Advertisement

Error Control

  • Shengming Jiang
Chapter

Abstract

In digital communication systems, all information to be transmitted is first digitalized into a series of binary bits of either 0 or 1. However, the wireless radio channel used to transmit these digital signals is error-prone (Fig.  1.23) because the channel is susceptible to impulse noises from many sources such as electromagnetic radiation and lightning strikes (Tanenbaum, Computer Networks, Pearson Education International, 2003, [1]). Therefore, error control schemes are necessarily used to detect errors and correct them if possible, which is essential to assure digital wireless communication quality.

References

  1. 1.
    Tanenbaum, A.S.: Computer Networks, 4th edn. Pearson Education International (2003)Google Scholar
  2. 2.
    Schwartz, M.: Telecommunication Networks, Protocols. Modeling and Analysis. Addison-Wesley Publishing Company, Massachusetts, USA (1987)Google Scholar
  3. 3.
    Luby, M.G., Mitzenmacher, M., Shokrollahi, M.A., Spielman, D.A.: Efficient erasure correcting codes. IEEE Trans. Inform. Theory 47(2), 569–584 (2001). FebGoogle Scholar
  4. 4.
    Declercq, D., Fossorier, M., Biglieri, E.: Channel Coding Theory, Algorithms, and Applications. Academic Press, Cambridge (2014)Google Scholar
  5. 5.
    Jiang, J.F., Han, G.J., Zhu, C.S., Chan, S., Rodrigues, J.J.P.C.: A trust cloud model for underwater wireless sensor networks. IEEE Commun. Mag. 110–116 (2017)Google Scholar
  6. 6.
    Luby, M., Mitzenmacher, M., Shokrollahi, A.., Spielman, D.., Stemann, V.: Practical loss-resilient codes. In: Proceedings of Annual ACM Symposium Theory of Computing (STOC), pp. 150–159. El Paso, TX, USA (1997)Google Scholar
  7. 7.
    Maymounkov, P., Mazieres, D.: Rateless codes and big downloads. In: Proceedings of International WS Peer-to-Peer System. Berkley, USA (2003)Google Scholar
  8. 8.
    Luby, M.: LT codes. In: Proceedings of Annual IEEE Symosium Foundations of Computer Science (FOCS), pp. 271–280. Washington, DC, USA (2002)Google Scholar
  9. 9.
    Shokrollahi, A.: Raptor codes. IEEE Trans. Inform. Theory 52(6), 2551–2567 (2006). JunGoogle Scholar
  10. 10.
    LJ Technical Systems, CT02 Curriculum ManualGoogle Scholar
  11. 11.
    Stojanovic, M.: Optimization of a data link protocol for an underwater acoustic channel. In: Proceedings of MTS/IEEE OCEANS. Washington, DC, USA (2005)Google Scholar
  12. 12.
    Jiang, S.M.: On reliable data transfer in underwater acoustic networks: a survey from networking perspective. IEEE Commun. Surv. Tutor. vol. P( 99) (2018)Google Scholar
  13. 13.
    Zorzi, M., Rao, R.R.: Energy-constrained error control for wireless channels. IEEE Personal Commun. Mag. 4(6), 27–33 (1997). DecGoogle Scholar
  14. 14.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Net. 38(4), 393–422 (2002). MarGoogle Scholar
  15. 15.
    Sen, J., Bhattacharya, S.: A survey on cross-layer design frameworks for multimedia applications over wireless networks. Int. J. of Comput. Sci. Inf. Tech. 1(1), 29–42 (2008)Google Scholar
  16. 16.
    Ramis, J., Femenias, G., Carrasco, L.: Cross-layer design of multi-rate wireless networks based on link layer truncated ARQ. In: Proceedings of IEEE International WS Cross Layer Design (IWCLD), pp. 1–5. Palma de Mallorca (2009)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Marine Internet Laboratory (MILAB), College of Information EngineeringShanghai Maritime UniversityShanghaiChina

Personalised recommendations