scholarly journals COMPARISON OF THE PROBABILISTIC CHARACTERISTICS OF 8-BIT CODES WITH FORWARD ERROR CORRECTION

Telecom IT ◽  
2019 ◽  
Vol 7 (1) ◽  
pp. 21-30
Author(s):  
S. Vladimirov

Research subject. The article presents the results of comparing different 8-bit error-correcting codes by their probabilistic characteristics. Method. Simulation was performed to determine the probabilistic characteristics of 8-bit error-correcting codes. The principles of their coding and decoding are considered. Core results. The probabilistic characteristics of 8-bit error-correcting codes are identified and presented. Recommendations for their application are developed depending on the structure of the using transmission system. Practical relevance. The application of the considered codes for the construction of transmission systems on devices with limited computing resources is proposed. The applicability of these codes in the development of application layer byte protocols that require the use of forward error correction mechanisms in communication channels is noted.

Author(s):  
Thomas Stockhammer ◽  
Amin Shokrollahi ◽  
Mark Watson ◽  
Michael Luby ◽  
Tiago Gasiba

2016 ◽  
Vol 4 (2) ◽  
pp. 1-5
Author(s):  
Viktor Durcek ◽  
◽  
Michal Kuba ◽  
Milan Dado

In this paper, an overview of various types of error-correcting codes is present. Three generations of forward error correction methods used in optical communication systems are listed and described. Forward error correction schemes proposed for use in future high-speed optical networks can be found in the third generation of codes.


Author(s):  
S. P. Sushchenko ◽  
◽  
P. V. Pristupa ◽  
P. A. Mikheev ◽  
V. V. Poddubny ◽  
...  

A model of a transport connection controlled by a transport protocol with the technology of forward error correction in the selective failure mode in the form of a discrete-time Markov chain is proposed. The model takes into account the influence of the protocol parameters, the level of errors in the communication channels, the round-trip delay and the technological parameters of forward error correction on the throughput of the transport connection. The analysis of the dependence of the advantages of the transport protocol with forward error correction over the classical transport protocol is carried out.


2018 ◽  
Vol 7 (3.27) ◽  
pp. 129 ◽  
Author(s):  
Huda Saleem ◽  
Huda Albermany ◽  
Husein Hadi

The typical scheme used to generated cryptographic key is a fuzzy extractor. The fuzzy extractor is the extraction of a stable data from biometric data or noisy data based on the error correction code (ECC) method. Forward error correction includes two ways are blocked and convolutional coding used for error control coding. “Bose_Chaudhuri_Hocquenghem” (BCH) is one of the error correcting codes employ to correct errors in noise data. In this paper use fuzzy extractor scheme to find strong key based on BCH coding, face recognition data used SVD method and hash function. Hash_512 converted a string with variable length into a string of fixed length, it aims to protect information against the threat of repudiation.  


2009 ◽  
Vol 2009 ◽  
pp. 1-10 ◽  
Author(s):  
David Gozálvez ◽  
David Gómez-Barquero ◽  
Thomas Stockhammer ◽  
Michael Luby

We investigate the use of application layer FEC protection in DVB-T (Digital Video Broadcasting-Terrestrial) networks for the provision of mobile services. Mobile reception is characterized by variations of the received signal caused by fast fading and shadowing. DVB-T was originally designed for fixed and portable reception, and generally does not provide enough quality in mobile environments. The link layer protection mechanism MPE-FEC (Multi Protocol Encapsulation-Forward Error Correction) was standardized in DVB-H (Digital Video Broadcasting-Handheld) for the protection of mobile TV services. Although DVB-T itself does not incorporate any link or application layer protection mechanism, AL-FEC (Application layer Forward Error Correction) protection can be introduced in DVB-T in a backwards compatible way. By means of AL-FEC, it is possible to improve the robustness of DVB-T services for the provision of mobile TV. In this paper, we explain the concept of AL-FEC protection in DVB-T and evaluate its performance by means of laboratory measurements and dynamic simulations with shadowing. We study different configurations of AL-FEC and compare its performance with MPE-FEC. In this paper, we discuss some implementation aspects of AL-FEC in real scenarios and propose an implementation based on Raptor codes and hash sequences. We also present results obtained by a first AL-FEC prototype for DVB-T that demonstrates the feasibility of the approach.


Sign in / Sign up

Export Citation Format

Share Document