skip to main content
10.1145/3644713.3644833acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

8-bit forward error correction codes in linear network coding

Authors Info & Claims
Published:13 May 2024Publication History

ABSTRACT

The paper provides a comparative analysis of three different types of 8-bit forward error correction codes for network coding systems. Using mathematical modeling, the probability characteristics of the considered 8-bit forward error correction codes are calculated for two network topologies used in network coding systems. Recommendations on the use of the considered codes are given.

Skip Supplemental Material Section

Supplemental Material

References

  1. Muthanna, M. S. A., Muthanna, A., Rafiq, A., Hammoudeh, M., Alkanhel, R., Lynch, S., & Abd El-Latif, A. A. (2022). Deep reinforcement learning based transmission policy enforcement and multi-hop routing in QoS aware LoRa IoT networks. Computer Communications, 183, 33-50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ateya, A. A., Muthanna, A., Vybornova, A., Darya, P., & Koucheryavy, A. (2018). Energy-aware offloading algorithm for multi-level cloud based 5G system. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 18th International Conference, NEW2AN 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27–29, 2018, Proceedings 18 (pp. 355-370). Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  3. Masek, P., Fujdiak, R., Zeman, K., Hosek, J., & Muthanna, A. (2016, April). Remote networking technology for iot: Cloud-based access for alljoyn-enabled devices. In 2016 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology (FRUCT-ISPIT) (pp. 200-205). IEEE.Google ScholarGoogle Scholar
  4. Ateya, A. A., Muthanna, A., Gudkova, I., Vybornova, A., & Koucheryavy, A. (2017, July). Intelligent core network for Tactile Internet system. In Proceedings of the international conference on future networks and distributed systems (pp. 1-6).Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Yastrebova A., Kirichek R., Koucheryavy Ye., Borodin A., Koucheryavy A. Future Networks 2030: Architecture & Requirement // 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). 2018. P. 1–8. DOI: 10.1109/ICUMT.2018.8631208.Google ScholarGoogle ScholarCross RefCross Ref
  6. Yastrebova, Anastasia, Ruslan Kirichek, Yevgeni Koucheryavy, Aleksey Borodin, and Andrey Koucheryavy. "Future networks 2030: Architecture & requirements." In 2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 1-8. IEEE, 2018.Google ScholarGoogle Scholar
  7. Hammoudeh, Mohammad, and Robert Newman. "Information extraction from sensor networks using the Watershed transform algorithm." Information Fusion 22 (2015): 39-49.Google ScholarGoogle Scholar
  8. Ahlswede R., Cai N., Li S.-Y.R., Yeung R.W. Network information flow // IEEE Transactions on Information Theory. 2000. Vol. 46. P. 1204–1216.Google ScholarGoogle Scholar
  9. Fragouli C., Soljanin E. Network Coding Fundamentals // Foundations and Trends in Networking. 2007. Vol. 2. No. 1. P. 1–133. DOI: 10.1561/1300000003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Габидулин Э.М., Пилипчук Н.И., Колыбельников А.И., Уривский А.В., Владимиров С.М., Григорьев А.А. Сетевое кодирование // Труды МФТИ. 2009. Том 1. № 2. С. 3–28.Google ScholarGoogle Scholar
  11. Al-Awami L. Network Coding: A Brief Tutorial. 2007. [Cited 26.09.2019]; Available from: https://www.researchgate.net/publication/255505013Google ScholarGoogle Scholar
  12. Migabo M.E., Djouani K., Olwal T.O., Kurien A.M. A Survey on Energy Efficient Network Coding for Multi-hop Routing in Wireless Sensor Networks // Procedia Computer Science. 2016. Vol. 94. P. 288–294.Google ScholarGoogle Scholar
  13. Halloush R., Liu H., Dong L., Wu M., Radha H. Hop-by-hop Content Distribution with Network Coding in Multihop Wireless Networks // Digital Communications and Networks. 2017. Vol. 3. Iss. 1. P. 47–54.Google ScholarGoogle Scholar
  14. Amanowicz M., Krygier J. On Applicability of Network Coding Technique for 6LoWPAN-based Sensor Networks // Sensors. 2018. Vol. 18(6). P. 1–20. DOI:10.3390/s18061718.Google ScholarGoogle ScholarCross RefCross Ref
  15. Cai N., Yeung R.W. Network coding and error correction // Proceedings of the IEEE Information Theory Workshop. Bangalore, India: IEEE, 2002. P. 119-122. DOI: 10.1109/ITW.2002.1115432.Google ScholarGoogle ScholarCross RefCross Ref
  16. Вернер М. Основы кодирования. Учебник для ВУЗов. М. : Техносфера, 2004. 288 с. ISBN: 5-94836-019-9.Google ScholarGoogle Scholar
  17. Angelopoulos G., Paidimarri A., Chandrakasan A.P., Medard M. Experimental study of the interplay of channel and network coding in low power sensor applications // 2013 IEEE International Conference on Communications (ICC). Budapest: IEEE, 2013. P. 5126–5130. DOI: 10.1109/ICC.2013.6655396.Google ScholarGoogle ScholarCross RefCross Ref
  18. Biczok G., Chen Y., Kralevska K., Overby H. Combining forward error correction and network coding in bufferless networks: A case study for optical packet switching // 2016 IEEE 17th International Conference on High Performance Switching and Routing (HPSR). Yokohama: IEEE, 2016. P. 61–68. DOI: 10.1109/HPSR.2016.7525640.Google ScholarGoogle ScholarCross RefCross Ref
  19. Martinez-Penas U., Kschischang F.R. Reliable and Secure Multishot Network Coding using Linearized Reed-Solomon Codes // 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton). Monticello, IL, USA: IEEE, 2018. P. 702–709. DOI: 10.1109/ALLERTON.2018.8635644.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Ahmad, T., Faisal, M. S., Rizwan, A., Alkanhel, R., Khan, P. W., & Muthanna, A. (2022). Efficient fake news detection mechanism using enhanced deep learning model. Applied Sciences, 12(3), 1743.Google ScholarGoogle ScholarCross RefCross Ref
  21. Muthanna, M. S. A., Alkanhel, R., Muthanna, A., Rafiq, A., & Abdullah, W. A. M. (2022). Towards SDN-enabled, intelligent intrusion detection system for internet of things (IoT). IEEE Access, 10, 22756-22768.Google ScholarGoogle ScholarCross RefCross Ref
  22. Alhelaly, S., Muthanna, A., & Elgendy, I. A. (2022). Optimizing task offloading energy in multi-user multi-UAV-enabled mobile edge-cloud computing systems. Applied Sciences, 12(13), 6566.Google ScholarGoogle Scholar
  23. Alam, S., Shuaib, M., Ahmad, S., Jayakody, D. N. K., Muthanna, A., Bharany, S., & Elgendy, I. A. (2022). Blockchain-based solutions supporting reliable healthcare for fog computing and Internet of medical things (IoMT) integration. Sustainability, 14(22), 15312.Google ScholarGoogle ScholarCross RefCross Ref
  24. Jamil, F., Qayyum, F., Alhelaly, S., Javed, F., & Muthanna, A. (2021). Intelligent Microservice Based on Blockchain for Healthcare Applications. Computers, Materials & Continua, 69(2).Google ScholarGoogle Scholar
  25. Chaaf, A., Saleh Ali Muthanna, M., Muthanna, A., Alhelaly, S., Elgendy, I. A., Iliyasu, A. M., & Abd El-Latif, A. A. (2021). Energy-efficient relay-based void hole prevention and repair in clustered multi-AUV underwater wireless sensor network. Security and Communication Networks, 2021, 1-20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Bierbrauer, Jurgen. Introduction to coding theory. Chapman and Hall/CRC, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  27. Niederreiter, Harald, and Chaoping Xing. Algebraic geometry in coding theory and cryptography. Princeton University Press, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  28. Ruiz, Hamlet Medina, Michel Kieffer, and Béatrice Pesquet-Popescu. "TCP and network coding: Equilibrium and dynamic properties." IEEE/ACM Transactions on Networking 24, no. 4 (2015): 1935-1947.Google ScholarGoogle Scholar
  29. ITU-T G.975. Forward error correction for submarine systems. Geneva: ITU, 2000. 21 p.Google ScholarGoogle Scholar
  30. Samanta, J. RS (255, 249) Codec Based on All Primitive Polynomials Over GF(2^8) / J. Samanta, J. Bhaumik, S. Barman, G. Hossain, M. Sahu, S. Dutta // Lecture Notes in Electrical Engineering. 2017. Vol. 470. P. 69–81. ISSN: 1876-1100.Google ScholarGoogle Scholar
  31. Babaie S. HCAP: Hamming Code with Additional Parity Method for Error Control in Wireless Sensor Networks / S. Babaie, A. Khosrohosseini, B. Ghasemkhani, A. Ghaffari //2010 International Conference on Intelligent Network and Computing (ICINC 2010). 2010. P. 410–415.Google ScholarGoogle Scholar
  32. Ramírez-López, F., G. A. Yáñez-Casas, C. A. López-Balcázar, J. J. Hernández-Gómez, R. de-la-Rosa-Rábago, and C. Couder-Castañeda. "Development and Coding of a Data Framing Protocol for IoT/LPWAN Networks Based on 8-Bit Processing Architectures." In International Congress of Telematics and Computing, pp. 342-366. Cham: Springer Nature Switzerland, 2023.Google ScholarGoogle Scholar
  33. Berlekamp, Elwyn R. Algebraic coding theory (revised edition). World Scientific, 2015.Google ScholarGoogle Scholar
  34. Hillier C. Error Detection and Correction On-Board Nanosatellites Using Hamming Codes / C. Hillier, V. Balyan // Journal of Electrical and Computer Engineering. 2019. 2019. P. 1–15.Google ScholarGoogle Scholar
  35. Vladimirov, Sergey, Anastasia Vybornova, Ammar Muthanna, Andrey Koucheryavy, and Ahmed A. Abd El-Latif. "Network Coding Datagram Protocol for TCP/IP Networks." IEEE Access (2023).Google ScholarGoogle Scholar
  36. Morelos-Zaragoza R. H. The Art of Error Correcting Coding. Chichester: «John Wiley & Sons, Ltd», 2002. 232 p. ISBN 0471-49581-6.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICFNDS '23: Proceedings of the 7th International Conference on Future Networks and Distributed Systems
    December 2023
    808 pages
    ISBN:9798400709036
    DOI:10.1145/3644713

    Copyright © 2023 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 May 2024

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)3

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format