Lec 19 Error and Loss Control I: FEC

Size: px
Start display at page:

Download "Lec 19 Error and Loss Control I: FEC"

Transcription

1 Multimedia Communication Lec 19 Error and Loss Control I: FEC Zhu Li Course Web: Z. Li, Multimedia Communciation, Spring 2017 p.1

2 Outline ReCap Lecture 18 TCP Congestion Control RMCAT Congestion control work NS-3 Tutorial FEC Digital Fountain Code Summary Z. Li, Multimedia Communciation, Spring 2017 p.2

3 TCP Congestion Control AIMD- Additive Increase Multiplicative Decrease, congestion window based control. When receiving ACK, increase cwnd by one, when packet loss, halve the cwnd Slow Start (TCP Tahoe): Introducing a threshold control When below thres, double cwnd per ACK If above thres, additive increase If loss, halve thres, cwnd=1 Z. Li, Multimedia Communciation, Spring 2017 p.3

4 TCP Congestion Fast retransmit: After receiving 3 duplicate ACK Resend first packet in window. o Try to avoid waiting for timeout Fast recovery: After retransmission do not enter slowstart. Threshold = cwnd/2 Congwin = 3 + Congwin/2 Each duplicate ACK received Congwin++ After new ACK o Congwin = Threshold o return to congestion avoidance Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Retransmit packet 3 Sender Receiver ACK 1 ACK 2 ACK 2 ACK 2 ACK 2 ACK 6 Z. Li, Multimedia Communciation, Spring 2017 p.4

5 TCP Throughput TCP Rate at steady state Segment size: MSS Round Trip Delay: RTT Prob of packet loss: p R TCP = MSS RTT 2p p 8 p(1 + 32p2 ) Observation Reducing RTT is the key! Indeed, AKAMAI, Netflix,,etc, use RTT as the KPI for deploying and provisioning CDN edge servers. Prob of loss is due to congestion, mostly. For wireless networks, loss due to PHY layer has wrong interpretation in TCP control! Z. Li, Multimedia Communciation, Spring 2017 p.5

6 WebRTC Motivation: native browser support for real time communication for a variety of applications Non TCP based connectivity, over RTP instead. Javascript API for HTML (W3C) Signalling & NAT traversal, Security (IETF RTCWEB) Congestion control (IETF RMCAT) Z. Li, Multimedia Communciation, Spring 2017 p.6

7 GCC Google Congestion Control (GCC) implemented in Chrome and Firefox to support WebRTC Utilizes RTP and RTCP for media data transport and control Has sender side control, which is loss based, probe the available BW as sending rate A s. Receiver side control is delay based, computes REMB, Receiver Estimated Maximum Bitrate, A r to limit the sending rate A s A s t k max X t k, A s t k f l t k, if f l t k > 0.1 = 1.05(A s t k 1 + 1kbps, if f l t k < 0.02 A s t k 1, if 0.02 f l t k 0.1 Z. Li, Multimedia Communciation, Spring 2017 p.7

8 Receiver Side State Machine Receiver side update A r (t i ) according to the congestion state estimation Packet Arrival Stats based link usage state estimation, Packet delay variation: Where, {t i } {T i } are time stamps of ith video packet sending and recving time. C is the link capacity, L is the video packet size. Queuing delay variation: m(t i ) = t i t i-1 (T i -T i-1 ) Network jitter noise, n(t i ), Z. Li, Multimedia Communciation, Spring 2017 p.8

9 Link Overuse Detection Observe arrival filter signal m(t): Z. Li, Multimedia Communciation, Spring 2017 p.9

10 GCC Link Capacity Utilization Single Flow Fairly good utilization, throughput follows the link capacity change Z. Li, Multimedia Communciation, Spring 2017 p.10

11 Outline ReCap Lecture 18 TCP Congestion Control RMCAT Congestion control work NS-3 Tutorial FEC Digital Fountain Code Summary Z. Li, Multimedia Communciation, Spring 2017 p.11

12 Loss Recovery: ARQ vs FEC When a packet did not reach the destination the receiver sends back a requests for retransmission Alternatively, the receiver can send back acknowledgement messages for each successfully received packet. The sender keeps track of the missing packets and retransmits them until all have been acknowledged This does NOT scale in multicasting situation Z. Li, Multimedia Communciation, Spring 2017 p.12

13 Multicasting Over Erasure Channel Examples File Downloading P2P sharing Broadcasting Z. Li, Multimedia Communciation, Spring 2017 p.13

14 Use Cases Reliable multicast Parallel downloads Long-distance transmission (avoiding TCP) One-to-many TCP Content distribution on overlay networks Streaming video ARQ is too late. Z. Li, Multimedia Communciation, Spring 2017 p.14

15 The Binary Erasure Channel a a a 1-a 0 e 1 e erasure a erasure probability Erasure channel Capacity: C= 1-a Intuitive interpretation: since a proportion a of the bits are lost in the channel, we can recover (at most) a proportion (1-a) of the bits. Z. Li, Multimedia Communciation, Spring 2017 p.15

16 Challenges The erasure probabilities are unknown. Want to come arbitrarily close to capacity on each of the erasure channels, with minimum amount of feedback. Traditional codes don t work in this setting since their rate is fixed. Need codes that can adapt automatically to the erasure rate of the channel. Z. Li, Multimedia Communciation, Spring 2017 p.16

17 Broadcast channel with erasures On a broadcast channel with erasures, the repetition schemes are very inefficient, and can lead to network congestion An appropriate Forward Error Correction (FEC) Code should achieve the theoretic channel capacity without feedback channel With classical codes the design of the fixed rate R=K/N, should be performed to worst case conditions This restriction makes this coding inefficient also Z. Li, Multimedia Communciation, Spring 2017 p.17

18 Polynomial Code Polynomial code of (n, k, n-k+1) A (n, k, 2s +1) code: k 2s Can detect 2s errors Can correct s errors Generally can correct a erasures and b errors if a + 2b 2s n Z. Li, Multimedia Communciation, Spring 2017 p.18

19 Hamming and Reed-Solomon Code An (N,K, N-k+1) Reed-Solomon code correctly decode the K symbols of the message from N codeword symbols However, Reed-Solomon codes are only useful for small values of N and K The coding / decoding cost is of order K( N - K)log 2 N code bits check bits RS (255, 253, 3) Hamming (2 11-1, , 3) Z. Li, Multimedia Communciation, Spring 2017 p.19

20 Encoding Engine Digital Fountain Codes Transmission If the error probability of a BEC varies, the ideal code should allow on the fly variable encoding rate R=K/N With Reed-Solomon codes it is not possible to change R on the fly Digital Fountain Codes Original content Encoded packets Users reconstruct Original content as soon as they receive enough packets Z. Li, Multimedia Communciation, Spring 2017 p.20

21 Digital Fountain Code Fountain Code Properties Sender sends a potentially limitless stream of encoded bits. Receivers collect bits until they are reasonably sure that they can recover the content from the received bits, and send STOP feedback to sender. Automatic adaptation: Receivers with larger loss rate need longer to receive the required information. Want that each receiver is able to recover from the minimum possible amount of received data, and do this efficiently. Z. Li, Multimedia Communciation, Spring 2017 p.21

22 Credit: Amin Shokrollahi, EPFL Content Enc Digital 22 buckets

23 Fountain Codes Distribution on 23

24 Universality and Efficiency [Universality] Want sequences of Fountain Codes for which the overhead is arbitrarily small [Efficiency] Want per-symbol-encoding to run in close to constant time, and decoding to run in time linear in number of output symbols. 24

25 LT-Codes 26

26 The Fountain Coding Process Input symbols Choose 2 Random original symbols XOR 2 Choose weight Insert header, and send Weight Weight table Prob

27 Decoding 28

28 Decoding 29

29 Decoding 30

30 Decoding 31

31 Decoding 32

32 Decoding 33

33 Decoding 34

34 Decoding 35

35 Decoding 36

36 The Degree Distribution Each codeword is a linear combination of d symbols from the message m The degree d is chosen at random from a degree distribution r(d) There are two design conflicts: The degree of some codewords should be high to guarantee that all the message symbols are covered The degree of some codewords should be low in order to start the decoding process and keep going Z. Li, Multimedia Communciation, Spring 2017 p.37

37 Soliton distribution Can we design a degree distribution that guarantees the optimal Shannon limit of decoding the K symbols of the message after K received codewords? We want a distribution that on average guarantees that just one message symbol is uncovered at each iteration, i.e, only one symbol is having degree one connection to the fountain bits Such a distribution is the Soliton Z. Li, Multimedia Communciation, Spring 2017 p.38

38 Soliton distribution Step 0 The expected number of code word symbols of degree one at step zero should be 1, otherwise no way to start decoding Step 1 One of the message symbols is decoded and it lower the degree of some of the codeword symbols. At the end of step 1, at most one degree 2 codeword should be connected to the decoded message symbol in order to decrease its degree to one and the process continues... Step k Continue the process checking at each step that one of the codeword symbols has degree one Z. Li, Multimedia Communciation, Spring 2017 p.39

39 Ideal Soliton Distribution The mean degree of this distribution is - - 1) ( 1,, 12 1, 6 1, 2 1, 1, 2,3, for 1) ( 1 1/ 1 K K K K d d d K d d r r r K d d e K d K d d log r r Z. Li, Multimedia Communciation, Spring 2017 p.40

40 Soliton distribution c 0 c 1 c 2 c K codewords m 0 m 1 m 2 m K Message symbols With the Soliton distribution the expected number of edges from each message symbol will be log e K Z. Li, Multimedia Communciation, Spring 2017 p.41

41 Soliton distribution c 0 c 1 c 2 c K codewords m 0 m 1 m 2 m K Message symbols The decoding of m 0 from c 0 causes the degree of the connected codewords to decrease by 1 Z. Li, Multimedia Communciation, Spring 2017 p.42

42 Robust Soliton Distribution However, in practice Ideal Soliton Distribution works poorly, due to: At decoding stages, some times no degree 1 symbol correction bits received, and decoding stuck Some symbols not covered at all. Instead, introducing Robust Soliton Distribution Parameter δ, the prob bound on which the decoding fails after receiving certain amount of packets, Constant c=1, or slightly lower than 1, Expected degree: Robust Soliton Distribution, μ d Z. Li, Multimedia Communciation, Spring 2017 p.43

43 Performance with Robust Soliton Degree Distribution Now the expected number of degree one codeword symbols at each step, instead of 1/K, is, With receiving S c log e ( K / ) K K K Checks, the prob of correctly decoding K symbols is (1-δ), for proper parameter of c. Z. Li, Multimedia Communciation, Spring 2017 p.44

44 Ideal Soliton Distribution Performance Soliton with K= 1000 and N= Experimental 0.9 (1- ) 0.8 Percent of decoded x Test number Z. Li, Multimedia Communciation, Spring 2017 p.45

45 Robust Soliton Distribution Online with K= 1000 and N= 1500 = 0.5 = Experimental (1- ) 0.99 Percent of decoded x Test number Z. Li, Multimedia Communciation, Spring 2017 p.46

46 Raptor Code A development of LT code by introducing a pre-coding group to have desirable # of redundant symbols for efficient LT code implementation Proper ratio of source symbols vs desired number of fountain symbols can leads to better performance. Ref: A. Shokrollahi, Raptor Codes, IEEE Trans on Info Theory, vol. 52(6), June Z. Li, Multimedia Communciation, Spring 2017 p.47

47 Application of Digital Fountain Code Broadcast MBMS in LTE networks Uses Raptor Code (RFC5053): Use a LDPC precode before LT coding Linear complexity guarantee Adopted for the MBMS and embms systems we use, e.g, pushing the APP updates to users by carriers DVB-H Broadcast system RS and Raptor codes. Ref: 0/tr_102993v010101p.pdf Open Source Raptor Project: Opensource RaptorQ (RFC6330) Z. Li, Multimedia Communciation, Spring 2017 p.48

48 FEC Summary One very useful technique for error and loss recovery APP layer forward erasure correction (AL-FEC): Early days: Reed-Solomon code Fountain Codes: LT code, Raptor, and Raptor Q Key features of Fountain Codes Rateless FEC: you don t need to fix the coding ratio Suitable for multicasting Suitable for when ARQ is not feasible/economical Z. Li, Multimedia Communciation, Spring 2017 p.49

Reliable Wireless Video Streaming with Digital Fountain Codes

Reliable Wireless Video Streaming with Digital Fountain Codes 1 Reliable Wireless Video Streaming with Digital Fountain Codes Raouf Hamzaoui, Shakeel Ahmad, Marwan Al-Akaidi Faculty of Computing Sciences and Engineering, De Montfort University - UK Department of

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

RAPTOR CODES FOR HYBRID ERROR-ERASURE CHANNELS WITH MEMORY. Yu Cao and Steven D. Blostein

RAPTOR CODES FOR HYBRID ERROR-ERASURE CHANNELS WITH MEMORY. Yu Cao and Steven D. Blostein RAPTOR CODES FOR HYBRID ERROR-ERASURE CHANNELS WITH MEMORY Yu Cao and Steven D. Blostein Department of Electrical and Computer Engineering Queen s University, Kingston, Ontario, Canada, K7L 3N6 Email:

More information

M.Sc. Thesis. Optimization of the Belief Propagation algorithm for Luby Transform decoding over the Binary Erasure Channel. Marta Alvarez Guede

M.Sc. Thesis. Optimization of the Belief Propagation algorithm for Luby Transform decoding over the Binary Erasure Channel. Marta Alvarez Guede Circuits and Systems Mekelweg 4, 2628 CD Delft The Netherlands http://ens.ewi.tudelft.nl/ CAS-2011-07 M.Sc. Thesis Optimization of the Belief Propagation algorithm for Luby Transform decoding over the

More information

Codes AL-FEC pour le canal à effacements : codes LDPC-Staircase et Raptor

Codes AL-FEC pour le canal à effacements : codes LDPC-Staircase et Raptor Codes AL-FEC pour le canal à effacements : codes LDPC-Staircase et Raptor Vincent Roca (Inria, France) 4MMCSR Codage et sécurité des réseaux 12 février 2016 1 Copyright Inria 2016 license Work distributed

More information

From Fountain to BATS: Realization of Network Coding

From Fountain to BATS: Realization of Network Coding From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving

More information

Lecture 6: Reliable Transmission"

Lecture 6: Reliable Transmission Lecture 6: Reliable Transmission" CSE 123: Computer Networks Alex C. Snoeren HW 2 out Wednesday! Lecture 6 Overview" Cyclic Remainder Check (CRC) Automatic Repeat Request (ARQ) Acknowledgements (ACKs)

More information

Study of Second-Order Memory Based LT Encoders

Study of Second-Order Memory Based LT Encoders Study of Second-Order Memory Based LT Encoders Luyao Shang Department of Electrical Engineering & Computer Science University of Kansas Lawrence, KS 66045 lshang@ku.edu Faculty Advisor: Erik Perrins ABSTRACT

More information

The throughput analysis of different IR-HARQ schemes based on fountain codes

The throughput analysis of different IR-HARQ schemes based on fountain codes This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 008 proceedings. The throughput analysis of different IR-HARQ schemes

More information

Chapter 1 Coding for Reliable Digital Transmission and Storage

Chapter 1 Coding for Reliable Digital Transmission and Storage Wireless Information Transmission System Lab. Chapter 1 Coding for Reliable Digital Transmission and Storage Institute of Communications Engineering National Sun Yat-sen University 1.1 Introduction A major

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Digital Fountain Codes System Model and Performance over AWGN and Rayleigh Fading Channels

Digital Fountain Codes System Model and Performance over AWGN and Rayleigh Fading Channels Digital Fountain Codes System Model and Performance over AWGN and Rayleigh Fading Channels Weizheng Huang, Student Member, IEEE, Huanlin Li, and Jeffrey Dill, Member, IEEE The School of Electrical Engineering

More information

Punctured vs Rateless Codes for Hybrid ARQ

Punctured vs Rateless Codes for Hybrid ARQ Punctured vs Rateless Codes for Hybrid ARQ Emina Soljanin Mathematical and Algorithmic Sciences Research, Bell Labs Collaborations with R. Liu, P. Spasojevic, N. Varnica and P. Whiting Tsinghua University

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009. Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name

More information

Fountain Codes. Gauri Joshi, Joong Bum Rhim, John Sun, Da Wang. December 8, 2010

Fountain Codes. Gauri Joshi, Joong Bum Rhim, John Sun, Da Wang. December 8, 2010 6.972 PRINCIPLES OF DIGITAL COMMUNICATION II Fountain Codes Gauri Joshi, Joong Bum Rhim, John Sun, Da Wang December 8, 2010 Contents 1 Digital Fountain Ideal 3 2 Preliminaries 4 2.1 Binary Erasure Channel...................................

More information

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels European Journal of Scientific Research ISSN 1450-216X Vol.35 No.1 (2009), pp 34-42 EuroJournals Publishing, Inc. 2009 http://www.eurojournals.com/ejsr.htm Performance Optimization of Hybrid Combination

More information

Bangalore, December Raptor Codes. Amin Shokrollahi

Bangalore, December Raptor Codes. Amin Shokrollahi Raptor Codes Amin Shokrollahi Synopsis 1. Some data Transmission Problems and their (conventional) solutions 2. Fountain Codes 2.1. Definition 2.2. Some type of fountain codes 2.3. LT-Codes 2.4. Raptor

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 9: Error Control Coding Chapter 8 Coding and Error Control From: Wireless Communications and Networks by William Stallings,

More information

Tornado Codes and Luby Transform Codes

Tornado Codes and Luby Transform Codes Tornado Codes and Luby Transform Codes Ashish Khisti October 22, 2003 1 Introduction A natural solution for software companies that plan to efficiently disseminate new software over the Internet to millions

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 12: Soft Information Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 PPR: Partial Packet Recovery for Wireless Networks ACM SIGOCMM, 2017 Kyle Jamieson and Hari

More information

IEEE C /02R1. IEEE Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/mbwa>

IEEE C /02R1. IEEE Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/mbwa> 23--29 IEEE C82.2-3/2R Project Title Date Submitted IEEE 82.2 Mobile Broadband Wireless Access Soft Iterative Decoding for Mobile Wireless Communications 23--29

More information

Capacity-Achieving Rateless Polar Codes

Capacity-Achieving Rateless Polar Codes Capacity-Achieving Rateless Polar Codes arxiv:1508.03112v1 [cs.it] 13 Aug 2015 Bin Li, David Tse, Kai Chen, and Hui Shen August 14, 2015 Abstract A rateless coding scheme transmits incrementally more and

More information

OPTIMIZATION OF RATELESS CODED SYSTEMS FOR WIRELESS MULTIMEDIA MULTICAST

OPTIMIZATION OF RATELESS CODED SYSTEMS FOR WIRELESS MULTIMEDIA MULTICAST OPTIMIZATION OF RATELESS CODED SYSTEMS FOR WIRELESS MULTIMEDIA MULTICAST by Yu Cao A thesis submitted to the Department of Electrical and Computer Engineering in conformity with the requirements for the

More information

UNEQUAL ERROR PROTECTION FOR DATA PARTITIONED H.264/AVC VIDEO STREAMING WITH RAPTOR AND RANDOM LINEAR CODES FOR DVB-H NETWORKS

UNEQUAL ERROR PROTECTION FOR DATA PARTITIONED H.264/AVC VIDEO STREAMING WITH RAPTOR AND RANDOM LINEAR CODES FOR DVB-H NETWORKS UNEQUAL ERROR PROTECTION FOR DATA PARTITIONED H.264/AVC VIDEO STREAMING WITH RAPTOR AND RANDOM LINEAR CODES FOR DVB-H NETWORKS Sajid Nazir, Vladimir Stankovic, Dejan Vukobratovic Department of Electronic

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

QUIZ : oversubscription

QUIZ : oversubscription QUIZ : oversubscription A telco provider sells 5 Mpbs DSL service to 50 customers in a neighborhood. The DSLAM connects to the central office via one T3 and two T1 lines. What is the oversubscription factor?

More information

A Study on the SPIHT Image Coding Technique for Underwater Acoustic Communications

A Study on the SPIHT Image Coding Technique for Underwater Acoustic Communications A Study on the SPIHT Image Coding Technique for Underwater Acoustic Communications Beatrice Tomasi, Dr. Laura Toni, Dr. Paolo Casari, Prof. James C. Preisig, Prof. Michele Zorzi Objectives and motivations

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

Revision of Lecture Eleven

Revision of Lecture Eleven Revision of Lecture Eleven Previous lecture we have concentrated on carrier recovery for QAM, and modified early-late clock recovery for multilevel signalling as well as star 16QAM scheme Thus we have

More information

Decoding of LT-Like Codes in the Absence of Degree-One Code Symbols

Decoding of LT-Like Codes in the Absence of Degree-One Code Symbols Decoding of LT-Like Codes in the Absence of Degree-One Code Symbols Nadhir I. Abdulkhaleq and Orhan Gazi Luby transform (LT) codes were the first practical rateless erasure codes proposed in the literature.

More information

4G Mobile Broadband LTE

4G Mobile Broadband LTE 4G Mobile Broadband LTE Part I Dr Stefan Parkvall Principal Researcher Ericson Research Data overtaking Voice Data is overtaking voice......but previous cellular systems designed primarily for voice Rapid

More information

Lecture 9: Case Study -- Video streaming over Hung-Yu Wei National Taiwan University

Lecture 9: Case Study -- Video streaming over Hung-Yu Wei National Taiwan University Lecture 9: Case Study -- Video streaming over 802.11 Hung-Yu Wei National Taiwan University QoS for Video transmission Perceived Quality How does network QoS translate to multimedia quality? Define your

More information

Chapter 2 Overview - 1 -

Chapter 2 Overview - 1 - Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC

Outline. EECS 122, Lecture 6. Error Control Overview Where are Codes Used? Error Control Overview. Error Control Strategies ARQ versus FEC Outline, Lecture 6 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Error Control Overview : n ARQ vs. FEC n Link vs. End-to-End : n Objectives n How Codes Work Code Examples: n Parity

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

Intuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding

Intuitive Guide to Principles of Communications By Charan Langton  Coding Concepts and Block Coding Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Coding Concepts and Block Coding It s hard to work in a noisy room as it makes it harder to think. Work done in such

More information

Queuing analysis of simple FEC schemes for Voice over IP

Queuing analysis of simple FEC schemes for Voice over IP Queuing analysis of simple FEC schemes for Voice over IP Eitan Altman Chadi Barakat Victor Ramos INRIA - Sophia Antipolis, France IEEE INFOCOM 200 Wednesday, April 25, 200 Anchorage, Alaska Outline Audio

More information

Efficient FEC Codes for Data Loss Recovery

Efficient FEC Codes for Data Loss Recovery Efficient FEC Codes for Data Loss Recovery Cheng Huang Lihao Xu Dept. of Computer Science and Engineering, Washington University in St. Louis, MO, 633 {cheng, lihao}@cse.wustl.edu Abstract Real-time applications

More information

Layering and Controlling Errors

Layering and Controlling Errors Layering and Controlling Errors Brad Karp (some slides contributed by Kyle Jamieson) UCL Computer Science CS 3035/GZ01 2 nd October 2014 Today s Agenda Layering Physical-layer encoding Link-layer framing

More information

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX

Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX Bit Error Rate Performance Evaluation of Various Modulation Techniques with Forward Error Correction Coding of WiMAX Amr Shehab Amin 37-20200 Abdelrahman Taha 31-2796 Yahia Mobasher 28-11691 Mohamed Yasser

More information

AHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC)

AHA Application Note. Primer: Reed-Solomon Error Correction Codes (ECC) AHA Application Note Primer: Reed-Solomon Error Correction Codes (ECC) ANRS01_0404 Comtech EF Data Corporation 1126 Alturas Drive Moscow ID 83843 tel: 208.892.5600 fax: 208.892.5601 www.aha.com Table of

More information

Chapter 2 Overview - 1 -

Chapter 2 Overview - 1 - Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next

More information

A Wireless Communication System using Multicasting with an Acknowledgement Mark

A Wireless Communication System using Multicasting with an Acknowledgement Mark IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an

More information

II. FRAME STRUCTURE In this section, we present the downlink frame structure of 3GPP LTE and WiMAX standards. Here, we consider

II. FRAME STRUCTURE In this section, we present the downlink frame structure of 3GPP LTE and WiMAX standards. Here, we consider Forward Error Correction Decoding for WiMAX and 3GPP LTE Modems Seok-Jun Lee, Manish Goel, Yuming Zhu, Jing-Fei Ren, and Yang Sun DSPS R&D Center, Texas Instruments ECE Depart., Rice University {seokjun,

More information

Coding Schemes for an Erasure Relay Channel

Coding Schemes for an Erasure Relay Channel Coding Schemes for an Erasure Relay Channel Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA Email: {spuduche,

More information

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Error Control Coding Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria Topics Introduction The Channel Coding Problem Linear Block Codes Cyclic Codes BCH and Reed-Solomon

More information

Code Design for Incremental Redundancy Hybrid ARQ

Code Design for Incremental Redundancy Hybrid ARQ Code Design for Incremental Redundancy Hybrid ARQ by Hamid Saber A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment of the requirements for the degree of Doctor

More information

MSc Project List for 2004/5 from Prof. Barry G Evans

MSc Project List for 2004/5 from Prof. Barry G Evans MSc Project List for 2004/5 from Prof. Barry G Evans B.Evans@surrey.ac.uk No Project Title RA cosupervision Rm No. Email 1 Robust mobile satellite systems physical link (ACM & ARQ) K.Narenthiran U40 K.Narenthiran@surrey.ac.uk

More information

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr.

Lecture #2. EE 471C / EE 381K-17 Wireless Communication Lab. Professor Robert W. Heath Jr. Lecture #2 EE 471C / EE 381K-17 Wireless Communication Lab Professor Robert W. Heath Jr. Preview of today s lecture u Introduction to digital communication u Components of a digital communication system

More information

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing

Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing 16.548 Notes 15: Concatenated Codes, Turbo Codes and Iterative Processing Outline! Introduction " Pushing the Bounds on Channel Capacity " Theory of Iterative Decoding " Recursive Convolutional Coding

More information

HY448 Sample Problems

HY448 Sample Problems HY448 Sample Problems 10 November 2014 These sample problems include the material in the lectures and the guided lab exercises. 1 Part 1 1.1 Combining logarithmic quantities A carrier signal with power

More information

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:

More information

Frequency-Hopped Spread-Spectrum

Frequency-Hopped Spread-Spectrum Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading

More information

XOR Coding Scheme for Data Retransmissions with Different Benefits in DVB-IPDC Networks

XOR Coding Scheme for Data Retransmissions with Different Benefits in DVB-IPDC Networks XOR Coding Scheme for Data Retransmissions with Different Benefits in DVB-IPDC Networks You-Chiun Wang Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, 80424,

More information

Wireless Communications

Wireless Communications 3. Data Link Layer DIN/CTC/UEM 2018 Main Functions Handle transmission errors Adjust the data flow : Main Functions Split information into frames: Check if frames have arrived correctly Otherwise: Discard

More information

An Efficient Forward Error Correction Scheme for Wireless Sensor Network

An Efficient Forward Error Correction Scheme for Wireless Sensor Network Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 737 742 C3IT-2012 An Efficient Forward Error Correction Scheme for Wireless Sensor Network M.P.Singh a, Prabhat Kumar b a Computer

More information

Recovering Lost Sensor Data through Compressed Sensing

Recovering Lost Sensor Data through Compressed Sensing Recovering Lost Sensor Data through Compressed Sensing Zainul Charbiwala Collaborators: Younghun Kim, Sadaf Zahedi, Supriyo Chakraborty, Ting He (IBM), Chatschik Bisdikian (IBM), Mani Srivastava The Big

More information

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads

More information

Optimization of Rateless Code Based Video Multicast

Optimization of Rateless Code Based Video Multicast Optimization of Rateless Code Based Video Multicast by Ali Bakhshali A thesis submitted to the Department of Electrical and Computer Engineering in conformity with the requirements for the degree of Master

More information

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Stefan Savage

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Stefan Savage Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Stefan Savage Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,

More information

RS + LDPC-Staircase Codes for the Erasure Channel: Standards, Usage and Performance

RS + LDPC-Staircase Codes for the Erasure Channel: Standards, Usage and Performance 213 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) RS + LDPC-Staircase Codes for the Erasure Channel: Standards, Usage and Performance Vincent

More information

Lecture 3 Data Link Layer - Digital Data Communication Techniques

Lecture 3 Data Link Layer - Digital Data Communication Techniques DATA AND COMPUTER COMMUNICATIONS Lecture 3 Data Link Layer - Digital Data Communication Techniques Mei Yang Based on Lecture slides by William Stallings 1 ASYNCHRONOUS AND SYNCHRONOUS TRANSMISSION timing

More information

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin

More information

Soft decoding of Raptor codes over AWGN channels using Probabilistic Graphical Models

Soft decoding of Raptor codes over AWGN channels using Probabilistic Graphical Models Soft decoding of Raptor codes over AWG channels using Probabilistic Graphical Models Rian Singels, J.A. du Preez and R. Wolhuter Department of Electrical and Electronic Engineering University of Stellenbosch

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 20 Spring 2012 April 4, 2012 Announcements HW9 due this week HW10 out HW11 and HW12 coming soon! Student presenta)ons HW9 Capture packets using Wireshark

More information

Implementation and Analysis of a Hybrid-ARQ Based Cooperative Diversity Protocol

Implementation and Analysis of a Hybrid-ARQ Based Cooperative Diversity Protocol Implementation and Analysis of a Hybrid-ARQ Based Cooperative Diversity Protocol Sheetu Dasari Problem Report submitted to the College of Engineering and Mineral Resources at West Virginia University in

More information

Scheduling Algorithms for OFDMA Broadband Wireless Networks. Guy Grebla

Scheduling Algorithms for OFDMA Broadband Wireless Networks. Guy Grebla Scheduling Algorithms for OFDMA Broadband Wireless Networks Guy Grebla Scheduling Algorithms for OFDMA Broadband Wireless Networks Research Thesis Submitted in partial fulfillment of the requirements

More information

Common Feedback Channel for Multicast and Broadcast Services

Common Feedback Channel for Multicast and Broadcast Services Common Feedback Channel for Multicast and Broadcast Services Ray-Guang Cheng, Senior Member, IEEE, Yao-Yuan Liu, Wen-Yen Cheng, and Da-Rui Liu Department of Electronic Engineering National Taiwan University

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

16.36 Communication Systems Engineering

16.36 Communication Systems Engineering MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication

More information

Performance Evaluation of the MPE-iFEC Sliding RS Encoding for DVB-H Streaming Services

Performance Evaluation of the MPE-iFEC Sliding RS Encoding for DVB-H Streaming Services Performance Evaluation of the MPE-iFEC Sliding RS for DVB-H Streaming Services David Gozálvez, David Gómez-Barquero, Narcís Cardona Mobile Communications Group, iteam Research Institute Polytechnic University

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 1/2009 Course Title Instructor : ITS323 Introduction to Data Communications

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2 Outline Basic Concepts Physical Redundancy Error Detecting/Correcting Codes Re-Execution Techniques Backward Error Recovery Techniques Basic Idea Start with k-bit data word Add r check bits Total = n-bit

More information

Introduction to Error Control Coding

Introduction to Error Control Coding Introduction to Error Control Coding 1 Content 1. What Error Control Coding Is For 2. How Coding Can Be Achieved 3. Types of Coding 4. Types of Errors & Channels 5. Types of Codes 6. Types of Error Control

More information

THE erasure channel [1] is a good network-layer model for

THE erasure channel [1] is a good network-layer model for 3740 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 The Design Permance of Distributed LT Codes Srinath Puducheri, Jörg Kliewer, Senior Member, IEEE, Thomas E. Fuja, Fellow, IEEE

More information

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions

EECS 122: Introduction to Computer Networks Encoding and Framing. Questions EECS 122: Introduction to Computer Networks Encoding and Framing Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

Modeling the RTT of bundle protocol over asymmetric deep-space channels

Modeling the RTT of bundle protocol over asymmetric deep-space channels Vol.1, No.3, Oct. 2016 DOI: 10.11959/j.issn.2096-1081.2016.018 Modeling the RTT of bundle protocol over asymmetric deep-space channels Research paper Modeling the RTT of bundle protocol over asymmetric

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Data communication and networking fourth Edition by Behrouz A. Forouzan Chapter 10 Error Detection and Correction 10.1 Note Data can be corrupted during transmission. Some applications require that errors

More information

LDPC Code Length Reduction

LDPC Code Length Reduction LDPC Code Length Reduction R. Borkowski, R. Bonk, A. de Lind van Wijngaarden, L. Schmalen Nokia Bell Labs B. Powell Nokia Fixed Networks CTO Group IEEE P802.3ca 100G-EPON Task Force Meeting, Orlando, FL,

More information

An Efficient Scheme for Reliable Error Correction with Limited Feedback

An Efficient Scheme for Reliable Error Correction with Limited Feedback An Efficient Scheme for Reliable Error Correction with Limited Feedback Giuseppe Caire University of Southern California Los Angeles, California, USA Shlomo Shamai Technion Haifa, Israel Sergio Verdú Princeton

More information

Adoption of this document as basis for broadband wireless access PHY

Adoption of this document as basis for broadband wireless access PHY Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group Proposal on modulation methods for PHY of FWA 1999-10-29 Source Jay Bao and Partha De Mitsubishi Electric ITA 571 Central

More information

University of Southampton Research Repository eprints Soton

University of Southampton Research Repository eprints Soton University of Southampton Research Repository eprints Soton Copyright and Moral Rights for this thesis are retained by the author and/or other copyright owners A copy can be downloaded for personal non-commercial

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

Open Access Concatenated RS-Convolutional Codes for Cooperative Wireless Communication

Open Access Concatenated RS-Convolutional Codes for Cooperative Wireless Communication Send Orders of Reprints at reprints@benthamscience.net The Open Electrical & Electronic Engineering Journal, 2013, 7, 9-20 9 Open Access Concatenated RS-Convolutional Codes for Cooperative Wireless Communication

More information

Distributed LT Codes

Distributed LT Codes Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA Email: {spuduche, jliewer, tfuja}@nd.edu

More information

S Coding Methods (5 cr) P. Prerequisites. Literature (1) Contents

S Coding Methods (5 cr) P. Prerequisites. Literature (1) Contents S-72.3410 Introduction 1 S-72.3410 Introduction 3 S-72.3410 Coding Methods (5 cr) P Lectures: Mondays 9 12, room E110, and Wednesdays 9 12, hall S4 (on January 30th this lecture will be held in E111!)

More information

Performance of Combined Error Correction and Error Detection for very Short Block Length Codes

Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Performance of Combined Error Correction and Error Detection for very Short Block Length Codes Matthias Breuninger and Joachim Speidel Institute of Telecommunications, University of Stuttgart Pfaffenwaldring

More information

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren

Lecture 3: Modulation & Clock Recovery. CSE 123: Computer Networks Alex C. Snoeren Lecture 3: Modulation & Clock Recovery CSE 123: Computer Networks Alex C. Snoeren Lecture 3 Overview Signaling constraints Shannon s Law Nyquist Limit Encoding schemes Clock recovery Manchester, NRZ, NRZI,

More information

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich, Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Okeke. C Department of Electrical /Electronics Engineering, Michael Okpara University of Agriculture, Umudike, Abia State,

More information