An Efficient Forward Error Correction Scheme for Wireless Sensor Network

Similar documents
Digital Television Lecture 5

Burst Error Correction Method Based on Arithmetic Weighted Checksums

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

Lab/Project Error Control Coding using LDPC Codes and HARQ

Error Protection: Detection and Correction

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

Page 1. Outline. Basic Idea. Hamming Distance. Hamming Distance Visual: HD=2

Chapter 10 Error Detection and Correction 10.1

Residual Channel Coding in Low-Power WSNs Using Minimum Hamming Distance Decoder

Error Detection and Correction

Physical-Layer Services and Systems

Chapter 10 Error Detection and Correction

Chapter 1 Coding for Reliable Digital Transmission and Storage

Implementation of Reed-Solomon RS(255,239) Code

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Intuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding

6. FUNDAMENTALS OF CHANNEL CODER

High-Rate Non-Binary Product Codes

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance

Error-Correcting Codes

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Revision of Lecture Eleven

Design of Reed Solomon Encoder and Decoder

Error Correction with Hamming Codes

Nonlinear Multi-Error Correction Codes for Reliable MLC NAND Flash Memories Zhen Wang, Mark Karpovsky, Fellow, IEEE, and Ajay Joshi, Member, IEEE

QUIZ : oversubscription

Lecture 13 February 23

Error Control Coding. Aaron Gulliver Dept. of Electrical and Computer Engineering University of Victoria

Lecture 3 Data Link Layer - Digital Data Communication Techniques

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

Chapter 2 Overview - 1 -

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Performance of Reed-Solomon Codes in AWGN Channel

Outline. Communications Engineering 1

Detecting and Correcting Bit Errors. COS 463: Wireless Networks Lecture 8 Kyle Jamieson

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Performance Optimization of Hybrid Combination of LDPC and RS Codes Using Image Transmission System Over Fading Channels

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

ERROR CONTROL CODING From Theory to Practice

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 9: Error Control Coding

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

Implementation of Reed Solomon Encoding Algorithm

Novel Localization of Sensor Nodes in Wireless Sensor Networks using Co-Ordinate Signal Strength Database

Channel Coding/Decoding. Hamming Method

EE521 Analog and Digital Communications

OFDM Systems For Different Modulation Technique

Basics of Error Correcting Codes

Hamming Codes as Error-Reducing Codes

n Based on the decision rule Po- Ning Chapter Po- Ning Chapter

Hamming Codes and Decoding Methods

BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel

Design of Parallel Algorithms. Communication Algorithms

Introduction to Error Control Coding

Performance Evaluation and Comparative Analysis of Various Concatenated Error Correcting Codes Using BPSK Modulation for AWGN Channel

An Alamouti-based Hybrid-ARQ Scheme for MIMO Systems

A Survey of Advanced FEC Systems

Lecture 17 Components Principles of Error Control Borivoje Nikolic March 16, 2004.

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

LDPC Decoding: VLSI Architectures and Implementations

Chapter 2 Overview - 1 -

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Wireless Communication in Embedded System. Prof. Prabhat Ranjan

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS

Performance Analysis of WiMAX Physical Layer Model using Various Techniques

The idea of similarity is through the Hamming

Improved concatenated (RS-CC) for OFDM systems

The throughput analysis of different IR-HARQ schemes based on fountain codes

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Synchronization of Hamming Codes

Data and Computer Communications

PAPR Reduction of OFDM System using LBC

International Journal of Scientific & Engineering Research Volume 9, Issue 3, March ISSN

Redundant Residue Number System Based Fault Tolerant Architecture over Wireless Network

Abstract. Keywords - Cognitive Radio, Bit Error Rate, Rician Fading, Reed Solomon encoding, Convolution encoding.

ECE 6640 Digital Communications

Datacommunication I. Layers of the OSI-model. Lecture 3. signal encoding, error detection/correction

Chapter 7. Conclusion and Future Scope

Improvement Of Block Product Turbo Coding By Using A New Concept Of Soft Hamming Decoder

Exercises to Chapter 2 solutions

HY448 Sample Problems

White Paper FEC In Optical Transmission. Giacomo Losio ProLabs Head of Technology

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ECE 6640 Digital Communications

A Novel Approach for Error Detection Using Additive Redundancy Check

Performance Evaluation of the MPE-iFEC Sliding RS Encoding for DVB-H Streaming Services

IEEE C /02R1. IEEE Mobile Broadband Wireless Access <

Code Design for Incremental Redundancy Hybrid ARQ

FREDRIK TUFVESSON ELECTRICAL AND INFORMATION TECHNOLOGY

A Novel Encoding Scheme for Cross-Talk Effect Minimization Using Error Detecting and Correcting Codes

International Journal of Computer Trends and Technology (IJCTT) Volume 40 Number 2 - October2016

Study of Turbo Coded OFDM over Fading Channel

Digital Electronics 8. Multiplexer & Demultiplexer

Implementation of a Block Interleaver Structure for use in Wireless Channels

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks

INSTITUT PENGURUSAN PENYELIDIKAN UNIVERSITI TEKNOLOGI MARA SHAH ALAM, SELANGOR MALAYSIA DISEDIAKAN OLEH :

A Wireless Communication System using Multicasting with an Acknowledgement Mark

Transcription:

Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 737 742 C3IT-2012 An Efficient Forward Error Correction Scheme for Wireless Sensor Network M.P.Singh a, Prabhat Kumar b a Computer Science & Engineering Department,National Institute of Technology Patna,Patna -800005, India b Information Technology Department,National Institute of Technology Patna,Patna -800005, India Abstract The two basic methods to recover erroneous packets in any network are Automatic Repeat Request (ARQ), and Forward Error Correction (FEC). The life time of any wireless sensor network depends directly on the efficient use of its power resources. Power is primarily consumed during wireless transmission and reception. As energy conservation is a major issue of concern in WSN, repeat transmission is not an option and FEC would be preferred over ARQ. One such FEC scheme is (16, 8) quasi cyclic code, which can be used to correct up to 2 Bit Errors and to detect 3 Bit Errors. However, when more than 2 errors occur, retransmission of data is required. In this work, an efficient FEC scheme for WSN s has been developed to avoid retransmission which not only saves energy but also extends its functionality and enables it to handle BURST ERRORS. The Proposed Error Correction Scheme is effective for correcting Burst Errors of even 8 bits. 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of C3IT Open access under CC BY-NC-ND license. Keywords: FEC; ARQ; Burst Errors 1. Introduction A Wireless Sensor Networks (WSN) can be defined as a network of devices, denoted as nodes, capable of sensing the environment and communicating the information gathered from the monitored field through wireless links. The data is forwarded to a sink that can use it locally or is connected to other networks through a gateway. The movement generally uses multiple hops. The nodes can be stationary or moving. They can or cannot be aware of their location. They can be homogeneous or heterogeneous. The main design concern for any applications of wireless sensor networks is the limited energy supply, limited computation capability and communication range of sensor nodes as compared with other computing and communicating devices [1], [4]. Lifetime of wireless sensor network depends on lifetime of battery of individual sensor nodes. The nodes play a dual role as data sender and data router in a multi-hop WSN. Aggressive energy management techniques are used to fulfill the main design goals of WSNs which is to carry out data communication while trying to prolong the lifetime of the network and prevent connectivity degradation. One way to conserve the energy in WSNs is to avoid retransmission due to error as far as possible and instead use efficient error control scheme for error correction. Forward error correction (FEC) also called channel coding is a system of error control for data transmission, whereby the sender adds systematically generated redundant data to its messages, also known as an error-correcting code. The carefully designed redundancy allows the receiver to detect and correct a limited number of errors occurring anywhere in the message without the need to ask the sender for 2212-0173 2012 Published by Elsevier Ltd. doi:10.1016/j.protcy.2012.05.120 Open access under CC BY-NC-ND license.

738 M.P. Singh and Prabhat Kumar / Procedia Technology 4 ( 2012 ) 737 742 additional data. FEC gives the receiver an ability to correct errors without needing a reverse channel to request retransmission of data, but this advantage is at the cost of a fixed higher forward channel bandwidth. FEC is therefore applied in situations where retransmissions are relatively costly, or impossible such as when broadcasting to multiple receivers. In particular, FEC information is usually added to mass storage devices to enable recovery of corrupted data. The maximum fractions of errors or of missing bits that can be corrected are determined by the design of the FEC code, so different forward error correcting codes are suitable for different conditions. The purpose of this paper is to establish a common channel coding standard for bandwidth efficient spacecraft and ground systems communications. The need for bandwidth efficiency has prompted the creation of an alternate coding standard which can enhance the performance and increase efficiency in communications. This alternate coding standard enhances the efficiency thus increasing the life of the nodes of the Wireless Sensor networks. In order to ensure that data is transmitted securely over the network without any loss during the transmission processes for the verification of the data such as retransmission have to be carried out which are generally time-consuming as well as energy-consuming. Thus using this alternate common channel coding standard these disadvantages can be eliminated. The new Error Correction scheme has a wide scope and can be implemented for communication channels in the applications of Wireless Sensor nodes like Broadcasting, Environmental monitoring, logistics, positioning and tracking, healthcare monitoring. The new common channel coding implements the quasi cyclic code which obviates the need to request for the retransmission of the data which helps in reducing the energy consumption to a great extent. Rest of the paper is organized as follows. Section 2 discusses the present error correction scheme. Section 3 introduces proposed error correction scheme. Section 4 compares proposed scheme with old scheme. Section 5 details the advantages of proposed scheme. Section 6 gives the limitation of proposed scheme. Finally, Section 7concludes this paper. 2. The Present Error Correction Scheme At present, a systematic (16, 8) quasi-cyclic code that can correct 2-bit errors, as well as detect 3-bit errors is in practice. A quasi-cyclic code is de ned as the code wherein a cyclic shift of n 0 digits always produces another code word. Thus, encoding of the message can be done serially using linear feedback shift registers, or in parallel if low latency is required. The implementation checks for and corrects single and double bit errors. If any error is detected, a signal is sent to the higher layer that an error has occurred. The syndrome value is represented by 8-bits. This implies that there are a total of 256 possible syndromes. Of these, the zero syndrome is used when there are no errors in the received message, 16 are used by single-correctable errors, and 120 by double-correctable errors. The generator matrix G and the parity matrix H is given by G = [I 8 C] = H = [C T I 8 ] = It is to be noted that the minimum Hamming distance between any two rows is 5. An example of how data is encoded, and how received message can be corrected is shown below. Let the message being sent be 0100 0010. The encoded message is therefore [0 1 0 0 0 0 1 0] = [0100001010011100] It is assumed that the second and third bits are inverted due to noise in the wireless channel. Then, the received message is 0010 0010 1001 1100. Multiplying the received message by the transpose of the parity matrix H,

M.P. Singh and Prabhat Kumar / Procedia Technology 4 ( 2012 ) 737 742 739 [0010001010011100] = [10101111] It is to be noted that the syndrome obtained is the exclusive-or of the 2nd and 3rd rows of H T. Thus at the receiver end, it is found that the 2nd and 3rd bits are inverted and hence erroneous and need to be corrected. The main of this scheme are (i) When the Burst Error is of more than 2 bit, the received codeword is rejected and the receiver asks for retransmission, (ii) Another problem is that if an inversion of bit occurs during transmission, it will be located in a particular codeword. 3. Proposed Forward Error correction Scheme 3.1. Module Description The proposed scheme consists of three modules Encoding Creation of Generator matrix from the Binary matrix and Identity matrix Generation of Parity matrix by concatenating the identity matrix and the transpose of binary matrix Conversion of Data word into Code word by multiplication Transmission The code word is transmitted in a Column-wise fashion. This is also called as the column major transmission, i.e Transmission starts from the last element of the last row and the last column and proceeds in a cyclic way along the Column major Decoding The Code word received at the receiver s end is decoded into the data word and the syndrome is compared with the predefined table values of the syndrome for error detection 3.2. Algorithm 1. Divide data into 8-bit fragments and Encode each of the data byte using (16,8) quasi cyclic code. 2. Group the encoded code words into groups of 4 code words and transmit the code words in column major, such that the mapping of bits in retransmission medium to code words is as follows, the bits at positions p=4n,4n+1,4n+2,4n+3 where n=0 to 15 to codeword1,codeword2,codeword3,codeword4 respectively and the data bit positions in particular code words are at (15-n) 3. Decode the received code words using (16,8) quasi cyclic code decoding scheme. FRAGMENTATION (k) Let fragmented data word be D QUASI_CYCLIC_CODE (generator, parity) ENCODING (dataword) Generator matrix=concatenation(identitymatrix[k],binarymatrix[k*r(parity)] Parity matrix=concatenation((binarymatrix) T,identitymatrix[k]) Multiply D with generator to get codeword TRANSMISSION(codeword) Transmission along column major DECODING(codeword) Data word= Codeword * (Generator) -1 3.3. Energy Analysis Power Consumption in Original Scheme Energy of converting dataword into Codeword =E1(D,C), Energy of Transmission over a distance d = E1(T1,d)

740 M.P. Singh and Prabhat Kumar / Procedia Technology 4 ( 2012 ) 737 742 Total Energy = E1= E1(D,C)+E1(T,d) In new scheme Group of 4 codewords are sent Energy of converting dataword into codeword =E2(D,C)=4*E1(T,d) Energy of storage = E2s 0 Energy of converting from Row Major to Column Major = E2(r,c) Energy of transmission E2(T,d) = E1(T,d) Total Energy = E2(D,C) + E2s + E2(r,c) + E2(T,d) The transmission of data according to new encoding scheme is shown below Data in transmission channel is generated by getting it column wise from the above matrix started from column 0 0 0 0 0 1 0 0 00 1 0 0 1 1 1 0 0 0 1 1 1 0 1 1 0 1 0 1 1 1 0 1 1 0 1 1 0 0 0 0 1 1 1 0 1 1 1 0 1 0 1 10 0 00 0 0 0 00 0 0 0 During transmission, there may be burst error like below 0 0 0 0 1 0 0 11 0 1 1 0 1 1 0 0 0 1 1 1 0 1 1 0 1 0 1 1 1 0 1 1 0 1 1 0 0 0 0 1 1 1 0 1 1 1 0 1 0 1 1 0 0 00 0 0 0 00 0 00 As it is known that the errors of length up to 2 bits can be corrected, the above errors in code words are successfully corrected and accepted.hence the burden of retransmission is reduced. 4. comparison of proposed scheme with old 4.1. Comparison of Energy consumptions In case of Burst Error, in original scheme the received codeword is rejected and the receiver asks for retransmission. Assuming that when 4 code words are sent, burst error occurs in one of them, Then energy consumed E1= E1(D,C) + 5E1(T1,d) -- (1) Whereas, in the new scheme the Burst Error can be corrected. Therefore, Total Energy consumed = E2(D,C) + E2s + E2(r,c) + E2(T,d) --(2) Comparing the equations (1) and (2), E1-E2 = E1(T, d)-e2s - E2(r, c) E1(T, d) Hence the energy saved is almost equivalent to E1 (T, d) In some Radio Chips used in Sensor Nodes, the Energy consumed for transmitting one bit over a distance of 100m is equivalent to energy consumed by it to process 3000 instructions. In the case of Original Algorithm, if more than 2 bit error occurs then Retransmission becomes necessary Extra Overhead Energy Consumed = Energy required to process 16*3000= 48000 instructions

M.P. Singh and Prabhat Kumar / Procedia Technology 4 ( 2012 ) 737 742 741 Table 1.Comparison of old and new scheme Sl Old Scheme New Scheme 1 Transmission of the data word takes place in a horizontal manner Transmission of the data word takes place in a vertical manner 2 Effective only for correcting Burst Errors of size less than or equal to 2 bit Effective for correcting Burst Errors of even 2 or more bits 3 When the Burst Error is of more than 2 bit, the received Even when the Burst error is of more than 2 bit, the error is codeword is rejected detected as it is distributed across the data word 4 Retransmission of the codeword becomes necessary when Burden of Retransmission is reduced or rather avoided there is a burst error 5 Efficiency is less because of the Retransmission of the code Efficiency is comparatively more as Retransmission is reduced word or rather avoided 5. Advantages of New Scheme The proposed scheme has following advantages over the old scheme. (i) It can correct burst error of length up to 8 bit. (ii) In original scheme if an inversion of bit occurs during transmission, it will be located in a particular codeword, (iii) Whereas in new scheme if an inversion occurs It may be located in any one of the four code words because in every 4 bits in transmission medium, there is a bit from each of the 4 code words, (iv) The possibility of particular code word being affected by noise is reduced to ¼. For example, From pre-calculated measurements it is clear that most of the errors occurring are either 2 bit or single bit. So the number of affected data bits in 64-bits is less than 8. In the best case and worst cases, The error distribution over 4 code words may be less than 3 bits It achieves the performance of (16,8) quasi cyclic code and it also guarantees the correction of burst error. Supposing that 8 inversions are present, when two code words get more than 2 errors, retransmission of 2 code words has to be done. Even if there are 3 inversions in a block of 16-bit, it might be possible for other blocks either to have a maximum of 5 errors or to not have any error. In this case the errors are corrected and the code word is retransmitted 6. Limitations of Proposed Scheme If the error occurs more than twice at only 4n positions or 4n+1, or 4n+2 or 4n+3, it implies that the corresponding code would contain more than 2 errors. Hence it becomes essential to retransmit that code word again. When more than 8 errors are present in a block of 64-bit then retransmission of at least one codeword has to be performed. 7. Conclusion A common channel coding standard is developed for the transmission of data using the nodes of Wireless Sensor networks which have a wide range of applications such as in weather and environmental monitoring, healthcare, positioning and tracking, spacecraft and ground system communications. This new coding standard obviates the need for the retransmission of the data which is generally a time-consuming and energy-consuming process and sometimes an impossible process too in the case of applications such as Broadcasting to multiple nodes. The newly proposed error correction scheme implements the Forward Error Correction (FEC). This in contrast to the Automatic Repeat Request (ARQ) and consumes lesser energy. As the power is scarce for wireless transmission and reception in the wireless sensor nodes the FEC is preferred over the ARQ. The Forward Error correction implements a (16-8) quasi cyclic code. As per the Original Error Correction Scheme the Transmission of the data word takes place in a horizontal manner. The Original Error Correction Scheme is effective only for correcting Burst Errors of size less than or equal to 2 bit. When the Burst Error is of more than 2 bit, the received codeword is rejected. Retransmission of the codeword becomes necessary when there is a burst error. Hence in order to overcome these drawbacks a

742 M.P. Singh and Prabhat Kumar / Procedia Technology 4 ( 2012 ) 737 742 new error correction scheme is proposed. As per the Newly Proposed Error Correction Scheme the transmission of the data word takes place in a vertical manner. The Proposed Error Correction Scheme is effective for correcting Burst Errors of even 2 or more bits. Even when the Burst error is of more than 2 bit, the error is detected as it is distributed across the data word. Burden of Retransmission is reduced or rather avoided in this case. Efficiency is comparatively more because the energy expended for the retransmission in the case of the original correction scheme is saved when the new proposed error correction scheme is implemented. References 1. Elaoud, M,Ramanathan,P: Adaptive Use of Error-Correcting Codes for Real-time Communication in Wireless Networks, proceedings IEEE Infocom 98, pp. 548-555, March 1998. 2. MacWilliams, F.J., Sloane, N.J.A.: The theory of errorcorrecting codes, North Holland Publicing Company,mAmsterdam, 1977 3. Plank, J.S.: A tutorial on Reed Solomon coding for faulttolerance in RAID like systems, Software, practice & experience, 27(9), Sept 1997, pp. 995 1012. 4. F. Walther, Energy modelling of MICAz: A low power wireless sensor node, Technical Report, University of Kaiserslautern, http://www.eit.un kl.de/wehn/files/reports/micaz power model.pdf, February 2006 5. S. L. Howard, C. Schlegel, and K. Iniewski, Error control coding inlow-power wireless sensor networks: When is ECC energyefficient? EURASIP Journal on Wireless Communications and Networking, pp. 1 14, 2006. 6. Justesen and T. Hoeholdt, A Course In Error-Correcting Codes, European Mathematical Society, 2004 7. T. Aaron Gulliver and Vijay K. Bhargava, A Systematic (16,8) Code for Correcting Double Errors and Detecting Triple- Adjacent Errors," IEEE Transactions on Computers, Vol.42, No.1, Jan. 1993 8. Mehmet C. Vuran, Member, IEEE, and Ian F. Akyildiz, Fellow, IEEE Error Control in Wireless Sensor Networks: A Cross Layer Analysis IEEE/ACM transactions on Networking, Vol. 17, No. 4, August 2009 pp. 1186-1199