US20140075269A1 - Method for Optimizing the Forward Error Correction Scheme - Google Patents
Method for Optimizing the Forward Error Correction Scheme Download PDFInfo
- Publication number
- US20140075269A1 US20140075269A1 US13/830,458 US201313830458A US2014075269A1 US 20140075269 A1 US20140075269 A1 US 20140075269A1 US 201313830458 A US201313830458 A US 201313830458A US 2014075269 A1 US2014075269 A1 US 2014075269A1
- Authority
- US
- United States
- Prior art keywords
- packets
- fec
- packet
- data packets
- recovering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000005540 biological transmission Effects 0.000 claims abstract description 14
- 238000011084 recovery Methods 0.000 description 7
- PCTMTFRHKVHKIS-BMFZQQSSSA-N (1s,3r,4e,6e,8e,10e,12e,14e,16e,18s,19r,20r,21s,25r,27r,30r,31r,33s,35r,37s,38r)-3-[(2r,3s,4s,5s,6r)-4-amino-3,5-dihydroxy-6-methyloxan-2-yl]oxy-19,25,27,30,31,33,35,37-octahydroxy-18,20,21-trimethyl-23-oxo-22,39-dioxabicyclo[33.3.1]nonatriaconta-4,6,8,10 Chemical compound C1C=C2C[C@@H](OS(O)(=O)=O)CC[C@]2(C)[C@@H]2[C@@H]1[C@@H]1CC[C@H]([C@H](C)CCCC(C)C)[C@@]1(C)CC2.O[C@H]1[C@@H](N)[C@H](O)[C@@H](C)O[C@H]1O[C@H]1/C=C/C=C/C=C/C=C/C=C/C=C/C=C/[C@H](C)[C@@H](O)[C@@H](C)[C@H](C)OC(=O)C[C@H](O)C[C@H](O)CC[C@@H](O)[C@H](O)C[C@H](O)C[C@](O)(C[C@H](O)[C@H]2C(O)=O)O[C@H]2C1 PCTMTFRHKVHKIS-BMFZQQSSSA-N 0.000 description 2
- 201000004223 Reis-Bucklers corneal dystrophy Diseases 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- DTCAGAIFZCHZFO-UHFFFAOYSA-N 2-(ethylamino)-1-(3-fluorophenyl)propan-1-one Chemical compound CCNC(C)C(=O)C1=CC=CC(F)=C1 DTCAGAIFZCHZFO-UHFFFAOYSA-N 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/29—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
- H03M13/2906—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes using block codes
- H03M13/2909—Product codes
- H03M13/2915—Product codes with an error detection code in one dimension
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/37—Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
- H03M13/373—Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35 with erasure correction and erasure determination, e.g. for packet loss recovery or setting of erasures for the decoding of Reed-Solomon codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0041—Arrangements at the transmitter end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0045—Arrangements at the receiver end
- H04L1/0047—Decoding adapted to other signal detection operation
- H04L1/005—Iterative decoding, including iteration between signal detection and decoding operation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0057—Block codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/004—Arrangements for detecting or preventing errors in the information received by using forward error control
- H04L1/0056—Systems characterized by the type of code used
- H04L1/0064—Concatenated codes
- H04L1/0066—Parallel concatenated codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
- H04N19/61—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding in combination with predictive coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2383—Channel coding or modulation of digital bit-stream, e.g. QPSK modulation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
Definitions
- the present invention relates to the field of data packet recovering methods. More particularly, the invention relates to a method for reorganizing and optimizing the Forward Error Correction (FEC) scheme in order to achieve a more efficient data packet recovery method while reducing the total overhead of the additional recovery packets.
- FEC Forward Error Correction
- the FEC scheme requires adding a fixed percentage of additional packets to a block of data packets such that the loss of one or more data packets in the block, within some predetermined bound, can be recovered by combining the FEC packets with those data packets that had been successfully received in order to reconstruct the missing data packets.
- the FEC scheme potentially provides a low-latency method for effectively correcting and recovering lost packets especially in situations where the transmission is undirectional from one source to numerous destinations.
- the FEC scheme is defined in Pro-MPEG Code of Practice #3 release 2 July 2004 “Transmission of Professional MPEG Transport Streams over IP Networks”.
- the encoder i.e. transmitter
- the decoder i.e. receiver
- XOR is chosen as the error correcting function for FEC, which is computationally very easy to implement.
- a XOR function is applied to a sequence of four data packets in order to yield a fifth packet “R”:
- variable packet loss rates and variable bit rates coupled with the need to minimize latency, present an even greater challenge to the implementation of FEC schemes for protecting the data packets. Therefore, the selected FEC scheme, which augments a media stream with redundant data, should be designed to help restore stream integrity based upon anticipated levels of packet loss.
- the FEC scheme which groups data packets into a FEC block, produces FEC packets which are said to cover the data packets in that block, since missing data packets can be restored by combining the remaining data packets and FEC packets in that block.
- FEC coverage the number of missing data packets that the FEC scheme can recover within the same block, is limited to the number of FEC packets within that block. Therefore, a method is needed for arranging the FEC data packet blocks in order to achieve a reliable packet recovery method without burdening the system with a massive overhead.
- the simple and na ⁇ ve method for using the FEC scheme suggests protecting every few consecutive packets with a FEC packet.
- packet loss due to burst has a high probability of losing a number of consecutive packets, which in this case, may not be recoverable by the protecting FEC packet.
- FIG. 1 a illustrates another prior art method for using the FEC scheme.
- This method suggests protecting each block of packets having a constant gap between them with a FEC packet.
- the total batch of data packets may be divided into fixed rows of predefined number, whereas the FEC packets are designed each to protect a column.
- k Base
- the receiver is able to recover them using the five FEC packets.
- this method is capable of recovering only one lost packet in each column.
- FIG. 1 b illustrates such a case where the highlighted packets are lost and there is no way of recovering them using this prior art method, as some of the columns have more than one lost packet.
- US 2006/0029065 discloses a FEC encoding system and method optimized fur protecting real-time audio-video streams for transmission over packet-switched networks with minimal latency.
- the disclosed system and method provide a low-latency FEC scheme for both variable and constant bit-rate MPEG-encoded audio and video streams.
- the disclosed method sorts packets by content type and aggregates them into FEC blocks weighted by sensitivity in the recovered stream to packet loss of a particular content type.
- the described method and system is very complicated and requires the knowledge and identification of the data packets contents.
- the present invention relates to a method for optimizing the FEC scheme comprising the steps of: (a) receiving a batch of data packets designated for transmission; (b) choosing a number of divisors having no common denominators in accordance with the said batch of data packets; (c) organizing into blocks said batch of data packets a number of times in accordance with the number of divisors using said divisors; and (d) creating a FEC packet for each of said blocks.
- the method further comprises the steps of: (e) transmitting the designated batch of data packets together with the created FEC packets to a receiver; and (f) recovering lost data packets of said designated batch using said created FEC packets at said receiver.
- the divisors are 5, 7, and 9.
- the divisors are 5, 6, and 7.
- FIG. 1 a illustrates a prior art method for using the FEC scheme.
- FIG. 1 b illustrates a prior art method for using the FEC scheme.
- FIG. 2 is a table illustrating an example of 100 data packets and their corresponding FEC packets according to another method of a prior art.
- FIG. 3 is a table illustrating an example of the same batch of 100 data packets organized in 3 various constellations, and their corresponding FEC packets according to an embodiment of the invention.
- FIG. 4 is another table illustrating an example of 100 data packets, and their corresponding FEC packets according to the method of the prior art.
- FIG. 5 is another table illustrating an example of 100 data packets, and their corresponding FEC packets according to an embodiment of the invention.
- FEC Forward Error Correction
- the term Forward Error Correction (FEC) scheme is used hereinafter to describe an error correction method for data transmission, in which the transmitter sends redundant data packets to a receiver or a number of receivers, for recovering errors in the data flow.
- the FEC scheme may be used for finding errors in the received data packets, correcting errors in the received data packets, or for replacing lost data packets.
- the FEC is also defined in Pro-MPEG Code of Practice #3 release 2 Jul. 2004 “Transmission of Professional MPEG-2 Transport Streams over IP Networks”.
- the error correcting function chosen for FEC is XOR which is computationally very easy to implement.
- the XOR function applied to a sequence of 4 data packets yields a FEC packet “R”:
- each FEC packet since each FEC packet is able to recover only one packet in the sequence it protects, the smaller the amount of data packets in the protected sequence, the better the protection of the FEC scheme for error recovery.
- a FEC packet may be added for each data packet.
- the adding of FEC packets increases bandwidth overhead, which increases cost and latency.
- FIG. 2 is a table illustrating an example of 100 data packets and their corresponding FEC packets according to the method of a prior art.
- the 100 data packets are organized in 5 columns and 20 rows, where each row of data packets is protected by a FEC packet and each column of data packets is protected by a FEC packet, totaling 25 FEC packets.
- the FEC packets protecting the rows are signed as FEC and numbered accordingly.
- this method increases bandwidth overhead of 25%, it is widely used for recovering packet loss. For example, if the marked packets 42-47 are lost during the data flow, it is possible to recover these lost packets using the following steps:
- this prior art method cannot recover a larger amount of lost consecutive packets such as 42-48. Furthermore, this prior art method cannot recover lour packets sharing the same rows and columns such as, 43, 44, 48 and 49.
- FIG. 3 is a table illustrating an example of the same batch of 100 data packets organized in 3 various constellations, and their corresponding FEC packets according to an embodiment of the invention.
- These 3 organized constellations are merely a visual representation of the operations made on the same batch of data packets.
- the terms organize, organized, and organizing, are used hereinafter for visually, or conceptually, describing the operations made on a batch of data packets, although in reality no need arises for actually dividing and reorganizing the batch of data packets.
- the same batch of packets designated for transmission is organized in columns, i.e. divided into groups of packets, for 3 times, prior to transmission.
- the total amount of designated packets is organized in five columns, and a FEC packet is added for every column, meaning, that each column containing a sequence of 20 data packets is protected by one FEC packet.
- the same total amount of designated packets is organized in seven columns, and again a FEC packet is added for protecting each column of packets.
- packets 90 and 100 are not protected by a FEC as the total of 100 is not divisible by 7.
- the last two packets may be protected by the existing FEC packets, such as protecting packet 99 by FEC 6 and protecting packet 100 by FEC 7.
- the last two packets may be protected by the FEC packets of the next batch of packets.
- the same total amount of designated packets is organized in nine columns, and again a FEC packet is added for protecting each column of packets (since the total of 100 is not divisible by 9, the last packet may be protected as described before in relation to the second step).
- the total batch of data packets is divided, i.e. conceptually organized, into fixed rows of predefined number for 3 times, where the FEC packets are designed to protect a column each.
- transmission the batch of packets is sent together with the created FEC packets.
- the method of the invention requires only 3 iterations: firstly employing the FEC packets of the 9 ⁇ 11 arrangement, secondly employing the FEC packets of the 5 ⁇ 20 arrangement, and thirdly employing the FEC packets of the 7 ⁇ 14 arrangement.
- FIG. 4 is another table illustrating an example of 100 data packets, the highlighted lost packets, and their corresponding FEC packets according to the method of the prior art.
- the missing packets 31, 36, 37, 42, 43, 48, 49, 54, 55, and 60 form a stairway pattern.
- iterations In order to recover the lost packets 5 iterations must be made:
- FIG. 5 illustrates the method of the invention with the same lost packets and their corresponding FEC packets.
- 3 iterations are required:
- the order of the iterations is preset in order to minimize the number of iterations.
- the preset order may be to use the FEC packets of 9 ⁇ 11 arrangement first, then to use the FEC packets of 7 ⁇ 14 arrangement, and lastly to use the FEC packets of 5 ⁇ 20 arrangement.
- Other preset orders are possible as well.
- the numbers, i.e. divisors, for organizing and dividing the group of data packets into columns are 5, 6, and 7, which have no common denominator and increase the bandwidth overhead by only 18%.
- the invention may be carried out with different numbers. In any case, the invention is not limited in any way to a specific set of numbers.
- the described optimization of the FEC scheme requires that the numbers used for organizing and dividing a batch of data packets into columns cannot be too large, since that adds too many FEC packets, or too small, since that requires each FEC packet to protect too many data packets, and the chosen numbers cannot have common denominators, since the packets they protect will overlap. Furthermore, many combinations of numbers may be used for organizing the group of data packets into columns. The total group of data packets may be divided more than 3 times or less than 3 times. Therefore, the combination of numbers may contain more or less than 3 numbers having no common denominators, and may vary greatly according to the needs and requirements of the transmitted data packets.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- Probability & Statistics with Applications (AREA)
- Quality & Reliability (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
Abstract
The present invention relates to a method for optimizing the FEC scheme comprising the steps of: (a) receiving a batch of data packets designated for transmission; (b) choosing a number of divisors having no common denominators in accordance with the said batch of data packets; (c) organizing into blocks said batch of data packets a number of times in accordance with the number of divisors using said divisors; and (d) creating a FEC packet for each of said blocks.
Description
- The present invention relates to the field of data packet recovering methods. More particularly, the invention relates to a method for reorganizing and optimizing the Forward Error Correction (FEC) scheme in order to achieve a more efficient data packet recovery method while reducing the total overhead of the additional recovery packets.
- During streaming of video or audio data packets, random congestion may cause packet loss and jitter. Furthermore, the typical high sensitivity of video systems to variations in packet rate transmission also adds to the danger of degradation resulting from data congestion, potential overflow and the resulting packet loss. The data packets that are dropped and lost cause a gap in the video or audio streaming which is highly unacceptable and intolerable. In addition to contending with packet delivery problems, maintaining low latency is a critical constraint for video streaming.
- One of the methods used today for packet recovery of lost data packets is the forward Error Correction (FEC) scheme. The FEC scheme requires adding a fixed percentage of additional packets to a block of data packets such that the loss of one or more data packets in the block, within some predetermined bound, can be recovered by combining the FEC packets with those data packets that had been successfully received in order to reconstruct the missing data packets. The FEC scheme potentially provides a low-latency method for effectively correcting and recovering lost packets especially in situations where the transmission is undirectional from one source to numerous destinations.
- The FEC scheme is defined in Pro-MPEG Code of Practice #3 release 2 July 2004 “Transmission of Professional MPEG Transport Streams over IP Networks”. The encoder (i.e. transmitter) inserts FEC packets into the output stream and the decoder (i.e. receiver) uses those FEC packets to reconstruct missing packets in the data sequence it receives, where each FEC packet protecting a group of packets can help recover a single lost packet.
- In the standard, XOR is chosen as the error correcting function for FEC, which is computationally very easy to implement. In this example, a XOR function is applied to a sequence of four data packets in order to yield a fifth packet “R”:
- “R” has the ability to recover any one lost packet of the initial four packets it protects, such as recovering packet “A”:
- Nevertheless, inserting FEC packets into the stream introduces bandwidth overhead and implies latency, since the FEC can be calculated only after all the packets it protects have been produced. Therefore a very important parameter in configuring the FEC scheme is how many FEC packets are needed for protecting a selected hatch of data packets, and how to organize the protection of the FEC packets over the data packets.
- Variable packet loss rates and variable bit rates, coupled with the need to minimize latency, present an even greater challenge to the implementation of FEC schemes for protecting the data packets. Therefore, the selected FEC scheme, which augments a media stream with redundant data, should be designed to help restore stream integrity based upon anticipated levels of packet loss. The FEC scheme, which groups data packets into a FEC block, produces FEC packets which are said to cover the data packets in that block, since missing data packets can be restored by combining the remaining data packets and FEC packets in that block. FEC coverage, the number of missing data packets that the FEC scheme can recover within the same block, is limited to the number of FEC packets within that block. Therefore, a method is needed for arranging the FEC data packet blocks in order to achieve a reliable packet recovery method without burdening the system with a massive overhead.
- The simple and naïve method for using the FEC scheme suggests protecting every few consecutive packets with a FEC packet. However, packet loss due to burst has a high probability of losing a number of consecutive packets, which in this case, may not be recoverable by the protecting FEC packet.
-
FIG. 1 a illustrates another prior art method for using the FEC scheme. This method suggests protecting each block of packets having a constant gap between them with a FEC packet. In other words, the total batch of data packets may be divided into fixed rows of predefined number, whereas the FEC packets are designed each to protect a column. The payload of the kth FEC packet (out of the L) protects the D packets numbered k+nL (0≦n≦D−1), where the parameters k, L, D are transmitted in the header of each FEC packet (In the standard, L=Offset, D=NA, k=Base). As illustrated inFIG. 1 a an example of 100 data packets are divided into 20 rows, and 5 FEC packets are added, where each FEC packet protects 20 data packets assigned in a column (L=5, D=20). Thus, if the highlighted packets (i.e. 9, 22, 48, 75, and 91) are lost in the transmission, the receiver is able to recover them using the five FEC packets. However, this method is capable of recovering only one lost packet in each column.FIG. 1 b illustrates such a case where the highlighted packets are lost and there is no way of recovering them using this prior art method, as some of the columns have more than one lost packet. - US 2006/0029065 discloses a FEC encoding system and method optimized fur protecting real-time audio-video streams for transmission over packet-switched networks with minimal latency. The disclosed system and method provide a low-latency FEC scheme for both variable and constant bit-rate MPEG-encoded audio and video streams. To maximize bandwidth-efficiency and playable frame rate for recovered media streams, the disclosed method sorts packets by content type and aggregates them into FEC blocks weighted by sensitivity in the recovered stream to packet loss of a particular content type. However, the described method and system is very complicated and requires the knowledge and identification of the data packets contents.
- It is an object of the present invention to provide a method for re-organizing and optimizing the FEC scheme.
- It is another object of the present invention to provide a reliable packet recovery method using the FEC scheme.
- It is still another object of the present invention to provide a method that achieves a simple and reliable packet recovery method without burdening the system with massive bandwidth overhead.
- Other objects and advantages of the invention will become apparent as the description proceeds.
- The present invention relates to a method for optimizing the FEC scheme comprising the steps of: (a) receiving a batch of data packets designated for transmission; (b) choosing a number of divisors having no common denominators in accordance with the said batch of data packets; (c) organizing into blocks said batch of data packets a number of times in accordance with the number of divisors using said divisors; and (d) creating a FEC packet for each of said blocks.
- Preferably, the method further comprises the steps of: (e) transmitting the designated batch of data packets together with the created FEC packets to a receiver; and (f) recovering lost data packets of said designated batch using said created FEC packets at said receiver.
- Preferably, the divisors are 5, 7, and 9.
- In an embodiment the divisors are 5, 6, and 7.
- In the drawings:
-
FIG. 1 a illustrates a prior art method for using the FEC scheme. -
FIG. 1 b illustrates a prior art method for using the FEC scheme. -
FIG. 2 is a table illustrating an example of 100 data packets and their corresponding FEC packets according to another method of a prior art. -
FIG. 3 is a table illustrating an example of the same batch of 100 data packets organized in 3 various constellations, and their corresponding FEC packets according to an embodiment of the invention. -
FIG. 4 is another table illustrating an example of 100 data packets, and their corresponding FEC packets according to the method of the prior art. -
FIG. 5 is another table illustrating an example of 100 data packets, and their corresponding FEC packets according to an embodiment of the invention. - The term Forward Error Correction (FEC) scheme is used hereinafter to describe an error correction method for data transmission, in which the transmitter sends redundant data packets to a receiver or a number of receivers, for recovering errors in the data flow. The FEC scheme may be used for finding errors in the received data packets, correcting errors in the received data packets, or for replacing lost data packets. The FEC is also defined in Pro-MPEG Code of Practice #3 release 2 Jul. 2004 “Transmission of Professional MPEG-2 Transport Streams over IP Networks”.
- The error correcting function chosen for FEC is XOR which is computationally very easy to implement. For example, the XOR function applied to a sequence of 4 data packets yields a FEC packet “R”:
-
- Therefore, since each FEC packet is able to recover only one packet in the sequence it protects, the smaller the amount of data packets in the protected sequence, the better the protection of the FEC scheme for error recovery. In extreme cases a FEC packet may be added for each data packet. However, the adding of FEC packets increases bandwidth overhead, which increases cost and latency.
-
FIG. 2 is a table illustrating an example of 100 data packets and their corresponding FEC packets according to the method of a prior art. In this example the 100 data packets are organized in 5 columns and 20 rows, where each row of data packets is protected by a FEC packet and each column of data packets is protected by a FEC packet, totaling 25 FEC packets. For the sake of brevity, the FEC packets protecting the rows are signed as FEC and numbered accordingly. Although this method increases bandwidth overhead of 25%, it is widely used for recovering packet loss. For example, if the marked packets 42-47 are lost during the data flow, it is possible to recover these lost packets using the following steps: -
- 1. recovering
packet 43 using FEC3, - 2. recovering
packet 44 using FEC4, - 3. recovering
packet 45 using FEC5, - 4. recovering
packet 46 using FEC1, - 5. After recovering
packet 46, recoveringpacket 47 usingFEC 10, - 6. After recovering
packets packet 42 using FEC9.
- 1. recovering
- However, this prior art method cannot recover a larger amount of lost consecutive packets such as 42-48. Furthermore, this prior art method cannot recover lour packets sharing the same rows and columns such as, 43, 44, 48 and 49.
-
FIG. 3 is a table illustrating an example of the same batch of 100 data packets organized in 3 various constellations, and their corresponding FEC packets according to an embodiment of the invention. These 3 organized constellations are merely a visual representation of the operations made on the same batch of data packets. For sake of brevity, the terms organize, organized, and organizing, are used hereinafter for visually, or conceptually, describing the operations made on a batch of data packets, although in reality no need arises for actually dividing and reorganizing the batch of data packets. In this embodiment the same batch of packets designated for transmission is organized in columns, i.e. divided into groups of packets, for 3 times, prior to transmission. First, the total amount of designated packets is organized in five columns, and a FEC packet is added for every column, meaning, that each column containing a sequence of 20 data packets is protected by one FEC packet. Secondly, the same total amount of designated packets is organized in seven columns, and again a FEC packet is added for protecting each column of packets. In this example constellation,packets packet 99 by FEC 6 and protectingpacket 100 byFEC 7. In addition, since it is not necessary to have exactly the same 100 packets protected by exactly the same FEC packets, the last two packets may be protected by the FEC packets of the next batch of packets. Lastly, the same total amount of designated packets is organized in nine columns, and again a FEC packet is added for protecting each column of packets (since the total of 100 is not divisible by 9, the last packet may be protected as described before in relation to the second step). In summation, the total batch of data packets is divided, i.e. conceptually organized, into fixed rows of predefined number for 3 times, where the FEC packets are designed to protect a column each. During, transmission the batch of packets is sent together with the created FEC packets. In this embodiment, 21(=5+7+9) FEC packets have been added totaling only 21% of bandwidth overhead, while, in many cases, the sought protection exceeds the protection of prior art methods. For example, assuming the highlighted packets (i.e. 60, 61, 62, 67, 68, 69, 74, 75, 76, 81, 82, and 83) were lost in transmission, using the following steps all the packets can be recovered: -
- 1. recovering
packet 61 using FEC19, - 2. recovering
packet 62 using FEC20, - 3. recovering
packet 68 using FEC17, - 4. recovering
packet 75 using FEC15, - 5. recovering
packet 81 using FEC21, - 6. recovering
packet 82 using FEC13, - 7. recovering
packet 60 using FEC5, - 8. recovering
packet 67 using FEC2, - 9. recovering
packet 76 using FEC1, - 10.recovering
packet 83 using FEC3, - 11. recovering
packet 69 using FEC11, - 12. recovering
packet 74 using FEC9.
- 1. recovering
- Thus the lost packets are recovered.
- In many cases it is also significant to test how many iterations the method requires for recovering the lost packets. For example, when recovering the lost data packets highlighted in
FIG. 3 the method of the invention requires only 3 iterations: firstly employing the FEC packets of the 9×11 arrangement, secondly employing the FEC packets of the 5×20 arrangement, and thirdly employing the FEC packets of the 7×14 arrangement. -
FIG. 4 is another table illustrating an example of 100 data packets, the highlighted lost packets, and their corresponding FEC packets according to the method of the prior art. In this example the missingpackets -
- 1. recovering
packets - 2. recovering
packets - 3. recovering
packets - 4. recovering
packets 42 and 49 using the FEC packets (specifically: FEC2 and FEC4), - 5. recovering
packets
- 1. recovering
- However, the same lost packets may be recovered with less iterations when applying the method of the invention, for example,
FIG. 5 illustrates the method of the invention with the same lost packets and their corresponding FEC packets. In order to recover the missingpackets -
- 1. recovering
packets FEC 19 and FEC15), - 2. recovering
packets - 3. recovering
packets 42 and 49 using the FEC packets of 5×20 arrangement (specifically: FEC2 and FEC4).
- 1. recovering
- In one of the embodiments, the order of the iterations is preset in order to minimize the number of iterations. For example, the preset order may be to use the FEC packets of 9×11 arrangement first, then to use the FEC packets of 7×14 arrangement, and lastly to use the FEC packets of 5×20 arrangement. Other preset orders are possible as well.
- As understood, other numbers, i.e. divisors, may be used for organizing a batch of data packets into columns other than 5, 7, and 9 for carrying out the invention. However, the essence of the invention lies in choosing the numbers that have no common denominator, since using numbers with common denominators causes overlapping of the protected data packets. For example, if among the chosen divisors are 3 and 9, the 3 FEC packets protecting the 3 columns are totally superfluous as their data packets are already better protected by the 9 FEC packets.
- In another embodiment of the invention the numbers, i.e. divisors, for organizing and dividing the group of data packets into columns, are 5, 6, and 7, which have no common denominator and increase the bandwidth overhead by only 18%. In other embodiments, the invention may be carried out with different numbers. In any case, the invention is not limited in any way to a specific set of numbers.
- In conclusion, the described optimization of the FEC scheme requires that the numbers used for organizing and dividing a batch of data packets into columns cannot be too large, since that adds too many FEC packets, or too small, since that requires each FEC packet to protect too many data packets, and the chosen numbers cannot have common denominators, since the packets they protect will overlap. Furthermore, many combinations of numbers may be used for organizing the group of data packets into columns. The total group of data packets may be divided more than 3 times or less than 3 times. Therefore, the combination of numbers may contain more or less than 3 numbers having no common denominators, and may vary greatly according to the needs and requirements of the transmitted data packets.
- While some embodiments of the invention have been described by way of illustration, it will be apparent that the invention can be carried into practice with many modifications, variations and adaptations, and with the use of numerous equivalents or alternative solutions that are within the scope of persons skilled in the art, without departing from the spirit of the invention or exceeding the scope of the claims.
Claims (4)
1. A method for optimizing the FEC scheme comprising the steps of:
a. receiving a batch of data packets designated for transmission;
b. choosing a number of divisors having no common denominators in accordance with the said batch of data packets;
c. organizing into blocks said batch of data packets a number of times in accordance with the number of divisors using said divisors; and
d. creating a FEC packet for each of said blocks.
2. A method according to claim 1 further comprising the steps of:
e. transmitting the designated batch of data packets together with the created FEC packets to a receiver; and
f. recovering lost data packets of said designated batch using said created FEC packets at said receiver.
3. A method according to claim 1 , where the divisors are 5, 7, and 9.
4. A method according to claim 1 , where the divisors are 5, 6, and 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/830,458 US20140075269A1 (en) | 2007-09-11 | 2013-03-14 | Method for Optimizing the Forward Error Correction Scheme |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/853,562 US8037392B1 (en) | 2007-09-11 | 2007-09-11 | Method for optimizing the forward error correction scheme |
US13/230,107 US8423872B2 (en) | 2007-09-11 | 2011-09-12 | Method for optimizing the forward error correction scheme |
US13/830,458 US20140075269A1 (en) | 2007-09-11 | 2013-03-14 | Method for Optimizing the Forward Error Correction Scheme |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/230,107 Continuation US8423872B2 (en) | 2007-09-11 | 2011-09-12 | Method for optimizing the forward error correction scheme |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140075269A1 true US20140075269A1 (en) | 2014-03-13 |
Family
ID=44730067
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/853,562 Active 2030-08-08 US8037392B1 (en) | 2007-09-11 | 2007-09-11 | Method for optimizing the forward error correction scheme |
US13/230,107 Active US8423872B2 (en) | 2007-09-11 | 2011-09-12 | Method for optimizing the forward error correction scheme |
US13/830,458 Abandoned US20140075269A1 (en) | 2007-09-11 | 2013-03-14 | Method for Optimizing the Forward Error Correction Scheme |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/853,562 Active 2030-08-08 US8037392B1 (en) | 2007-09-11 | 2007-09-11 | Method for optimizing the forward error correction scheme |
US13/230,107 Active US8423872B2 (en) | 2007-09-11 | 2011-09-12 | Method for optimizing the forward error correction scheme |
Country Status (1)
Country | Link |
---|---|
US (3) | US8037392B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130007552A1 (en) * | 2011-06-30 | 2013-01-03 | Brother Kogyo Kabushiki Kaisha | Data processing devices, computer readable storage media, and methods |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8031701B2 (en) | 2006-09-11 | 2011-10-04 | Cisco Technology, Inc. | Retransmission-based stream repair and stream join |
WO2009089695A1 (en) * | 2008-01-14 | 2009-07-23 | Zte Corporation | A data transmission method and equipment |
CN101286819B (en) * | 2008-05-07 | 2010-05-12 | 中兴通讯股份有限公司 | Data receiving method and device |
US9312989B2 (en) * | 2008-07-07 | 2016-04-12 | Cisco Technology, Inc. | Importance-based FEC-aware error-repair scheduling |
US10498359B2 (en) * | 2011-07-14 | 2019-12-03 | Microsoft Technology Licensing, Llc | Correction data |
IL217306A (en) * | 2012-01-01 | 2016-05-31 | Video Flow Ltd | Packets recovery system and method |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5369682A (en) * | 1992-08-17 | 1994-11-29 | Glenayre Electronics, Inc. | Digital simulcast transmission system |
US6681362B1 (en) * | 2000-03-06 | 2004-01-20 | Sarnoff Corporation | Forward error correction for video signals |
US20080219151A1 (en) * | 2007-03-07 | 2008-09-11 | Nokia Corporation | System and method for using a peer to peer mechanism to repair broadcast data in wireless digital broadcast networks |
US20080250299A1 (en) * | 2004-04-29 | 2008-10-09 | Arnaud Maillet | Method of Transmitting Digital Data Packets and Device Implementing the Method and Receiver |
US7539187B2 (en) * | 2004-07-07 | 2009-05-26 | Qvidium Technologies, Inc. | System and method for low-latency content-sensitive forward error correction |
US7660245B1 (en) * | 2004-09-16 | 2010-02-09 | Qualcomm Incorporated | FEC architecture for streaming services including symbol-based operations and packet tagging |
US7738501B2 (en) * | 2005-04-15 | 2010-06-15 | Zarlink Semiconductor, Inc. | Method of recovering timing over a granular packet network |
-
2007
- 2007-09-11 US US11/853,562 patent/US8037392B1/en active Active
-
2011
- 2011-09-12 US US13/230,107 patent/US8423872B2/en active Active
-
2013
- 2013-03-14 US US13/830,458 patent/US20140075269A1/en not_active Abandoned
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5369682A (en) * | 1992-08-17 | 1994-11-29 | Glenayre Electronics, Inc. | Digital simulcast transmission system |
US6681362B1 (en) * | 2000-03-06 | 2004-01-20 | Sarnoff Corporation | Forward error correction for video signals |
US20080250299A1 (en) * | 2004-04-29 | 2008-10-09 | Arnaud Maillet | Method of Transmitting Digital Data Packets and Device Implementing the Method and Receiver |
US7539187B2 (en) * | 2004-07-07 | 2009-05-26 | Qvidium Technologies, Inc. | System and method for low-latency content-sensitive forward error correction |
US7660245B1 (en) * | 2004-09-16 | 2010-02-09 | Qualcomm Incorporated | FEC architecture for streaming services including symbol-based operations and packet tagging |
US20100050057A1 (en) * | 2004-09-16 | 2010-02-25 | Qualcomm Incorporated | Fec architecture for streaming services including symbol based operations and packet tagging |
US7738501B2 (en) * | 2005-04-15 | 2010-06-15 | Zarlink Semiconductor, Inc. | Method of recovering timing over a granular packet network |
US20080219151A1 (en) * | 2007-03-07 | 2008-09-11 | Nokia Corporation | System and method for using a peer to peer mechanism to repair broadcast data in wireless digital broadcast networks |
Non-Patent Citations (1)
Title |
---|
Moon et al, Bit Rearrangement for MIMO Retransmissions, 2007, IEEE, pp 3509-3513. * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130007552A1 (en) * | 2011-06-30 | 2013-01-03 | Brother Kogyo Kabushiki Kaisha | Data processing devices, computer readable storage media, and methods |
US8843809B2 (en) * | 2011-06-30 | 2014-09-23 | Brother Kogyo Kabushiki Kaisha | Data processing devices, computer readable storage media, and methods |
Also Published As
Publication number | Publication date |
---|---|
US8423872B2 (en) | 2013-04-16 |
US20120233525A1 (en) | 2012-09-13 |
US8037392B1 (en) | 2011-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20140075269A1 (en) | Method for Optimizing the Forward Error Correction Scheme | |
JP4785836B2 (en) | Method for transmitting digital data packets and apparatus for implementing the method | |
EP1512228B1 (en) | Forward error correction method and system for reliable transmission of real time data over a packet based networks | |
US8990663B2 (en) | Method to support forward error correction for real-time audio and video data over internet protocol networks | |
US7155657B2 (en) | Device and method for inserting error correcting codes and for reconstructing data streams, and corresponding products | |
CN100362782C (en) | Method for recovering drop-out data unit | |
US20060291475A1 (en) | Selective forward error correction | |
CN101345605A (en) | Transmitting apparatus, receiving apparatus, error correcting system, transmitting method, and error correcting method | |
KR20080095833A (en) | Method and system for partitioning and encoding of uncompressed video for transmission over wireless medium | |
WO2003063465A3 (en) | System and method for transmitting audio or video data using multiple levels of protection | |
CA2543349C (en) | Method for lost packet reconstruction and device for carrying out said method | |
JP2006262288A (en) | Video data delivery server and video data delivery method | |
US6697996B2 (en) | Multi-dimensional packet recovery system and method | |
CN101517903B (en) | Multimedia information receiving device | |
CN101517950A (en) | Reducing a number of data packets to increase a number of error correcting packets | |
US20140133498A1 (en) | Communication device and communication method | |
EP1758254A1 (en) | Improved erasure correction scheme based on XOR operations for packet transmission | |
US9307243B2 (en) | Method and apparatus for transporting an 8B/10B coded video stream across a 64B/66B coded link | |
US20090228763A1 (en) | Method and apparatus for encoding and decoding data with error correction | |
KR20160138382A (en) | Method and apparatus for generating and recovering packet in broadcasting and/or communication system | |
Skorokhod | The experimental studies of the jpwl tools ability to correct burst errors in a noisy channel when transmitting video in a jpeg 2000 format | |
CN109245850B (en) | Self-adaptive system code FEC coding and decoding method based on media content | |
US20120140617A1 (en) | System and method for packet protection switching | |
US20210288749A1 (en) | Error correction method for a unidirectional data transfer | |
KR20040053354A (en) | Method for error correction in packet-oriented data transmission with transmission blocks that are better determined by descriptors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |