https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

content


Error-control coding options abound

Error-control coding options abound

Last month we covered applications and limitations of error-control codes and some of the theory behind their operation. This month we cover coding techniques.
  • Written by Urgent Communications Administrator
  • 1st February 2006

Last month we covered applications and limitations of error-control codes and some of the theory behind their operation. This month we cover coding techniques. Specifically, we will discuss automatic repeat request, or ARQ, forward error correction, hybrid ARQ, interleaving and concatenation.

An error-detection code by itself does not control errors, but it can be used to request repeated transmission of errored code words until they are received error-free. This technique is called ARQ. In terms of error performance, ARQ outperforms forward error correction (FEC) because code words always are delivered error-free (provided the error-detection code doesn’t fail). However, this performance does not come free of charge — we pay for it with decreased throughput.

The chief advantage of ARQ is that error detection requires simpler decoding than error correction. ARQ also is adaptive because it only re-transmits information when errors occur. On the other hand, ARQ schemes require a feedback path that may not be available.

There are two types of ARQ:

  • Stop-and-wait ARQ: With stop-and-wait ARQ, the transmitter sends a single code word and waits for a positive acknowledgement (ACK) or negative acknowledgement (NAK) before sending any more code words. The advantage of stop-and-wait ARQ is that it only requires a half-duplex channel. The main disadvantage is that it wastes time waiting for ACKs, resulting in low throughput.

  • Continuous ARQ: Continuous ARQ requires a full duplex channel because code words are sent continuously until a NAK is received. Typically, only the code word corresponding to the NAK is re-transmitted. Continuous ARQ offers greater throughput efficiency than stop-and-wait ARQ at the cost of greater memory requirements.

FEC is appropriate for applications where the user must get the message right the first time. A voice circuit is one example. Today’s error-correction codes fall into two categories:

  • Block codes: The repetition code introduced in last month’s column (MRT, January, page 51) is an example of a binary block code. It is important to note that not all block codes are binary. In fact, one of the most popular block codes is the Reed-Solomon code that operates on m-bit symbols, not bits. Because Reed-Solomon codes correct symbol errors rather than bit errors, they are very effective at correcting burst errors. For example, a 2-symbol error-correcting Reed-Solomon code with 8-bit symbols can correct all bursts of 16 bits or less in length. Reed-Solomon codes are used in JTIDS, a NASA deep-space standard, and CD players.

  • Convolutional codes: With con-volutional codes, the incoming bit stream is applied to a K-bit-long shift register. For each modification to the shift register, b new bits are inserted and n code bits are delivered, so the code rate is b/n. The power of a convolutional code is a function of its constraint length, K. Large constraint-length codes tend to be more powerful.

Unfortunately, with large constraint length comes greater decoder complexity. There are several effective decoding algorithms for convolutional codes, but the most popular is the Viterbi algorithm, discovered by Andrew Viterbi in 1967.

One drawback of the codes we have examined so far is that they require bandwidth expansion to accommodate the added parity bits should the user wish to maintain the original unencoded information rate. In 1976, Gottfried Ungerboeck discovered a class of codes that integrates the encoding and modulation functions and does not require bandwidth expansion [1]. These codes are called Ungerboeck codes or trellis coded modulation (TCM). Nearly every telephone line modem or DSL modem on the market today operating above 9.6 kb/s uses TCM.

Other coding techniques exist that are worth examining, such as hybrid ARQ. Hybrid ARQ schemes combine error detection and FEC to make more efficient use of the channel. At the receiver, the decoder first attempts to correct any errors present in the received code word. If it cannot correct all the errors, it requests retransmission using an ARQ technique.

Another technique to consider is interleaving. Many real-world channels are burst-error channels. For example, the mobile radio channel is a burst-error channel as a consequence of multipath fading. The most popular way to correct burst errors is to take a code that works well on random errors (e.g., a convolutional code) and interleave the bursts to “spread out” the errors so that they appear random to the decoder. There are two types of interleavers commonly in use today, block interleavers and convolutional interleavers. Figure 1 on page 38 illustrates the operation of a block interleaver.

The block interleaver is loaded row by row with L code words, each with a length of n bits. These L code words are then transmitted column by column until the interleaver is emptied. Then the interleaver is loaded again, and the cycle repeats. At the receiver, the code words are de-interleaved before they are decoded. A burst of length L bits or less will cause no more than 1 bit error in any single code word. The random error decoder is much more likely to correct this single error than the entire burst.

The parameter L is called the interleaver degree, or interleaver depth. The interleaver depth is chosen based on worst-case channel conditions. It must be large enough so that the interleaved code can handle the longest error bursts expected on the channel. The main drawback of interleavers is the delay introduced with each row-by-row fill of the interleaver. The delay is a function of the interleaver depth, which, in turn, is a function of the fade duration on the channel. The delay on some channels can be several seconds long. This long delay is often unacceptable. On voice circuits, for example, interleaver delays confuse the unfamiliar listener by introducing long pauses between speaker transitions. Even short delays of less than one-half second are sufficient to disrupt normal conversation.

In theory, interleaving is a poor way to handle burst errors. Why? From a strict probabilistic sense, we are converting “good” errors into “bad” errors. Burst errors have structure, and that structure can be exploited (in theory). Interleavers “randomize” the errors and destroy the structure. Despite this theoretical disadvantage, interleaving is one of the best burst-error-correcting techniques in practice. In fact, the greatest advance in coding theory in the past 15 years, turbo coding, employs a very long random interleaver [2]. Until the coding theorists discover a better way, interleaving will be an essential error-control-coding technique for bursty channels.

Yet another technique worth exploring is concatenation. When two codes are used in series, the combination is called a concatenated code. Concatenated codes often are used when a single code cannot correct all types of errors encountered on the channel. The operation of concatenated codes is best illustrated by example. Figure 2 on page 40 shows the Consultative Committee for Space Data Systems (CCSDS) Blue Book standard for Telemetry Channel Coding (interleaving is omitted for clarity) [3].

The inner code — a rate ½, K=7, convolutional code with Viterbi decoding — corrects most random errors and the outer code — a 16-symbol error correcting Reed-Solomon code — cleans any burst errors that slip through the Viterbi decoder. The Reed-Solomon code operates on 8-bit symbols and therefore is a very powerful burst-error correcting code. The overall code rate is simply the product of the two individual code rates, i.e., (½)(223/255) 0.44. It should be noted that coding gains for concatenated codes are very large.

Next month: Error-control coding in APCO 25 Radios.


Jay Jacobsmeyer is president of Pericle Communications Co., a consulting engineering firm located in Colorado Springs, Colo. He holds bachelor’s and master’s degrees in Electrical Engineering from Virginia Tech and Cornell University, respectively, and has more than 20 years experience as a radio frequency engineer.

References:

  1. G. Ungerboeck, “Trellis coded modulation with redundant signal sets Parts I and II,” IEEE Communications Magazine, vol. 25, No. 2, pp. 5-21, February 1987.

  2. C. Berrou, A. Glavieux and P. Thitimajshima, “Near Shannon limit error-correcting coding and decoding: Turbo-codes,” IEEE Transactions on Communications, pp. 1261-71, October 1996.

  3. E. R. Berlekamp et al., “The application of error control to communications,” IEEE Communications Magazine, vol. 25, No. 4, pp. 44-57, April 1987.

Tags: content Test & Measurement

Most Recent


  • FAA approves beyond-visual-line-of-sight (BVLOS) flights in North Dakota
    The unmanned aerial vehicle (UAV) avionics company uAvionix received Federal Aviation Administration approval to conduct advanced beyond visual line-of-sight (BVLOS) flights of small UAVs in North Dakota.  The flights will be conducted at the Northern Plains Unmanned Aerial Systems (UAS) Test Site (NPUASTS) in Grand Forks, one of seven FAA-run UAV test sites in the U.S., using […]
  • Spending American Rescue Plan Act funds: A primer for municipalities
    The American Rescue Plan Act (ARPA) of 2021 is a $1.9 trillion legislative package that includes funding for states, local governments and tribal nations to respond to the economic and public health impacts of the COVID-19 pandemic. While initially restricted, subsequent guidance from the federal government has expanded what those funds can be used for. […]
  • Report: Remote work causing offices to empty, but walkable cities still in high demand
    Given the reliance on vehicular transportation in the United States, some American cities historically haven’t prioritized being walkable in past planning and or design. But amid an unprecedented shift in the economy toward remote work, those that have are increasingly desirable for prospective residents. A new report from Smart Growth American and Places Platform, “Foot Traffic Ahead […]
  • Federal agencies infested by cyberattackers via legit remote-management systems
    It has come to light that hackers cleverly utilized two off-the-shelf remote monitoring and management systems (RMMs) to breach multiple Federal Civilian Executive Branch (FCEB) agency networks in the US last summer. On Jan. 25, the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC) released […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Cyber is the new Cold War, and AI is the arms race
  • Microsoft patches 6 zero-day vulnerabilities under active attack
  • AI energizes remote monitoring of patients, fuels bidirectional health care
  • Error-control coding options abound
    Newscan: New York transit agency breached by hackers as cyberattacks surge

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Cybercrime ecosystem spawns lucrative underground Gig Economy dlvr.it/ShkKbf

31st January 2023
UrgentComm

FAA approves beyond-visual-line-of-sight (BVLOS) flights in North Dakota dlvr.it/ShgxHW

30th January 2023
UrgentComm

AT&T boasts of core ‘white box’ success in 5G, fiber push dlvr.it/Shgb4w

30th January 2023
UrgentComm

Spending American Rescue Plan Act funds: A primer for municipalities dlvr.it/ShgZ52

30th January 2023
UrgentComm

AT&T wireless growth keyed by FirstNet—now provides 24,000 agencies with 4.4 million connections dlvr.it/ShY5qH

27th January 2023
UrgentComm

Report: Remote work causing offices to empty, but walkable cities still in high demand dlvr.it/ShXM7Z

27th January 2023
UrgentComm

AT&T FirstNet unleashes robotic dogs for emergency services dlvr.it/ShW7p8

27th January 2023
UrgentComm

Federal agencies infested by cyberattackers via legit remote-management systems dlvr.it/ShVhn3

26th January 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.