Published Paper 2(Ogbimi)
Published Paper 2(Ogbimi)
Published Paper 2(Ogbimi)
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
277
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
The network cloud is the virtually physical The results showed that Network coding with FEC was
interconnection of nodes and communications lines that highly profitable and that its throughput improved after
transfer data from between locations. All these components adding FEC to the system and has a higher throughput than
work in concert to create the network. A user at a SW with FEC but fell sharply with increased error rate. It
workstation and running a network application passes his was also found out that SW-NC-FEC rose more sharply
or her data to the network through a station, which passes when packet generation rate increased. The paper also
the data to the cloud. The network cloud gets the data to the found out that SW-NC-FEC produced more throughput as
designated node, which then delivers it to the appropriate vandermonde matrix was enlarged, while SW-NC
designated station. Clearly, there would be no network degraded.
without a network cloud, but it should not matter to the The paper [4] adopted ARQ and BCH Codes in
network what the inside of the network cloud looks like. developing an adaptive Error Control in Sensor Networks
The network cloud is the medium for getting the data from Using Coverage Area Information. The proposed adaptive
sender to destination. error control strategy was informational value. To evaluate
the informational value that uses coverage area
information, a novel approach was proposed. Packets from
sensor nodes in regions with low spatial density had higher
informational value. The adaptive schemes using ARQ and
BCH codes increased the reliability of packets with high
informational value when compared to static error control,
without a great increase in the energy consumption. In
future work they hope to analyse Different FEC and hybrid
FEC/ARQ strategies. The proposed strategies could be
used and adapted to several applications of sensor networks
to increase the reliability of messages considered more
important in the network.
The paper [5] analysed the Feedback Error in Automatic
Repeat request. They proposed a new method of
acknowledging packet delivery for unreliable feedback
channel conditions. The proposed method, dubbed BCF-
SAW, relied on backwards composite acknowledgement
and provided the retransmission protocols with
configurable ultra-reliability. It further provided the
scheduler of the wireless system with new degrees of
Figure 1: Diagram showing WAN Architecture in form of a network freedom to configure the communication link in order to
cloud meet the desirable reliability requirement even in highly-
B. Past Error Control Methods used in Wired and Wireless unstable feedback channel conditions. The presented
Networks numerical analysis showed orders of magnitude increase in
Lots of past research works carried out using Automatic reliability of the retransmission protocols over the practical
Repeat request Method. Among them are [3] which range of target block error rate only at the expense of a
maximized throughput of SW ARQ with Network Coding negligible increase in experienced average packet delay.
through Forward Error Correction. The paper investigated Arq Protocols Supporting Qos In Embedded Systems by
whether adding data recovery technique improved the [6], studied a framework to provide reliable transmission
performance network that used network coding. A using an ARQ scheme in a real-time manner for embedded
comparative analysis of throughput in a Stop and Wait networks. The framework was demonstrated through two
Automatic Repeat Request (SW_ARQ) data transmission different methods over a point to point link. Using EDF
with Network Coding (NC) and Forward Error Correction scheduling, the framework inserts retransmission packets
(FEC) was analysed. Programming Language developed calculating the delay bounds of the original transmission.
three discrete event simulations using Vandermonde Strategies were used to give a best effort on attempt to
matrix,: SW-ARQ without NC, SW-ARQ with NC and SW retransmit erroneous packets, trying to guarantee the
with NC and FEC. deadlines of original and retransmission packets.
278
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
The methods lead to a performance utilization of the The paper proposed a scalable heuristic scheme for
real-time communication by providing retransmissions and selecting a redundant path and classified the resulting
a better quality of service. Basically a lower message error redundant path length and disjointness according to their
rate were provided by adding one retransmission packet per characteristics for various internet like topologies. The
message while the promises of real-time deadlines are kept. simulation showed that for various topologies of the
Calculating the delay bounds of the messages, a Internet, only 10% of the participating nodes were needed
retransmission packet was scheduled in the channel. This for the proposed path redundant selection scheme to
way, a notable reduction of message error rate is achievable effectively find redundant path sharing few links which
with the cost of a reasonable overhead. The possibility and reduced packet loss by 66 percent.
schedulability of the presented methods have been [9] combined Forward Error Correction and Network
evaluated and some simulations were done to verify the Coding in Bufferless Networks using Optical Packet
strength of the methods in accepting real-time channels. Switching as a case study. A combined forward Error
The evaluation shows the performance of the methods in Correction and Network coding scheme was used to
accepting real-time channels in reality, and at last a address performance issues arising in a bufferless network.
comparison was been made between the two methods. A case study for reducing packet loss in optical packet
The paper [7] increased the information throughput switched networks was presented. The Analysis showed
efficiency over a stop and wait protocol by developing an that combining coding scheme has indeed increased
adaptive ARQ Strategy for Packet Switching Data successful decoding probability and reduced packet loss
Communications Networks. This improvement from the rate with orders of magnitude, if the underlying FEC
simulation results was particularly evident for a demonstrated sufficient redundancy. Factoring in realistic
communication system operating in an environment with contention probabilities in OPS networks, high rate, low
high channel Pb. The adaptive features to an existing over head Reed Solomon Codes were used to reduce packet
Software protocol was added and also designed only to be loss and meet both buffering and decoding delay
modified with no hardware requirements. Several different requirements simultaneously.
adaptive arq strategies were presented, and all adapted to The Paper [10] improved the efficiency of Forward Error
the packet length as the channel Pb increased or decreased. Correction coding in reducing packet loss in Internet
The noise or interference analysis or empirical data of the Protocol networks. A method was explored for measuring
specific system which reflected the condition required to the performance of FEC coding thereby the coding method
determine how many levels to use in an adaptive structure combining with interleaving in reducing the packet loss in
for a system. The different strategies were presented to IP networks. The performance of FEC data transferred
provide a system designer with the ability to optimize a from the source to destination was evaluated using FEC
specific system for the particular noise or fading conditions decoder which also voluntarily created the packet loss, and
experienced. recovered lost packets at the destination. The FEC coding
The adaptive software protocol model simulation performance was measured using an analytical method
program used could possibly be modified to simulate other stated in the paper. Single multiplexer network model was
ARQ protocols and also compare with other protocols in used for transmission of the data from multiple sources to
attempt to optimize the system further. destinations. In the paper, the unified method provided an
integrated framework for exploring the compromises
C Past Research works in Forward Error Correction
between the various key parameters i.e. channel coding
Lots of research works using Forward Error control have rates, interleaving depths, block lengths. It provided the
been performed. Among them are [8] which combined Path selection of various optimal coding strategies with various
Diversity with Forward Error Correction (PDF) systems for QOS requirements and system constraints.
Packet Switched Networks. In this research work, packet The Paper [11] used Forward Error Correction Schemes
loss rate was reduced by sending packets on appropriate to Protect Real Time Data Against Packet Loss and also
rates on disjoint paths from single sender to receivers. This recovered the lost packets of real time data. The factor was
work was extended to applications that were sensitive to the time in which data can be recovered as data that is
delay over packet switched networks for which single delayed for too long was regarded as lost. In the paper, the
sender to receiver connection were established using authors proposed and simulated a FEC enabled network
collection of relay nodes. protocol to complement current techniques like Low
Latency Queuing (LLQ) to reduce congestion error on
normal packet switched networks.
279
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
An erasure decoder was developed by combining two RS code as an MDS code, meets the conditions d = n –
erasure decoding techniques. The performances of various k + 1 or alternatively d – 1 = n – k, which means that it can
erasure decoders were compared. These techniques were correct any combination up to n – t erasures according to
also deployed in optical networks to reduce the effect of equation above when it is used as the erasure code for
packet loss arising from contention errors and Redundant reliable end to end communication in packet switched
Array of Inexpensive Disks systems. network. In this scenario, the source node transport layer
produces n transport packets using the RS encoder for
III. ERASURE CODING IN P ACKET S WICHED NETWORKS every k information packets made known from the
Erasure codes are FEC code classes which does not application layer. At the destination node transport layer,
require retransmission when they are employed. An erasure the RS decoder is able to recover the original information
is an error at which its location in the message is known to as long as it can receive any k out of the n packets
the decoder but has an unknown value. An erasure code is transmitted correctly. For this reason, the MDS erasure
designed to recover the erasures, as a substitute for codes are also called the k-out-of-n codes.
correcting errors from the packets correctly received or RS codes for different application requirements can
encoded bits. In a packet based network, an (n, k) erasure provide a large number of MDS codes. Extended RS codes
consists of k information packets and n-k parity packets are also maximum distance separable [13] and [14] by
over a finite field GF(q) (q is a power of a prime). adding one or two overall parity check(s). These attributes
It is assumed that packet-loss in an erasure channel is an have made RS codes an attractive candidate in this field.
independent event introduced by [12], with a fixed constant The decoding complexity of RS codes is achieved using
probability, . Packets are either presented as erasures or the fast Fourier transform technique at the scale of O (n
correctly received as erasures to the decoder in this channel log2 n), [15]. RS codes have been considered for different
model. The Erasure channel Shannon capacity is (1- and applications in the network environment [16], [17], and
[18], [19] and [20]. For example, employing the RS code in
transmission at any rate R< (1( with a random linear
association with the ARQ technique can largely improve
code can be achieved [12]. The number of erasures an
the performance of reliable multicast in the IP network
erasure code can correct, is bounded by d – 1 where d
[18], which is important for ensuring QoS in multimedia
is the minimum distance of the code. Clearly, this same
(video and audio) distribution across the network.
code doubles the number of errors that can be corrected
when it is used solely for error correction. The construction B Bose- Chaudhuri Hocquenghem Code (BCH) Code
of erasure codes can be classified into two categories using They discovered a code called BCH. It could be used to
a simple taxonomy: the maximum-distance separable detect and correct multiple errors code. BCH code is a
(MDS) code approach and sparse graph-code approach. generalized form of Hamming code. For any positive
The construction methods and performance features are integer possibility codes for m (m >3) and t (t < a
some of the summarised useful erasure codes as follows binary BCH code exists with the following parameters:
A Reed Solomon codes Block length n =
Reed Solomon codes are q-uary BCH codes special Number of Parity Check digits = n – k mt
subclass and form the most important class of the MDS Minimum distance d 2t + 1
codes. They have been widely used for error control in Generating polynomial g(x) is generally created as
digital communications and storage systems because of follows:
their powerful correcting capacity of burst error. RS codes Lowest Common Multiple (L.C.M) of {m1(x), m2(x),
can also be applied effective erasure codes to recover errors ………….m2t-1(x)}
of multiple erasures of size q. In general (n,k) RS code can The message m(x) is divided by g(x) and remainder will
be formulated using the generator polynomial. be represented as check bits r(x). Now whole encoded
g(x) = (x – αb)(x – αb+1)………….( for message is represented as:
some 2 and some a 1, where GF(q) for any i
E(x) = m(x) + r(x) (1)
and αn = 1 but αs 1 for any positive s n. The codes
produced have in length n = q – 1 symbols (or packet) with BCH Decoding
each packet containing q bits. The decoding of BCH is performed in three steps:
Syndrome is computed from the received packet.
280
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
Error location polynomial is generated from set of D. Simulating the proposed Coding with both RS codes and
equations and derived from the syndrome. BCH Codes
Error location polynomial is used to identify and We analyze the packet loss rate of the coding schemes
correct the errant bits. with RS codes and BCH codes. For the simplicity of the
C Combined Coding Scheme analysis, RS (n, k) code and BCH codes (n, k) are used.
Both codes correct up to m erroneous messages. The
The data link layer adds authenticity to the physical messages we are talking about now is with respect to RS
layer by adding mechanism to detect and retransmit and BCH codes are in digits. The packet error ratio (PER)
damages or lost packets. It also used a mechanism to is the ratio of altered received packets of data to the total
recognize duplicate packets. Error control is normally number of the received packets. A packet is declared
achieved adding a trailer to the end of the packet. In this incorrect if at least one bit is erroneous. The expectation
coding scheme was designed in detail. value of the PER is called packet error probability, Pp for
End System which data packet length of N digits can be expressed as
= 1 – (1- )N (2)
Link
Where N is the number of packets in the network and in
Intermediate System queue, assuming that the bit errors are independent of each
other.
Using Dynamic Erasure with both RS and BCH codes,
Link Intermediate
up to, m errors can be corrected.
System
Number of packets in a source data block denote the
transmission of the block of source data, the number of
erasures as a throughput. The packet error probability
End System
Intermediate System produced in blocks of data is given by
Dynamic Erasure + RS Code (3)
Link
Dynamic Erasure + BCH Code (4)
281
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
Table II
Graph showing Packet Error probability at Bit Error Packet Error Probability Of The Schemes At Bit Error Probability Of
probability of 0.1 0.3
1.02 Dynamic Dynamic
Erased with Reed with BCH
1.00 Channels Dynamic solomon Code
Packet Error Probability
0.98 2 1 1 1
0.96 Dynamic
4 1 1 1
0.94
6 1 1 1
Dynamic with
0.92
Reed solomon 8 0.413 1 1
0.90
Dynamic with 10 1 0.999999 1
0.88 BCH Code
12 0.999846 1 1
0.86
0 10 20 30 14 0.16897 1 1
Number of Erased Channels 16 1 0.988549 1
18 1 0.903109 1
Figure 3: Figure showing Packet Error probability of the Schemes at
20 1 1 1
Bit Error probability of 0.1
282
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
Dynamic erasure coding graph reduced from 1 to 0.413 Graph showing Packet Error probability at Bit Error
and rose back to 1, fell and pass through two points and probability of 0.5
then, rose back to 1, became uniform till the end. Dynamic
Erasure coding with Reed Solomon was uniform at 1 and 1.01
sloped down to 0.999999 and rose back to 1, remained 1.00
283
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
Dynamic Erasure with BCH coding graph produced a The graph shows the packet error probability for each of
lower packet error probability at points 4, 6, 8, 10, 16, 18, the scheme at bit error probability of 0.7. The blue graph
20. Both Dynamic Erasure Coding and Dynamic Coding shows the Dynamic Erasure Coding Method. The wine
with BCH have a better retention of packet error colored graph shows the Dynamic Erasure coding with
probability more than the Dynamic Erasure with Reed Reed Solomon Method while the Lemon green coloured
Solomon coding. This is because of the deep production of graph shows the Dynamic Erasure coding with BCH
steeper slope from Dynamic Erasure with Reed Solomon Coding method. Dynamic erasure coding graph was
coding. initially uniform from points 2 to 6, sloped down to
Table IV
0.999999, rose to 1 and fell to 0.999827, rose to 1,
Packet Error Probability Of The Schemes At Bit Error Probability remained uniform at points 14 and 16, sloped down to
Of 0.7 0.999755, and finally rose to 1 and remained uniform until
Dynamic Dynamic the last point of number of erasures. Dynamic Erasure
Erased with Reed with BCH coding with Reed Solomon graph was initially uniform at
Channels Dynamic solomon Code 1, from point 4 and sloped down to 0.999997, rose back to
2 1 1 1 1, remained uniform until the last point. Dynamic with
BCH code graph was initially uniform at 1 from points 2 to
4 1 1 1
4, sloped down to 0.999995, rose to 1 passing through
6 1 1 0.999995 0.999959 and remained uniform until the end of points.
8 0.999999 0.999997 0.999959 This graph shows that Dynamic Erasure coding produced a
lower packet error probability at points 2, 4, 6, 10, 14, 16
10 1 1 1 and 20. Dynamic Erasure with Reed Solomon produced a
12 0.999827 1 1 lower packet error probability at points 2, 4, 6, 10, 12, 14,
14 1 1 1
16, 18 and 20. Dynamic Erasure with BCH coding
produced a lower packet error probability at points 2, 4, 6,
16 1 1 1 10, 12, 14, 16, 18, 20. Dynamic with Reed Solomon have a
18 0.999755 1 1 better retention of packet error probability more than the
20 1 1 1
Dynamic Erasure with BCH code and Dynamic Erasure
coding. This is because of the deep production of steeper
slope from both graphs (Dynamic Erasure Coding and
Graph showing Packet Error probability at Bit Error Dynamic Erasure with BCH).
probability of 0.7
Table V
1.00 Packet Error Probability Of The Schemes At Bit Error Probability Of
0.9
1.00 Dynamic Dynamic
Packet Error Probability
1.00 12 1 1 0.9999
0 10 20 30 14 1 1 1
Number of Erased Channels
16 1 1 1
18 1 1 0.99
Figure 6: Graph showing Packet Error probability of the Schemes at
Bit Error probability of 0.7. 20 1 1 1
284
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
V. CONCLUSION
Graph showing Packet Error probability at Bit Error
probability of 0.9 In this paper, A method was proposed using Dynamic
Erasure Coding Method based on the number of erased
1.02
channels and good channels. Via simulation, It was shown
1.00 that the method reduced Packet Error Probability. With
increase in the number of erasures, the network error
Packet Error Probability
285
International Journal of Emerging Technology and Advanced Engineering
Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 9, Issue 10, October 2019)
[12] Elias, P. (1955), Coding for Noisy Channels, Proceedings of 3rd [27] Berkekamp, E. R., R. E. Peile, and S. P. Pope, (1987), The
London Symposium, Information Theory Pages 61-66. Applications of Error Control to Communications, IEEE
[13] Tanaka, H., and F., Nishida, (1970), A Construction of a Polynomial Communications Magazine, Vol. 25, No. 4, Pages 44 – 57.
Code, Electron Communication, Japan, 53-A, Pages 24-31. [28] Blaum, M., Brandy, J., Bruck, J., and Menon, J., (1996), Evenodd:
[14] Gross, A.J., (1973), Some Augumentations of Bose_Chaudhuri error An Efficient Scheme of tolerating double disk failures in RAID
correcting codes in Srivastava, J. N.(Edition); A survey of Architecures, IEEE Transaction Computation, No. 44, Pages 192-
Combinatorial Theory, North-Holland, Amsterdam. 202.
[15] Justesen, J., (1976), On the Complexity of Decoding Reed Solomon [29] Bose, R.C. and D. K. Ray-Chaudhuri (1960), On a Class of Error
Codes, IEEE Transformational Information Theory, No. 22, Pages Correcting Binary Group Codes at Information and Control 3, Pages
237-238. 68-79.
[16] McAuley, A. J., (1990) Reliable Broadband Communication Using a [30] Chen, H., Fu Song, (2016), Improving Coding Performance and
Burst Erasure Correcting Code, Proceedings ACM SIGCOMM ’90 Energy Efficiency of Erasure Coding Process for Storage Systems –
Philadelphia, P.A., September, Pages 287-306. A Parallel and Scalable Approach, Institute of Electronics and
Electrical Engineers, 9th International Conference on Cloud
[17] Rizzo, L., (1997). Effective Erasure codes for Reliable
Computing, Pages 933-936.
Communication Protocols, ACM Communications Review Vol.27,
No. 2, Pages 24-36. [31] Dai, B., W. Zhao, Jan Yang and Lu Lv, (2014) CODEC: Content
Distribution with (N,K) Erasure code in MaNET, International
[18] Nonnenmacher, J., E.W. Biersasck and D. Towsley, (1998), Parity
Journal of Computer Networks and Communications (IJCNC), Vol.
Based Loss Recovery for Reliable Multicast Transmission, IEEE
6, No. 4, Pages 39–51.
Transactional Communication, 1998, Vol. 6. Pages 349– 361.
[32] Dimakis, A.G. and K. Ramchadran (2008), Network Coding for
[19] Sakakibara, K., and M. Kasahara, (1995), A Multicast Hybrid using
Distributed Storage in Wireless Networks, Networked Sensing
MDS Codes and GMD decoding, IEEE Transaction in
Information and Control, Springer Science + Business Media, LLC,
Communication 43, pp 2933 – 2939.
2008, Pages 115–134.
[20] Rubenstein, D., J. Kurose, and D. Towsley, (1998), Real-Time
[33] Donglas, C., S. B. Toby and R. Bridgehall, (2004), Energy
Reliable Multicast, Using Proactive Forward Error Correction,
Efficiency of CSMA protocols for Wireless Packet Switched
Proceedings NOSDAV, Cambridge, U.K. July, Pages 279-294.
Networks, Proceedings of IEEE Wireless Communication and
[21] Ababneh, J. and O. Almomani, (2014), Survey of Error Correction Networking Conference, Volume 1, Pages 447-452.
Mechanisms for Video Streaming over the Internet, International
[34] Dressler, F., M. B. Li, R. Kapitza, S. Ripperger, C. Eibel, B. Herzog,
Journal of Advanced Research in Computer Science Applications,
T. Honig and W. Schroder-Prekischat. (2016). Monitoring Bats in
West Yorkshire, U.K., Vol. 5, No. 3., Pages 155–161.
the Wild: On Using Erasure Codes for Efficient Wireless Sensor
[22] Abdullah, A.S., M.J. Abbasi and N. Fisal, (2015), Review of Networks, ACM Transaction on Sensor Networks, Vol 12, No 1,
Rateless-Network-Coding Based Packet Protection in Wireless Article 7.
Sensor Networks, Hindawi Publishing Corporation, Mobile
[35] Elfouly, T., M. Saleh and O. M. Malluhi (2008), Efficient Forward
Information Systems, Volume 2015, Article ID 641027, Pages 1–15,
Error Correction for Reliable Transmission in Packet Network,
http://dx.doi.org/10.1155/2015/641027.
Proceedings of 2008 International Conference on Parallel and
[23] Ajutsu, H., K. Ueda, H. Saito, (2017), MEC: Network Optimized Distributed Techniques and Applications, Las Vegas, U.S.A,
Multi-Stage Erasure coding for Scalable Storage Systems, IEEE 22nd Volume 1, Pages 103-109.
Pacific Rim International Symposium on Dependable Computing,
[36] Tovirac, J. (2005), Error Control for Message Multicast over
Christchurch, Canterbury, New Zealand, Pages 292–300.
Wireless Links, PhD Dissertation, Institute for Telecommunications
[24] Arrobo, G. and R. Gitlin, (2014), Minimising Energy Consumption Research, University of Southern Austrailia, Austrailia.
for Cooperative Network and Diversity Coded Sensor Networks,
[37] Towsley D., J.K. Wolf, (1979). On the Statistical Analysis of Queue
2014 Wireless Telecommunications Symposium, Pages 103 – 109.
Length and Waiting times for Statistical Multiplexers with ARQ
[25] Bada, A.B. (2017) Automatic Repeat Request (ARQ) Protocols, The Retransmission schemes, IEEE Transaction on Communications,
International Journal of Engineering and Science (IJES), Vol 6, Issue VOL COM-27, No. 4, March 1979.
5, Pages 64-66.
[38] Tucker, R.S. (2011), Scalability and Energy Consumption of
[26] Balinga, J. (2011), Energy Consumption in Wired and Wireless Optical and Electronic Packet Switching, IEEE Journal of Light
Access Networks, IEEE Communications Magazine, Volume 49, Wave Technology, Vol. 24, No 16, Pages 2410-2421, 445 Hoes
Issue 6, pages 70 – 77, South West, Nimbus Avenue, Portland, Lane, Piscataway, New Jersey 08854-4141, U.S.A.
Oregon 97233, U.S.A
286