In this paper, we propose and analytically evaluate the use of punctured convolutional codes for recovering packets lost in multicast transmission. An independent erasure channel is assumed for packets transmission over a star topology. The analysis provides a method for determining the recoverability and the post-reconstruction receiving rate for a given convolutional code. We theoretically evaluate the effectiveness of the proposed approach taking into account two different parameters: the number of transmissions per packet and the number of packets needed to be sent to guarantee the reception of data. Finally, we compare the proposed approach with the scheme when parity packets are generated based on Reed-Solomon codes.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Anna YAMAGUCHI, Masayuki ARAI, Hitoshi KUROSU, Satoshi FUKUMOTO, Kazuhiko IWASAKI, "Fault-Tolerance Design for Multicast Using Convolutional-Code-Based FEC and Its Analytical Evaluation" in IEICE TRANSACTIONS on Information,
vol. E85-D, no. 5, pp. 864-873, May 2002, doi: .
Abstract: In this paper, we propose and analytically evaluate the use of punctured convolutional codes for recovering packets lost in multicast transmission. An independent erasure channel is assumed for packets transmission over a star topology. The analysis provides a method for determining the recoverability and the post-reconstruction receiving rate for a given convolutional code. We theoretically evaluate the effectiveness of the proposed approach taking into account two different parameters: the number of transmissions per packet and the number of packets needed to be sent to guarantee the reception of data. Finally, we compare the proposed approach with the scheme when parity packets are generated based on Reed-Solomon codes.
URL: https://global.ieice.org/en_transactions/information/10.1587/e85-d_5_864/_p
Copy
@ARTICLE{e85-d_5_864,
author={Anna YAMAGUCHI, Masayuki ARAI, Hitoshi KUROSU, Satoshi FUKUMOTO, Kazuhiko IWASAKI, },
journal={IEICE TRANSACTIONS on Information},
title={Fault-Tolerance Design for Multicast Using Convolutional-Code-Based FEC and Its Analytical Evaluation},
year={2002},
volume={E85-D},
number={5},
pages={864-873},
abstract={In this paper, we propose and analytically evaluate the use of punctured convolutional codes for recovering packets lost in multicast transmission. An independent erasure channel is assumed for packets transmission over a star topology. The analysis provides a method for determining the recoverability and the post-reconstruction receiving rate for a given convolutional code. We theoretically evaluate the effectiveness of the proposed approach taking into account two different parameters: the number of transmissions per packet and the number of packets needed to be sent to guarantee the reception of data. Finally, we compare the proposed approach with the scheme when parity packets are generated based on Reed-Solomon codes.},
keywords={},
doi={},
ISSN={},
month={May},}
Copy
TY - JOUR
TI - Fault-Tolerance Design for Multicast Using Convolutional-Code-Based FEC and Its Analytical Evaluation
T2 - IEICE TRANSACTIONS on Information
SP - 864
EP - 873
AU - Anna YAMAGUCHI
AU - Masayuki ARAI
AU - Hitoshi KUROSU
AU - Satoshi FUKUMOTO
AU - Kazuhiko IWASAKI
PY - 2002
DO -
JO - IEICE TRANSACTIONS on Information
SN -
VL - E85-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2002
AB - In this paper, we propose and analytically evaluate the use of punctured convolutional codes for recovering packets lost in multicast transmission. An independent erasure channel is assumed for packets transmission over a star topology. The analysis provides a method for determining the recoverability and the post-reconstruction receiving rate for a given convolutional code. We theoretically evaluate the effectiveness of the proposed approach taking into account two different parameters: the number of transmissions per packet and the number of packets needed to be sent to guarantee the reception of data. Finally, we compare the proposed approach with the scheme when parity packets are generated based on Reed-Solomon codes.
ER -