• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Dai Jinyou, Yu Shaohua. An Adaptive Forward Error Correction Method for Carrier Ethernet[J]. Journal of Computer Research and Development, 2009, 46(2): 239-244.
Citation: Dai Jinyou, Yu Shaohua. An Adaptive Forward Error Correction Method for Carrier Ethernet[J]. Journal of Computer Research and Development, 2009, 46(2): 239-244.

An Adaptive Forward Error Correction Method for Carrier Ethernet

More Information
  • Published Date: February 14, 2009
  • Huge change has happened with physical channel of the present Ethernet while compared with that of traditional Ethernet. Carrier Ethernet brings forward higher request to Ethernet physical channel. Under the application environment of carrier Ethernet, it is of necessity to improve the transport performance of the Ethernet physical channel by using a special method. Based on the frame structure defined in IEEE Std 802.3, a kind of frame structure is presented, which comprises FEC(forward error correction) contents and an FEC method is also brought forward. The method includes an error correction function as well as a mechanism of detecting the performance of the physical channel and adaptively adjusting the FEC configuration, so the cost brought by the FEC method can be cut short to the minimum while the error correction performance is guaranteed. An Ethernet interface using the FEC method can communicate with an ordinary non FEC Ethernet interface, so the backward compatibility can be reached. Detailed analysis for the performance of the FEC method is given too, and the analysis result proves that the FEC method is feasible. A kind of network device that carries out the method is designed and a test topology is set up to test and verify the method. The test data show that the method has the expected performance.
  • Related Articles

    [1]Shi Leyi, Zhu Hongqiang, Liu Yihao, Liu Jia. Intrusion Detection of Industrial Control System Based on Correlation Information Entropy and CNN-BiLSTM[J]. Journal of Computer Research and Development, 2019, 56(11): 2330-2338. DOI: 10.7544/issn1000-1239.2019.20190376
    [2]Yao Sheng, Xu Feng, Zhao Peng, Ji Xia. Intuitionistic Fuzzy Entropy Feature Selection Algorithm Based on Adaptive Neighborhood Space Rough Set Model[J]. Journal of Computer Research and Development, 2018, 55(4): 802-814. DOI: 10.7544/issn1000-1239.2018.20160919
    [3]Dong Hongbin, Teng Xuyang, Yang Xue. Feature Selection Based on the Measurement of Correlation Information Entropy[J]. Journal of Computer Research and Development, 2016, 53(8): 1684-1695. DOI: 10.7544/issn1000-1239.2016.20160172
    [4]Tang Chenghua, Liu Pengcheng, Tang Shensheng, Xie Yi. Anomaly Intrusion Behavior Detection Based on Fuzzy Clustering and Features Selection[J]. Journal of Computer Research and Development, 2015, 52(3): 718-728. DOI: 10.7544/issn1000-1239.2015.20130601
    [5]Zhang Fengbin and Wang Tianbo. Real Value Negative Selection Algorithm with the n-Dimensional Chaotic Map[J]. Journal of Computer Research and Development, 2013, 50(7): 1387-1398.
    [6]Zhang Zhenhai, Li Shining, Li Zhigang, and Chen Hao. Multi-Label Feature Selection Algorithm Based on Information Entropy[J]. Journal of Computer Research and Development, 2013, 50(6): 1177-1184.
    [7]Zheng Liming, Zou Peng, Han Weihong, Li Aiping, Jia Yan. Traffic Anomaly Detection Using Multi-Dimensional Entropy Classification in Backbone Network[J]. Journal of Computer Research and Development, 2012, 49(9): 1972-1981.
    [8]Zhang Xiang, Deng Zhaohong, Wang Shitong, Choi Kupsze. Maximum Entropy Relief Feature Weighting[J]. Journal of Computer Research and Development, 2011, 48(6): 1038-1048.
    [9]Chen Shitao, Chen Guolong, Guo Wenzhong, and Liu Yanhua. Feature Selection of the Intrusion Detection Data Based on Particle Swarm Optimization and Neighborhood Reduction[J]. Journal of Computer Research and Development, 2010, 47(7): 1261-1267.
    [10]Hou Jian, Peng Jiayin, Zhang Yuzhuo, Zhang Chengyi. A Reverse Triple I Algorithm for Fuzzy Reasoning Based on Maximum Fuzzy Entropy Principle[J]. Journal of Computer Research and Development, 2006, 43(7): 1180-1185.

Catalog

    Article views (789) PDF downloads (566) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return