An efficient software implementation of a Forward Error Correcting code

  • Jean-Charles Henrion
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1309)


Today, Forward Error-Correcting (FEC) codes are mainly implemented in hardware, and many believe that their complexity prohibit their software implementation. This paper presents in detail how the performances of a software implementantion can be significantly improved. Different levels of optimization which are independent of the working environment are presented and discussed. The coding throughput of 100 Mbps on an UltraSparc 1 shows that FEC codes can be easily added to multimedia applications without requiring dedicated hardware support. As a case study, we use FEC codes to protect AAL5-PDUs from cell losses in ATM networks.


Data Block Information Message Parity Block Forward Error Correct Code Integrate Service Digital Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    M. de Prycker: “Asynchronous Transfer Mode, Solution for Broadband ISDN”, Ellis Horwood Series in Computer Communications and Networking, 1993.Google Scholar
  2. 2.
    ITU-T Recommandation I.363: “Integrated Services Digital Network (ISDN), Overall Networks Aspects and Functions, B-ISDN ATM Adaptation Layer(AAL) specification”, 1993.Google Scholar
  3. 3.
    ATM Forum: “Traffic Management 4.0”, ATM Forum Specification af-tm-0056.001, 1996.Google Scholar
  4. 4.
    J-R. Louvion, B. Piller: “Performance Measurements and Traffic Characterization on the ATM Pilot Network”, European Transactions on Telecommunications, Vol. 7, Nℴ 5, Sept. 1996.Google Scholar
  5. 5.
    H. Imai: “Essentials of Error-Control Coding techniques”, Academic Press, Inc., Harcourt Brace Jovanovitch, Publishers, 1990.Google Scholar
  6. 6.
    D. Feldmeier: “Fast Software Implementation of Detection Codes”, IEEE/ACM Transactions on Networking, Vol. 1, Nℴ 6, December 1995.Google Scholar
  7. 7.
    J-C. Henrion: “Evaluation du débit maximum d'algorithmes FEC dans un environnement ATM”, University of Liège, Institut Montefiore, June 1996.Google Scholar
  8. 8.
    D.D. Clarck, D.L. Tennenhouse: “Architectural considerations for a new generation of protocols”, SIGCOMM'90 Proceedings, Philadelphia,Sept. 24–27, 1990.Google Scholar
  9. 9.
    J. Nonnenmacher, E. Biersack: “Reliable Multicast: Where to use FEC”, Fifth International Workshop on Protocols for High-Speed Networks, W. Dabbous & C. Diot Eds, Chapman & Hall, 1997.Google Scholar
  10. 10.
    C. Huitema: “The case for packet level FEC”, Fifth Workshop on Protocols for High-Speed Networks, W. Dabbous & C. Diot Eds, Chapman & Hall, 1997.Google Scholar
  11. 11.
    A. McAuley: “Reliable Broadband Communication using a burst Erasure Correcting Code”, Computer Communication Research Group, Presented at ATM SIGCOMM '90, Philadelphia, 1990.Google Scholar
  12. 12.
    L. Rizzo: “Effective erasure codes for reliable computer communication protocols”, Computer Communication review, Vol. 27, Nℴ2, April 1997.Google Scholar
  13. 13.
    P. Karn: URL “”, “Amateur Audio Digital Communications”, May 1997.Google Scholar
  14. 14.
    A. Albanese, M. Luby: “PET — Priority Encoding Transmission”, High-Speed Networking for Multimedia Applications, Kluwer Academic Publishers, 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Jean-Charles Henrion
    • 1
  1. 1.Institut d'électricité Montefiore B.28Université de LiègeLiègeBelgium

Personalised recommendations