SlideShare a Scribd company logo
1 of 7
Download to read offline
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
8
Bandwidth Aware FEC Algorithms for Wireless Communication
Systems
Salehe I. Mrutu*
, Sadath Kalolo, Mastidia Byanyuma, Christina Nyakyi and Anael Sam
The Nelson Mandela African Institute of Science and Technology, P. O. Box 447 Arusha, Tanzania
* E-mail of the corresponding author: mrutui@nm-aist.ac.tz
Abstract
Forward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission
add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall
network throughput, thus increasing the demand for more required bandwidth. In this paper we investigate and
discuss various techniques used in FEC and show their effects to data communication in terms of bandwidth
utilization. Additionally we propose improvement of (2, 1, 2) Convolutional encoder to (3, 2, 3) encoder. The
proposed improvements increase the code rate from 1/2 to 2/3 hence reducing error control information and
increasing bit rate. The received codeword can be decoded by Soft-Output Viterbi Algorithm.
Keywords: FEC, Bandwidth, Convolutional Codes, Code Rate, Soft Output Viterbi Algorithm
1. Introduction
In the recent years wireless communication industry has experienced a drastic growth of traffic volumes on its
networks. According to Cisco Visual Networking traffic update, the Global mobile data traffic grew by 70% in
2012(Cisco-Visual-Networking-Index, 2013). Global mobile data traffic reached 885 petabytes per month at the
end of 2012, up from 520 petabytes per month at the end of 2011(Cisco-Visual-Networking-Index, 2013). The
rapid traffic growth lies on large increase in the number of mobile devices users; the emerging of popular
bandwidth-intensive applications such as rich media gaming, streaming media, video conferencing, mapping
and navigation applications, telemedicine and virtue education applications as new services (Bazelon, Jackson,
& McHenry, 2011). The invention of new devices such as smart phones, tablets and notebooks that use the
aforementioned services contributes much to the situation (Hanzo et al., 2012). All of the above mentioned
reasons require the availability of wireless networks that are capable to offer more bandwidth or higher data rate.
Bandwidth allocation in wireless communication involves the process of assigning radio frequencies to different
applications. The radio frequency spectrum is a finite and limited natural resource which is increasingly in
demand due to a large growing number of wireless telecommunication services such as mobile phone, radio and
TV broadcasting, space research, environmental monitoring and other communication services that ensure
wellbeing of life in the world.
Mobile-cellular penetration rates stand at 96% globally; 128% in developed countries; and 89% in developing
Countries(ITU-ICT-Facts-and-Figures, 2013). In developing countries such as Tanzania 75% of people live in
rural areas which are characterized by inadequate resources such as teachers and books in schools, doctors in
health centers and other necessary facilities. The emergence of e-services such as e-education, virtual education,
e-health, telemedicine and other e-business services brings up new hope to reach remote and marginalized
communities in rural areas. However, most of the aforementioned services are bandwidth intensive and require
high data rate networks to operate in wireless communication systems. Contrary to that, Tanzanian rural areas are
characterized by limited ICT infrastructure that are dominated by low data rate such as GPRS, EDGE and VSAT
network services which are also too expensive for the rural population.
Despite the high demand for bandwidth a considerable portion of it is used to transfer control information rather
than actual or intended information. Communication systems are congested by various control information such
as error control, security and application format which are system use information. Any attempt to reduce these
control information while maintaining quality of service in data transmission favors the communication system
in two ways. First, more bandwidth is offered for the intended data (End user data) and therefore increasing the
capacity of the transmission network. Secondly, communication costs are reduced as end users are charged based
on the amount of bandwidth used during transmission of data.
This work proposes a new FEC Convolutional code model that reduces system error control information in
wireless communication systems. Thus, offering more room for actual user information to be delivered at the
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
9
same cost.
Section 2 of this paper presents the state of art of selected FEC algorithms with their bandwidth requirements.
Section 3 presents the proposed model of improved FEC Convolutional code and section 4 concludes this work.
2. State Of The Art
There are many types of FEC codes in use today; however, FEC codes are basically divided into two main
categories which are Block codes and Convolutional codes (Liumeng, 2011; Sijia & Zexi, 2011). Block codes
work on fixed-size blocks (packets) of bits or symbols of predetermined size. The output of block codes only
depends on the immediate inputs to the same block; while Convolutional codes work for bit or symbol streams
transmission with outputs that depends not only on the immediate input but also the previous inputs.
Convolution codes (CC) are one of the popular FEC codes in use today. This type of code was first introduced by
Elias in 1955(Morelos-Zaragoza, 2006). Through the age, FEC Convolutional code has found numerous
applications in wireless communication including digital terrestrial, satellite communication and broadcasting
systems and space communication systems (IMT-2000, GSM, IS-95,WiMAX (802.16), WCDMA, GPRS,
UMTS, CDMA 2000, DVB-T and DVB-S) (Morelos-Zaragoza, 2006). The most popular decoding mechanism
of CC is the Viterbi algorithm introduced by Viterbi in 1967(Viterbi, 1967). CCs have memory and are defined
as (n, k, m) codes, where n is the number of output bits, k is the number of input bits at a time, and m is the
memory length of encoder(Liumeng, 2011). If an encoder receives k bits of information as input at a time and
gives out n bits as output (codeword) at a time, then k/n is a code rate of that particular encoder. The common
code rate for this codes are 1/2,1/3, 1/4 (Johannesson & Stahl, 1999) and 4/8(Johannesson, Stahl, & Wittenmark,
2000).
To reduce the number of bits transmitted, various puncturing schemes are used which discard selected bits from
the encoder output. Typical puncture rates are 2/3, 3/4, 5/6, and 7/8. For example, a 3/4 puncture rate means that
for every 3 input bits, 4 output bits are transmitted from the encoder output rather than the 6 bits that are actually
generated. Puncturing can be implemented using external logic to the Convolutional encoder(Francis & Green,
2007). This allows the freedom to change between the various puncture rates but it increases data processing
load. Higher gains of CCs are also achieved by Convolutional Turbo Code (CTC) and concatenation of CCs with
other schemes (Benedetto, Garello, & Montorsi, 1998). A good example of this is DVB-T where Convolutional
code is concatenated with Reed Solomon as inner and outer code(Francis & Green, 2007).
According to ViaSat (ViaSat, 2013), CTCs perform extremely well at lower code rates. Communication systems
with less bandwidth and power constraints can use low rate concatenated code to achieve high coding gains or
very low error rates. However, tight bandwidth situations and power constraints communication system drive
this solution in opposite direction. Thus, demanding for an interleaver to be integrated into FEC systems to
enhance burst error dispersion as used in most of the contemporary communication systems (Francis & Green,
2007; ViaSat, 2013). More efforts are still needed to improve FEC codes to support communication systems to
meet modern applications bandwidth requirements.
Below are few selected FEC block codes that are used in serial or parallel concatenation with Convolutional
Codes. This selection includes Reed-Solomon (R-S) codes, Bose-Chaudhuri-Hochquenghem (BCH), Low
Density Parity Codes (LDPC) and Turbo Product Codes (TPC). In communication systems the aforementioned
codes are sometimes concatenated in either serial or parallel form to give a desired exceptional performance. In
serial arrangement there is inner and outer channel code. This fact makes the situation even worse as the extra
bandwidth required for the communication system is a total of all redundant bits in inner and outer code.
2.1 Reed Solomon (R-S)
R-S is a class of non-binary cyclic block codes defined by (n, k) code; where n is the output block size and k is
the number of information symbols and (n-k) gives a number of redundant information. This type of code is used
in communication systems as component code for building more powerful codes through concatenation such as
Reed Solomon Turbo Product Code (RS-TPC). R-S codes type has its application in WiMAX (802.16), DVB-T,
DVB-S, DVB-C, ISDB, DMB, DOCSIS and GPON.
2.2 Bose Chaudhuri Hacquenghem (BCH)
BCH is a class of cyclic block codes; it is used as a component for building more powerful codes. BCH encodes
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
10
k data bits into n code bits by adding n-k parity checking bits for the purpose of detecting and checking the errors.
Given the length of the codes n=2m-1 for any integer m≥3, we have t (where t<2m-1), as the bound of the error
correction. The number of parity checking bits is n-k≤ mt. Its applications are found in Video Broadcasting,
DVB-S2 and memory controllers.
2.3 Low Density Parity Codes (LDPC)
LDPC is a FEC linear block code defined by a very sparse parity check matrices which allow for parallel
iterative decoder. LDPC works with a code rate from 0.67 to 0.92 (Gho & Kahn, 2012), Applications of LDPC
are also in China Multimedia Mobile Broadcasting (CMMB), IEEE 802.11n-2009 (Wi-Fi standard), WiMAX,
VSAT, DVB-T2, DVB-C and DVB-S2
2.4 Turbo Product Codes (TPC)
TPC is a class of high-performance FEC codes developed in 1993, TPC are finding use in 3G mobile
communications and (deep space) satellite communications as well as other applications where designers seek to
achieve reliable information transfer over bandwidth or latency-constrained communication links in the presence
of data-corrupting noise(ViaSat, 2013). Code rates for selected FECs are presented in table 1.
Table 1: Selected FEC Codes with Their Corresponding Code Rates
In the next section, we present the proposed model of FEC convolution code to be used in application layer for
encoding and decoding data streams.
3. System Model
The model improves the (2, 1, 2) Convolutional encoder from four states (i.e. S0, S1 S2, and S3) to eight states (i.e.
S0, S1, S2, S3, S4, S5, S6, and S7). This improvement results into a two level encoder. The inner level states which
include the first four states (i.e. S0, S1 S2, and S3) and the outer level states that include the rest of the states (i.e.
S4, S5 S6, and S7). We assume that:
• The encoding process starts and ends at state S0.
• The implementation of the proposed code is in the application layer to support specific real time
applications.
At each state, there are four possible ways to move to other states, where two ways allow the encoder to move to
other two states of the same level and the other two ways to another level. All the same there are four possible
ways to enter a state from other states, where two ways come from states of the same level and another two ways
enter a state from states of another level as shown in the fig. 1.
3.1 Encoding
The encoding process in the fig. 1 starts and terminates at state S0. By following the arrows leaving a state, the
input/output labels (e.g. 01/011 representing 01 as input bits and 011 as the codeword associated to it) gives
guidance through the encoding process. We easily follow the arrows from state to another while taking care of
the input and codeword generated. Suppose the bits {10-11-10-00-01} are supplied as a string of input to the
encoder (starting with 10), then the encoder will produce the following string as codeword at the output {100-
111-110-011-011} and the encoder will change states from S0, S4, S5, S6, S0, to S1.
S/N Code Type Supported Code Rate
1 LPDC ≤ 1
2 TPC ≤ 0.93
3 CTC ≤ 0.83333
4 R-S ≤ 0.9375
5 BCH t<=12 ; t=1,2, (3)
6 CC ≤ 0.5
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
11
Figure 1: Proposed model of (3, 2, 3) convolution encoder
3.2 Decoding
The Soft-Decision Output Viterbi algorithm (SOVA) proposed by Viterbi (Viterbi, 1967) and improved by
Joachim Hagenauer and Peter Hoeher (Hagenauer & Hoeher, 1989) is used to decode the received bits. SOVA
decodes received data against random errors by comparing the received code sequence with every possible code
sequence of a node or state. A bit by bit comparison yield a branch metric also known as hamming distance
which is used to determine the most likely path of correct data.
Trellis diagram presented in fig. 2 contains information of states and uses time as a horizontal axis to show the
possible paths through the states. The decoding process starts at S0 where four possible branches with their
possible codes can be compared with the received codeword at the top. The path with minimum comparison
metrics is the most likely path with correct data. The comparison metrics are calculated cumulatively as you
move along from time zero onwards. Viterbi realized that at any stage when different paths converge into one
state, then only those paths with smaller hamming metric need to be remembered and not all paths. Therefore,
the surviving path with minimum hamming distance metrics is the winner path.
For example, the trellis diagram in fig. 2 shows how eight states are used to decode the received codewords
stream {100-111-110-011-011} to give back the original data stream {i.e. 10-11-10-00-01}.
Through the red colored path in the trellis diagram which shows how the decoding process moves through S0, S4,
S5, S6, S0, to S1.
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
12
Figure 2: Trellis diagram to show the path
4. Conclusion
We have discussed the selected FECs, their applications and respective code rates. The improved FEC
Convolutional Code model from (2, 1, 2) to (3, 2, 3) is also presented and enables the algorithm to improve the
code rate by 0.17 from 1/2 to 2/3 and hence reducing error control information in transmission media. The paper
shows clearly that the improved FEC Convolutional Code can significantly improve performance i.e data
throughput of wireless communication systems in comparison with the rate of 1/2 convolutional coding case.
Hence, the reduction of operational costs. The decoding process that uses the normal SOVA has also been
presented.
References
Bazelon, C., Jackson, C., & McHenry, G. (2011). An Engineering and Economic Analysis of the Prospects of
Reallocating Radio Spectrum from the Broadcast Band through the Use of Voluntary Incentive Auctions.
Benedetto, S., Garello, R., & Montorsi, G. (1998). A search for good convolutional codes to be used in the
construction of turbo codes. Communications, IEEE Transactions on, 46(9), 1101-1105.
Cisco-Visual-Networking-Index. (2013). Global Mobile Data Traffic Forecast Update, 2012-2017.
http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-
520862.html,.
Francis, M., & Green, R. (2007). Forward Error Correction in Digital Television Broadcast Systems. XILINX,
White Paper: Virtex-5, Virtex-4, Spartan-3, LogiCORE, WP27.
Gho, G.-H., & Kahn, J. M. (2012). Rate-adaptive modulation and low-density parity-check coding for optical
fiber transmission systems. Journal of Optical Communications and Networking, 4(10), 760-768.
Hagenauer, J., & Hoeher, P. (1989, 27-30 Nov 1989). A Viterbi algorithm with soft-decision outputs and its
applications. Paper presented at the Global Telecommunications Conference, 1989, and Exhibition.
Communications Technology for the 1990s and Beyond. GLOBECOM '89., IEEE.
Hanzo, L., Haas, H., Imre, S., O''Brien, D., Rupp, M., & Gyongyosi, L. (2012). Wireless Myths, Realities, and
Futures: From 3G/4G to Optical and Quantum Wireless. Proceedings of the IEEE, 100(Special
Centennial Issue), 1853-1888. doi: 10.1109/JPROC.2012.2189788
ITU-ICT-Facts-and-Figures. (2013). The World in 2013: ICT Facts and Figures. http://www.itu.int/en/ITU-
D/Statistics/Documents/facts/ICTFactsFigures2013.pdf.
Johannesson, R., & Stahl, P. (1999). New rate 1/2, 1/3, and 1/4 binary convolutional encoders with an optimum
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
13
distance profile. Information Theory, IEEE Transactions on, 45(5), 1653-1658.
Johannesson, R., Stahl, P., & Wittenmark, E. (2000). A note on type II convolutional codes. Information Theory,
IEEE Transactions on, 46(4), 1510-1514.
Liumeng, S. (2011). Application and Principle of Error Corrected Encoding Technology. Energy Procedia,
Elsevier Ltd., 13, 9087-9092.
Morelos-Zaragoza, R. H. (2006). The Art of Error Correcting Coding (Second Edition ed.): John Wiley & Sons,
Ltd.;The Atrium, Southern Gate, Chichester,West Sussex PO19 8SQ, England.
Sijia, H., & Zexi, Z. (2011, 9-11 Sept. 2011). Principles of FECs with evaluating different types of FEC used in
the Internet and wireless networks. Paper presented at the Electronics, Communications and Control
(ICECC), 2011 International Conference on.
ViaSat. (2013). Convolutional Turbo Codes (CTCs) Retrieved 10-May 2013, from
http://www.viasat.com/convolutional-turbo-codes-ctcs
Viterbi, A. J. (1967). Error bounds for convolutional codes and an asymptotically optimum decoding algorithm.
Information Theory, IEEE Transactions on, 13(2), 260-269. doi: 10.1109/tit.1967.1054010
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/ The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...ijtsrd
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
Potential key challenges for terahertz communication systems
Potential key challenges for terahertz communication systems Potential key challenges for terahertz communication systems
Potential key challenges for terahertz communication systems IJECEIAES
 
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiTraffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiShristi Pradhan
 
A Review on Cooperative Communication Protocols in Wireless World
A Review on Cooperative Communication  Protocols in Wireless World A Review on Cooperative Communication  Protocols in Wireless World
A Review on Cooperative Communication Protocols in Wireless World ijwmn
 
WiFi Transmit Power and its Effect on Co-Channel Interference
WiFi Transmit Power and its Effect on Co-Channel InterferenceWiFi Transmit Power and its Effect on Co-Channel Interference
WiFi Transmit Power and its Effect on Co-Channel InterferenceIJCNCJournal
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architectureIAEME Publication
 
A survey on multiple access technologies beyond fourth generation wireless co...
A survey on multiple access technologies beyond fourth generation wireless co...A survey on multiple access technologies beyond fourth generation wireless co...
A survey on multiple access technologies beyond fourth generation wireless co...ijceronline
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
 
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...iosrjce
 
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
 

What's hot (17)

Mn2521592162
Mn2521592162Mn2521592162
Mn2521592162
 
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
 
Introduction wcn
Introduction wcnIntroduction wcn
Introduction wcn
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
Potential key challenges for terahertz communication systems
Potential key challenges for terahertz communication systems Potential key challenges for terahertz communication systems
Potential key challenges for terahertz communication systems
 
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiTraffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
 
A Review on Cooperative Communication Protocols in Wireless World
A Review on Cooperative Communication  Protocols in Wireless World A Review on Cooperative Communication  Protocols in Wireless World
A Review on Cooperative Communication Protocols in Wireless World
 
WiFi Transmit Power and its Effect on Co-Channel Interference
WiFi Transmit Power and its Effect on Co-Channel InterferenceWiFi Transmit Power and its Effect on Co-Channel Interference
WiFi Transmit Power and its Effect on Co-Channel Interference
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architecture
 
LTE Vision 2020
LTE Vision 2020LTE Vision 2020
LTE Vision 2020
 
LTE_D2D
LTE_D2DLTE_D2D
LTE_D2D
 
A survey on multiple access technologies beyond fourth generation wireless co...
A survey on multiple access technologies beyond fourth generation wireless co...A survey on multiple access technologies beyond fourth generation wireless co...
A survey on multiple access technologies beyond fourth generation wireless co...
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
 
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of things
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 

Similar to Bandwidth aware fec algorithms for wireless communication systems

Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...IJECEIAES
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...theijes
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...Zac Darcy
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsIOSR Journals
 
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...IJERA Editor
 
An effective technique for increasing capacity and improving bandwidth in 5G ...
An effective technique for increasing capacity and improving bandwidth in 5G ...An effective technique for increasing capacity and improving bandwidth in 5G ...
An effective technique for increasing capacity and improving bandwidth in 5G ...IJECEIAES
 
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...cscpconf
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
 
ID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptxID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptxDrSNAVANEETHAN
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
 
A collaborative physical layer security scheme
A collaborative physical layer security schemeA collaborative physical layer security scheme
A collaborative physical layer security schemeIJECEIAES
 

Similar to Bandwidth aware fec algorithms for wireless communication systems (20)

Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
 
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
 
An effective technique for increasing capacity and improving bandwidth in 5G ...
An effective technique for increasing capacity and improving bandwidth in 5G ...An effective technique for increasing capacity and improving bandwidth in 5G ...
An effective technique for increasing capacity and improving bandwidth in 5G ...
 
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
ID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptxID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptx
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
 
A collaborative physical layer security scheme
A collaborative physical layer security schemeA collaborative physical layer security scheme
A collaborative physical layer security scheme
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Bandwidth aware fec algorithms for wireless communication systems

  • 1. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 8 Bandwidth Aware FEC Algorithms for Wireless Communication Systems Salehe I. Mrutu* , Sadath Kalolo, Mastidia Byanyuma, Christina Nyakyi and Anael Sam The Nelson Mandela African Institute of Science and Technology, P. O. Box 447 Arusha, Tanzania * E-mail of the corresponding author: mrutui@nm-aist.ac.tz Abstract Forward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall network throughput, thus increasing the demand for more required bandwidth. In this paper we investigate and discuss various techniques used in FEC and show their effects to data communication in terms of bandwidth utilization. Additionally we propose improvement of (2, 1, 2) Convolutional encoder to (3, 2, 3) encoder. The proposed improvements increase the code rate from 1/2 to 2/3 hence reducing error control information and increasing bit rate. The received codeword can be decoded by Soft-Output Viterbi Algorithm. Keywords: FEC, Bandwidth, Convolutional Codes, Code Rate, Soft Output Viterbi Algorithm 1. Introduction In the recent years wireless communication industry has experienced a drastic growth of traffic volumes on its networks. According to Cisco Visual Networking traffic update, the Global mobile data traffic grew by 70% in 2012(Cisco-Visual-Networking-Index, 2013). Global mobile data traffic reached 885 petabytes per month at the end of 2012, up from 520 petabytes per month at the end of 2011(Cisco-Visual-Networking-Index, 2013). The rapid traffic growth lies on large increase in the number of mobile devices users; the emerging of popular bandwidth-intensive applications such as rich media gaming, streaming media, video conferencing, mapping and navigation applications, telemedicine and virtue education applications as new services (Bazelon, Jackson, & McHenry, 2011). The invention of new devices such as smart phones, tablets and notebooks that use the aforementioned services contributes much to the situation (Hanzo et al., 2012). All of the above mentioned reasons require the availability of wireless networks that are capable to offer more bandwidth or higher data rate. Bandwidth allocation in wireless communication involves the process of assigning radio frequencies to different applications. The radio frequency spectrum is a finite and limited natural resource which is increasingly in demand due to a large growing number of wireless telecommunication services such as mobile phone, radio and TV broadcasting, space research, environmental monitoring and other communication services that ensure wellbeing of life in the world. Mobile-cellular penetration rates stand at 96% globally; 128% in developed countries; and 89% in developing Countries(ITU-ICT-Facts-and-Figures, 2013). In developing countries such as Tanzania 75% of people live in rural areas which are characterized by inadequate resources such as teachers and books in schools, doctors in health centers and other necessary facilities. The emergence of e-services such as e-education, virtual education, e-health, telemedicine and other e-business services brings up new hope to reach remote and marginalized communities in rural areas. However, most of the aforementioned services are bandwidth intensive and require high data rate networks to operate in wireless communication systems. Contrary to that, Tanzanian rural areas are characterized by limited ICT infrastructure that are dominated by low data rate such as GPRS, EDGE and VSAT network services which are also too expensive for the rural population. Despite the high demand for bandwidth a considerable portion of it is used to transfer control information rather than actual or intended information. Communication systems are congested by various control information such as error control, security and application format which are system use information. Any attempt to reduce these control information while maintaining quality of service in data transmission favors the communication system in two ways. First, more bandwidth is offered for the intended data (End user data) and therefore increasing the capacity of the transmission network. Secondly, communication costs are reduced as end users are charged based on the amount of bandwidth used during transmission of data. This work proposes a new FEC Convolutional code model that reduces system error control information in wireless communication systems. Thus, offering more room for actual user information to be delivered at the
  • 2. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 9 same cost. Section 2 of this paper presents the state of art of selected FEC algorithms with their bandwidth requirements. Section 3 presents the proposed model of improved FEC Convolutional code and section 4 concludes this work. 2. State Of The Art There are many types of FEC codes in use today; however, FEC codes are basically divided into two main categories which are Block codes and Convolutional codes (Liumeng, 2011; Sijia & Zexi, 2011). Block codes work on fixed-size blocks (packets) of bits or symbols of predetermined size. The output of block codes only depends on the immediate inputs to the same block; while Convolutional codes work for bit or symbol streams transmission with outputs that depends not only on the immediate input but also the previous inputs. Convolution codes (CC) are one of the popular FEC codes in use today. This type of code was first introduced by Elias in 1955(Morelos-Zaragoza, 2006). Through the age, FEC Convolutional code has found numerous applications in wireless communication including digital terrestrial, satellite communication and broadcasting systems and space communication systems (IMT-2000, GSM, IS-95,WiMAX (802.16), WCDMA, GPRS, UMTS, CDMA 2000, DVB-T and DVB-S) (Morelos-Zaragoza, 2006). The most popular decoding mechanism of CC is the Viterbi algorithm introduced by Viterbi in 1967(Viterbi, 1967). CCs have memory and are defined as (n, k, m) codes, where n is the number of output bits, k is the number of input bits at a time, and m is the memory length of encoder(Liumeng, 2011). If an encoder receives k bits of information as input at a time and gives out n bits as output (codeword) at a time, then k/n is a code rate of that particular encoder. The common code rate for this codes are 1/2,1/3, 1/4 (Johannesson & Stahl, 1999) and 4/8(Johannesson, Stahl, & Wittenmark, 2000). To reduce the number of bits transmitted, various puncturing schemes are used which discard selected bits from the encoder output. Typical puncture rates are 2/3, 3/4, 5/6, and 7/8. For example, a 3/4 puncture rate means that for every 3 input bits, 4 output bits are transmitted from the encoder output rather than the 6 bits that are actually generated. Puncturing can be implemented using external logic to the Convolutional encoder(Francis & Green, 2007). This allows the freedom to change between the various puncture rates but it increases data processing load. Higher gains of CCs are also achieved by Convolutional Turbo Code (CTC) and concatenation of CCs with other schemes (Benedetto, Garello, & Montorsi, 1998). A good example of this is DVB-T where Convolutional code is concatenated with Reed Solomon as inner and outer code(Francis & Green, 2007). According to ViaSat (ViaSat, 2013), CTCs perform extremely well at lower code rates. Communication systems with less bandwidth and power constraints can use low rate concatenated code to achieve high coding gains or very low error rates. However, tight bandwidth situations and power constraints communication system drive this solution in opposite direction. Thus, demanding for an interleaver to be integrated into FEC systems to enhance burst error dispersion as used in most of the contemporary communication systems (Francis & Green, 2007; ViaSat, 2013). More efforts are still needed to improve FEC codes to support communication systems to meet modern applications bandwidth requirements. Below are few selected FEC block codes that are used in serial or parallel concatenation with Convolutional Codes. This selection includes Reed-Solomon (R-S) codes, Bose-Chaudhuri-Hochquenghem (BCH), Low Density Parity Codes (LDPC) and Turbo Product Codes (TPC). In communication systems the aforementioned codes are sometimes concatenated in either serial or parallel form to give a desired exceptional performance. In serial arrangement there is inner and outer channel code. This fact makes the situation even worse as the extra bandwidth required for the communication system is a total of all redundant bits in inner and outer code. 2.1 Reed Solomon (R-S) R-S is a class of non-binary cyclic block codes defined by (n, k) code; where n is the output block size and k is the number of information symbols and (n-k) gives a number of redundant information. This type of code is used in communication systems as component code for building more powerful codes through concatenation such as Reed Solomon Turbo Product Code (RS-TPC). R-S codes type has its application in WiMAX (802.16), DVB-T, DVB-S, DVB-C, ISDB, DMB, DOCSIS and GPON. 2.2 Bose Chaudhuri Hacquenghem (BCH) BCH is a class of cyclic block codes; it is used as a component for building more powerful codes. BCH encodes
  • 3. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 10 k data bits into n code bits by adding n-k parity checking bits for the purpose of detecting and checking the errors. Given the length of the codes n=2m-1 for any integer m≥3, we have t (where t<2m-1), as the bound of the error correction. The number of parity checking bits is n-k≤ mt. Its applications are found in Video Broadcasting, DVB-S2 and memory controllers. 2.3 Low Density Parity Codes (LDPC) LDPC is a FEC linear block code defined by a very sparse parity check matrices which allow for parallel iterative decoder. LDPC works with a code rate from 0.67 to 0.92 (Gho & Kahn, 2012), Applications of LDPC are also in China Multimedia Mobile Broadcasting (CMMB), IEEE 802.11n-2009 (Wi-Fi standard), WiMAX, VSAT, DVB-T2, DVB-C and DVB-S2 2.4 Turbo Product Codes (TPC) TPC is a class of high-performance FEC codes developed in 1993, TPC are finding use in 3G mobile communications and (deep space) satellite communications as well as other applications where designers seek to achieve reliable information transfer over bandwidth or latency-constrained communication links in the presence of data-corrupting noise(ViaSat, 2013). Code rates for selected FECs are presented in table 1. Table 1: Selected FEC Codes with Their Corresponding Code Rates In the next section, we present the proposed model of FEC convolution code to be used in application layer for encoding and decoding data streams. 3. System Model The model improves the (2, 1, 2) Convolutional encoder from four states (i.e. S0, S1 S2, and S3) to eight states (i.e. S0, S1, S2, S3, S4, S5, S6, and S7). This improvement results into a two level encoder. The inner level states which include the first four states (i.e. S0, S1 S2, and S3) and the outer level states that include the rest of the states (i.e. S4, S5 S6, and S7). We assume that: • The encoding process starts and ends at state S0. • The implementation of the proposed code is in the application layer to support specific real time applications. At each state, there are four possible ways to move to other states, where two ways allow the encoder to move to other two states of the same level and the other two ways to another level. All the same there are four possible ways to enter a state from other states, where two ways come from states of the same level and another two ways enter a state from states of another level as shown in the fig. 1. 3.1 Encoding The encoding process in the fig. 1 starts and terminates at state S0. By following the arrows leaving a state, the input/output labels (e.g. 01/011 representing 01 as input bits and 011 as the codeword associated to it) gives guidance through the encoding process. We easily follow the arrows from state to another while taking care of the input and codeword generated. Suppose the bits {10-11-10-00-01} are supplied as a string of input to the encoder (starting with 10), then the encoder will produce the following string as codeword at the output {100- 111-110-011-011} and the encoder will change states from S0, S4, S5, S6, S0, to S1. S/N Code Type Supported Code Rate 1 LPDC ≤ 1 2 TPC ≤ 0.93 3 CTC ≤ 0.83333 4 R-S ≤ 0.9375 5 BCH t<=12 ; t=1,2, (3) 6 CC ≤ 0.5
  • 4. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 11 Figure 1: Proposed model of (3, 2, 3) convolution encoder 3.2 Decoding The Soft-Decision Output Viterbi algorithm (SOVA) proposed by Viterbi (Viterbi, 1967) and improved by Joachim Hagenauer and Peter Hoeher (Hagenauer & Hoeher, 1989) is used to decode the received bits. SOVA decodes received data against random errors by comparing the received code sequence with every possible code sequence of a node or state. A bit by bit comparison yield a branch metric also known as hamming distance which is used to determine the most likely path of correct data. Trellis diagram presented in fig. 2 contains information of states and uses time as a horizontal axis to show the possible paths through the states. The decoding process starts at S0 where four possible branches with their possible codes can be compared with the received codeword at the top. The path with minimum comparison metrics is the most likely path with correct data. The comparison metrics are calculated cumulatively as you move along from time zero onwards. Viterbi realized that at any stage when different paths converge into one state, then only those paths with smaller hamming metric need to be remembered and not all paths. Therefore, the surviving path with minimum hamming distance metrics is the winner path. For example, the trellis diagram in fig. 2 shows how eight states are used to decode the received codewords stream {100-111-110-011-011} to give back the original data stream {i.e. 10-11-10-00-01}. Through the red colored path in the trellis diagram which shows how the decoding process moves through S0, S4, S5, S6, S0, to S1.
  • 5. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 12 Figure 2: Trellis diagram to show the path 4. Conclusion We have discussed the selected FECs, their applications and respective code rates. The improved FEC Convolutional Code model from (2, 1, 2) to (3, 2, 3) is also presented and enables the algorithm to improve the code rate by 0.17 from 1/2 to 2/3 and hence reducing error control information in transmission media. The paper shows clearly that the improved FEC Convolutional Code can significantly improve performance i.e data throughput of wireless communication systems in comparison with the rate of 1/2 convolutional coding case. Hence, the reduction of operational costs. The decoding process that uses the normal SOVA has also been presented. References Bazelon, C., Jackson, C., & McHenry, G. (2011). An Engineering and Economic Analysis of the Prospects of Reallocating Radio Spectrum from the Broadcast Band through the Use of Voluntary Incentive Auctions. Benedetto, S., Garello, R., & Montorsi, G. (1998). A search for good convolutional codes to be used in the construction of turbo codes. Communications, IEEE Transactions on, 46(9), 1101-1105. Cisco-Visual-Networking-Index. (2013). Global Mobile Data Traffic Forecast Update, 2012-2017. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11- 520862.html,. Francis, M., & Green, R. (2007). Forward Error Correction in Digital Television Broadcast Systems. XILINX, White Paper: Virtex-5, Virtex-4, Spartan-3, LogiCORE, WP27. Gho, G.-H., & Kahn, J. M. (2012). Rate-adaptive modulation and low-density parity-check coding for optical fiber transmission systems. Journal of Optical Communications and Networking, 4(10), 760-768. Hagenauer, J., & Hoeher, P. (1989, 27-30 Nov 1989). A Viterbi algorithm with soft-decision outputs and its applications. Paper presented at the Global Telecommunications Conference, 1989, and Exhibition. Communications Technology for the 1990s and Beyond. GLOBECOM '89., IEEE. Hanzo, L., Haas, H., Imre, S., O''Brien, D., Rupp, M., & Gyongyosi, L. (2012). Wireless Myths, Realities, and Futures: From 3G/4G to Optical and Quantum Wireless. Proceedings of the IEEE, 100(Special Centennial Issue), 1853-1888. doi: 10.1109/JPROC.2012.2189788 ITU-ICT-Facts-and-Figures. (2013). The World in 2013: ICT Facts and Figures. http://www.itu.int/en/ITU- D/Statistics/Documents/facts/ICTFactsFigures2013.pdf. Johannesson, R., & Stahl, P. (1999). New rate 1/2, 1/3, and 1/4 binary convolutional encoders with an optimum
  • 6. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 13 distance profile. Information Theory, IEEE Transactions on, 45(5), 1653-1658. Johannesson, R., Stahl, P., & Wittenmark, E. (2000). A note on type II convolutional codes. Information Theory, IEEE Transactions on, 46(4), 1510-1514. Liumeng, S. (2011). Application and Principle of Error Corrected Encoding Technology. Energy Procedia, Elsevier Ltd., 13, 9087-9092. Morelos-Zaragoza, R. H. (2006). The Art of Error Correcting Coding (Second Edition ed.): John Wiley & Sons, Ltd.;The Atrium, Southern Gate, Chichester,West Sussex PO19 8SQ, England. Sijia, H., & Zexi, Z. (2011, 9-11 Sept. 2011). Principles of FECs with evaluating different types of FEC used in the Internet and wireless networks. Paper presented at the Electronics, Communications and Control (ICECC), 2011 International Conference on. ViaSat. (2013). Convolutional Turbo Codes (CTCs) Retrieved 10-May 2013, from http://www.viasat.com/convolutional-turbo-codes-ctcs Viterbi, A. J. (1967). Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. Information Theory, IEEE Transactions on, 13(2), 260-269. doi: 10.1109/tit.1967.1054010
  • 7. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar