A model-based approach to evaluation of the efficacy of FEC coding in combating network packet losses

Xunqi Yu, James W. Modestino, Rigip Kurceren, Yee S. Chan

Research output: Contribution to journalArticle

36 Scopus citations

Abstract

We propose a model-based analytic approach for evaluating the overall efficacy of FEC coding combined with interleaving in combating packet losses in IP networks. In particular, by modeling the network path in terms of a single bottleneck node, described as a G/M/1/K queue, we develop a recursive procedure for the exact evaluation of the packet-loss statistics for general arrival processes, based on the framework originally introduced by Cidon et al, 1993. To include the effects of interleaving, we incorporate a discrete-time Markov chain (DTMC) into our analytic framework. We study both single-session and multiple-session scenarios, and provide a simple algorithm for the more complicated multiple-session scenario. We show that the unified approach provides an integrated framework for exploring the tradeoffs between the key coding parameters; specifically, interleaving depths, channel coding rates and block lengths. The approach facilitates the selection of optimal coding strategies for different multimedia applications with various user quality-of-service (QoS) requirements and system constraints. We also provide an information-theoretic bound on the performance achievable with FEC coding in IP networks.

Original languageEnglish (US)
Pages (from-to)628-641
Number of pages14
JournalIEEE/ACM Transactions on Networking
Volume16
Issue number3
DOIs
StatePublished - Jun 1 2008

Keywords

  • Autocorrelation function
  • FEC coding
  • Interleaving
  • Packet-loss processes
  • Residual packet-loss rates
  • Single-multiplexer model

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Hardware and Architecture
  • Information Systems

Fingerprint Dive into the research topics of 'A model-based approach to evaluation of the efficacy of FEC coding in combating network packet losses'. Together they form a unique fingerprint.

  • Cite this