ArticlePDF Available

Error Detection and Correction Using Reed Solomon Codes

Authors:

Abstract

In the present world, communication system which includes wireless, satellite and space communication, reducing error is being critical. During message transferring the data might get corrupted, so high bit error rate of the wireless communication system requires employing to various coding methods for transferring the data. Channel coding for detection and correction of error helps the communication systems design to reduce the noise effect during transmission. The purpose of this paper is to study and analyze the performance and efficiency of Reed-Solomon (RS) Codes. In coding theory, Reed-Solomon (RS) codes are the subset of BCH codes that are one of the most powerful known classes of linear cyclic block codes. Reed-Solomon (RS) codes are very efficient and best for correction of burst errors and have a wide range of applications in digital communication and data storage. Reed-Solomon (RS) is the most powerful technique used for error detection and correction at present.
© 2013, IJARCSSE All Rights Reserved Page | 965
Volume 3, Issue 8, August 2013 ISSN: 2277 128X
International Journal of Advanced Research in
Computer Science and Software Engineering
Research Paper
Available online at: www.ijarcsse.com
Error Detection and Correction Using Reed Solomon Codes
Priyanka Shrivastava1 Uday Pratap Singh2
M.Tech Scholar Computer Science Professor Computer Science
Department L.N.C.T, Bhopal, India Department L.N.C.T, Bhopal, India
Abstract-- In the present world, communication system which includes wireless, satellite and space communication,
reducing error is being critical. During message transferring the data might get corrupted, so high bit error rate of the
wireless communication system requires employing to various coding methods for transferring the data. Channel
coding for detection and correction of error helps the communication systems design to reduce the noise effect during
transmission. The purpose of this paper is to study and analyze the performance and efficiency of Reed-Solomon (RS)
Codes. In coding theory, Reed-Solomon (RS) codes are the subset of BCH codes that are one of the most powerful
known classes of linear cyclic block codes. Reed-Solomon (RS) codes are very efficient and best for correction of burst
errors and have a wide range of applications in digital communication and data storage. Reed-Solomon (RS) is the
most powerful technique used for error detection and correction at present.
Keyword- Reed-Solomon (RS), Galois Field (GS), Generator Polynomial g(x), Block length, Bit Error Rate (BER),
Signal Noise Ratio (SNR)
I. Introduction
Channel coding is an important signal processing operation for the efficient transmission of digital information over the
channel. In channel coding the number of symbols in the source encoded message is increased in a controlled manner in
order to facilitate two basic objectives at the receiver one is Error detection and other is error correction. Error detection
and error correction to achieve good communication is also employed in devices. It is used to reduce the level of noise
and interferences in electronic medium. The amount of error detection and correction required and its effectiveness
depends on the signal to noise ratio (SNR) [1]. A channel code is a broadly used term mostly referring to the forward
error correction code. Forward error correction (FEC) is a system of error control for data transmission, whereby the
sender adds redundant data to its messages, also known as an error correction code. This allows the receiver to detect and
correct errors without the need to ask the sender for additional data. FEC is applied where retransmissions are relatively
costly or impossible. FEC information is usually added to most mass storage devices to protect against damage to the
stored data [2]. There are many types of block codes, but the most notable is Reed Solomon coding, Golay, BCH,
Multidimensional parity, and Hamming codes are other example of block codes.
Reed Solomon is an error-correcting coding system that was devised to address the issue of correcting multiple
errors especially burst-type errors in mass storage devices (hard disk drives, DVD, barcode tags), wireless and mobile
communications units, satellite links, digital TV, digital video broadcasting (DVB), and modem technologies like xDSL
[3]. Reed-Solomon codes are an important subset of non-binary cyclic error correcting code and are the most widely used
codes in practice. These codes are used in wide range of applications in digital communications and data storage. Reed
Solomon describes a systematic way of building codes that could detect and correct multiple random symbol errors. By
adding t check symbols to the data, an RS code can detect any combination of up to t erroneous symbols, or correct up to
t/2 symbols. Furthermore, RS codes are suitable as multiple-burst bit-error correcting codes, since a sequence of b + 1
consecutive bit errors can affect at most two symbols of size b. The choice of t is up to the designer of the code, and may
be selected within wide limits.
Example:
A popular Reed Solomon code is RS (255,223) with 8-bit symbols. Each codeword contains 255 code word bytes, of
which 223 bytes are data and 32 bytes are parity for this code
n = 255, k = 223, s = 8
2t = 32, t = 16
The decoder can correct any 16 symbol errors in the code word: i.e. errors in up to 16 bytes anywhere in the codeword
can be automatically corrected.
Given a symbol size s, the maximum codeword length (n) for a Reed Solomon code is n = 2s 1.
For example, the maximum length of a code with 8-bit symbols (s=8) is 255 bytes.
Reed Solomon codes may be shortened by (conceptually) making a number of data symbols zero at
the encoder, not transmitting them, and then re-inserting them at the decoder.
RS are block codes and are represented as RS (n, k), where n is the size of code word length and k is the number data
symbols, n k = 2t is the number of parity symbols as shown in Fig. 1.
Shrivastava et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(8),
August - 2013, pp. 965-969
© 2013, IJARCSSE All Rights Reserved Page | 966
k 2t
n
Fig. 1 Structure of RS codeword
Each symbol at input is composed of m bits given by relation n = qm-1. The message is divided into k symbols and 2t
parity symbols are added to give n symbols of RS code. Reed Solomon codes are constructed using generator polynomial
which is given by equation:
g (x) = (x - αi) (x - αi+1)……( x - α2t+i-1) ( x - α2t+i)
RS encoding is based on addition operation and multiplication operation over Galois field (GF(2m)). For GF(2m) field m
XOR gates will be required for the realization of addition operation and operation of multiplication requires m2 AND
gates & m2-1 XOR gates using conventional approaches [4].
II. PROPERTIES OF REED SOLOMON CODES
The properties of Reed-Solomon codes make them especially suited to the applications where burst error occurs. This is
because:-
It does not matter to the code how many bits in a symbol are incorrect, if multiple bits in a symbol are corrupted
it only counts as a single error. Alternatively, if a data stream is not characterized by error bursts or drop-outs
but by random single bit errors, a Reed-Solomon code is usually a poor choice. More effective codes are
available for this case.
Designers are not required to use the natural sizes of Reed-Solomon code blocks. A technique known as
"shortening" produces a smaller code of any desired size from a larger code. For example, the widely used
(255,251) code can be converted to a (160,128). At the decoder, the same portion of the block is loaded locally
with binary zeroes [5].
A ReedSolomon code operating on 8-bits symbols has n = 28 1 = 255 symbols per block because the number
of symbol in the encoded block is n = 2m 1.
For the designer its capability to correct both burst errors makes it the best choice to use as the encoding and
decoding tool. III. REED-SOLOMON ENCODER
The Reed Solomon encoder reads in k data symbols computes the n k symbols, append the parity symbols to the k data
symbols for a total of n symbols. The encoder is essentially a 2t tap shift register where each register is m bits wide. The
multiplier coefficients are the coefficients of the RS generator polynomial. The general idea is the construction of a
polynomial, the coefficient produced will be symbols such that the generator polynomial will exactly divide the
data/parity polynomial. From the architectural point of view, the encoder represents the set of shift registers, joined by
means of integrators and multipliers, operating according to the rules of Galois arithmetic. The shift register represents
the sequence of memory cells, called bits, each of which contains one element of a Galois field GF(q). The symbol,
contained in a specific position, is transmitted to the output line as it leaves this position. Simultaneously, the symbol
from the input line is loaded into position. Replacement of symbols takes place discretely, at strictly defined time
intervals, known as clocks. In hardware implementation of the shift register, its elements can be connected both
sequential and in parallel manner. In sequential connection, the sending of a single m-bit symbol requires m clocks, while
parallel connection requires only one clock [6].
The generator polynomial of the RS encoder is represented by
g(x) = g0 + g0 x + g0 x2 + …. + g2t-1 x2t-1 + x2t
The hardware implementation of this RS encoder is shown in Fig. 2.
Fig.2 Block Diagram of RS Encoder
DATA PARITY
Shrivastava et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(8),
August - 2013, pp. 965-969
© 2013, IJARCSSE All Rights Reserved Page | 967
Reed Solomon codes are based on a special area of mathematics known as Galois fields or finite fields. Finite field has
the property that arithmetic operations (+, -, x, / etc.) on field elements always have a result inside the field.
The basic principle of encoding is to find the remainder for the message divided by a generator polynomial G(x). The
encoder working is by simulating a linear feedback shift register with degree as G(x) is having, and feedback taps with
the coefficients of the generating polynomial of the cods [7].
IV. REED-SOLOMON DECODER
The Reed Solomon decoder tries to correct errors and/or erasures by calculating the syndromes for each codeword. Based
upon the syndromes the decoder is able to determine the number of errors in the received block. If there are errors
present, the decoder tries to find the locations of the errors using the Berlekamp-massey algorithm by creating an error
locator polynomial. The roots of this polynomial are found using the Chien search algorithm.
Using Forney's algorithm, the symbol error values are found and corrected. For an RS (n, k) code where n - k = 2T, the
decoder can correct up to T symbol errors in the code word. Given that errors may only be corrected in units of single
symbols (typically 8 data bits), Reed Solomon coders work best for correcting burst errors.
Decoding of Reed-Solomon codes is a complex problem that results in a bulky and extremely complicated code which
requires that the developer should have an extensive knowledge in many areas of higher mathematics. A typical decoding
is known as auto-regressive spectral decoding method, with following steps:-
1. Determining error syndrome (syndrome generator).
2. Building an error polynomial, carried out by using Barlekamp algorithms which are hard to implement or use
some simple algorithm like Euclid’s algorithm.
3. Finding the roots of this polynomial, this is usually carried out by Chein search algorithm.
4. Determining the error type, this is calculated by Forney s algorithm or any other algorithm of matrix inversion.
5. Correcting erroneous symbols by means of superimposing the mask and data word and the sequentially
inverting all bits that are corrupted via XOR operation as shown in Fig. 3 [6].
Fig. 3 Block diagram of RS Decoder
V. APPLICATIONS OF REED-SOLOMON CODES
5.1 Data Storage: -
Reed-Solomon is very widely used in mass storage systems to correct burst errors associated with media defects.
Special properties of Reed-Solomon codes make the sound quality of the CD as impressive as it is.
Reed-Solomon is a main component of CD Compact Disc. In CD a scheme known as Cross-Interleaved Reed
Solomon Coding (CIRC) is used. The result of CIRC is that it can correct up to 4000 bits error bursts, or about 2.5
mm on the surface of the disc [8].
5.2 Bar Code: -
All the two dimensional bar codes such as PDF-417, Maxi Code, Data matrix, QR Code, and Aztec Code use Reed-
Solomon error correction to allow the correct reading even if some portions of bar code are damaged. When the bar
code symbol is not recognized by the bar code scanner it will treat it as an erasure. Reed-Solomon is less common in
one-dimensional bar codes [5].
5.3 Satellite Broadcasting: -
The demand for satellite transponder bandwidth continues to grow, fueled by the desire to deliver television
including new channels High Definition TV and IP data. BPSK coupled with traditional Reed-Solomon and Viterbi
codes have been used for nearly 20 years for delivery of digital satellite TV [9].
Shrivastava et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(8),
August - 2013, pp. 965-969
© 2013, IJARCSSE All Rights Reserved Page | 968
5.4 Spread-Spectrum Systems: -
Reed-Solomon codes can be used in designing the hopping sequences. If these sequences are carefully selected, the
interference caused by the other users in a multiple access environment can be greatly reduced [10].
5.5 Error Control for Systems with Feedback: -
Wicker and Bartz examined various means for using Reed-Solomon codes in applications that allow transmission of
information from receiver to the transmitter. These applications include mobile data transmission systems and high
reliability military communication systems [11].
5.6 Ultra Wideband (UWB): -
UWB is a wireless technology for transmitting the digital data at very high rates over a wide spectrum of frequency
by using very low power. It makes it possible to transmit data at rate over 100Mbps within 10 meters. To preserve
the important header information, MB-OFDM UWB adopts Reed-Solomon (23, 17) code. In receiver, RS decoder
needs high speed and low latency and for this efficient hardware is used [12].
VI. REED-SOLOMON ERROR PROBABILITY
Reed-Solomon codes are mainly used in correcting the burst errors. However it has its own error correcting capability.
So, error probability is useful in saving our time for detecting and correcting the error. Let us assume an example that the
code can correct 4 error symbols in an (255, 251) RS code. A maximum of 32 bits error can be corrected. So, during
decoding if the decoder calculates more than 32 bits of error while performing syndrome calculation part, then send a
signal that decoder cannot correct this error. Therefore plotting of the bit error probability (P) against the SNR will help.
There can be a range of SNR for error to be corrected.
However range includes many parts like percentage of probability that the signal will detect. Fig. 4 shows plot between
SNR and bit error probability. The code is for random 255 symbols where each symbol consists of 8 bits to be
transmitted. These 255 symbols form a code word and there are 500 such codewords. However the range estimation can
be calculated for different capability of correcting errors [10].
Fig. 4 Graph between BER and SNR
Analysis of the error probability graph, 255 symbols corresponds to m = 8, therefore symbol with contain 8 bits each and
for different range of deduced SNR different error correcting capabilities. So different number of error bits can be found
out from the plotted graph for different error capabilities. For example for 2t = 4; t = 2 therefore 16 error bits can be
corrected at max. So a range of SNR can be found out using the plotted graph. Similarly for 2t = 8; t = 4 so at max 32 bits
can be corrected. This range is quite bigger the previous range of SNR. This analysis helps us to find out that the decoder
can correct the received signal or not and this saves a lot of time and efforts.
VII. CONCLUSION
This paper presents clear understanding of Reed-Solomon codes used in error detection and correction. RS are very
powerful non-binary cyclic codes and are used mainly for burst errors. There are different applications of REED-
Solomon codes such as data storage, satellite transmission, bar code etc. and the main component of a Compact Disc is
RS code. The main purpose of this paper was to study the Reed-Solomon code encoding and decoding process and also
Shrivastava et al., International Journal of Advanced Research in Computer Science and Software Engineering 3(8),
August - 2013, pp. 965-969
© 2013, IJARCSSE All Rights Reserved Page | 969
the error probability for the RS code. The encoding process and the block diagram have been discussed and also the
different step for decoding process has been discussed. The error probability for RS code shows that the BER
performance also improves for large block length and shows a poor BER performance for lower SNR as the SNR value
increases the curve becomes steeper.
Refrences
[1] Carl Eklund, et.al. "WirelessMAN: Inside the IEEE 802.16 Standard for Wireless Metropolitan Area Networks,
IEEE Press, 2006.
[2] Hagenauer, J., and Lutz, E., “Forward Error Correction Coding for Fading Compensation in Mobile Satellite
Channels,” IEEE JSAC, vol. SAC -5, no. 2, Feb 1987, pp. 215 -225.
[3] High-speed VLSI Architecture for Parallel Reed-Solomon Decoder", IEEE Trans. On VLSI, April 2003
[4] J. Jittawutipoka, J. Ngarmnil, “Low complexity Reed Solomon encoder using Globally optimized finite field
multipliers” , IEEE Region 10 conference, Nov. 2004.
[5] www.wikipedia.org
[6] flylib.com/books/en/1.443.1.19/1/ a document on Reed-Solomon
[7] H.M. Shao, T.K. Truong, L.J. Deutsch, J. Yuen and LS. Reed, “A VLSI Design of a pipeline Reed-Solomon
Decoder, IEEE Trans. Comput., vol. C-34, no. 5, pp 393-403, May 1985.
[8] Wicker, Stephen B., Bhargava, Vijay K, “Reed-Solomon Codes and the Compact Disc”, IEEE Press ISBN 978-0-
7803-1025-4.
[9] J.L. Massey, “Deep Space Communications and Coding: A Match Made in Heaven,” in Advanced Methods for
Satellite and Deep Space Communications, Lecture Notes in Control and Information Sciences, Volume 182,
Berlin: Springer-Verlag, 1992.
[10] Sanjeev Kumar, Rajni Gupta, “Bit Error Analysis of Reed-Solomon Code for Efficient Communication System,
International Journal of computer Applications (0975 8887) Volume 30- No. 12, September 2011.
[11] V.K Agrawal, Pankaj Goel, Gaurav Mittal, Review of Reed-Solomon Code for Error Detection and correction,”
International Journal of Research in IT, Management and Engineering IJRIME Volume2, Issue6 (june-2012) ISSN:
2249-1619.
[12] Sung-woo Choi, sang-Sung Choi, Han-ho Lee, “RS decoder architecture for UWB”, wireless home Network
Research Team, ETRI ICACT, Feb 2006
... La table 5.1 présente les polynômes primitifs pour les principaux "corps de Galois" : x L x l+1 x l+2t À ce stade, la logique de contrôle de sortie n'autorise que le chemin du fichier d'entrée, tandis que le chemin d'égalité reste désactivé [92]. Avec les coordonnées de sortie d'environ un cycle d'horloge, le codeur émet la dernière trame de données avec la (k + 1) th horloge. ...
... La complexité linéaire de l'encodage des codes RS est O(nlogn), pour le décodage elle est O(nlog²n). Ceci nous a poussé à proposer un autre algorithme de correction d'erreurs tout en gardant la notion de codes RS[91,92]. ...
Thesis
Ces derniers temps, le nombre de gadgets et d'applications reposant sur la communicationsans fil a explosé, entraînant des transformations considérables dans le style de vie des gens.Pour gérer cette augmentation de connectivité, plusieurs techniques avancées sont prévues avec les normes 5G, tout en essayant de minimiser l’impact négatif de la consommation d’énergie.Une solution alternative pour surmonter ce problème est la technologie Light-Fidelity (Li-Fi) ou communication par lumière visible (VLC). Il s'agit d'un nouveau modèle de transmission de données en lumière visible qui utilise des diodes électroluminescentes et des capteurs de lumière laser comme moyen de communication à haut débit, similaire au Wi-Fi. Le Li-Fi est une meilleure alternative au Wi-Fi en matière de communication sans fil. Il a une plus grandecapacité en termes de bande passante dans la région visible et ne perturbe pas les communications qui utilisent la gamme de radiofréquences. On note aussi que le Li-Fi supporte la mobilité des utilisateurs et l'accès multi-utilisateurs. La taille du spectre infrarouge et de la lumière visible ensemble équivaut à approximativement 2600 fois la taille de l'ensemble du spectre de fréquence radio de 300 GHz.L’objectif de cette thèse est centré sur la modulation de lumière à haute fréquence pourencoder et envoyer des informations en s’intéressant à l’aspect sécurité dans le cas des attaques informatiques. Notre contribution consiste à proposer une nouvelle solution basée sur les différents environnements afin d’assurer une fiabilité de traitements et de transmissions des données dans un contexte de mobilité et de qualité de service. L’architecture proposée assure l’authenticité et la confidentialité des données transmises à travers le signal lumineux et peut-être mise en œuvre dans différents secteurs telle que les écoles, les aéroports et les avions.
... They can be used in a variety of wireless and digital communications scenarios. The most effective method currently being utilised for error detection and correction is Reed Solomon codes [9]. ...
Article
This paper presents a new decoding method to assess the effects of weak channel conditions in cooperative device-to-device (D2D) communication systems with non-orthogonal multiple access (NOMA). Error reduction is challenging in wireless communication for high-speed data transfer. Effective channel coding methods are necessary for the communication system to identify and fix errors. In the area of "forward error correction," Reed-Solomon (RS) encoders and decoders belong (FEC). Reed-Solomon codes perform best in the fading environment, which has a higher burst error rate. In order to ensure that the receiver only receives error-free data, RS codes add parity bits at the transmitter end. These bits allow RS codes to detect and correct numerous random symbol errors. When the Reed-Solomon encoder and decoder are utilised in the system design, the proposed system outperforms existing systems in terms of sum rate, outage probability, and outage capacity. The performance of the existing system is also constrained, but not that of the proposed system, because of weak channel conditions.
... If d = 0, this means that f(x) and L are correct; we increment m and continue. If d0, the algorithm continues to run and recalculates each time f(x) until d = 0. [13]. ...
Article
Full-text available
Although visible light communication (VLC) channels are more secure than radio frequency channels, the broadcast nature of VLC links renders them open to eavesdropping. As a result, VLC networks must provide security in order to safeguard the user’s data from eavesdroppers. In the literature, keyless security techniques have been developed to offer security for VLC. Even though these techniques provide strong security against eavesdroppers, they are difficult to deploy. Key generation algorithms are critical for securing wireless connections. Nonetheless, in many situations, the typical key generation methods may be quite complicated and costly. They consume scarce resources, such as bandwidth. In this paper, we propose a novel key extraction procedure that uses error-correcting coding and one time pad (OTP) to improve the security of VLC networks and the validity of data. This system will not have any interference problems with other devices. We also explain error correction while sending a message across a network, and suggest a change to the Berlekamp–Massey (BM) algorithm for error identification and assessment. Because each OOK signal frame is encrypted by a different key, the proposed protocol provides high physical layer security; it allows for key extraction based on the messages sent, so an intruder can never break the encryption system, even if the latter knows the protocol with which we encrypted the message; our protocol also enables for error transmission rate correction and bit mismatch rates with on-the-fly key fetch. The results presented in this paper were performed using MATLAB.
Article
Spatial communication is one of the technologies widely used in the backbone of networks in the field of telecommunications. The evolution of the latter's systems improves the spatial open standards with a view to a dominant throughput and a more increased capacity by using error protection algorithms. To do this, the highly perforated Turbo codes (TC) are damaged for the coding of the channels, which represents a major challenge for the fertilization of the decoders. The technical study of this article shows the effective performance of turbo codes under the architectures of DVB-RCS2 international standards via two simulations with MPEG-TS, ATM signals and has variable input lengths. In addition, they obtained sufficient results from the BERs via the MATLAB software to have the technical impact of this chosen code on DVB-RCS2 systems and the various industrial platforms.
Article
Brain signals have recently been proposed as a strong biometric due to their characteristics such as, uniqueness, permanence, universality, and confidentiality. There are many factors that affect the stability of EEG signals as a biometric for example, using different recording devices, variation in participant emotional states, performing different mental tasks and recording in temporally spaced sessions. Due to the non-stationary nature of EEG signals, there are still speculations about the stability of using them for generating a unique and repeatable cryptographic key. The challenge that faces all biometric based crypto-systems is to overcome the variation in biometric itself over time and to generate multiple unique keys from the same observation. In this work, we investigate the stability of using EEG signals as a biometric for both personal authentication and cryptographic key generation. The authentication process was tested using three datasets AMIGOS, DEAP, and SEED. Achieving accuracy of 96.23%,98.85%, and 99.89% respectively. The key generation process generates a set of different keys with different lengths from the same observation. Each key is unique and repeatable. The generated keys were examined using NIST test suite, scale index test, and autocorrelation test. Time complexity analysis of the key generation process was performed.
Article
With the increasing demand for intelligent services, the sixth-generation (6G) wireless networks will shift from a traditional architecture that focuses solely on a high transmission rate to a new architecture that is based on the intelligent connection of everything. Semantic communication (SemCom), a revolutionary architecture that integrates user as well as application requirements and the meaning of information into data processing and transmission, is predicted to become a new core paradigm in 6G. While SemCom is expected to progress beyond the classical Shannon paradigm, several obstacles need to be overcome on the way to a SemCom-enabled smart Internet. In this paper, we first highlight the motivations and compelling reasons for SemCom in 6G. Then, we provide an overview of SemCom-related theory development. After that, we introduce three types of SemCom, i.e., semantic-oriented communication, goal-oriented communication, and semantic-aware communication. Following that, we organize the design of the communication system into three dimensions, i.e., semantic information (SI) extraction, SI transmission, and SI metrics. For each dimension, we review existing techniques and discuss their benefits and limitations, as well as the remaining challenges. Then, we introduce the potential applications of SemCom in 6G and portray the vision of future SemCom-empowered network architecture. Finally, we outline future research opportunities. In a nutshell, this paper provides a holistic review of the fundamentals of SemCom, its applications in 6G networks, and the existing challenges and open issues with insights for further in-depth investigations.
Article
In wireless, satellite and space communication system reducing error is critical. High bit error rate of the wireless communication system requires employing various coding method on the data transferred. Channel coding for error detection and correction helps the communication system design to reduce the effect of noisy transmission channel. The purpose of this paper is to study and investigate the efficiency of Reed-Solomon code. In digital communication, Reed-Solomon (RS) codes refer to as a part of channel coding that had becoming very significant to better withstand the effects of various channel impairments such as noise, interference and fading. Reed-Solomon codes are best for correction burst error and find wide range of application in data storage. Reed-Solomon is the most powerful error detection and correction technique in present. The results show that the code gain with high code rate is better than that of low code rate; the results also showed that the error-correcting codes become more efficient as the block size increases Keyword: Reed-Solomon (RS), Galois field (GF), Generator Polynomial g(x) , Forward error Correction (FEC), Code Rate, Block Size.
Article
wireless, satellite, and space communication systems, reducing error is critical. High bit error rates of the wireless communication system require employing various coding methods on the data transferred. Channel coding for error detection and correction helps the communication system designers to reduce the effects of a noisy transmission channel. The purpose of this paper is to study and investigate the performance of Reed-Solomon code that is used to encode the data stream in digital communication. The performances were evaluated by applying to binary phase sift keying modulation scheme in symmetric Additive White Gaussian Noise channel. Reed-Solomon codes are best for correcting burst errors and find wide range of applications in digital communications and data storage. Keywords-Solomon codes (RS), Forward Error Correction (FEC), Additive White Gaussian Noise (AWGN), Binary Phase Shift Keying (BPSK).
Article
WirelessMAN: Inside the IEEE 802.16 Standard for Wireless Metropolitan Area Networks is the perfect resource for understanding and navigating through the IEEE 802.16 standard, which serves as the basis of all WiMAX broadband wireless access systems. Written by the 802.16 Working Group's Chair, Dr. Roger B. Marks, and Vice Chair, Kenneth L. Stanwood, along with Working Group participants Carl Eklund, Subbu Ponnuswamy, and Dr. Nico J.M. van Waes, the book provides a thorough understanding of the standard from an insider's perspective not found elsewhere. Inside: Find detailed descriptions of the medium access control (MAC) and physical layer (PHY) operation up through IEEE 802.16-2004, with an introduction to the technologies introduced in IEEE 802.16e. See why certain design choices were made and how recent technological developments, real-world experience, and lessons learned from previous projects were used to make critical tradeoffs. Get details on OFDM, OFDMA, multiple antenna systems, security,and mesh technologies. See performance simulations and learn about current conformance and interoperability activities. Read a summary of ongoing projects, related standards, and future extensions. WirelessMAN is a must-read for anyone wishing to understand the IEEE 802.16 standard and its operation. This book will immediately benefit designers, engineers, students, and deployment professionals who need to rapidly understand the fundamentals of the standard. The book is a self-contained companion to the standard, and no specific knowledge of any other wireless protocols is assumed. It can be used for self-study, as a reference, or as a designer's handbook. © 2006 The Institute of Electrical and Electronics Engineers, Inc.
Conference Paper
UWB is the most spotlighted wireless technology that transmits data at very high rates using low power over a wide spectrum of frequency band. UWB technology makes it possible to transmit data at rate over 100 Mbps within 10 meters. To preserve important header information, MB-OFDM UWB adopts Reed-Solomon (23,17) code. In receiver, RS decoder needs high speed and low latency using efficient hardware. In this paper, we suggest the architecture of RS decoder for MB-OFDM UWB. We adopts modified-Euclidean algorithm for key equation solver block which is most complex in area. We suggest pipelined processing cell for this block and show the detailed architecture of syndrome, Chien search and Forney algorithm block. At last, we show the hardware implementation results of RS decoder for ASIC implementation
Article
A pipeline structure of a transform decoder similar to a systolic array is developed to decode Reed-Solomon (RS) codes. An important ingredient of this design is a modified Euclidean algorithm for computing the error-locator polynomial. The computation of inverse field elements is completely avoided in this modification of Euclid's algorithm. The new coder is regular and simple, and naturally suitable for VLSI implementation. An example illustrating both the pipeline and systolic array aspects of this decoder structure is given for a RS code.
Conference Paper
This paper proposes a new approach to implement a low complexity Reed-Solomon (RS) encoder of DTV systems. Based on a reported optimization algorithm which yields low complexity constant finite field multipliers for Galois fields GF(2n), the new compact RS encoder is constructed with 15 optimized finite field multipliers, of which the redundant operations are reduced to minimize the number of modulo 2 additions or XOR gates. Hence the 15 multipliers partly share the same hardware operations. A significant improvement on complexity is clearly shown with FPGA implementation.
Article
This paper presents high-speed parallel Reed-Solomon (RS) (255,239) decoder architecture using modified Euclidean algorithm for the high-speed multigigabit-per-second fiber optic systems. Pipelining and parallelizing allow inputs to be received at very high fiber-optic rates and outputs to be delivered at correspondingly high rates with minimum delay. A parallel processing architecture results in speed-ups of as much as or more than 10 Gb, since the maximum achievable clock frequency is generally bounded by the critical path of the modified Euclidean algorithm block. The parallel RS decoders have been designed and implemented with the 0.13-/spl mu/m CMOS standard cell technology in a supply voltage of 1.1 V. It is suggested that a parallel RS decoder, which can keep up with optical transmission rates, i.e., 10 Gb/s and beyond, could be implemented. The proposed channel = 4 parallel RS decoder operates at a clock frequency of 770 MHz and has a data processing rate of 26.6 Gb/s.
Article
Fading in mobile satellite communications severely degrades the performance of data transmission. The channel is modeled with nonfrequency selective Rice and Rayleigh fading. Also, stored channel simulation is used for hardware data transmission. FEC coding with Viterbi decoding of convolutional codes, and Berlekamp-Massey decoding of Reed-Solomon codes, are used to compensate for the fading. In addition to interleaving, channel state and erasure information improve the performance of the decoder. The BER after decoding is calculated for specific codes on several channels and for different transmission schemes. Using very simple channel state and erasure information gives 2-7 dB additional coding gain. These gains have been verified by hardware data transmission on synthetic fading channels and stored mobile satellite channels.
Article
this paper we have followed the usual communications practice of not distinguishing between a "code" (i. e., the set of all codewords) and an "encoder," but this difference can be important in coding theory.] The Lin-Lyne code had a memory of M = 20, i. e., the encoder remembered twenty past information bits as well as the current information bit when forming the two encoded binary digits that are emitted for each input information bit. It was known that the minimum Hamming distance dmin of this code was 11. This is the minimum distance between two encoded sequences of length 2 (M+1) = 22 digits (one "constraint length") that correspond to different values of the initial information bit. If one uses these code parameters mindlessly in (17), one computes an estimated coding gain of G c 5 (7.0 dB), but this estimate is so optimistic that it must be taken with a grain of salt! [In fact, one should really use in (17) the free distance, d free , of the convolutional code, which is the minimum Hamming distance between two encoded sequences of infinite length that correspond to different values of the initial information bit. This would, of course, give an even more optimistic estimate of G c. !] The problem is not one of great multiplicity of near neighbors as it was for the Reed-Muller code. Rather, the problem is that one must take into account the fact that although Fano-algorithm sequential decoding is virtually maximumlikelihood decoding if the decoder is allowed to compute until it makes a decoding decision, in practice one always aborts the decoding after some predetermined amount of computation on a frame and announces erasure of the corresponding frame of data. The actual error probability in the non-erased frames is virtually zero since the frames that would have ...