Transport Layer Protocols for the Land Mobile Satellite Broadcast Channel

Size: px
Start display at page:

Download "Transport Layer Protocols for the Land Mobile Satellite Broadcast Channel"

Transcription

1 Transport Layer Protocols for the Land Mobile Satellite Broadcast Channel Núria Gassó Montserrat (1), Harald Ernst (1) (1) Deutsches Zentrum für Luft- und Raumfahrt (DLR) Institute for Communications and Navigations Weßling, Germany INTRODUCTION An important advantage of satellite transmission is their inherent capability to broadcast data to large audiences. The standard application is thereby to send data streams (i.e. TV) to wide audiences using fixed satellite receivers. An extension to this approach is broadcast to mobile receivers, especially cars. This has been realised in the U.S. by XM-Radio and Sirius. All these system have in common that they broadcast streams to receiver, which are immediately played. In contrast to this traditional broadcast models, other approaches are researched in Europe (e.g. in the ESA project Ku-Mobil and the EU project Maestro), which go away from the traditional thinking of services as streams. Instead, this new approach culminates in the idea of transferring distinguished files. For these systems, unidirectional file based transport protocols are needed, which fit into the very specifics of the land-mobile satellite environment. While broadcasting streams can make use of the well defined MPEG-protocols, file transfer via an unreliable medium is less well specified. In the following an Internet Protocol (IP) based transport scheme is analysed, where the main focus is on protocols from the IETF Reliable Multicast Group. There, the combination of the Layered Coding Transport (LCT) protocol with the Asynchronous Layered Coding (ALC) and the File Delivery over Unidirectional Transport (FLUTE) protocol seems a most promising candidate for this kind of application. The basic mechanism of these protocols and their behaviour in the land mobile environment is shown and analysed. BACKGROUND In 21 DLR worked as a subcontractor together with SES Astra, ND SatCom and IMST on an ESA feasibility study for the design of a land-mobile Ku-band multimedia broadcast system for vehicles [1]. In the study it was shown that an approach, using only the Line-of-Sight LOS state and based on a file based personalised radio system, could present the user with a high-quality radio system, without the need to use high link margins. The basic idea is to transfer individual audio files to the receiver. There, the radio program is reassembled, using only correctly received files (Fig.1). The system broadcasts a large number of files to the receiver, e.g. different music or news files. The receiver then mixes the received files together, ignoring corrupted files. If enough files of good quality are received, the user experiences a continuous service, without interruptions due to bad link conditions. In such a system, it is no longer necessary to receive all content error free, but the aim is to receive a maximum number of files correctly at the receiver. The challenges for such a system are the relatively long and frequent fades of the LMS-channel, which make the channel highly unreliable, even including channel coding and interleavers of up to some seconds. This will be further motivated in the next section. For long files, there is therefore a relative high probability that the channel decoding at the physical layer will fail at some point during their transmission. For a broadcast scenario, without return channel, this would result in the failure of the whole file transfer. In this case, additional coding on the file layer is a possible solution to overcome the impairment of the channel, which is the topic of the next section. After that, the used transport layer protocol is described more in detail and its features described. In the section on Low Density Parity Check (LDPC) codes, the Forward Error Correction (FEC) scheme, which was used, is shortly described and it is shown that it has some very interesting properties in regard to flexibility and computational efficiency.

2 C F C >, C F C C I J = J A > > I J = J A F > > F > C, > F C C F C > F > > F > A F I = J A E J A A A L = J E A L E H A J L A? E J O Figure 1: Personal Radio System. Figure 2: Two-State Narrowband Channel Model [3]. Finally, the behaviour of the protocols in the land-mobile satellite channel are simulated and the results analysed. The article ends with a conclusion and a short outlook on the steps for the future realisation of such a system. THE LAND MOBILE SATELLITE (LMS) CHANNEL The main effect in an LMS channel is signal shadowing, experienced when no clear Line-Of-Sight (LOS) between the satellite and the user terminal is present. The average duration and depth of this shadowing are key parameters for any such system. For this reason, a measurement campaign was performed inside the study and the recorded data was analysed for four different environment types: Highway, Rural, Sub-Urban and Urban (for further information see [2]). The main effect in an LMS-channel is signal shadowing, experienced when no clear Line-Of-Sight (LOS) between the satellite and the user terminal is present. A relative robust model for the description of the land-mobile satellite channel is the two-state Lutz model. In our case in the Ku-band, one can assume that only the Line-of- Sight (LOS) state can be used for transmission purpose, whereas the shadowed state always results in erroneous reception. The Lutz Model is presented in Figure 2, where D g and D b are the mean durations of the good (LOS) and of the bad (NLOS) state respectively, and p xx denotes the constant state transition probabilities. The average duration of this shadowing are now key parameters for any system and the numbers which are used in the simulations later on are found in the following table: Table 1: Lutz model parameters Environment D g D b LOS Highway 18 s 2 s 9 % Rural 16 s 4 s 8 % Suburban 8 s 2 s 8 % Urban 22 s 15 s 6 % where D g and D b are the mean durations of staying in the good (LOS) and or the bad (shadowed) state before it changes to the opposite state. TRANSPORT LAYER CODING As indicated in previous section, our system is hampered by the relative long faded states. While the mean duration of fades are a few seconds, there is a non-negligible probability that fades can last up to one minute or that fades can follow so fast after each other as to be considered nearly one large fade. Normal channel coding approaches with such long interleavers require a high complexity and pose additional problems, especially concerning synchronisation. Instead we propose to add Forward Error Correction (FEC) mechanism at the transport layer of our system. The transport object is separated into k individual packets and h redundancy packets are added to it. The

3 individual packets are then transferred to the physical layer, which adds independent channel coding to each packet (e.g. a based on the Digital Video Broadcasting standard for Satellites DVB-S). The principle is shown in Fig.6. This results in a double structure, where the normal channel coding per packet combats the effect of fast fading and white Gaussian noise using soft-decision decoding. On top of it h redundancy packets are added to the k normal data packets, resulting in the transmission of n = k + h packets. This allows combating the slow fading events, where typical whole packets, or series of packets, are destroyed and it is known which packets are received correctly. Using Maximum Distance Separable (MDS) codes, like the Reed-Solomon (RS), allows a receiver to reconstruct the original information if at least k out of n packets of a packet group are received. Therefore, the receiver can cope with erasures, as long as they result in a total loss not exceeding h packets, independently, where this erasures did happen. An important point is the capability to reliably detect erroneous packets. Packets are often protected using a CRC at the Network layer (e.g. in UDP). Alternatively, one could also use the channel codes of the Physical layer, which often have also error detection capability, like in the case of DVB-S (see [4], for specific aspects). In the following it is assumed, that erroneously packets are always correctly detected and discarded. Regarding the protocol stack there are implementations possible at different layers: Data Link Layer Network Layer (IP-layer) Transport Layer The first two cases are relative similar. Both can use a fixed size (k, n) packet group, where the packet stream is segmented into groups of constant length for which redundancy is added, see e.g. [4]. In this approach parameter are implicitly fixed in the system. Alternatively, the coding can be done at the transport level for the whole object. A file is encoded as one unit, with some added redundancy packets. The coding spans a logical object, which is of variable length. The approach which is used in the following is specified by the IETF Reliable Multicast Group and is based on the transport layer. It can be found in RFC 345 Asynchronous Layered Coding Protocol (ALC)). It forms the base of the File Delivery over Unidirectional Transport (FLUTE) protocol, which will be explained in more detail in the following section. A major advantage of the second approach is that the redundancy can be file specific, and therefore highly protected files can be mixed with best effort datagrams. Additionally, each file is encoded and decoded independently, allowing parallel execution and storage of files before decoding. Lastly, the possible multiplex between packets from different files increase the spreading of the file in time. However, there are also disadvantages. First, short files consisting only of a low number of packets are not so well protected. Secondly, the signalling information of the coding scheme like e.g. packet position or the parameters of the coding have to be transferred. Lastly, the variable length and large size of the file make the usage of RS-codes either complex or sub-optimal. Especially to address this last point, an alternative low complexity FEC scheme for this purpose is described in section on LDPC codes. But before going into the details of the coding, a more in depth look on the used protocols is done. FLUTE PROTOCOLL The proposed FLUTE/ALC/LCT scheme provides reliable asynchronous delivery of files to an unlimited number of concurrent receivers from a single sender. As no information is required to be sent back from the receivers to the sender, this scheme is particularly suitable for satellite broadcast systems, which have no or only limited return link capability. Although we are referring to the scheme FLUTE/ALC/LCT as a unit, each protocol has its own specific function. Layered Coding Transport (LCT), which is based upon UDP (User Datagram Protocol) in the protocol stack (see Fig.3), is responsible for adding support for multicast on transport level, e.g. differentiating between sessions or indicating the start and stop of objects. Asynchronous Layered Coding (ALC) adds the necessary

4 8 H ) *, ! + > E J I 6 5 1! 5 $ > E J I 6 1! $ > E J I E B E B 4 A A H A N J A I E I E B = F F E? = > A Figure 3: FLUTE Protocol Stack. Figure 4: LCT Header support for combining LCT with a Forward Error Correction (FEC) building block, which is responsible for increasing the robustness of the transfer. Finally, FLUTE specification defines additional mechanisms needed to signal and map the properties of files to the general concepts of ALC. The functioning of FLUTE/ALC/LCT is based in the delivery of one or more files, called objects in the IETF language, during a session. A session comprises multiple channels originating at a single sender that are used for some period of time to carry packets pertaining to the transmission of one or more objects. Each session has a Transport Session Identifier (TSI), which together with the IP address of the sender uniquely identifies the session. In order to start receiving the data packets, a receiver must join a channel. A FLUTE/ALC/LCT channel is defined by the combination of a sender IP address and its Transport Session Identifier (TSI), which is associated with the channel by the sender. If more than one object is going to be carried within a session, the Transmission Object Identifier (TOI) must be used in the LCT header (see Fig. 4) to identify which packets are to be associated with which object. As mentioned before, the file properties are carried in-band together with the delivered files. Thus, each FLUTE session has an entity called File Delivery Table (FDT) containing these properties. An FDT consists of a set of file description entries for the files to be delivered in the session. Each file description entry must include at least the TOI for the file that it describes and the Uniform Resource Identifier (URI) indicating the location of the file. The FDT is delivered through FDT Instances. An FDT Instance is an XML structure containing one or more file description entries of the FDT. Reliable transmission is achieved in this scheme through the use of a Forward Error Correction (FEC) building block at the ALC layer, which adds a certain redundancy to each object. Therefore, it is no longer necessary to receive all IP packets correctly, but it is enough, if a certain fraction of the overall number of packets of a file arrives successfully. Information related to the FEC building block can be contained in an ALC specific LCT header extension, in FDT or in both. The format of this information is determined by the FEC encoding scheme being used. The introduction of additional redundancy at the transport layer is an important advantage for this family of protocols and in the paper the effect of this scheme is analysed for the special case of the land-mobile satellite channel. LOW DENSITY PARITY CHECK (LDPC) CODES In the following only a short overview on the used channel coding, which is based on Low Density Parity Check (LDPC) aspects is given. Since Reed-Solomon (RS) codes are rather hard to use for variable file sizes, one can utilise other codes, which are no longer maximum distance separable and need therefore to receive in average more than k packets, before they can correctly decode all erasures, but may have certain other advantages. Actually, a flexible and fast decodable code, which hence can span a longer block length, may even result in a better overall coding gain due to its time diversity, than an optimal RS-code, which can only connect a limited amount of packets. Block codes of size (n, k) can in general be described by the generating matrix G, which defines the transformation of the information vector u of length k to a codeword vector x of length n. Nevertheless, in our case for the LDPC codes the description via the parity check matrix H is more appropriate and results in the definition:

5 for any valid codeword x. Hx T = T (1) One can see each row of H as a parity check equation, where all those bits are added via XOR together, which have a 1 in the row of the matrix H. If it is a valid code, the summation results in a. Unfortunately, this does not give a general way to find the correct codeword, just a check, if the correct codeword has been found. A special code class, which is used for our erasure decoding, are LDPC codes, which can be described via its sparse parity check matrix H. The principal structure of the code is defined by a profile stating how many 1 per columns and per row are allowed. If this is constant for any row and columns, it is called regular LDPC code. These codes were invented by Gallager [5] and he showed that they are optimal codes for infinite block length. If the number of ones per columns varies, one typically defines a percentage how many columns have two ones (in the later called degree two nodes), three ones and so on for higher degrees. This approach resulted in codes, which for long blocklength compete with the best Turbo codes [6]. A code with such a structure can be decoded via iterative message passing algorithm, based on belief propagation [5]. In the case of erasure decoding, the steps simplify to individual XOR calculations per row. In [7] it was proved that LDPC decoder can in principle reach the channel capacity for Binary Erasure Channels (BEC) with an arbitrary small deviation e. In the following a different family of LDPC codes based on staircase structures are used, which allow a systematic and linear encoding in time and are also very flexible in regard to the extension to different file sizes. Staircase LDPC codes For codes which at have at least (N K 1) degree 2 variable nodes a systematic encoding method which requires linear encoding time is available [6]. H = [H 1 H 2 ] H 2 = (2) The matrix H is split in two parts, where H 1 is a sparse random matrix with the appropriate profile, excluding degree 2 variable nodes. H 2 has the mentioned staircase structure. If the source word u is loaded into the first k bits of the codeword relating to H 1, then the n k parity bits p can be computed in linear time. An example of a code of this family is the LDPC code that is under evaluation for the second generation of the digital satellite TV standard (DVB-S2). More information on the used coding scheme can be found under the webpage of Vincent Roca 1, who developed the used implementation of the FLUTE protocols. RESULTS In this section results are presented regarding the behavior of the FLUTE transport IETF protocol in the LMS channel. The first point which is looked into is the effect of spreading the transmission of a file in such a channel over the time at the transport layer level. Secondly, the combination of coding and spreading is studied for each environment, so one can decide which is the best pair of Code Rate (CR) and Transmission Time (TT) under each specific situation. Effects of Spreading Files over Time An interesting feature of the IP protocols is the possibility to multiplex different transfers together, so that each transfer uses only a limited bandwidth. This can be used to spread the individual transfer over different time spans. 1

6 Highway Rural Suburban Urban.45.4 Highway Rural Suburban Urban Probability.25 Probability Received Packets in % Received Packets in % (a) Short transmission time (b) Long transmission time Figure 5: PDFs of Received Packets for Different Environments with both Starting States In order to see which are the effects of increasing the transmission time two different situations have been tested: one with a short transmission time, in which 1 Mbyte files have been sent out using all the channel capacity (it means 8,4 seconds), and another one in which files have been spread over longer time (3 seconds). If files are sent as fast as possible and the total file transfer time is smaller than the mean duration of the good and bad states, the probability for a packet to be received mainly depends on the state in which the receptions starts. If for example the initial state is the good one, almost all packets will be correctly recovered. In contrast, if the initial state is the bad one, a high number of packets will be lost, specially in the urban environment, which is the one that has the longest bad state duration. However, when a file is spread over a long period of time, the mean number of packets received (µ g ) is equivalent to the LOS share LOS and the success probability no longer depends on the initial state. Thus, as can be seen in table for some thousands transfers, the higher the spreading time, the closer the values of µ g and LOS are and the lower the standard deviation (σ) is. Furthermore, referring to this table, note that for the short TT situation, µ g is always above the LOS value if transmission start in the good state, whereas if the starting state is the bad one, µ g is below LOS. Table 2: Mean Value of Packets Received (µ g ) and LOS in percentage 8,4 sec 3 sec Environment Good Bad Good Bad LOS Highway 93 % 72 % 9 % 91 % 9 % Rural 89 % 57 % 79 % 79 % 8 % Suburban 84 % 67 % 8 % 8 % 8 % Urban 86 % 22 % 6 % 53 % 6 % Until now we have separately studied the number of received packets depending on the state in which a transmission starts. But for having an idea of what happens in a real situation one need to apply the total probability theorem. According to this and being P G and P B the probability of staying in the good or bad state respectively. Equation (3) denotes de probability of receiving a packet (x = 1): P (χ x = 1) = p(x = 1 Good) P G + p(x = 1 Bad) P B (3) PDFs obtained after applying 3 shows that for the long TT situation there are no practical differences between the general case and the ones starting in one of the two states. And, of course, µ g and σ has similar values (see Fig. 5(b)). Otherwise, for the short TT situation, although µ g gets close to LOS, the resulting PDF is characterized by the two peaks centered in % and 1% and by a high σ value (see Fig. 5(a)). Combination of coding and spreading As shown in the last section, the number of packets received depends not only on the environment (Highway, Rural, Suburban or Rural) of the end user but also on the amount of time taken by the transmission. Although

7 .6 time 3s time 18s time 12s time 6s Transport layer n = k + h packets.5 k data packets(file/object) h redundancy packets k k+1... k+h channel coding Probability k k+1... k+h.1 Physical layer transmission Received Packets in % Figure 6: Transport Layer FEC. Figure 7: Received packets for different TT in Urban environment. it is possible for a user to receive all the packets belonging to a file, even for the short transmission time it does not happen always. Whereas with longer transmission times µ g tends to LOS, which is in the best case 9%. As long as our system is file oriented, assuming that uncompleted files are discarded, the receiver would need to recover all the data packets, which in principle never happens. In order to increase the probability of correct reception P Succ of a file two approaches can now be taken: Sending a file more than once Adding redundancy to the file at the transport layer level and interleaving it over a certain time With the first option and n repetitions, P Succ increases according to equation (4). This increases the reception probability especially for short transfers, but at least doubles the needed bandwidth per file. Therefore, in the following the second option is to be evaluated. In order to that, different coding rates (1, 2/3 and 1/2) and transmission times (15, 6, 12, 18 and 3 seconds) have been tested. P Succ rep = 1 (1 P Succ ) n (4) As a general outline one can see that using CR=1, which is equal to adding no redundancy at all, leads to a very small probability of file success. Consistent with the results of the last section, note that P Succ is then higher for low transfer times. Results obtained for code rates 2/3 and 1/2 differs considerably from one environment to the others, so the four cases needs to be separately analyzed. In the Highway environment P Succ is almost always 1% as soon as some extra coding is added, independently of the parameters chosen. In the Rural and Suburban environments protocols behave in a similar way: with CR=1/2, the transfer time has rather no influence, so it is not worth to spread files over longer times, if such a code rate is used. But, as can be seen in Fig. 8(a), with CR=2/3 P Succ increases with the transmission time. Although this tendency is common to the previously commented environments, the Urban one behaves in the opposite way and P Succ decreases with transfer time for this code rate (Fig. 8(b)). This happens, since with CR=2/3 the mean number of received packets µ g is not enough for recovering the 1 Mbyte file (6% of 1123, which is the number of sent packets, is 673,8 and the file has 743 data packets). As the standard deviation σ of the results for shorter transfer times has higher values (see Fig.7 ), it happens more frequently for shorter than for longer transfer times that a higher number of packets are correctly received. So the number of correctly received files is higher for short transfer times. Due to this big variety in the obtained results, there is not a pair (CR,TT) that can be considered optimum for all the environments. Since in the broadcast system users experience different reception conditions, one has to choose the file transmission parameters according to the characteristics of the file itself in terms of urgency, length and importance. While urgent and short files can be transmitted more than once without any kind of redundancy, the best option for files of vital importance seems to be (CR=1/2, TT=3). Whereas for the other files an intermediate approach as for example (CR = 2/3, TT=12) can be adopted.

8 Code Rate 1 Code Rate 2/3 Code Rate 1/ Received Files in % Code Rate 1 Code Rate 2/3 Code Rate 1/2 Received Files in % Transmission time in minutes (a) Suburban environment Transmission time in minutes (b) Urban environment Figure 8: P Succ for different Transmission Times CONCLUSIONS AND OUTLOOK In the paper it has been shown, that transport layer coding is an interesting option to overcome the obstacles of the slow fading land-mobile satellite channel. It could be seen, that the improvement of such a coding scheme strictly depends on the target success probability of the transfer and the time delay a transmission is allowed to have. In a follow on of the feasibility study described here, the presented ideas will now be realised as part of a demonstrator system under ESA Contract 17769/3/NL/US. Transport Layer Coding is going to be implemented for this environment and its performance will be measured in live tests, also in regard to applications like multilingual traffic information, multimedia passenger entertainment and personal radio applications. ACKNOWLEDGMENT The authors would like to thank their colleagues in the before mentioned project and especially Vincent Roca from INRIA, who developed the open source implementation of the FLUTE protocol, which was used for the simulations and is really a great tool for research. REFERENCES [1] H. Ernst, S. Scalise, and R. Dietrich, Feasibility study of a mobile Ku terminal, WP 3 design & analysis, DLR, NDSatcom, ESA-Contract No 15593/1/NL/DS, 22. [2] H. Ernst, S. Scalise, J. Kunisch, J. Siemons, G. Harles, and J. Hörle, Measurement campaign for the land mobile satellite channel in Ku-band, in European Personal and Mobile Satellite Conference (EMPS), Bologna, Italy, September 22. [3] E. Lutz, M. Werner, and A. Jahn, Satellite Systems for Personal and Broadband Communications. Berlin, Heidelberg, New York: Springer-Verlag, 2. [4] A. Donner, S. Bovelli, and S. Shabdanov, Reliable multicast based on DVB-RCS, in 2th International Communication Satellite Systems Conference & Exhibit, May 22. [5] R. G. Gallager, Low-density parity-check codes, IRE Transactions on information theory, vol. 8, pp , Jan [6] D. J. C. MacKay, Information Theory, Inference and Learning Algorithms. Cambridge University Press, 23. [Online]. Available: [7] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman, Efficient erasure correcting codes, IEEE Trans. Information Theory, vol. 47, pp , 21.

ELEC 691X/498X Broadcast Signal Transmission Winter 2018

ELEC 691X/498X Broadcast Signal Transmission Winter 2018 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: 848 2424 ext.: 4103. Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1 In this

More information

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter

More information

Coding theory for scalable media delivery

Coding theory for scalable media delivery 1 Coding theory for scalable media delivery Michael Luby RaptorQ is a product of Qualcomm Technologies, Inc. Application layer erasure coding complements traditional error coding Forward Error Correction

More information

Lec 19 - Error and Loss Control

Lec 19 - Error and Loss Control ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office

More information

Packet-Level Forward Error Correction in Video Transmission

Packet-Level Forward Error Correction in Video Transmission Packet-Level Forward Error Correction in Video Transmission Matteo Mazzotti, Enrico Paolini, Marco Chiani, Davide Dardari, and Andrea Giorgetti University of Bologna Wireless Communications Laboratory

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS Jyoti Sharma Department of ECE Sri Sai College of Engg. & Technology, Badhani, Punjab, India Priya Department of ECE Sri Sai

More information

Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR)

Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR) Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR) P. Vincy Priscilla 1, R. Padmavathi 2, S. Tamilselvan 3, Dr.S. Kanthamani 4 1,4 Department

More information

draft-begen-fecframe-interleaved-fec-scheme-00 IETF 72 July 2008 Ali C. Begen

draft-begen-fecframe-interleaved-fec-scheme-00 IETF 72 July 2008 Ali C. Begen 1-D Interleaved Parity FEC draft-begen-fecframe-interleaved-fec-scheme-00 IETF 72 July 2008 Ali C. Begen abegen@cisco.com Introduction 1-D interleaved parity code Is a systematic FEC code of decent complexity

More information

CSEP 561 Error detection & correction. David Wetherall

CSEP 561 Error detection & correction. David Wetherall CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled

More information

RTP: A Transport Protocol for Real-Time Applications

RTP: A Transport Protocol for Real-Time Applications RTP: A Transport Protocol for Real-Time Applications Provides end-to-end delivery services for data with real-time characteristics, such as interactive audio and video. Those services include payload type

More information

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen Networked Systems and Services, Fall 2018 Chapter 2 Jussi Kangasharju Markku Kojo Lea Kutvonen Outline Physical layer reliability Low level reliability Parities and checksums Cyclic Redundancy Check (CRC)

More information

A look at the ROUTE forward ROUTE ~ Real-time Object-delivery over Unidirectional Transport

A look at the ROUTE forward ROUTE ~ Real-time Object-delivery over Unidirectional Transport A look at the ROUTE forward ROUTE ~ Real-time Object-delivery over Unidirectional Transport Michael Luby Qualcomm Technologies, Inc. Mile High Video 2018 August 1, 2018 ROUTE (Real-time Object-delivery

More information

Design and Implementation of Low Density Parity Check Codes

Design and Implementation of Low Density Parity Check Codes IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V2 PP 21-25 www.iosrjen.org Design and Implementation of Low Density Parity Check Codes

More information

Raptor Codes for P2P Streaming

Raptor Codes for P2P Streaming Raptor Codes for P2P Streaming Philipp Eittenberger 1, Todor Mladenov 2, Udo Krieger 1 1 Faculty of Information Systems and Applied Computer Science Otto-Friedrich University Bamberg, Germany 2 Department

More information

< Irregular Repeat-Accumulate LDPC Code Proposal Technology Overview

<  Irregular Repeat-Accumulate LDPC Code Proposal Technology Overview Project IEEE 802.20 Working Group on Mobile Broadband Wireless Access Title Irregular Repeat-Accumulate LDPC Code Proposal Technology Overview Date Submitted Source(s):

More information

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

Link Layer: Error detection and correction

Link Layer: Error detection and correction Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability

More information

A Hybrid ARQ Scheme for Resilient Packet Header Compression

A Hybrid ARQ Scheme for Resilient Packet Header Compression A Hybrid ARQ Scheme for Resilient Packet Compression Vijay A Suryavanshi and Aria Nosratinia Multimedia Communications Laboratory, The University of Texas at Dallas Richardson, TX 7083-0688, USA E-mail:

More information

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see CSC310 Information Theory Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ISSN 255 CORRECTIONS TO FAULT SECURE OF MAJORITY LOGIC DECODER AND DETECTOR FOR MEMORY APPLICATIONS Viji.D PG Scholar Embedded Systems Prist University, Thanjuvr - India Mr.T.Sathees Kumar AP/ECE Prist University,

More information

Overview. A Survey of Packet-Loss Recovery Techniques. Outline. Overview. Mbone Loss Characteristics. IP Multicast Characteristics

Overview. A Survey of Packet-Loss Recovery Techniques. Outline. Overview. Mbone Loss Characteristics. IP Multicast Characteristics A Survey of Packet-Loss Recovery Techniques Overview Colin Perkins, Orion Hodson and Vicky Hardman Department of Computer Science University College London (UCL) London, UK IEEE Network Magazine Sep/Oct,

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction Network Working Group A. Li, Ed. Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track RTP Payload Format for Generic Forward Error Correction Status of This Memo This

More information

On the construction of Tanner graphs

On the construction of Tanner graphs On the construction of Tanner graphs Jesús Martínez Mateo Universidad Politécnica de Madrid Outline Introduction Low-density parity-check (LDPC) codes LDPC decoding Belief propagation based algorithms

More information

Network Working Group. Microsoft L. Vicisano Cisco L. Rizzo Univ. Pisa M. Handley ICIR J. Crowcroft Cambridge Univ. December 2002

Network Working Group. Microsoft L. Vicisano Cisco L. Rizzo Univ. Pisa M. Handley ICIR J. Crowcroft Cambridge Univ. December 2002 Network Working Group Request for Comments: 3451 Category: Experimental M. Luby Digital Fountain J. Gemmell Microsoft L. Vicisano Cisco L. Rizzo Univ. Pisa M. Handley ICIR J. Crowcroft Cambridge Univ.

More information

LDPC benchmarking for DVB-H

LDPC benchmarking for DVB-H Subject Description and discussion of the benchmarking of our LDPC solual-fec for DVB-H Category Report Revision 1.0.1 Authors STM/AST and INRIA Table of contents 1. Introduction...4 2. Test environment...5

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video

Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Preface p. xi Acknowledgments p. xvii Introduction to Networked Multimedia An Introduction to RTP p. 3 A Brief History of Audio/Video Networking p. 4 Early Packet Voice and Video Experiments p. 4 Audio

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

FECFRAME extension Adding convolutional FEC codes support to the FEC Framework

FECFRAME extension Adding convolutional FEC codes support to the FEC Framework FECFRAME extension Adding convolutional FEC codes support to the FEC Framework Vincent Roca, Inria, France Ali Begen, Networked Media, Turkey https://datatracker.ietf.org/doc/draft-roca-tsvwg-fecframev2/

More information

AL-FEC for Streaming Services over LTE Systems

AL-FEC for Streaming Services over LTE Systems AL-FEC for Streaming Services over LTE Systems Christos Bouras 1,2, Nikolaos Kanakis 2, Vasileios Kokkinos 1,2, Andreas Papazois 1,2 1 Computer Technology Institute and Press Diophantus, Patras, Greece

More information

LDPC Codes a brief Tutorial

LDPC Codes a brief Tutorial LDPC Codes a brief Tutorial Bernhard M.J. Leiner, Stud.ID.: 53418L bleiner@gmail.com April 8, 2005 1 Introduction Low-density parity-check (LDPC) codes are a class of linear block LDPC codes. The name

More information

Finding Small Stopping Sets in the Tanner Graphs of LDPC Codes

Finding Small Stopping Sets in the Tanner Graphs of LDPC Codes Finding Small Stopping Sets in the Tanner Graphs of LDPC Codes Gerd Richter University of Ulm, Department of TAIT Albert-Einstein-Allee 43, D-89081 Ulm, Germany gerd.richter@uni-ulm.de Abstract The performance

More information

Error Control Coding for MLC Flash Memories

Error Control Coding for MLC Flash Memories Error Control Coding for MLC Flash Memories Ying Y. Tai, Ph.D. Cadence Design Systems, Inc. ytai@cadence.com August 19, 2010 Santa Clara, CA 1 Outline The Challenges on Error Control Coding (ECC) for MLC

More information

EE 387 course information

EE 387 course information EE 387 course information EE 387, Notes 1, Handout #2 Instructor: John Gill, Packard 266 Textbook: Algebraic Codes for Data Transmission by Richard Blahut Weekly homework, including occasional programming

More information

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by: T305 T325 B BLOCK 4 T325 Summary Prepared by: Session 3 [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Dr. Saatchi, Seyed Mohsen T325 Error Control Coding

More information

Overlapped Scheduling for Folded LDPC Decoding Based on Matrix Permutation

Overlapped Scheduling for Folded LDPC Decoding Based on Matrix Permutation Overlapped Scheduling for Folded LDPC Decoding Based on Matrix Permutation In-Cheol Park and Se-Hyeon Kang Department of Electrical Engineering and Computer Science, KAIST {icpark, shkang}@ics.kaist.ac.kr

More information

Audio/Video Transport Working Group. Document: draft-miyazaki-avt-rtp-selret-01.txt. RTP Payload Format to Enable Multiple Selective Retransmissions

Audio/Video Transport Working Group. Document: draft-miyazaki-avt-rtp-selret-01.txt. RTP Payload Format to Enable Multiple Selective Retransmissions Audio/Video Transport Working Group Internet Draft Document: draft-miyazaki-avt-rtp-selret-01.txt July 14, 2000 Expires: January 14, 2001 Akihiro Miyazaki Hideaki Fukushima Thomas Wiebke Rolf Hakenberg

More information

Network Working Group Request for Comments: October 2009

Network Working Group Request for Comments: October 2009 Network Working Group Request for Comments: 5651 Obsoletes: 3451 Category: Standards Track M. Luby M. Watson L. Vicisano Qualcomm, Inc. October 2009 Layered Coding Transport (LCT) Building Block Abstract

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The

More information

Network Architecture

Network Architecture Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,

More information

A Reliable Multicast Transport Protocol with Feedback Implosion Suppression for Satellite Communication Systems

A Reliable Multicast Transport Protocol with Feedback Implosion Suppression for Satellite Communication Systems 004 Conference on Information Sciences and Systems, Princeton University, March 7-9 A Reliable Multicast Transport Protocol with Feedback Implosion Suppression for Satellite Communication Systems Gün Akkor

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods

A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods SUBMITTED TO ISIT 2005 ON 31 JANUARY 2005 1 arxiv:cs/0503006v1 [cs.it] 2 Mar 2005 A New Non-Iterative Decoding Algorithm for the Erasure Channel : Comparisons with Enhanced Iterative Methods J. Cai, C.

More information

Fast RTP Retransmission for IPTV - Implementation and Evaluation

Fast RTP Retransmission for IPTV - Implementation and Evaluation Fast RTP Retransmission for IPTV - Implementation and Evaluation M.J. Prins, M. Brunner, G. Karagiannis, H. Lundqvist, and G. Nunzi Abstract With the deployment of IPTV reliability for multicast is becoming

More information

MA5400 IP Video Gateway. Introduction. Summary of Features

MA5400 IP Video Gateway. Introduction. Summary of Features MA5400 IP Video Gateway Introduction The MA5400 IP Video Gateway bridges the gap between the MPEG-2 and IP domains providing an innovative solution to the need to transport real-time broadcast quality

More information

Robustness of Multiplexing Protocols for Audio-Visual Services over Wireless Networks

Robustness of Multiplexing Protocols for Audio-Visual Services over Wireless Networks Robustness of Multiplexing Protocols for Audio-Visual Services over Wireless Networks W. S. Lee, M. R. Frater, M. R. Pickering and J. F. Arnold School of Electrical Engineering University College UNSW

More information

Transmission Control for Fast Recovery of Rateless Codes

Transmission Control for Fast Recovery of Rateless Codes Transmission Control for Fast Recovery of Rateless Codes Jau-Wu Huang Department of Computer Science National Tsing Hua University Hsinchu, Taiwan Kai-Chao Yang, Han-Yu Hsieh, Jia-Shung Wang Department

More information

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial

More information

Cobalt Digital Inc Galen Drive Champaign, IL USA

Cobalt Digital Inc Galen Drive Champaign, IL USA Cobalt Digital White Paper IP Video Transport Protocols Knowing What To Use When and Why Cobalt Digital Inc. 2506 Galen Drive Champaign, IL 61821 USA 1-217-344-1243 www.cobaltdigital.com support@cobaltdigital.com

More information

Transporting Voice by Using IP

Transporting Voice by Using IP Transporting Voice by Using IP National Chi Nan University Quincy Wu Email: solomon@ipv6.club.tw 1 Outline Introduction Voice over IP RTP & SIP Conclusion 2 Digital Circuit Technology Developed by telephone

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

Comparison of Decoding Algorithms for Concatenated Turbo Codes

Comparison of Decoding Algorithms for Concatenated Turbo Codes Comparison of Decoding Algorithms for Concatenated Turbo Codes Drago Žagar, Nenad Falamić and Snježana Rimac-Drlje University of Osijek Faculty of Electrical Engineering Kneza Trpimira 2b, HR-31000 Osijek,

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

RECOMMENDATION ITU-R BT.1720 *

RECOMMENDATION ITU-R BT.1720 * Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question

More information

Module 10 Frame Relay and ATM

Module 10 Frame Relay and ATM Module 10 Frame Relay and ATM 10.0 INTRODUCTION Multimedia is basically a heterogeneous service which is characterized by different traffic types and variable bandwidths. Specifically Video bandwidth has

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Multimedia networked applications: standards, protocols and research trends

Multimedia networked applications: standards, protocols and research trends Multimedia networked applications: standards, protocols and research trends Maria Teresa Andrade FEUP / INESC Porto mandrade@fe.up.pt ; maria.andrade@inescporto.pt http://www.fe.up.pt/~mandrade/ ; http://www.inescporto.pt

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

CHANNEL CODING 1. Introduction

CHANNEL CODING 1. Introduction CHANNEL CODING 1. Introduction The fundamental resources at the disposal of a communications engineer are signal power, time and bandwidth. For a given communications environment, these three resources

More information

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions 2007 IEEE Communication Theory Workshop Christian R. Berger 1, Shengli Zhou 1, Yonggang Wen 2, Peter Willett 1 and

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track Internet Engineering Task Force (IETF) Request for Comments: 6726 Obsoletes: 3926 Category: Standards Track ISSN: 2070-1721 T. Paila Nokia R. Walsh Nokia/TUT M. Luby Qualcomm Technologies, Inc. V. Roca

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2. Roch H. Glitho- Ericsson/Concordia University

INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2. Roch H. Glitho- Ericsson/Concordia University INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2 1 Outline 1. Basics 2. Media Handling 3. Quality of Service (QoS) 2 Basics - Definitions - History - Standards.

More information

Transport Performance Evaluation of an ATM-based UMTS Access Network

Transport Performance Evaluation of an ATM-based UMTS Access Network Transport Performance Evaluation of an -based US Access Network Nikos H. Loukas, Christos K. Xenakis, Lazaros Merakos University of Athens, Department of Informatics, Communication Networks Laboratory

More information

Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3)

Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3) Direct Link Networks: Building Blocks (2.1), Encoding (2.2), Framing (2.3) ECPE/CS 5516: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams (CS) Virginia Tech courses.cs.vt.edu/~cs5516

More information

Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet

Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet Channel-Adaptive Error Protection for Scalable Audio Streaming over Wireless Internet GuiJin Wang Qian Zhang Wenwu Zhu Jianping Zhou Department of Electronic Engineering, Tsinghua University, Beijing,

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)

Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP) Communications and Network, 2014, 6, 175-185 Published Online August 2014 in SciRes. http://www.scirp.org/journal/cn http://dx.doi.org/10.4236/cn.2014.63019 Implementation and Evaluation of Transport Layer

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Forward Error Correction Using Reed-Solomon Codes

Forward Error Correction Using Reed-Solomon Codes Exercise 5 Forward Error Correction Using Reed-Solomon Codes EXERCISE OBJECTIVE When you have completed this exercise, you will be familiar with the concept of forward error correction (FEC). You will

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Internet Engineering Task Force (IETF) Request for Comments: 6015 Category: Standards Track October 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 6015 Category: Standards Track October 2010 ISSN: Internet Engineering Task Force (IETF) A. Begen Request for Comments: 6015 Cisco Category: Standards Track October 2010 ISSN: 2070-1721 Abstract RTP Payload Format for 1-D Interleaved Parity Forward Error

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Network Connectivity and Mobility

Network Connectivity and Mobility Network Connectivity and Mobility BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1. Network

More information

IP Video Network Gateway Solutions

IP Video Network Gateway Solutions IP Video Network Gateway Solutions INTRODUCTION The broadcast systems of today exist in two separate and largely disconnected worlds: a network-based world where audio/video information is stored and passed

More information

BECAUSE of their superior performance capabilities on

BECAUSE of their superior performance capabilities on 1340 IEEE TRANSACTIONS ON MAGNETICS, VOL. 41, NO. 4, APRIL 2005 Packet-LDPC Codes for Tape Drives Yang Han and William E. Ryan, Senior Member, IEEE Electrical and Computer Engineering Department, University

More information

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks

A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks A Route Selection Scheme for Multi-Route Coding in Multihop Cellular Networks Hiraku Okada,HitoshiImai, Takaya Yamazato, Masaaki Katayama, Kenichi Mase Center for Transdisciplinary Research, Niigata University,

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Proposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions

Proposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 2 (Sep-Oct. 2012), PP 32-36 Proposal for Robust and Adaptive Forward Error Correction

More information

4.0.1 CHAPTER INTRODUCTION

4.0.1 CHAPTER INTRODUCTION 4.0.1 CHAPTER INTRODUCTION Data networks and the Internet support the human network by supplying seamless, reliable communication between people - both locally and around the globe. On a single device,

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER Transport Layer The Transport layer ensures the reliable arrival of messages and provides error checking mechanisms and data

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Introduction to LAN/WAN. Application Layer 4

Introduction to LAN/WAN. Application Layer 4 Introduction to LAN/WAN Application Layer 4 Multimedia Multimedia: Audio + video Human ear: 20Hz 20kHz, Dogs hear higher freqs DAC converts audio waves to digital E.g PCM uses 8-bit samples 8000 times

More information

L6: OSI Reference Model

L6: OSI Reference Model EECS 3213 Fall 2014 L6: OSI Reference Model Sebastian Magierowski York University 1 Outline The OSI Reference Model An organized way of thinking about network design (from low-level to high-level considerations)

More information

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding CS 64 Project Report Error resilient video transmission over wireless networks December 00 Gang Ding Abstract This report proposes a general architecture for error resilient video transmission over mobile

More information

Recommended Readings

Recommended Readings Lecture 11: Media Adaptation Scalable Coding, Dealing with Errors Some slides, images were from http://ip.hhi.de/imagecom_g1/savce/index.htm and John G. Apostolopoulos http://www.mit.edu/~6.344/spring2004

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission

More information

Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay

Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 26 Source Coding (Part 1) Hello everyone, we will start a new module today

More information

Exercises for the Lectures on Communication Networks

Exercises for the Lectures on Communication Networks Exercises for the Lectures on Prof. Jochen Seitz & Dipl.-Ing. Karsten Renhak Department of University of Technology Ilmenau October 5, 010 [Jochen.Seitz Karsten.Renhak]@tu-ilmenau.de Contents 1 Communication

More information

Reliable File Transfer in the Multicast Domain

Reliable File Transfer in the Multicast Domain Reliable File Transfer in the Multicast Domain Winston Dang August 1993 Abstract This paper describes a broadcast file transfer protocol that is suitable for widespread distribution of files from several

More information

HYBRID BROADCAST AND OTT DELIVERY FOR TERRESTRIAL AND MOBILE TV SERVICES

HYBRID BROADCAST AND OTT DELIVERY FOR TERRESTRIAL AND MOBILE TV SERVICES HYBRID BROADCAST AND OTT DELIVERY FOR TERRESTRIAL AND MOBILE TV SERVICES Thomas Stockhammer Qualcomm Incorporated, Germany ABSTRACT The service layer of LTE Broadcast is designed to broadcast formats that

More information

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models

Reference Models. 7.3 A Comparison of the OSI and TCP/IP Reference Models Reference Models Contains 7.1 The OSI Reference Model 7.1.1 The Physical Layer 7.1.2 The Data Link Layer 7.1.3 The Network Layer 7.1.4 The Transport Layer 7.1.5 The Session Layer 7.1.6 The Presentation

More information