SlideShare a Scribd company logo
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
8
Bandwidth Aware FEC Algorithms for Wireless Communication
Systems
Salehe I. Mrutu*
, Sadath Kalolo, Mastidia Byanyuma, Christina Nyakyi and Anael Sam
The Nelson Mandela African Institute of Science and Technology, P. O. Box 447 Arusha, Tanzania
* E-mail of the corresponding author: mrutui@nm-aist.ac.tz
Abstract
Forward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission
add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall
network throughput, thus increasing the demand for more required bandwidth. In this paper we investigate and
discuss various techniques used in FEC and show their effects to data communication in terms of bandwidth
utilization. Additionally we propose improvement of (2, 1, 2) Convolutional encoder to (3, 2, 3) encoder. The
proposed improvements increase the code rate from 1/2 to 2/3 hence reducing error control information and
increasing bit rate. The received codeword can be decoded by Soft-Output Viterbi Algorithm.
Keywords: FEC, Bandwidth, Convolutional Codes, Code Rate, Soft Output Viterbi Algorithm
1. Introduction
In the recent years wireless communication industry has experienced a drastic growth of traffic volumes on its
networks. According to Cisco Visual Networking traffic update, the Global mobile data traffic grew by 70% in
2012(Cisco-Visual-Networking-Index, 2013). Global mobile data traffic reached 885 petabytes per month at the
end of 2012, up from 520 petabytes per month at the end of 2011(Cisco-Visual-Networking-Index, 2013). The
rapid traffic growth lies on large increase in the number of mobile devices users; the emerging of popular
bandwidth-intensive applications such as rich media gaming, streaming media, video conferencing, mapping
and navigation applications, telemedicine and virtue education applications as new services (Bazelon, Jackson,
& McHenry, 2011). The invention of new devices such as smart phones, tablets and notebooks that use the
aforementioned services contributes much to the situation (Hanzo et al., 2012). All of the above mentioned
reasons require the availability of wireless networks that are capable to offer more bandwidth or higher data rate.
Bandwidth allocation in wireless communication involves the process of assigning radio frequencies to different
applications. The radio frequency spectrum is a finite and limited natural resource which is increasingly in
demand due to a large growing number of wireless telecommunication services such as mobile phone, radio and
TV broadcasting, space research, environmental monitoring and other communication services that ensure
wellbeing of life in the world.
Mobile-cellular penetration rates stand at 96% globally; 128% in developed countries; and 89% in developing
Countries(ITU-ICT-Facts-and-Figures, 2013). In developing countries such as Tanzania 75% of people live in
rural areas which are characterized by inadequate resources such as teachers and books in schools, doctors in
health centers and other necessary facilities. The emergence of e-services such as e-education, virtual education,
e-health, telemedicine and other e-business services brings up new hope to reach remote and marginalized
communities in rural areas. However, most of the aforementioned services are bandwidth intensive and require
high data rate networks to operate in wireless communication systems. Contrary to that, Tanzanian rural areas are
characterized by limited ICT infrastructure that are dominated by low data rate such as GPRS, EDGE and VSAT
network services which are also too expensive for the rural population.
Despite the high demand for bandwidth a considerable portion of it is used to transfer control information rather
than actual or intended information. Communication systems are congested by various control information such
as error control, security and application format which are system use information. Any attempt to reduce these
control information while maintaining quality of service in data transmission favors the communication system
in two ways. First, more bandwidth is offered for the intended data (End user data) and therefore increasing the
capacity of the transmission network. Secondly, communication costs are reduced as end users are charged based
on the amount of bandwidth used during transmission of data.
This work proposes a new FEC Convolutional code model that reduces system error control information in
wireless communication systems. Thus, offering more room for actual user information to be delivered at the
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
9
same cost.
Section 2 of this paper presents the state of art of selected FEC algorithms with their bandwidth requirements.
Section 3 presents the proposed model of improved FEC Convolutional code and section 4 concludes this work.
2. State Of The Art
There are many types of FEC codes in use today; however, FEC codes are basically divided into two main
categories which are Block codes and Convolutional codes (Liumeng, 2011; Sijia & Zexi, 2011). Block codes
work on fixed-size blocks (packets) of bits or symbols of predetermined size. The output of block codes only
depends on the immediate inputs to the same block; while Convolutional codes work for bit or symbol streams
transmission with outputs that depends not only on the immediate input but also the previous inputs.
Convolution codes (CC) are one of the popular FEC codes in use today. This type of code was first introduced by
Elias in 1955(Morelos-Zaragoza, 2006). Through the age, FEC Convolutional code has found numerous
applications in wireless communication including digital terrestrial, satellite communication and broadcasting
systems and space communication systems (IMT-2000, GSM, IS-95,WiMAX (802.16), WCDMA, GPRS,
UMTS, CDMA 2000, DVB-T and DVB-S) (Morelos-Zaragoza, 2006). The most popular decoding mechanism
of CC is the Viterbi algorithm introduced by Viterbi in 1967(Viterbi, 1967). CCs have memory and are defined
as (n, k, m) codes, where n is the number of output bits, k is the number of input bits at a time, and m is the
memory length of encoder(Liumeng, 2011). If an encoder receives k bits of information as input at a time and
gives out n bits as output (codeword) at a time, then k/n is a code rate of that particular encoder. The common
code rate for this codes are 1/2,1/3, 1/4 (Johannesson & Stahl, 1999) and 4/8(Johannesson, Stahl, & Wittenmark,
2000).
To reduce the number of bits transmitted, various puncturing schemes are used which discard selected bits from
the encoder output. Typical puncture rates are 2/3, 3/4, 5/6, and 7/8. For example, a 3/4 puncture rate means that
for every 3 input bits, 4 output bits are transmitted from the encoder output rather than the 6 bits that are actually
generated. Puncturing can be implemented using external logic to the Convolutional encoder(Francis & Green,
2007). This allows the freedom to change between the various puncture rates but it increases data processing
load. Higher gains of CCs are also achieved by Convolutional Turbo Code (CTC) and concatenation of CCs with
other schemes (Benedetto, Garello, & Montorsi, 1998). A good example of this is DVB-T where Convolutional
code is concatenated with Reed Solomon as inner and outer code(Francis & Green, 2007).
According to ViaSat (ViaSat, 2013), CTCs perform extremely well at lower code rates. Communication systems
with less bandwidth and power constraints can use low rate concatenated code to achieve high coding gains or
very low error rates. However, tight bandwidth situations and power constraints communication system drive
this solution in opposite direction. Thus, demanding for an interleaver to be integrated into FEC systems to
enhance burst error dispersion as used in most of the contemporary communication systems (Francis & Green,
2007; ViaSat, 2013). More efforts are still needed to improve FEC codes to support communication systems to
meet modern applications bandwidth requirements.
Below are few selected FEC block codes that are used in serial or parallel concatenation with Convolutional
Codes. This selection includes Reed-Solomon (R-S) codes, Bose-Chaudhuri-Hochquenghem (BCH), Low
Density Parity Codes (LDPC) and Turbo Product Codes (TPC). In communication systems the aforementioned
codes are sometimes concatenated in either serial or parallel form to give a desired exceptional performance. In
serial arrangement there is inner and outer channel code. This fact makes the situation even worse as the extra
bandwidth required for the communication system is a total of all redundant bits in inner and outer code.
2.1 Reed Solomon (R-S)
R-S is a class of non-binary cyclic block codes defined by (n, k) code; where n is the output block size and k is
the number of information symbols and (n-k) gives a number of redundant information. This type of code is used
in communication systems as component code for building more powerful codes through concatenation such as
Reed Solomon Turbo Product Code (RS-TPC). R-S codes type has its application in WiMAX (802.16), DVB-T,
DVB-S, DVB-C, ISDB, DMB, DOCSIS and GPON.
2.2 Bose Chaudhuri Hacquenghem (BCH)
BCH is a class of cyclic block codes; it is used as a component for building more powerful codes. BCH encodes
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
10
k data bits into n code bits by adding n-k parity checking bits for the purpose of detecting and checking the errors.
Given the length of the codes n=2m-1 for any integer m≥3, we have t (where t<2m-1), as the bound of the error
correction. The number of parity checking bits is n-k≤ mt. Its applications are found in Video Broadcasting,
DVB-S2 and memory controllers.
2.3 Low Density Parity Codes (LDPC)
LDPC is a FEC linear block code defined by a very sparse parity check matrices which allow for parallel
iterative decoder. LDPC works with a code rate from 0.67 to 0.92 (Gho & Kahn, 2012), Applications of LDPC
are also in China Multimedia Mobile Broadcasting (CMMB), IEEE 802.11n-2009 (Wi-Fi standard), WiMAX,
VSAT, DVB-T2, DVB-C and DVB-S2
2.4 Turbo Product Codes (TPC)
TPC is a class of high-performance FEC codes developed in 1993, TPC are finding use in 3G mobile
communications and (deep space) satellite communications as well as other applications where designers seek to
achieve reliable information transfer over bandwidth or latency-constrained communication links in the presence
of data-corrupting noise(ViaSat, 2013). Code rates for selected FECs are presented in table 1.
Table 1: Selected FEC Codes with Their Corresponding Code Rates
In the next section, we present the proposed model of FEC convolution code to be used in application layer for
encoding and decoding data streams.
3. System Model
The model improves the (2, 1, 2) Convolutional encoder from four states (i.e. S0, S1 S2, and S3) to eight states (i.e.
S0, S1, S2, S3, S4, S5, S6, and S7). This improvement results into a two level encoder. The inner level states which
include the first four states (i.e. S0, S1 S2, and S3) and the outer level states that include the rest of the states (i.e.
S4, S5 S6, and S7). We assume that:
• The encoding process starts and ends at state S0.
• The implementation of the proposed code is in the application layer to support specific real time
applications.
At each state, there are four possible ways to move to other states, where two ways allow the encoder to move to
other two states of the same level and the other two ways to another level. All the same there are four possible
ways to enter a state from other states, where two ways come from states of the same level and another two ways
enter a state from states of another level as shown in the fig. 1.
3.1 Encoding
The encoding process in the fig. 1 starts and terminates at state S0. By following the arrows leaving a state, the
input/output labels (e.g. 01/011 representing 01 as input bits and 011 as the codeword associated to it) gives
guidance through the encoding process. We easily follow the arrows from state to another while taking care of
the input and codeword generated. Suppose the bits {10-11-10-00-01} are supplied as a string of input to the
encoder (starting with 10), then the encoder will produce the following string as codeword at the output {100-
111-110-011-011} and the encoder will change states from S0, S4, S5, S6, S0, to S1.
S/N Code Type Supported Code Rate
1 LPDC ≤ 1
2 TPC ≤ 0.93
3 CTC ≤ 0.83333
4 R-S ≤ 0.9375
5 BCH t<=12 ; t=1,2, (3)
6 CC ≤ 0.5
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
11
Figure 1: Proposed model of (3, 2, 3) convolution encoder
3.2 Decoding
The Soft-Decision Output Viterbi algorithm (SOVA) proposed by Viterbi (Viterbi, 1967) and improved by
Joachim Hagenauer and Peter Hoeher (Hagenauer & Hoeher, 1989) is used to decode the received bits. SOVA
decodes received data against random errors by comparing the received code sequence with every possible code
sequence of a node or state. A bit by bit comparison yield a branch metric also known as hamming distance
which is used to determine the most likely path of correct data.
Trellis diagram presented in fig. 2 contains information of states and uses time as a horizontal axis to show the
possible paths through the states. The decoding process starts at S0 where four possible branches with their
possible codes can be compared with the received codeword at the top. The path with minimum comparison
metrics is the most likely path with correct data. The comparison metrics are calculated cumulatively as you
move along from time zero onwards. Viterbi realized that at any stage when different paths converge into one
state, then only those paths with smaller hamming metric need to be remembered and not all paths. Therefore,
the surviving path with minimum hamming distance metrics is the winner path.
For example, the trellis diagram in fig. 2 shows how eight states are used to decode the received codewords
stream {100-111-110-011-011} to give back the original data stream {i.e. 10-11-10-00-01}.
Through the red colored path in the trellis diagram which shows how the decoding process moves through S0, S4,
S5, S6, S0, to S1.
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
12
Figure 2: Trellis diagram to show the path
4. Conclusion
We have discussed the selected FECs, their applications and respective code rates. The improved FEC
Convolutional Code model from (2, 1, 2) to (3, 2, 3) is also presented and enables the algorithm to improve the
code rate by 0.17 from 1/2 to 2/3 and hence reducing error control information in transmission media. The paper
shows clearly that the improved FEC Convolutional Code can significantly improve performance i.e data
throughput of wireless communication systems in comparison with the rate of 1/2 convolutional coding case.
Hence, the reduction of operational costs. The decoding process that uses the normal SOVA has also been
presented.
References
Bazelon, C., Jackson, C., & McHenry, G. (2011). An Engineering and Economic Analysis of the Prospects of
Reallocating Radio Spectrum from the Broadcast Band through the Use of Voluntary Incentive Auctions.
Benedetto, S., Garello, R., & Montorsi, G. (1998). A search for good convolutional codes to be used in the
construction of turbo codes. Communications, IEEE Transactions on, 46(9), 1101-1105.
Cisco-Visual-Networking-Index. (2013). Global Mobile Data Traffic Forecast Update, 2012-2017.
http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-
520862.html,.
Francis, M., & Green, R. (2007). Forward Error Correction in Digital Television Broadcast Systems. XILINX,
White Paper: Virtex-5, Virtex-4, Spartan-3, LogiCORE, WP27.
Gho, G.-H., & Kahn, J. M. (2012). Rate-adaptive modulation and low-density parity-check coding for optical
fiber transmission systems. Journal of Optical Communications and Networking, 4(10), 760-768.
Hagenauer, J., & Hoeher, P. (1989, 27-30 Nov 1989). A Viterbi algorithm with soft-decision outputs and its
applications. Paper presented at the Global Telecommunications Conference, 1989, and Exhibition.
Communications Technology for the 1990s and Beyond. GLOBECOM '89., IEEE.
Hanzo, L., Haas, H., Imre, S., O''Brien, D., Rupp, M., & Gyongyosi, L. (2012). Wireless Myths, Realities, and
Futures: From 3G/4G to Optical and Quantum Wireless. Proceedings of the IEEE, 100(Special
Centennial Issue), 1853-1888. doi: 10.1109/JPROC.2012.2189788
ITU-ICT-Facts-and-Figures. (2013). The World in 2013: ICT Facts and Figures. http://www.itu.int/en/ITU-
D/Statistics/Documents/facts/ICTFactsFigures2013.pdf.
Johannesson, R., & Stahl, P. (1999). New rate 1/2, 1/3, and 1/4 binary convolutional encoders with an optimum
Control Theory and Informatics www.iiste.org
ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online)
Vol.3, No.3, 2013
13
distance profile. Information Theory, IEEE Transactions on, 45(5), 1653-1658.
Johannesson, R., Stahl, P., & Wittenmark, E. (2000). A note on type II convolutional codes. Information Theory,
IEEE Transactions on, 46(4), 1510-1514.
Liumeng, S. (2011). Application and Principle of Error Corrected Encoding Technology. Energy Procedia,
Elsevier Ltd., 13, 9087-9092.
Morelos-Zaragoza, R. H. (2006). The Art of Error Correcting Coding (Second Edition ed.): John Wiley & Sons,
Ltd.;The Atrium, Southern Gate, Chichester,West Sussex PO19 8SQ, England.
Sijia, H., & Zexi, Z. (2011, 9-11 Sept. 2011). Principles of FECs with evaluating different types of FEC used in
the Internet and wireless networks. Paper presented at the Electronics, Communications and Control
(ICECC), 2011 International Conference on.
ViaSat. (2013). Convolutional Turbo Codes (CTCs) Retrieved 10-May 2013, from
http://www.viasat.com/convolutional-turbo-codes-ctcs
Viterbi, A. J. (1967). Error bounds for convolutional codes and an asymptotically optimum decoding algorithm.
Information Theory, IEEE Transactions on, 13(2), 260-269. doi: 10.1109/tit.1967.1054010
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/ The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

Mn2521592162
Mn2521592162Mn2521592162
Mn2521592162
IJERA Editor
 
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
ijtsrd
 
Introduction wcn
Introduction wcnIntroduction wcn
Introduction wcn
Rupam Karmakar
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
CSCJournals
 
Potential key challenges for terahertz communication systems
Potential key challenges for terahertz communication systems Potential key challenges for terahertz communication systems
Potential key challenges for terahertz communication systems
IJECEIAES
 
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiTraffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Shristi Pradhan
 
A Review on Cooperative Communication Protocols in Wireless World
A Review on Cooperative Communication  Protocols in Wireless World A Review on Cooperative Communication  Protocols in Wireless World
A Review on Cooperative Communication Protocols in Wireless World
ijwmn
 
WiFi Transmit Power and its Effect on Co-Channel Interference
WiFi Transmit Power and its Effect on Co-Channel InterferenceWiFi Transmit Power and its Effect on Co-Channel Interference
WiFi Transmit Power and its Effect on Co-Channel Interference
IJCNCJournal
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architecture
IAEME Publication
 
LTE Vision 2020
LTE Vision 2020LTE Vision 2020
LTE Vision 2020
Muljati Muli
 
LTE_D2D
LTE_D2DLTE_D2D
A survey on multiple access technologies beyond fourth generation wireless co...
A survey on multiple access technologies beyond fourth generation wireless co...A survey on multiple access technologies beyond fourth generation wireless co...
A survey on multiple access technologies beyond fourth generation wireless co...
ijceronline
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
ijcseit
 
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
iosrjce
 
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
ijasa
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of things
journalBEEI
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
IJERA Editor
 

What's hot (17)

Mn2521592162
Mn2521592162Mn2521592162
Mn2521592162
 
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
Performance Analysis of MIMO System on Different Modulation Scheme over Ricia...
 
Introduction wcn
Introduction wcnIntroduction wcn
Introduction wcn
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
Potential key challenges for terahertz communication systems
Potential key challenges for terahertz communication systems Potential key challenges for terahertz communication systems
Potential key challenges for terahertz communication systems
 
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFiTraffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
Traffic Offloading Solutions: Femto, WiFi and Integrated Femto-WiFi
 
A Review on Cooperative Communication Protocols in Wireless World
A Review on Cooperative Communication  Protocols in Wireless World A Review on Cooperative Communication  Protocols in Wireless World
A Review on Cooperative Communication Protocols in Wireless World
 
WiFi Transmit Power and its Effect on Co-Channel Interference
WiFi Transmit Power and its Effect on Co-Channel InterferenceWiFi Transmit Power and its Effect on Co-Channel Interference
WiFi Transmit Power and its Effect on Co-Channel Interference
 
4 g communication architecture
4 g communication  architecture4 g communication  architecture
4 g communication architecture
 
LTE Vision 2020
LTE Vision 2020LTE Vision 2020
LTE Vision 2020
 
LTE_D2D
LTE_D2DLTE_D2D
LTE_D2D
 
A survey on multiple access technologies beyond fourth generation wireless co...
A survey on multiple access technologies beyond fourth generation wireless co...A survey on multiple access technologies beyond fourth generation wireless co...
A survey on multiple access technologies beyond fourth generation wireless co...
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
Bandwidth allocation mechanisms in the next mobile generation: A practical Ap...
 
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of things
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 

Similar to Bandwidth aware fec algorithms for wireless communication systems

Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
International Journal of Reconfigurable and Embedded Systems
 
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
IJECEIAES
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ijngnjournal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
IJCNCJournal
 
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
theijes
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
International Journal of Computer and Communication System Engineering
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
Zac Darcy
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
Zac Darcy
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
Zac Darcy
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
IOSR Journals
 
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
IJERA Editor
 
An effective technique for increasing capacity and improving bandwidth in 5G ...
An effective technique for increasing capacity and improving bandwidth in 5G ...An effective technique for increasing capacity and improving bandwidth in 5G ...
An effective technique for increasing capacity and improving bandwidth in 5G ...
IJECEIAES
 
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
cscpconf
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
IJARBEST JOURNAL
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
ijcnac
 
ID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptxID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptx
DrSNAVANEETHAN
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
IAEME Publication
 
A collaborative physical layer security scheme
A collaborative physical layer security schemeA collaborative physical layer security scheme
A collaborative physical layer security scheme
IJECEIAES
 

Similar to Bandwidth aware fec algorithms for wireless communication systems (20)

Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
Performance Enhancement in SU and MU MIMO-OFDM Technique for Wireless Communi...
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
Comparative Study for Performance Analysis of VOIP Codecs Over WLAN in Nonmob...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF VOIP CODECS OVER WLAN IN NONMOB...
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
 
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
Performance Analysis of Multi-QoS Model of OCDMA System by Adopting OPPM Sign...
 
An effective technique for increasing capacity and improving bandwidth in 5G ...
An effective technique for increasing capacity and improving bandwidth in 5G ...An effective technique for increasing capacity and improving bandwidth in 5G ...
An effective technique for increasing capacity and improving bandwidth in 5G ...
 
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRY...
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
ID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptxID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptx
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
 
A collaborative physical layer security scheme
A collaborative physical layer security schemeA collaborative physical layer security scheme
A collaborative physical layer security scheme
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
Alexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
Alexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
Alexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
Alexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
Alexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
Alexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
Alexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
Alexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
Alexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
Alexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
Alexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
Alexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
Alexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
Alexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
Alexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
Alexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
Alexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
Alexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

Bandwidth aware fec algorithms for wireless communication systems

  • 1. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 8 Bandwidth Aware FEC Algorithms for Wireless Communication Systems Salehe I. Mrutu* , Sadath Kalolo, Mastidia Byanyuma, Christina Nyakyi and Anael Sam The Nelson Mandela African Institute of Science and Technology, P. O. Box 447 Arusha, Tanzania * E-mail of the corresponding author: mrutui@nm-aist.ac.tz Abstract Forward Error Correction (FEC) codes used by receivers to correct transmission errors without retransmission add a considerable amount of redundant bits to data bits. The addition of redundant bits lowers the overall network throughput, thus increasing the demand for more required bandwidth. In this paper we investigate and discuss various techniques used in FEC and show their effects to data communication in terms of bandwidth utilization. Additionally we propose improvement of (2, 1, 2) Convolutional encoder to (3, 2, 3) encoder. The proposed improvements increase the code rate from 1/2 to 2/3 hence reducing error control information and increasing bit rate. The received codeword can be decoded by Soft-Output Viterbi Algorithm. Keywords: FEC, Bandwidth, Convolutional Codes, Code Rate, Soft Output Viterbi Algorithm 1. Introduction In the recent years wireless communication industry has experienced a drastic growth of traffic volumes on its networks. According to Cisco Visual Networking traffic update, the Global mobile data traffic grew by 70% in 2012(Cisco-Visual-Networking-Index, 2013). Global mobile data traffic reached 885 petabytes per month at the end of 2012, up from 520 petabytes per month at the end of 2011(Cisco-Visual-Networking-Index, 2013). The rapid traffic growth lies on large increase in the number of mobile devices users; the emerging of popular bandwidth-intensive applications such as rich media gaming, streaming media, video conferencing, mapping and navigation applications, telemedicine and virtue education applications as new services (Bazelon, Jackson, & McHenry, 2011). The invention of new devices such as smart phones, tablets and notebooks that use the aforementioned services contributes much to the situation (Hanzo et al., 2012). All of the above mentioned reasons require the availability of wireless networks that are capable to offer more bandwidth or higher data rate. Bandwidth allocation in wireless communication involves the process of assigning radio frequencies to different applications. The radio frequency spectrum is a finite and limited natural resource which is increasingly in demand due to a large growing number of wireless telecommunication services such as mobile phone, radio and TV broadcasting, space research, environmental monitoring and other communication services that ensure wellbeing of life in the world. Mobile-cellular penetration rates stand at 96% globally; 128% in developed countries; and 89% in developing Countries(ITU-ICT-Facts-and-Figures, 2013). In developing countries such as Tanzania 75% of people live in rural areas which are characterized by inadequate resources such as teachers and books in schools, doctors in health centers and other necessary facilities. The emergence of e-services such as e-education, virtual education, e-health, telemedicine and other e-business services brings up new hope to reach remote and marginalized communities in rural areas. However, most of the aforementioned services are bandwidth intensive and require high data rate networks to operate in wireless communication systems. Contrary to that, Tanzanian rural areas are characterized by limited ICT infrastructure that are dominated by low data rate such as GPRS, EDGE and VSAT network services which are also too expensive for the rural population. Despite the high demand for bandwidth a considerable portion of it is used to transfer control information rather than actual or intended information. Communication systems are congested by various control information such as error control, security and application format which are system use information. Any attempt to reduce these control information while maintaining quality of service in data transmission favors the communication system in two ways. First, more bandwidth is offered for the intended data (End user data) and therefore increasing the capacity of the transmission network. Secondly, communication costs are reduced as end users are charged based on the amount of bandwidth used during transmission of data. This work proposes a new FEC Convolutional code model that reduces system error control information in wireless communication systems. Thus, offering more room for actual user information to be delivered at the
  • 2. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 9 same cost. Section 2 of this paper presents the state of art of selected FEC algorithms with their bandwidth requirements. Section 3 presents the proposed model of improved FEC Convolutional code and section 4 concludes this work. 2. State Of The Art There are many types of FEC codes in use today; however, FEC codes are basically divided into two main categories which are Block codes and Convolutional codes (Liumeng, 2011; Sijia & Zexi, 2011). Block codes work on fixed-size blocks (packets) of bits or symbols of predetermined size. The output of block codes only depends on the immediate inputs to the same block; while Convolutional codes work for bit or symbol streams transmission with outputs that depends not only on the immediate input but also the previous inputs. Convolution codes (CC) are one of the popular FEC codes in use today. This type of code was first introduced by Elias in 1955(Morelos-Zaragoza, 2006). Through the age, FEC Convolutional code has found numerous applications in wireless communication including digital terrestrial, satellite communication and broadcasting systems and space communication systems (IMT-2000, GSM, IS-95,WiMAX (802.16), WCDMA, GPRS, UMTS, CDMA 2000, DVB-T and DVB-S) (Morelos-Zaragoza, 2006). The most popular decoding mechanism of CC is the Viterbi algorithm introduced by Viterbi in 1967(Viterbi, 1967). CCs have memory and are defined as (n, k, m) codes, where n is the number of output bits, k is the number of input bits at a time, and m is the memory length of encoder(Liumeng, 2011). If an encoder receives k bits of information as input at a time and gives out n bits as output (codeword) at a time, then k/n is a code rate of that particular encoder. The common code rate for this codes are 1/2,1/3, 1/4 (Johannesson & Stahl, 1999) and 4/8(Johannesson, Stahl, & Wittenmark, 2000). To reduce the number of bits transmitted, various puncturing schemes are used which discard selected bits from the encoder output. Typical puncture rates are 2/3, 3/4, 5/6, and 7/8. For example, a 3/4 puncture rate means that for every 3 input bits, 4 output bits are transmitted from the encoder output rather than the 6 bits that are actually generated. Puncturing can be implemented using external logic to the Convolutional encoder(Francis & Green, 2007). This allows the freedom to change between the various puncture rates but it increases data processing load. Higher gains of CCs are also achieved by Convolutional Turbo Code (CTC) and concatenation of CCs with other schemes (Benedetto, Garello, & Montorsi, 1998). A good example of this is DVB-T where Convolutional code is concatenated with Reed Solomon as inner and outer code(Francis & Green, 2007). According to ViaSat (ViaSat, 2013), CTCs perform extremely well at lower code rates. Communication systems with less bandwidth and power constraints can use low rate concatenated code to achieve high coding gains or very low error rates. However, tight bandwidth situations and power constraints communication system drive this solution in opposite direction. Thus, demanding for an interleaver to be integrated into FEC systems to enhance burst error dispersion as used in most of the contemporary communication systems (Francis & Green, 2007; ViaSat, 2013). More efforts are still needed to improve FEC codes to support communication systems to meet modern applications bandwidth requirements. Below are few selected FEC block codes that are used in serial or parallel concatenation with Convolutional Codes. This selection includes Reed-Solomon (R-S) codes, Bose-Chaudhuri-Hochquenghem (BCH), Low Density Parity Codes (LDPC) and Turbo Product Codes (TPC). In communication systems the aforementioned codes are sometimes concatenated in either serial or parallel form to give a desired exceptional performance. In serial arrangement there is inner and outer channel code. This fact makes the situation even worse as the extra bandwidth required for the communication system is a total of all redundant bits in inner and outer code. 2.1 Reed Solomon (R-S) R-S is a class of non-binary cyclic block codes defined by (n, k) code; where n is the output block size and k is the number of information symbols and (n-k) gives a number of redundant information. This type of code is used in communication systems as component code for building more powerful codes through concatenation such as Reed Solomon Turbo Product Code (RS-TPC). R-S codes type has its application in WiMAX (802.16), DVB-T, DVB-S, DVB-C, ISDB, DMB, DOCSIS and GPON. 2.2 Bose Chaudhuri Hacquenghem (BCH) BCH is a class of cyclic block codes; it is used as a component for building more powerful codes. BCH encodes
  • 3. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 10 k data bits into n code bits by adding n-k parity checking bits for the purpose of detecting and checking the errors. Given the length of the codes n=2m-1 for any integer m≥3, we have t (where t<2m-1), as the bound of the error correction. The number of parity checking bits is n-k≤ mt. Its applications are found in Video Broadcasting, DVB-S2 and memory controllers. 2.3 Low Density Parity Codes (LDPC) LDPC is a FEC linear block code defined by a very sparse parity check matrices which allow for parallel iterative decoder. LDPC works with a code rate from 0.67 to 0.92 (Gho & Kahn, 2012), Applications of LDPC are also in China Multimedia Mobile Broadcasting (CMMB), IEEE 802.11n-2009 (Wi-Fi standard), WiMAX, VSAT, DVB-T2, DVB-C and DVB-S2 2.4 Turbo Product Codes (TPC) TPC is a class of high-performance FEC codes developed in 1993, TPC are finding use in 3G mobile communications and (deep space) satellite communications as well as other applications where designers seek to achieve reliable information transfer over bandwidth or latency-constrained communication links in the presence of data-corrupting noise(ViaSat, 2013). Code rates for selected FECs are presented in table 1. Table 1: Selected FEC Codes with Their Corresponding Code Rates In the next section, we present the proposed model of FEC convolution code to be used in application layer for encoding and decoding data streams. 3. System Model The model improves the (2, 1, 2) Convolutional encoder from four states (i.e. S0, S1 S2, and S3) to eight states (i.e. S0, S1, S2, S3, S4, S5, S6, and S7). This improvement results into a two level encoder. The inner level states which include the first four states (i.e. S0, S1 S2, and S3) and the outer level states that include the rest of the states (i.e. S4, S5 S6, and S7). We assume that: • The encoding process starts and ends at state S0. • The implementation of the proposed code is in the application layer to support specific real time applications. At each state, there are four possible ways to move to other states, where two ways allow the encoder to move to other two states of the same level and the other two ways to another level. All the same there are four possible ways to enter a state from other states, where two ways come from states of the same level and another two ways enter a state from states of another level as shown in the fig. 1. 3.1 Encoding The encoding process in the fig. 1 starts and terminates at state S0. By following the arrows leaving a state, the input/output labels (e.g. 01/011 representing 01 as input bits and 011 as the codeword associated to it) gives guidance through the encoding process. We easily follow the arrows from state to another while taking care of the input and codeword generated. Suppose the bits {10-11-10-00-01} are supplied as a string of input to the encoder (starting with 10), then the encoder will produce the following string as codeword at the output {100- 111-110-011-011} and the encoder will change states from S0, S4, S5, S6, S0, to S1. S/N Code Type Supported Code Rate 1 LPDC ≤ 1 2 TPC ≤ 0.93 3 CTC ≤ 0.83333 4 R-S ≤ 0.9375 5 BCH t<=12 ; t=1,2, (3) 6 CC ≤ 0.5
  • 4. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 11 Figure 1: Proposed model of (3, 2, 3) convolution encoder 3.2 Decoding The Soft-Decision Output Viterbi algorithm (SOVA) proposed by Viterbi (Viterbi, 1967) and improved by Joachim Hagenauer and Peter Hoeher (Hagenauer & Hoeher, 1989) is used to decode the received bits. SOVA decodes received data against random errors by comparing the received code sequence with every possible code sequence of a node or state. A bit by bit comparison yield a branch metric also known as hamming distance which is used to determine the most likely path of correct data. Trellis diagram presented in fig. 2 contains information of states and uses time as a horizontal axis to show the possible paths through the states. The decoding process starts at S0 where four possible branches with their possible codes can be compared with the received codeword at the top. The path with minimum comparison metrics is the most likely path with correct data. The comparison metrics are calculated cumulatively as you move along from time zero onwards. Viterbi realized that at any stage when different paths converge into one state, then only those paths with smaller hamming metric need to be remembered and not all paths. Therefore, the surviving path with minimum hamming distance metrics is the winner path. For example, the trellis diagram in fig. 2 shows how eight states are used to decode the received codewords stream {100-111-110-011-011} to give back the original data stream {i.e. 10-11-10-00-01}. Through the red colored path in the trellis diagram which shows how the decoding process moves through S0, S4, S5, S6, S0, to S1.
  • 5. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 12 Figure 2: Trellis diagram to show the path 4. Conclusion We have discussed the selected FECs, their applications and respective code rates. The improved FEC Convolutional Code model from (2, 1, 2) to (3, 2, 3) is also presented and enables the algorithm to improve the code rate by 0.17 from 1/2 to 2/3 and hence reducing error control information in transmission media. The paper shows clearly that the improved FEC Convolutional Code can significantly improve performance i.e data throughput of wireless communication systems in comparison with the rate of 1/2 convolutional coding case. Hence, the reduction of operational costs. The decoding process that uses the normal SOVA has also been presented. References Bazelon, C., Jackson, C., & McHenry, G. (2011). An Engineering and Economic Analysis of the Prospects of Reallocating Radio Spectrum from the Broadcast Band through the Use of Voluntary Incentive Auctions. Benedetto, S., Garello, R., & Montorsi, G. (1998). A search for good convolutional codes to be used in the construction of turbo codes. Communications, IEEE Transactions on, 46(9), 1101-1105. Cisco-Visual-Networking-Index. (2013). Global Mobile Data Traffic Forecast Update, 2012-2017. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11- 520862.html,. Francis, M., & Green, R. (2007). Forward Error Correction in Digital Television Broadcast Systems. XILINX, White Paper: Virtex-5, Virtex-4, Spartan-3, LogiCORE, WP27. Gho, G.-H., & Kahn, J. M. (2012). Rate-adaptive modulation and low-density parity-check coding for optical fiber transmission systems. Journal of Optical Communications and Networking, 4(10), 760-768. Hagenauer, J., & Hoeher, P. (1989, 27-30 Nov 1989). A Viterbi algorithm with soft-decision outputs and its applications. Paper presented at the Global Telecommunications Conference, 1989, and Exhibition. Communications Technology for the 1990s and Beyond. GLOBECOM '89., IEEE. Hanzo, L., Haas, H., Imre, S., O''Brien, D., Rupp, M., & Gyongyosi, L. (2012). Wireless Myths, Realities, and Futures: From 3G/4G to Optical and Quantum Wireless. Proceedings of the IEEE, 100(Special Centennial Issue), 1853-1888. doi: 10.1109/JPROC.2012.2189788 ITU-ICT-Facts-and-Figures. (2013). The World in 2013: ICT Facts and Figures. http://www.itu.int/en/ITU- D/Statistics/Documents/facts/ICTFactsFigures2013.pdf. Johannesson, R., & Stahl, P. (1999). New rate 1/2, 1/3, and 1/4 binary convolutional encoders with an optimum
  • 6. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (Paper) ISSN 2225-0492 (Online) Vol.3, No.3, 2013 13 distance profile. Information Theory, IEEE Transactions on, 45(5), 1653-1658. Johannesson, R., Stahl, P., & Wittenmark, E. (2000). A note on type II convolutional codes. Information Theory, IEEE Transactions on, 46(4), 1510-1514. Liumeng, S. (2011). Application and Principle of Error Corrected Encoding Technology. Energy Procedia, Elsevier Ltd., 13, 9087-9092. Morelos-Zaragoza, R. H. (2006). The Art of Error Correcting Coding (Second Edition ed.): John Wiley & Sons, Ltd.;The Atrium, Southern Gate, Chichester,West Sussex PO19 8SQ, England. Sijia, H., & Zexi, Z. (2011, 9-11 Sept. 2011). Principles of FECs with evaluating different types of FEC used in the Internet and wireless networks. Paper presented at the Electronics, Communications and Control (ICECC), 2011 International Conference on. ViaSat. (2013). Convolutional Turbo Codes (CTCs) Retrieved 10-May 2013, from http://www.viasat.com/convolutional-turbo-codes-ctcs Viterbi, A. J. (1967). Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. Information Theory, IEEE Transactions on, 13(2), 260-269. doi: 10.1109/tit.1967.1054010
  • 7. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar