https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Call Center/Command


Demystifying error-control coding

Demystifying error-control coding

It's the key to designing error-free communications systems. But what is it?
  • Written by Urgent Communications Administrator
  • 1st November 2005

Many of us have heard the term error-control coding in connection with modern land mobile radio systems, but few of us understand what it is, what it does and why we should be concerned about it. Old timers are forewarned: All LMRs eventually will be digital, and all digital radios use error-control coding. Terms like Golay code, Hamming code, CRC and interleaving will become popular topics at cocktail parties. Don’t get left out of the conversation; learn about error-control codes.

This article begins a series that will examine what error-control codes do, how they work, and when they can be used successfully.

Error-control coding is a discipline under the branch of applied mathematics called Information Theory, discovered by Claude Shannon in 1948 [1]. Prior to this discovery, conventional wisdom said that channel noise prevented error-free communications. Shannon proved otherwise when he showed that channel noise limits the transmission rate, not the error probability.

Shannon showed that every communications channel has a capacity, C (measured in bits per second), and as long as the transmission rate, R (also in bits per second), is less than C, it is possible to design a virtually error-free communications system using error-control codes. Shannon’s contribution was to prove the existence of such codes. He did not tell us how to find them.

After the publication of Shannon’s famous paper, researchers scrambled to find codes that would produce the very small probability of error that he predicted. Progress was disappointing in the 1950s when only a few weak codes were found.

In the 1960s, the field split between the algebraists, who concentrated on a class of codes called block codes, and the probabilists, who were concerned with understanding encoding and decoding as a random process. The probabilists eventually discovered a second class of codes, called convolutional codes, and designed powerful decoders for them.

In the 1970s, the two research paths merged, and several efficient decoding algorithms were developed. With the advent of inexpensive microelectronics, decoders finally became practical and in 1981, the entertainment industry adopted a very powerful error control scheme for the new CD player [2]. Today, error-control coding in its many forms is used in almost every new communications system, including the Association of Public-Safety Communications Officials’ Project 25 standard.

Digital communications systems often are conceptualized as shown in Figure 1. The following paragraphs describe the elements of Figure 1 and define other terms common to error-control coding.

  • Encoder and decoder: The encoder adds redundant bits to the sender’s bit stream to create a code word. The decoder uses the redundant bits to detect and/or correct as many bit errors as the particular error-control code will allow. For our purposes, encoding and decoding refers to channel coding as opposed to source coding. (Source coding prepares the original information for transmission; the vocoder, or voice-encoder, is one example of source coding.)

  • Modulator and demodulator: The modulator transforms the output of the encoder, which is digital, into a format suitable for the channel, which is usually analog (e.g., a radio channel). The demodulator attempts to recover the correct channel symbol in the presence of noise.

    When the wrong symbol is selected, the decoder tries to correct any errors that result. Some demodulators make soft decisions, meaning that the demodulator does not attempt to match the received signal to one of the allowed symbols. Instead, it matches the noisy sample to a larger set of discrete symbols and sends it to the decoder where the heavy lifting is done.

  • Communications channel: This part of the communication system introduces errors. The channel can be radio, twisted wire pair, coaxial cable, fiber-optic cable, magnetic tape, optical discs or any other noisy medium.

  • Error-control code: The set of code words used with an encoder and decoder to detect errors, correct errors, or both detect and correct errors.

  • Bit-error rate (BER): The probability of bit error often is the figure of merit for an error-control code. We want to keep this number small, typically less than 10-4 for data and less than 10-3 for digital voice. BER is a useful indicator of system performance on an independent error channel, but it has little meaning on bursty, or dependent, error channels.

  • Message-error rate: This probability of message error is sometimes called frame error rate. This may be a more appropriate figure of merit because the smart user wants all of his or her messages to be error-free and couldn’t care less about the BER.

  • Undetected message error rate (UMER): This is the probability that the error detection decoder fails and an errored message (code word) slips through undetected. This event happens when the error pattern introduced by the channel is such that the transmitted code word is converted into another valid code word. The decoder can’t tell the difference and must conclude that the message is error-free. Practical error detection codes ensure that the UMER is very small, often less than 10-16.

  • Random errors: These errors occur independently. This type of error occurs on channels that are impaired solely by thermal (Gaussian) noise. Independent-error channels also are called memory-less channels because knowledge of previous channel symbols adds nothing to our knowledge of the current channel symbol.

  • Burst errors: These errors are not independent. For example, channels with deep fades experience errors that occur in bursts. Because the fades result in consecutive bits that are more likely to be in error, the errors are usually considered dependent rather than independent. In contrast to independent-error channels, burst-error channels have memory.

  • Energy per bit: This refers to the amount of energy contained in one information bit. This is not a parameter that can be measured by a meter, but it can be derived from other known parameters. Energy per bit (Eb) is important because almost all channel impairments can be overcome by increasing it. Energy per bit (in joules) is related to transmitter power Pt (in watts and bit rate R (in bits per second), as shown in Equation 1.

    If transmit power is fixed, the energy per bit can be increased by lowering the bit rate. This is why lower bit rates are considered more robust. The required energy per bit to maintain reliable communications can be decreased through error-control coding, as we shall see in the next article in this series.

  • Coding gain: This refers to the difference in decibels (dB) in the signal-to-noise ratio required to maintain reliable communications after coding is employed. Signal-to-noise ratio is usually represented as Eb/N0, where N0 is the noise power spectral density measured in watts/Hertz (joules). For example, let’s say a communications system requires an Eb/N0 of 12 dB to maintain a BER of 10-5, but after coding it requires only 9 dB to maintain the same BER. In that case, the coding gain is 12 dB – 9 dB = 3 dB. (Recall that dB = 10 log10 X, where X is a ratio of powers or energies.)

  • Code rate: Consider an encoder that takes k information bits and adds r redundant bits (also called parity bits) for a total of n = k + r bits per code word. The code rate is the fraction k/n, and the code is called an (n, k) error-control code. The added parity bits are a burden (i.e., overhead) to the communications system, so the system designer often chooses a code for its ability to achieve high coding gain with few parity bits.

Next month: What coding can and cannot do.


Jay Jacobsmeyer is president of Pericle Communications Co., a consulting engineering firm located in Colorado Springs, Colo. He holds bachelor’s and master’s degrees in Electrical Engineering from Virginia Tech and Cornell University, respectively, and has more than 20 years experience as a radio frequency engineer.

References:

  1. C. E. Shannon, “A Mathematical Theory of Communication,” Bell System Technical Journal, vol. 27, pp. 379-423, 1948.

  2. F. Guterl, “Compact Disc,” IEEE Spectrum, vol. 25, No. 11, pp. 102-108, 1988.

Tags: Call Center/Command content Test & Measurement

Most Recent


  • The shine begins to wear off 5G private wireless
    Verizon had high hopes for private wireless networking. The company had predicted that by now it would be well on its way to making billions of dollars from the sale of custom 4G and 5G networks dedicated exclusively to its enterprise customers. Indeed, during 2021 Verizon execs pegged the total addressable market for private wireless at around […]
  • Phishers trick Microsoft into granting them 'verified' Cloud Partner status
    Late last year, a group of threat actors managed to obtain “verified publisher” status through the Microsoft Cloud Partner Program (MCPP). This allowed them to surpass levels of brand impersonation ordinarily seen in phishing campaigns, as they distributed malicious applications bolstered by a verified blue badge only ever given to trusted vendors and service providers in […]
  • Shapeshifting robot can morph from a liquid to a solid
    A new shape-shifting robot can reversibly morph between liquid and solid shapes. The novel design was created by a team of engineers from The Chinese University of Hong Kong and Carnegie Mellon University. Inspired by sea cucumbers’ ability to go both soft or rigid depending on its environment, the miniature robot was built using magnetic […]
  • Automakers against stampede to BEV dominance
    When the president of the world’s biggest carmaker talks, people listen. So, when Toyota President Akio Toyoda said, in September of last year, that bans on ICE cars within 10 to 15 years  will be “rather difficult to achieve” because EVs “are just going to take longer than the media would like us to believe,” […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Open-source tools for the IoT ecosystem
  • New Orleans-area 911 center inks multiyear APEX deal with Carbyne to replace call-handling system
  • Demystifying error-control coding
    Newscan: Feds recover millions from pipeline ransom hackers, hint at U.S. Internet tactic
  • Cyber is the new Cold War, and AI is the arms race

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

The shine begins to wear off 5G private wireless dlvr.it/Shth0P

3rd February 2023
UrgentComm

Phishers trick Microsoft into granting them ‘verified’ Cloud Partner status dlvr.it/Shqngn

2nd February 2023
UrgentComm

Shapeshifting robot can morph from a liquid to a solid dlvr.it/Shqk9K

2nd February 2023
UrgentComm

Automakers against stampede to BEV dominance dlvr.it/ShpX08

2nd February 2023
UrgentComm

FCC nominee Gigi Sohn headed for third Senate hearing dlvr.it/ShpDcZ

1st February 2023
UrgentComm

Sign up to learn how to successfully manage your Motorola ASTRO® 25 System: spr.ly/60143j8fp https://t.co/XcxiUwzN27

1st February 2023
UrgentComm

Hytera parent cites financial health, but unable to make royalty payment to Motorola Solutions dlvr.it/ShlrlM

1st February 2023
UrgentComm

NATE: Todd Schlekeway highlights organization’s safety, legislative initiatives dlvr.it/ShljHj

1st February 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.