A MODEL-BASED APPROACH TO EVALUATION OF THE EFFICACY OF FEC
#1

A MODEL-BASED APPROACH TO EVALUATION OF THE EFFICACY OF FEC CODING IN COMBATING NETWORK PACKET LOSSES


ABSTRACT:

We propose a model-based analytic approach for evaluating the overall efficacy of FEC coding combined with interleaving in combating packet losses in IP networks. The loss of various packets during the data transmission can be reduced by using FEC coding. In this project we are going to evaluate the efficacy of FEC coding. Particularly modeling the network path in terms of a single bottleneck node. We develop a procedure for the exact evaluation of the packet-loss statistics for general arrival processes, based on a framework. We study both single-session and multiple-session scenarios, and provide a simple procedure for the more complicated multiple-session scenario. We show that the unified approach provides an integrated framework for exploring the tradeoffs between the key coding parameters; specifically, interleaving depths, channel coding rates and block lengths. The approach facilitates the selection of optimal coding strategies for different applications with various user quality-of-service (QoS) requirements and system constraints. We also provide an information-theoretic bound on the performance achievable with FEC coding in IP networks.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: reference model approach, personal teaching efficacy and general, fec decoding based bp algorithm in lte disadvantages, a model based approach to evaluation of the efficacy of fec coding in combating network packet losses a model based approach, on the efficacy of opportunistic routing, ppt s on fec decoding, a model based approach to evaluation of efficacy of fec coding,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  NEW BUSINESS MODEL & STRATEGY FOR INTERNET ECONOMY seminar paper 3 3,761 21-10-2014, 08:18 PM
Last Post: jaseela123d
  A MANET Architecture Model seminar paper 1 1,204 16-10-2012, 01:41 PM
Last Post: seminar details
  Benefits of the 3R approach for agricultural waste management seminar details 0 991 12-06-2012, 01:01 PM
Last Post: seminar details
  Implementation of an IEEE 802.11 Wireless LAN Model using OPNET seminar details 0 1,229 11-06-2012, 05:58 PM
Last Post: seminar details
  EVALUATION OF A ZEOLITE-WATER SOLAR ADSORPTION REFRIGERATOR project uploader 0 1,411 11-06-2012, 12:58 PM
Last Post: project uploader
  The CoQUOS Approach to Continuous Queries in Unstructured Overlays seminar details 0 1,033 09-06-2012, 05:21 PM
Last Post: seminar details
  AN EFFICIENT APPROACH FOR CAPACITOR SIZING AND LOCATION ON A RADIAL seminar details 0 1,036 09-06-2012, 02:17 PM
Last Post: seminar details
  Waterfall Model seminar details 0 1,572 09-06-2012, 11:32 AM
Last Post: seminar details
  An Object Oriented Approach to Image Restoration in Matlab seminar details 0 891 07-06-2012, 05:28 PM
Last Post: seminar details
  JOB EVALUATION seminar details 0 593 06-06-2012, 05:23 PM
Last Post: seminar details

Forum Jump: