- Research
- Open Access
A protection scheme for multimedia packet streams in bursty packet loss networks based on small block low-density parity-check codes
- Filippo Casu^{1}Email author,
- Julián Cabrera^{1},
- Fernando Jaureguizar^{1} and
- Narciso García^{1}
https://doi.org/10.1186/s13638-015-0402-6
© Casu et al.; licensee Springer. 2015
Received: 2 September 2014
Accepted: 30 May 2015
Published: 1 July 2015
Abstract
This paper proposes an enhanced forward error correction (FEC) scheme based on small block low-density parity-check (LDPC) codes to protect real-time packetized multimedia streams in bursty channels. The use of LDPC codes is typically addressed for channels where losses are uniformly distributed (memoryless channels) and for large information blocks. This work suggests the use of this type of FEC codes at the application layer, in bursty channels (e.g., Internet protocol (IP)-based networks) and for real-time scenarios that require low transmission latency. To fulfil these constraints, the appropriate configuration parameters of an LDPC scheme have been determined using small blocks of information and adapting the FEC code to be capable of recovering packet losses in bursty environments. This purpose is achieved in two steps. The first step is performed by an algorithm that estimates the recovery capability of a given LDPC code in a burst packet loss network. The second step is the optimization of the code: an algorithm optimizes the parity matrix structure in terms of recovery capability against the specific behavior of the channel with memory. Experimental results have been obtained in a simulated transmission channel to show that the optimized LDPC matrices generate a more robust protection scheme against bursty packet losses for small information blocks.
Keywords
- Multimedia communications
- Time-sensitive services
- Real time
- Forward error correction
- LDPC
- LDGM
- Bursty channels
- Small block codes
1 Introduction
Multimedia communications are moving toward IP networks, since they are more efficient than circuit-switching channels. The most popular real-time applications that deliver services using Internet protocol (IP) networks are represented by voice over IP (VOIP), television over IP, and video conference [1, 2].
Nevertheless, IP networks have some weak points (e.g., unreliable packets delivery and delay control problems) that might damage the media content. For this reason, research is centring its efforts on developing efficient and robust systems against delays and channel errors.
Specifically, errors and losses can occur at different levels: data link layer and higher layers [3]. In this sense, those at the data link layer are originated by low values of signal-to-noise ratio (bits arrive at the receiver either correctly or erroneously). In this layer, error detection and error correction are possible with the use of forward error correction (FEC) codes. On the other hand, at higher layers, losses and errors also occur due to sporadic impulse noise or congestion of the network routers, leading to bursts of packet losses (erasure channels). In this case, the use of application layer FEC (AL-FEC) [4, 5] can prevent these errors.
In this paper, we focus on packet delivery problems at the application layer, regardless where the losses are originated and assuming that either a packet arrives perfectly or is lost.
IP is usually employed with the transport level protocols transmission control protocol (TCP) and user datagram protocol (UDP). TCP provides reliable and ordered packet delivery and is employed by many popular internet applications, such as World Wide Web (WWW), E-Mail, etc. UDP is commonly used in time-sensitive applications, since it allows lower delays, thanks to a simpler transmission model. Nevertheless, UDP provides unreliable communication: neither the reception of packets nor the order of the received packets are guaranteed. Hence, it is necessary to include additional mechanisms to give reliability to the communication. In this sense, a typical solution is partly represented by the real-time transport protocol (RTP), an application layer protocol developed by the Video Audio Transport Working Group of the Internet Engineering Task Force (IETF) (RFC 3550 [6]) that is generally used over UDP. Although the use of RTP over TCP is not excluded, in this work we focus on the widely used UDP/RTP combination.
RTP defines a packet format for delivering data with real-time characteristics, such as interactive audio and video. Moreover, RTP includes payload type identification, sequence numbering, and timestamping that are intended to ease the management of the transmission. However, RTP does not include protection mechanisms. Therefore, in order to avoid losses at a packet level, it is necessary to add complementary recovery modules.
Protection techniques are usually divided in two large families: automatic repeat request (ARQ) schemes and FEC schemes. Whereas ARQ techniques are based on the retransmission of lost information, which is requested by the receiver, FEC techniques consist in generating redundancy data that is sent jointly with media data and can be used to recover lost information at the receiver [7]. Combination of both FEC codes and ARQ techniques has also been proposed as in the hybrid automatic repeat request (HARQ) [8].
In time-sensitive communication, FEC-based schemes are usually preferred to ARQ schemes, since no extra delay is added due to the retransmission of lost information [7]. Nevertheless, FEC techniques also add some latency derived from the encoding and decoding operations, that has to be considered in this scenario.
In addition, regarding scenarios where multicast communications are used, (e.g., IPTV and multi-client video conference) with a considerable number of clients, the adoption of either FEC or ARQ schemes is a key decision that may influence the success of the protection scheme used. Since each receiver might suffer from different losses, in ARQ schemes, each receiver has to send different requests to the transmitter, generating an additional traffic that may further contribute to the congestion of the network. This situation is different for FEC-based schemes, where the redundancy produced at the transmitter is always sent to all the receivers, so each one can use it if necessary. Therefore, although FEC-based schemes introduce additional band occupation, due to the transmission of redundant recovery data, they seem more suitable than ARQ techniques when it comes to time-sensitive multi-client communications.
In this sense, the FECFRAME Working Group has elaborated the RFC 6363 [9] in order to provide a FEC-based protection scheme to RTP multimedia transmissions. RFC 6363 recommends creating a parallel RTP-FEC packetized stream, composed of recovery packets, from a packetized media stream. This parallel stream is originated applying FEC codes across the RTP media packets (RFC 3550). Each RTP-FEC packet contains an RTP header of its own, data that protect the RTP source headers, and the FEC payload.
Different possibilities of FEC codes employed in this area are exclusive OR (XOR)-based codes, basic and interleaved, low-density parity-check (LDPC) codes, Reed-Solomon codes, fountain codes, etc. [4, 5].
Reed-Solomon codes [10, 11] offer the best recovery capability for block codes, since they belong to the class of maximum distance separable (MDS) codes. Nevertheless, they require a considerable computational cost that can limit their use in real-time communications at the application layer [12].
XOR-based codes are largely used in AL-FEC schemes, in particular the interleaved ones proposed by the Pro-MPEG forum in its COP 3 [13], where media packets are organized in matrices, and recovery packets are generated applying XOR operations by columns (in some cases by rows as well). The recovery capability depends on the interleaving matrix dimensions. This type of scheme is particularly useful in the case of bursty losses, since recovery packets have not been generated from consecutive data packets. The main limitation of these FEC schemes is the rigid structure of the interleaving matrix.
This paper only considers those FEC codes which are open source and deliberately leaves out patented codes (e.g., fountain codes). More specifically, we focus on LDPC codes [14], since they can recover multiple (bursty or single) losses, as the data symbols used to generate each redundant symbol are not constrained in a fixed structure, as is the case of interleaved codes. On the other hand, comparing LDPC codes with Reed-Solomon ones, although LDPC codes are sub-optimal in terms of recovery capabilities [12], they require a lower computational cost. Indeed, they need linear or quasi-linear encoding/decoding complexity [15]. This characteristic is very useful in multicast transmission scenarios with different types of receivers, including those with limited computational capability.
LDPC codes are suited for channels where losses occur following a uniform distribution of probability, and each loss is independent from all the other ones, i.e., memoryless channels [16]. Moreover, LDPC codes are defined as large block codes [17], since their robustness increases with the number of information packets involved. Nevertheless, using a large number of information packets implies an increase in the latency, which may be inconvenient for real-time applications.
In our work, we are interested in applying this type of codes to channels with memory, that is, where losses occur in bursts, since IP networks are characterized by this type of behavior. In addition, we consider codes that involve a small number of information packets in an attempt to reduce the required latency. Hence, our first contribution in this paper is an analysis to a priori evaluate the recovery capability of an LPDC code under these conditions. The structure of an LDPC code is defined by a randomly generated parity matrix that identifies which packets are involved in the generation of each FEC packet. As this is a stochastic process, these matrices might not be uniformly robust, hence our approach is capable of assessing those parts of the parity matrix that are weaker against bursty losses and those parts that are stronger. Once the different parts of the parity matrix are outlined, we propose a second algorithm to modify the weakest parts with the aim of improving overall recovery capabilities for channels with memory. Moreover, although our approach is based on giving a new structure to a randomly generated LDPC code, we preserve the intrinsic characteristics of the original LDPC code in order to keep the same decoding algorithm at the receiver.
In the literature, we can find several approaches that use this family of codes in scenarios with channels with memory. In this sense, the authors in [18] propose a technique that allows to construct an LDPC matrix intended for burst erasure correction, using a superposition scheme that consists in replacing the entries of a base matrix H _{base} with binary matrices called superposition matrices [19]. Each 0 entry is replaced by a 0’s superposition matrix, while each 1 entry is replaced by a circulant or permutation matrix. The recovery capability depends on the characteristics of the selected permutation matrices. As a simpler alternative, we propose to create an H matrix using classical pseudo-random algorithms, easy to find in the literature, and afterwards modify H in order to make it more robust against bursts of lost packets. This is done by means of a novel characterization of its recovery capability in bursty channels. Another approach for creating the parity matrix is presented in [20]. They propose two algebraic methods for the systematic construction of quasi-cyclic LDPC codes. However, they evaluate their recovery performances for very large values of blocks, while in our approach, we consider a significantly smaller value.
In other works [21, 22], it is also proposed to modify the parity matrix using a column permutation algorithm. The authors propose different metrics to estimate the recovery capabilities of the parity matrix. Again, these works consider a larger number of information packets than that of our approach.
On the other hand, the authors in [17, 23, 24] propose to randomize the order of the transmission of the packets of the stream. This technique allows to decorrelate the packets affected by bursts and reaches good results for a high number of blocks. On the contrary, for low values of this parameter, our results show that our modified matrices perform better in bursty channels.
Other works address the application of LDPC to bursty channels, focusing on alternative more complex decoding algorithms, like those in [25, 26], or encoding algorithms, like the one in [27], as a mean to recover from error bursts.
The paper is organized as follows: in Section 2, we describe the main characteristics of LDPC codes. In Section 3, LDPC codes for packetized stream are presented. In Section 4, we assess the performance of the proposed LDPC scheme through experimental results. Finally, in Section 5, we present our conclusions.
2 LDPC codes
2.1 An introduction to LDPC codes
LDPC codes were introduced by Gallager [14]. However, they remained unused for more than 30 years, until Mackay and Neal rediscovered them [28]. They belong to the class of linear block codes, which are defined by parameters k, the number of symbols of a data vector u, and n, the number of symbols of a code vector c. Thus, the number of redundancy (or parity) bits is n−k, which, in the case of a systematic code, they are added to the k bits of a data vector. Another important parameter is represented by the rate code, R=k/n, that is inversely proportional to the added redundancy.
As other linear block codes, an LDPC code is defined by its parity-check matrix H of dimensions n−k×n, whose entries are exclusively 1’s and 0’s.
The parity-check matrix is so named because it provides n−k parity check equations that generate constraints between data bits and parity bits. Moreover, an LDPC code is defined as a linear block code for which the parity-check matrix H is very sparse, which means a low density (LD) of 1’s. In the literature, several algorithms to construct H are presented [15, 23, 28].
This approach is based on the use of the Gauss-Jordan elimination [29, 30].
On the other hand, matrix H can alternatively be represented as a bipartite graph (also known as Tanner Graph). The graph is formed by code nodes and check nodes and it associates a parity-check equation to each check-node. The number of edges that come out from y _{ i } and c _{ j } defines the degree of the node.
Other important parameters of LDPC codes are the number of 1’s in each column, w _{ c }, and the number of 1’s in each row, w _{ r }. The first one, w _{ c }, indicates the degree of the code nodes, and the second one, w _{ r }, corresponds to the degree of the check nodes. Taking into account these parameters, an H matrix is defined as low density when w _{ c }<<n−k and w _{ r }<<k.
Otherwise, the LDPC code is called irregular [31]. In this paper, we consider only the regular version of these codes, since we are interested in having a fixed number of data packets that generate each FEC packet.
3 Small block LDPC codes in low-latency memory channels
3.1 Protection scheme
In a typical video transmission model based on IP/UDP/RTP protocols, the encoded video stream is encapsulated in RTP media packets that, in turn, are encapsulated in UDP. Since the typical maximum transmission unit (MTU) is 1500 bytes, we assume this as the fixed size of data packet. Since this is a design system parameter, the latency introduced by our algorithm only depends on the parameters k and n.
Our protection system works at the application layer, and it follows the architecture presented in the FEC framework [9]. This means that two RTP instances are generated: one for the source packets and another one for the repair packets (RTP-FEC packets). Thus, an RTP-FEC packet contains an RTP header of its own, and the redundancy data for the RTP source header and its payload. The information protecting header and protecting payload media data is generated by applying the FEC code across the RTP source packets. As an example, in [32], the structure of the FEC packet employed for the Reed-Solomon-based approach is very similar to the structure of our FEC packets.
where the edges that link parity nodes to check nodes are not considered in w _{ c } and w _{ r }.
3.2 Low-density burst-oriented generator matrix
As said before, it is not possible to exactly compute the a priori recovery capability of this family of codes from the value of the parameters k and n. For this reason, we have designed an algorithm that evaluates the global recovery capability of a randomly generated LDGM code for a bursty channel.
This algorithm firstly estimates the contribution of each column of the matrix H to the global recovery capability of the LDGM code (see Section 3.2.1). With that measurement, we are able to identify those parts of the parity matrix that are more sensitive to bursty losses and those parts that are stronger. Moreover, aggregating the values of all the columns of matrix H, we obtain a global measurement of the recovery capability of the matrix.
Finally, taking into account sensitive parts and strong parts, in a second step, our algorithm modifies them with the aim of improving the general recovery capability of the LDGM code keeping its intrinsic parameters, k, n, w _{ c }, and w _{ r }.
3.2.1 3.2.1 Column-based recovery measurement for matrix H
We propose the use of a simplified model to estimate this measurement. We assume that only a single burst can occur per block of k packets. Note that, for low values of packet error rate (PER), this assumption is reasonable for small values of k, as shown in [33].
where \({B^{l}_{j}}\) is a burst of length l, l∈(2,n−k), starting in packet j, j∈(0,k−1), and FEC(·) indicates whether the lost packets have been recovered by the LDGM code (FEC(·)=1) or not (FEC(·)=0).
Hence, our algorithm is able to characterize the recovery capability of H in a column-based manner. We tag as the weakest parts of H matrix those columns that have a low value of CRM, whereas the strongest parts are represented by the columns that achieve a high value of CRM.
3.2.2 3.2.2 Global recovery measurement
The higher GRM(H) is, the higher recovery capability a given matrix H has.
3.2.3 3.2.3 Burst-oriented modifying algorithm
Once the weakest and the strongest parts of the matrix H are identified, the following step of our algorithm consists in identifying the global minimum of CRM(j) of H (CRM _{ min }(j)), that is a minimum of recovery capability in the matrix.
The objective is to increase the value of CRM _{ min }(j) with the aim of improving the global recovery capability of the matrix, that is, increasing the value of GRM(H). This operation is performed by a local analysis around column j. For that purpose, a burst of lost packets that begins in j and has an arbitrary length l is considered in order to test how it affects the recovery capability of matrix H. This means that the algorithm considers a sub-matrix within H, that starts in column j and terminates in column (j+l−1), and checks which rows have more than one packet affected by the burst. Those rows are useless to recover lost packets, since each row is able to recover just one lost packet. Therefore, the algorithm aims at modifying the equations defined by H in order to be able to recover the packets affected by the artificial burst.
In detail, the algorithm moves the second 1 entry of Eq. 2 to Eq. 1 (generically, from row A to row B), in order to employ the packet j+2 in the generation of the second FEC packet, as shown in Fig. 6. In this new case, the updated LDGM code is able to solve Eqs. 1, 2, and 4 during the first iteration of the decoding algorithm. This means that packets j+2, j, and j+3 can be recovered, since there is only a lost packet per row. In the second iteration, it is possible to solve Eq. 0 (packets j and j+3 are already known) recovering packet j+1. The algorithm operates this type of changes in the sub-matrix of H that starts in column j, where CRM _{ min } is situated, until column j+l, with l defined by the characteristics of the bursty channel.
Main steps of burst-oriented modifying algorithm
1. Find the global minimum of CRM(j), CRM _{ min }(j); |
2. Define a window within H that has as first column the corresponding column of CRM _{ min }(j), the same number of rows of H, and a predefined number of columns l (a window of columns); |
3. Solve the equations system H without the packets (variables) used in the sub-matrix of the global minimum; |
4. Point out which equations (rows) cannot be solved; |
5. Move the 1 entry belonging to an equation unsolved (row A) in the sub-matrix of the global minimum to another equation (row B). Row B is a row that does not loose its recovery capability with this change. The objective is to solve the equations system (as in the example in Fig. 6 where row A is the third one, and row B is the second one); |
6. Find the global maximum of CRM(j), CRM _{ max }(i); |
7. Define a new sub-matrix that starts in the column of the global maximum and has the same dimensions of the previous matrix; |
8. Move 1 entry from row B to row A, in order to preserve w _{ r } for all the columns of H. |
Finally, it is meaningful to underline that the decoding operations are based on a simple iterative algorithm: given a set of linear equations, if one of them has only one unknown variable, then its value is that of the constant term. This variable is replaced in all remaining linear equations, and the algorithm reiterates. Hence, several unknown variables can be found by the recursive algorithm. Our modifying algorithm does not modify the original iterative decoding algorithm, since the modified generator matrix is known both at encoder and decoder.
4 Simulations and results
4.1 Design parameters
A crucial aspect in the configuration of any channel code is the appropriate selection of parameters k and n according to the characteristics of the communications channel used. In our approach, the choice of these parameters is determined, on the one hand, by statistical characteristics of the channel, and, on the other hand, by the imposed minimum code rate. The aim of this choice is to guarantee the best achievable recovery capability with the lower added redundancy.
The selection of k is particularly relevant because its value directly affects the latency generated at the receiver, becoming a problem in the case of time-sensitive services, such as videoconference. Thus, it is very useful to employ low values for this parameter. In that sense, the approach in [33] employs an interleaving protection scheme with k=80 and is able to recover bursts of up to 20 packets. These values depend also on the rate of the provided services. A typical value proposed for bitrates of about 10 Mbps and for XOR-based interleaved systems is about k=100 [13].
Regarding n, this parameter determinates the amount of added redundancy and the recovery capability. Typical reasonable values are those that achieve a redundancy rate about 15 and 20 % of the total information [33]. Moreover, it is important to underline that in this work, we focus on very low values of k (and n). Whereas in literature, very high values of k are mostly proposed, in our scheme n = 100 and k = 80.
4.2 Transmission channel
The main statistical characteristics of the considered channels are represented by two values: the PER and the average burst length (L _{ m }).
4.3 Simulations
4.3.1 4.3.1 Analysis of the recovery capability of LDBOGM codes
In order to provide a comprehensive evaluation of LDBOGM matrices, we have firstly generated 50 different matrices using the classical stochastic algorithm in [35] and in [36], keeping n, k, and w _{ c } fixed to values determined in Section 4.1. Every LDGM matrix has been modified using our algorithm, and a corresponding LDBOGM matrix has been generated. Afterwards, for each pair of matrices (original and modified), we have evaluated the recovery capability in a set of experiments. We have done it through the ratio of recovered packets with respect to lost packets.
The experiments have consisted in simulating the transmission of an RTP media stream together with its corresponding FEC stream. The recovery capability is calculated after a total amount of 2000 blocks of k transmitted packets, in order to achieve statistically relevant results.
We have carried out experiments for four different channels as representative of the conditions of wired and wireless networks not only in a normal context but also in congested channels [33, 37–39]. In particular, we have considered channels with two different average burst lengths, L _{ m }= 5 and L _{ m }=10, and two values of PER, 1 and 5 %.
Recovery capability of LDBOGM
L _{ m }=5 | L _{ m }=5 | L _{ m }=10 | L _{ m }=10 | |
---|---|---|---|---|
PER =1 % | PER =5 % | PER =1 % | PER =5 % | |
Max. | 90 % | 72.5 % | 67 % | 50 % |
Min. | 81 % | 67 % | 52 % | 42 % |
Average | 85 % | 70 % | 58 % | 44 % |
Recovery capability of original LDGM
L _{ m }=5 | L _{ m }=5 | L _{ m }=10 | L _{ m }=10 | |
---|---|---|---|---|
PER =1 % | PER =5 % | PER =1 % | PER =5 % | |
Max. | 87 % | 71 % | 63 % | 45 % |
Min. | 77 % | 62 % | 49 % | 35 % |
Average | 83 % | 67 % | 55 % | 41 % |
Moreover, we consider a scenario where the modification of the matrix is done off-line. Nevertheless, it is interesting to outline that, given k=80, n=100, and w _{ c }=3 (values used in the simulations), the refinement time, calculated as the average time for 50 matrices, is 69.1476 ms. Whereas, the original H matrix creation time is 0.0615 ms. The time measurements are implemented in C++, and they have been carried out in a PC with an Intel Core i7-3540 @ 3 GHz.
4.3.2 4.3.2 Comparative results
To assess the effectiveness of our approach, we have selected the modified matrix that has obtained the best average recovery capabilities in the analysis presented in the previous section (LBOGM) and compared it with: (i) the original matrix, (ii) an XOR-based 2D interleaved code, with 10 columns and 8 rows (identified by Interleaving), and, finally, (iii) a Reed-Solomon scheme, based on the inter-packet approach with m=4 and n=60 proposed in [40] (identified by Reed-Solomon).
The experiments have been carried out following the same methodology described in the previous section, but the evaluation has been extended to a much larger set of channel models. In this sense, we have considered a PER ranging from 0.1 to 20 %, and the average burst length has been extended up to L _{ m }=20. The reason is that in our estimations, burst lengths from 2 to 20 packets are considered. The actual used values are the following: L _{ m }= 5, 10, 15, and 20 and PER =0.1, 1, 5, 10, 15, and 20 %.
4.3.3 4.3.3 Complexity analysis: LDBOGM code vs. Reed-Solomon codes
In this section, we show that, although Reed-Solomon codes perform better, our LDBOGM code has better computing performance.
In [41], the authors show that Reed-Solomon codes may have a good performance in terms of complexity requirements, when carefully designed. In this sense, the authors refer to RFC 5510 [42], where the encoding complexity, in the case of the pre-computation of the generator matrix, involves k operations per repair element (vector-matrix multiplication). For the LDGM codes, considered in this paper, the number of operations equals w _{ r }−1, which is far lower than k.
Moreover, regarding the decoding process, in [41], the authors state that, although the decoding speeds are reasonable or high for Reed-Solomon codes, when it comes to small blocks, they are still lower than those of an LDPC-staircase code, which in turn are more complex than the ones used in this work.
Encoding time for Reed-Solomon codes and LDBOGM codes
LDBOGM | Reed-Solomon | Performance gain |
---|---|---|
0.009 ms | 0.048 ms | 81 % |
Decoding time for Reed-Solomon codes and LDBOGM codes, PER =1 %
L _{ m }=5 | L _{ m }=10 | L _{ m }=15 | L _{ m }=20 | |
---|---|---|---|---|
LDBOGM | 4.535 ms | 6.152 ms | 5.891 ms | 7.862 ms |
Reed-Solomon | 8.950 ms | 9.910 ms | 12.734 ms | 10.623 ms |
Performance gain | 49 % | 38 % | 54 % | 26 % |
As can be observed, in both cases (encoding and decoding) gains in terms of computing time have been obtained using the LDBOGM code: 81 % for the encoding time, from 26 % up to 54 % for the decoding time.
5 Conclusions
In this paper, we have proposed an algorithm, the burst-oriented modifying algorithm, that allows boosting the recovery capability of LDPC codes against bursty packet losses, in contrast to the original randomly generated H matrix, which is oriented to memoryless channels.
Moreover, in this work, we use small values of k (small information blocks), in order to fulfil low transmission latency requirements for time-sensitive communications.
Our approach is based on a novel analysis that evaluates the recovery capability of each part of matrix H, with the aim of finding the weakest and strongest parts against bursts of lost packets. This analysis has been made by defining a local parameter, the CRM, column-based recovery measurement, and a global parameter, the GRM(H), global recovery measurement.
Once the different parts of the matrix H are identified (minima and maxima of CRM), the second step of our algorithm is to modify the weakest parts of the matrix H in order to make these parts stronger against bursts of lost packets, with the aim of improving the GRM(H) value.
Finally, in order to assess the effectiveness of our algorithm, we have carried out two types of experimental tests. The first one consists in the generation of 50 different LDGM matrices, which have been modified using our algorithm to generate the corresponding LDBOGM matrices. Afterwards, we have evaluated the recovery capability for each pair of matrices (original and modified) for four different bursty channels in an RTP transmission. We have demonstrated that LDBOGMs obtain better results in almost all the experiments. In the second test, we have selected the modified matrix that has obtained the best average recovery capabilities in the analysis presented in the previous section (LBOGM) and compared it with (i) the original matrix, (ii) an XOR-based interleaved code, and (iii) a Reed-Solomon scheme. After a simulated RTP transmission in 24 different bursty channels, we state that our algorithm outperforms the classical LDGM codes and the interleaving XOR-based scheme. In addition, the recovery capabilities of the LDBOGM code approaches the values reached by the Reed-Solomon codes in some cases.
Declarations
Acknowledgements
This work has been partially supported by the Ministerio de Economía y Competitividad of the Spanish Government under projects TEC2010-20412 (Enhanced 3DTV), IPT-2012-0306-430000 (Videocells), and TEC2013-48453 (MR-UHDTV).
Authors’ Affiliations
References
- KR Rao, ZS Bojkovic, DA Milovanovic, Multimedia communication systems: techniques, standards, and networks (Prentice Hall PTR, Upper Saddle River, NJ, USA, 2002).Google Scholar
- Mvd Schaar, PA Chou, Multimedia over IP and wireless networks: compression, networking, and systems (Academic Press, Inc., Orlando, FL, USA, 2007).Google Scholar
- A Talari, S Kumar, N Rahnavard, S Paluri, J Matyjas, Optimized cross-layer forward error correction coding for H.264 AVC video transmission over wireless channels. EURASIP J. Wireless Commun. Netw. 2013(1) (2013).Google Scholar
- K Matsuzono, J Detchart, M Cunche, V Roca, H Asaeda, in Local Computer Networks (LCN), 2010 IEEE 35th Conference On. Performance analysis of a high-performance real-time application with several AL-FEC schemes (IEEE,Denver, CO, USA, 2010), pp. 1–7.Google Scholar
- M Luby, T Stockhammer, M Watson, IPTV systems, standards and architectures: part II—application layer FEC in IPTV services. Comm. Mag. 46(5), 94–101 (2008).View ArticleGoogle Scholar
- H Schulzrinne, S Casner, R Frederick, V Jacobson, RTP: a transport protocol for real-time applications. Technical report, RFC 3550 (2003). http://www.ietf.org/rfc/rfc3550.txt.
- C Lamoriniere, A Nafaa, L Murphy, in Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE. Dynamic switching between adaptive FEC protocols for reliable multi-source streaming (IEEE,Honolulu, HI, USA, 2009), pp. 1–6.Google Scholar
- M-F Tsai, T-C Huang, C-K Shieh, K-C Chu, Dynamical combination of byte level and sub-packet level FEC in HARQ mechanism to reduce error recovery overhead on video streaming over wireless networks. Comput. Netw. 54(17), 3049–3067 (2010).View ArticleMATHGoogle Scholar
- M Watson, A Begen, V Roca, Forward error correction (FEC) framework. Techn. report. RFC 6363 (2011). http://www.ietf.org/rfc/rfc6363.txt.
- SB Wicker, Reed-Solomon codes and their applications (IEEE Press, Piscataway, NJ, USA, 1994).Google Scholar
- L Rizzo, Effective erasure codes for reliable computer communication protocols. ACM SIGCOMM Comput. Commun. Rev. 27(2), 24–36 (1997).View ArticleGoogle Scholar
- A Nafaa, T Taleb, L Murphy, Forward error correction strategies for media streaming over wireless networks. Commun. Mag. IEEE. 46(1), 72–79 (2008).View ArticleGoogle Scholar
- P-M Forum, Transmission of professional MPEG-2 transport streams over IP networks. Code of practice #3 release 2, Pro-Meg Forum (July 2004) http://www.pro-mpeg.org/documents/wancop3.pdf.
- RG Gallager, Low-density parity-check codes. Inf. Theory, IRE Trans. 8(1), 21–28 (1962).MathSciNetView ArticleMATHGoogle Scholar
- TJ Richardson, RL Urbanke, Efficient encoding of low-density parity-check codes. Inf. Theory IEEE Trans. 47(2), 638–656 (2001).MathSciNetView ArticleGoogle Scholar
- A Bennatan, D Burshtein, On the application of LDPC codes to arbitrary discrete-memoryless channels. Inf. Theory IEEE Trans. 50(3), 417–438 (2004).MathSciNetView ArticleMATHGoogle Scholar
- V Roca, Z Khallouf, J Laboure, in Fifth International Workshop on Networked Group Communication (NGC’03). Design and evaluation of a low density generator matrix (LDGM) large block FEC codec (Springer Berlin Heidelberg,Honolulu, HI, USA, 2003).Google Scholar
- SJ Johnson, Burst erasure correcting LDPC codes. Commun. IEEE Trans. 57(3), 641–652 (2009).View ArticleGoogle Scholar
- J Xu, L Chen, L Zeng, L Lan, S Lin, Construction of low-density parity-check codes by superposition. IEEE Trans. Commun. 53(2), 243–251 (2005).View ArticleGoogle Scholar
- YY Tai, L Lan, L Zeng, S Lin, KAS Abdel-Ghaffar, Algebraic construction of quasi-cyclic LDPC codes for the AWGN and erasure channels. Commun. IEEE Trans. 54(10), 1765–1774 (2006).View ArticleGoogle Scholar
- G Hosoya, H Yagi, T Matsushima, S Hirasawa, A modification method for constructing low-density parity-check codes for burst erasures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci.E89-A(10), 2501–2509 (2006).View ArticleGoogle Scholar
- E Paolini, M Chiani, Construction of near-optimum burst erasure correcting low-density parity-check codes. Commun. IEEE Trans. 57(5), 1320–1328 (2009).View ArticleGoogle Scholar
- V Roca, C Neumann, D Furodet, Low density parity check (LDPC) staircase and triangle forward error correction (FEC) schemes. Tech. report, RFC 5170 (2008).Google Scholar
- V Roca, C Neumann, Design, evaluation and comparison of four large block FEC codecs, LDPC, LDGM, LDGM Staircase and LDGM Triangle, plus a Reed-Solomon small block FEC codec. Rapport de recherche RR-5225, INRIA (2004). http://hal.inria.fr/inria-00070770.
- M Fossorier, in Information Theory, 2006 IEEE International Symposium On. Universal burst error correction (IEEE,Seattle, WA, USA, 2006), pp. 1969–1973.Google Scholar
- M Fossorier, Hybrid burst erasure correction of LDPC codes. Commun. Lett. IEEE. 13(4), 260–261 (2009).View ArticleGoogle Scholar
- E Martinian, C-EW Sundberg, Burst erasure correction codes with low decoding delay. Inf. Theory IEEE Trans. 50(10), 2494–2502 (2004).MathSciNetView ArticleMATHGoogle Scholar
- DJC MacKay, Good error-correcting codes based on very sparse matrices. Inf. Theory IEEE Trans. 45(2), 399–431 (1999).MathSciNetView ArticleMATHGoogle Scholar
- A Shokrollahi, LDPC codes: an introduction, 2 (2003).Google Scholar
- W Ryan, An introduction to LDPC codes (2003). http://www.telecom.tuc.gr/~alex/papers/ryan.pdf.
- TJ Richardson, MA Shokrollahi, RL Urbanke, Design of capacity-approaching irregular low-density parity-check codes. IEEE Trans. Inf. Theory. 47(2), 619–637 (2001).MathSciNetView ArticleMATHGoogle Scholar
- M Mazzotti, E Paolini, M Chiani, B Gadat, C Bergeron, R Fracchia, in Vehicular Technology Conference (VTC Spring), 2011 IEEE 73rd. Analysis of packet-level forward error correction for video transmission (IEEE,Yokohama, Japan, 2011), pp. 1–5.Google Scholar
- C Diaz, J Cabrera, F Jaureguizar, N Garcia, A video-aware FEC-based unequal loss protection system for video streaming over RTP. IEEE Trans. Consum. Electron. 57(2), 523–531 (2011).View ArticleMATHGoogle Scholar
- Network model for evaluating multimedia transmission performance over internet protocol. Technical report, ITU-T Recommendation G.1050 (November 2007). http://www.telecom.tuc.gr/~alex/papers/ryan.pdf.
- V Roca, C Neumann, M Cunche, J Laboure, LDPC-Staircase/LDPC-Triangle/LDGM Codec Reference Implementation. http://planete-bcast.inrialpes.fr.
- OpenFEC Project. http://openfec.org.
- V Miguel, J Cabrera, F Jaureguizar, N Garcia, in IEEE International Conference on Consumer Electronics (ICCE), 2011. High-definition video distribution in 802.11g home wireless networks (IEEE,Las Vegas, NV, USA, 2011), pp. 211–212.Google Scholar
- C Diaz, J Cabrera, F Jaureguizar, N Garcia, in Visual Communications and Image Processing (VCIP), 2012 IEEE. Adaptive protection scheme for MVC-encoded stereoscopic video streaming in IP-based networks (IEEE,San Diego, CA, USA, 2012), pp. 1–6.Google Scholar
- AC Begen, in Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE. Error control for IPTV over XDSL networks (IEEE,Las Vegas, NV, USA, 2008), pp. 632–637.Google Scholar
- F Casu, J Cabrera, F Jaureguizar, N Garcia, in IEEE Symposium on Computers and Communications (ISCC), 2011. Inter-packet symbol approach to Reed-Solomon FEC codes for RTP-multimedia stream protection (IEEE,Kerkyra, Greece, 2011), pp. 49–54.Google Scholar
- V Roca, M Cunche, C Thienot, J Detchart, J Lacan, in Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference On. RS LDPC-Staircase codes for the erasure channel: standards, usage and performance (IEEE,Lyon, France, 2013), pp. 638–644.Google Scholar
- J Lacan, V Roca, J Peltotalo, S Peltotalo, Reed-Solomon forward error correction (FEC) schemes. Technical Report 5510 (April 2009). Internet Engineering Task Force. http://www.ietf.org/rfc/rfc5510.txt.
- Schifra Reed-Solomon error correcting code library. www.schifra.com.
Copyright
This is an Open Access article distributed under the terms of the Creative Commons Attribution License(http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.