Design and Performance Analysis of Channel Coding Scheme Based On Multiplication by Alphabet-9
Design and Performance Analysis of Channel Coding Scheme Based On Multiplication by Alphabet-9
Design and Performance Analysis of Channel Coding Scheme Based On Multiplication by Alphabet-9
and the data message (information bits) is: 𝑈(𝑥) = 𝑝(𝑥) + 𝑥 𝑛−𝑘 𝑚(𝑥) (9)
Hamming code is designed for the minimum Hamming and 𝑚(𝑥) is the data message. At a decoder, the received
distance of 𝑑 = 3. Hamming distance is the smallest non- codeword is represented by:
zero from codewords. For example, the distance between the
codewords of (1 0 0 0 1 1 0) and (0 1 0 0 0 1 1) is four. A 𝑟(𝑥) = 𝑈(𝑥) + 𝑒(𝑥) (11)
codeword is a set of binary (0, 1) of length 𝑛 bits that consist
of data message 𝑘 and redundancy 𝑟 bits. Hamming code is where: 𝑟(𝑥) = the received codeword
denoted by Hamming (𝑛, 𝑘) and constructed by G and H 𝑈(𝑥) = the transmitted codeword
matrices. Then, the code rate can be calculated as: 𝑒(𝑥) = the error bit
𝑛 = 𝑟1 + 𝑘 + 𝑟2 (13)
Thus, the above variables will form the (𝑛, 𝑘) code based
on the multiplication by Alphabet-9. The encoder structure
for Alphabet-9 coding is as shown in Figure 1. The encoder
requires two redundancy bit generators and k input bits
generators to form a codeword. Based on the encoder
structure, 𝑘 bits of information will be added by redundancy
bits (𝑟1 and 𝑟2 ), which will be a codeword. Suppose the
information is 1100 and 𝑅{𝑟1, 𝑟2 } = 09, then the codeword is
000011001001. The encoder codeword is transmitted
through a communication channel to the receiver via a
decoder. The information bit errors can occur during the
transmission due to the influence of noises and this leads to
a decrease in the system’s performance.
Figure 2: Decoder structure for the proposed code
Table 1
Encoder Redundancy
B. Decoding
i r1 r2 In designing a decoder for the Alphabet-9 code, one of the
1 0000 1001 most important steps is obtaining the coding syndrome. The
2 0001 1000 coding syndrome procedure is as follows:
3 0010 0111
4 0011 0110 1. Determining the value of variable 𝑗 = {10,9, … ,6}.
5 0101 0100
2. Determining the multiplication of the variable 𝑗 by
Alphabet-9 through the following mathematical
equation:
𝑗×9=𝑆 (14)
If 𝑠1 = 𝑟2 and 𝑠2 = 𝑟1 , then the information will calculated by comparing the transmitted data to the received
be received. data. Based on the calculated BER, the throughput can be
If the above condition is not fulfilled, then the obtained.
information will be discarded. In this paper, the computer simulation has been conducted
5. If the error bit occurs at the information bit, the in Matlab in order to evaluate the performances of the
checker is then processed by the following proposed codes, Reed-Solomon code and the Hamming
expressions: code over AWGN channel. The simulation parameters are
shown in Table 3.
𝑦[𝑛] = 𝑥[𝑛] + 𝑒[𝑛] (15)
𝑇𝑅 = (1 − 𝐵𝐸𝑅) × 𝑅 (20)
Figure 7: Throughput performance versus SNR for the proposed codes with
various codeword lengths
Table 4
Features of Reed-Solomon, Hamming, and the Proposed Codes
Reed-
Hamming
No Parameter Solomon Proposed Code
Figure 6: Throughput performance versus SNR for the proposed code, Reed Code
Code
Solomon and the Hamming code 1 Code complexity High Moderate Simple
2 Code notation (𝑛, 𝑘) (𝑛, 𝑘) (𝑛, 𝑘)
From Figure 4 and 6, it can be seen that the BER and the 3 Data symbols 𝑘 𝑘 𝑘
throughput performance of the proposed code are better than 4 Code length 2𝑚 − 1 𝑛 =𝑘+𝑟 𝑛 = 𝑟1 + 𝑘 + 𝑟2
5 Redundancy 𝑛 − 𝑘 = 2𝑡 𝑟 𝑟1 and 𝑟2
those of the Hamming and Reed Solomon codes. However, 6 BER High Moderate Low
the code rate of the proposed code is lower than those of the 7 Throughput Low Moderate High
Hamming and Reed-Solomon codes. This can be overcome 8 Bit rate High Moderate Low
by increasing the number of data bits of the code so that the
data rate will be increased. Furthermore, the proposed code
performance is heavily influenced by the number of data bits VI. CONCLUSION
and the length of the codeword. For the noise sensitive
digital communication applications, such as data and video In this paper, we have designed a novel channel coding
transmission, the proposed code can be applied by using based on multiplication by the Alphabet-9. The designed
bigger data bits and longer codeword lengths. coding procedure related to the encoder redundancy and the
The proposed code has many similarities with the decoder syndrome has been presented as well as the
Hamming and Reed-Solomon codes in terms of features and corresponding encoder, and decoder for the proposed coding
code construction. Some of the comparable features among method have been constructed. Furthermore, a computer
the channel coding schemes are shown in Table 4. There are simulation model of the proposed coding has been
two interesting features from the proposed code that are introduced in order to analyze the performance of the coding
much better than those of the Hamming and Reed-Solomon in terms of BER and throughput. The computer simulation
codes. The proposed codes have lower BER and higher was conducted by using Matlab programming in order to
throughput. This is because the proposed code uses two simulate the impact of the coding technique on the system’s
blocks of redundancy bit that makes the code longer. performance. The results show that the BER of the proposed
Theoretically, the use of two blocks of redundancy bits can coding performs better than those of the Hamming code and
increase the security level of the system because the data Reed-Solomon code with the coding gains of 3.6 dB and 5.8
bits will be flanked by both blocks. However, the security dB, respectively. The BER of the proposed coding decreases
issue is not the focus of this research. with the increase of the code length and the information bit.
The performance of the proposed coding could also produce
higher throughput than those of the Hamming and Reed-
Solomon codes as reflected in the simulation. When the
SNR is 5 dB, the proposed code increased the throughput
about 0.3 Mbps and 0.92 Mbps compared to the Hamming
and Reed-Solomon codes, respectively. Moreover, the
throughput of the proposed code increases with the increase
of the coding length and the information bits. Therefore, it is
believed that the proposed novel channel coding scheme
could perform better in a digital communication system with
lower BER and higher throughput.
REFERENCES [9] I.S. Reed and G. Solomon, “Polynomial Codes over Certain Finite
Fields,” SIAM Journal of Applied Mathematics, vol. 8, no. 2, pp. 300-
304, 1960.
[1] C. E. Shannon, “A Mathematical Theory of Communication,” The
[10] C.K.P. Clarke, Reed-Solomon Error Correction. BBC R&D White
Bell System Technical Journal, vol. 27, pp. 379-423, 1948.
Paper, WHP 031, July 2002.
12[2] J. C. Moreira and P. G. Farrel, Essentials of Error-Control Coding,
18[11] A. Bravo-Santos, “Polar Codes for the Rayleigh Fading Channel,”
England: John Wiley & Sons. 2006.
IEEE Communications Letters, vol. 17, no. 12, pp. 2352-2355, 2013.
13 [3] M. Franklin, R. Gelles, R. Ostrovsky, and L. J. Schulman, “Optimal
Melinda, Nasaruddin, Syahrial, and A. Yuwaldi, “Performance of
Interactive 19
[12]
Coding for Streaming Authentication and
Trajectory Plot for Serial Concatenation of BCH and convolutional
Communication,” IEEE Transactions on Information Theory, vol. 61,
Codes,” In Proceedings of IEEE Comnetsat, pp. 26-30, 2013.
no. 1, pp. 133-145, 2015.
[13] S. S. Sarnin, N. F. Naim, and W.N.S.W Muhamad, “Performance
14[4] Nasaruddin and T. Tsujioka, “A novel design of reconfigurable
evaluation of phase shift keying modulation technique using BCH
wavelength-time optical codes to enhance security in optical CDMA
code, Cyclic code and Hamming code through AWGN channel model
networks,” IEICE Trans. Communication, vol.E99-B, no. 6, pp. 2516-
in communication system,” in Proceedings of Information Sciences
2524, 2008.
and Interaction Sciences (ICIS), pp. 60-65, 2010.
15[5] T. Zhang and Q. Ding, “Design of (15, 11) Hamming Code Encoding
[14] R. Logeshwaran and I. J. L Paul, “Performance study on the
and Decoding System Based on FPGA,” in Proceedings of
suitability of Reed Solomon Codes in WiMAX,” in Proceedings of
International Conference on Instrumentation, Measurement,
Wireless Communication and Sensor Computing, ICWCSC 2010, pp.
Computer, Communication and Control, pp. 704-707, 2011.
1-4, 2010.
16[6] R. Ma and S. Cheng, “The Universality of Generalized Hamming
[15] D. J. Costello and S. Lin, Error Control Coding, Second Edition,
Code for Multiple Sources,” IEEE Transactions on Communications,
Prentice Hall, NJ, 2004.
vol. 59, no. 10, pp. 2641-2647, 2011.
[16] H. Simon and M. Michael, Modern Wireless Communication, Pearson
17[7] Nasaruddin and R. Kurnia, “Hamming Coding for Multi-relay
Prentice Hall. Upper Sadley River, New Jersey. 2005.
Cooperative Quantize and Forward Networks,” in Proceedings of
[17] J. Goldie and M. Wilson, “LVDS Performance: Bit Error Rate (BER)
IEEE Region 10 Symposium (TENSYMP), pp. 315-319, 2016.
Testing Test Report #2,” National Semiconductor Corporation Report,
[8] S. Siikavirta, J. Manner, and L. Wang, “Reed-Solomon feasibility in
2000.
mobile transport,” in Proceedings of Cyber-Enabled Distributed
[18] T. C. W. Schenk, G. Dolmans, and I. Modonesi, “Throughput of a
Computing and Knowledge Discovery, pp. 363-368, 2009.
MIMO OFDM based WLAN System,” in Proceedings of IEEE SCVT,
2004.