Decomposable Forward Error Correction Codes Based on Chinese Remainder Theorem

被引:3
作者
Sun, Hung-Min [1 ]
Chang, Shih-Ying [1 ]
Hung, Yu-Hsiang [1 ]
Tseng, Yu-Kai [1 ]
Chiao, Hsin-Ta [2 ]
机构
[1] Natl Tsing Hua Univ, Hsingchu, Taiwan
[2] Ind Technol, Res Inst, Hsinchu, Taiwan
来源
2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009) | 2009年
关键词
reliable multicast; forward error correction; Chinese remainder theorem;
D O I
10.1109/I-SPAN.2009.91
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Several applications benefited from multicast data distribution because a sender can concurrently transmit data to multiple receivers using fewer bandwidth. However, reliability is an important issue in multicast because retransmission is not very efficient in multicast. In recent years, Forward Error Correction (FEC) codes are proposed to facilitate reliable multicast data distribution and are applied to several applications. FEC provides a more efficient way of reliable multicast data distribution because of no retransmission. In this paper, we propose a new FEC codes (F-CR codes), which are extended from Chinese Remainder codes, require smaller transmission redundancy than conventional FEC codes and support two variants for transmission and computation efficiency. In particular, the r-decomposition variant allows the sender to decompose an output symbols encoded into tau smaller sub-symbols. This decomposable property which is firstly proposed in this paper is especially suitable for link unstable networks or link heterogeneity networks like wireless sensor networks. The analysis and experiments also demonstrate the feasibility of F-CR codes.
引用
收藏
页码:260 / +
页数:2
相关论文
共 11 条
[1]   Routing techniques in wireless sensor networks: A survey [J].
Al-Karaki, JN ;
Kamal, AE .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (06) :6-28
[2]  
Allman M., 1997, P 5 INT C TEL SYST N, P456
[3]  
[Anonymous], ELEMENTARY NUMBER TH
[4]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[5]  
Byers J. W., 1998, Computer Communication Review, V28, P56, DOI 10.1145/285243.285258
[6]  
Goldreich O., 1999, Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, P225, DOI 10.1145/301250.301309
[7]  
Luby M, 2002, ANN IEEE SYMP FOUND, P271, DOI 10.1109/SFCS.2002.1181950
[8]  
MacWilliams F. J., 1988, THEORY ERROR CORRECT
[9]   POLYNOMIAL CODES OVER CERTAIN FINITE FIELDS [J].
REED, IS ;
SOLOMON, G .
JOURNAL OF THE SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, 1960, 8 (02) :300-304
[10]   Energy efficiency based packet size optimization in wireless sensor networks [J].
Sankarasubramaniam, Y ;
Akyildiz, IF ;
McLaughlin, SW .
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, 2003, :1-8