FEC framing and delineation Frank Effenberger Huawei Technologies, US Dec. 5, 2006.

Slides:



Advertisements
Similar presentations
Convolutional Codes Representation and Encoding  Many known codes can be modified by an extra code symbol or by deleting a symbol * Can create codes of.
Advertisements

PeterJ Slide 1 Sep 4, B/10B Coding 64B/66B Coding 1.Transmission Systems 2.8B/10B Coding 3.64B/66B Coding 4.CIP Demonstrator Test Setup.
Forward Error Correction Demystified Presented by Sunrise Telecom Broadband … a step ahead.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
USLP Interface and Processing between Coding & Sync Sub-layer and Data Link Protocol Sub-layer.
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
5/15/2015© 2008 Raymond P. Jefferis IIILect The Data Link Layer.
10Gb/s EPON FEC - Coding gain vs power budget Contributors names Sept 2006.
10Gb/s EPON FEC - Coding gain vs power budget Contributors names Sept 2006.
Long distance communication Multiplexing  Allow multiple signals to travel through one medium  Types Frequency division multiplexing Synchronous time.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany packet transmission A.J. Han Vinck January 19, 2010.
Transmission Characteristics 1. Introduction (Information Interchange codes) 2. Asynchronous and Synchronous Transmissions 3. Error detection (bit errors)
Transmission Modes Different ways of characterizing the transmission.
William Stallings Data and Computer Communications 7th Edition Chapter 6 Digital Data Communications Techniques.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 4 Digital Transmission.
Digital Data Communications Techniques Updated: 2/9/2009.
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
1/26 Chapter 6 Digital Data Communication Techniques.
Doc.: IEEE /1434r0 Submission November 2013 Slide 1 CID 1376: NDP BlockAck Bitmap Protection Date: Authors: Alfred Asterjadhi, et.
1 Fault-Tolerant Computing Systems #2 Hardware Fault Tolerance Pattara Leelaprute Computer Engineering Department Kasetsart University
Energy-Efficient Solutions for 10Gbps Ethernet Yury Audzevich, Alan Mujumdar, Philip Watts, Andrew W. Moore MSN 2012 workshop Friday, July 13th, 2012.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 5 - Encoding and Data Link Basics.
EE 122: Encoding And Framing Ion Stoica September 9, 2002.
10 Gb/s PON FEC-Framing Contributors names Sept 2006.
Universal Synchronous/Asynchronous Receiver/Transmitter (USART)
Data and Computer Communications. The Data Link Layer.
Data Link Layer - 1 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
10Gb/s EPON FEC - Coding gain vs power budget September 2006, Knoxville, TN, USA Contributors and Support: Frank Effenberger, Huawei Frank Chang, Vitesse.
TOBB ETÜ ELE46/ELE563 Communications Networks Lecture 01 May 6, 2014 Fall 2011 Tuesday 10:30 – 12:20 (310) Thursday 15:30 – 17:20 (372) İsrafil Bahçeci.
1 Data Link Layer Lecture 20 Imran Ahmed University of Management & Technology.
ECS 152A 4. Communications Techniques. Asynchronous and Synchronous Transmission Timing problems require a mechanism to synchronize the transmitter and.
Data and Computer Communications
Data and Computer Communications Chapter 6 – Digital Data Communications Techniques.
Data and Computer Communications by William Stallings Eighth Edition Digital Data Communications Techniques Digital Data Communications Techniques Click.
CS3505: DATA LINK LAYER. data link layer  phys. layer subject to errors; not reliable; and only moves information as bits, which alone are not meaningful.
TI Cellular Mobile Communication Systems Lecture 4 Engr. Shahryar Saleem Assistant Professor Department of Telecom Engineering University of Engineering.
Computer Networks Lecture 2: Data Link Based on slides from D. Choffnes Northeastern U. and P. Gill from StonyBrook University Revised Autumn 2015 by S.
Real-Time Turbo Decoder Nasir Ahmed Mani Vaya Elec 434 Rice University.
1 FEC framing and delineation Frank Effenberger Huawei Technologies, US Dec. 5, 2006.
802.11b PHY Wireless LANs Page 1 of 23 IEEE b WLAN Physical Layer Svetozar Broussev 16-Feb-2005.
Data Communications and Networking
Unit 1 Lecture 4.
1/30/ :20 PM1 Chapter 6 ─ Digital Data Communication Techniques CSE 3213 Fall 2011.
Error Detection & Correction  Data can be corrupted during transmission.  For reliable transmission, errors must be detected and corrected.  Error detection.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 6: Datalink layer problems Slides used.
March 2002 Jie Liang, et al, Texas Instruments Slide 1 doc.: IEEE /0207r0 Submission Simplifying MAC FEC Implementation and Related Issues Jie.
Network Layer4-1 Chapter 5: The Data Link Layer Our goals: r understand principles behind data link layer services: m error detection, correction m sharing.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
The Data Link Layer Chapter 3. Data Link Layer Design Issues Services Provided to the Network Layer Framing Error Control Flow Control.
Status and Plans for Xilinx Development
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Data Link Layer.
Chapter 7 Packets, Frames, and Error Detection
Framework For Upstream Synchronization and Alignment
10GEPON FEC Framing Adhoc Technical Status Jeff Mandin 802
Contributors and Support: Frank Effenberger, Huawei
DIGITAL DATA COMMUNICATION TECHNIQUES
doc.: IEEE <doc#>
doc.: IEEE <doc#>
DIGITAL DATA COMMUNICATION TECHNIQUES
DIGITAL DATA COMMUNICATION TECHNIQUES
Ion Stoica September 6, 2001 EE 122: Lecture 4 Ion Stoica September 6, 2001.
Measuring propagation delay over a coded serial communication channel using FPGAs P.P.M. Jansweijer, H.Z. Peek October 15, 2009 VLVnT-09 Athens.
CSE 461: Framing, Error Detection and Correction
Feedback-jamming ARQ mechanisms
EECS 122: EE122: Error Detection and Reliable Transmission
Data Link Layer. Position of the data-link layer.
Presentation transcript:

FEC framing and delineation Frank Effenberger Huawei Technologies, US Dec. 5, 2006

Outline Basic framing concept Continuous framing method Burst framing method

Basic concepts We want to maintain 64b66b line code structure, to maximal degree We want to avoid excessive processing requirements and time for delineation

Layer Diagram MAC Control MAC 66b PCS FEC PCS PMA PMD

Continuous Transmission FEC parity in 66b code Input is ordinary 66b coded stream Stream is broken into groups of X blocks Parity is generated for each group Parity is assembled into Y blocks Codeword is then X+Y blocks long

Example with RS(255,239) Input grouped into 28 blocks of 66b each RS(255,239) generates 16 bytes of parity Parity assembled into 2 66b blocks –66b framing bits are set arbitrarily, most likely to preserve the standard rules Resulting FEC codeword is 30 66b blocks

Reception FEC enabled 66b code Incoming stream is first delineated into 66b blocks –Using a search and locking mechanism very similar to that used today in 10GbE Resulting stream of blocks is then serially searched for FEC parity –This requires 66 times less searching than pure serial locking, a significant improvement

Error tolerant 66b framing Current algorithm looks for 64 consecutive successes to declare lock, and 16 failures out of 64 to declare loss-of- lock Extend this algorithm such that –X successes out of Y to declare lock –W failures out of Z to declare loss-of-lock Exact setting of these parameters is for future study –However, it is clear that even strict locking (X=Y=64) is feasible at BER of even 1e-3 –Locking time on the order of 66*64 blocks (27 microseconds) with a serial technique (could be 66 times shorter with a parallel scheme)

Serial block searching Receiver must calculate FEC parity on each block alignment –In the previous example, there are 30 alignments This could be done serially –Would require 30*30 block to positively lock (5.8 microseconds)

Overall locking time Proposed method of two stage locking is relatively fast –33 (27+6) µs approximately worst case time In comparison, bitwise serial FEC locking takes 380 µs (30*30*66 blocks to lock) As good as this is, 33 µs is still too slow for burst mode –Time should be >>1 µs –It should also be more deterministic

Fast burst mode synchronization To be efficient, burst mode transmissions need a leading pattern containing –A preamble to provide level and timing Usually a pattern with a high transition density for easier clock recovery and perfect DC balance for level recovery –A delimiter to provide delineation A special pattern that is searchable using a bitwise correlator The pattern is chosen to have a large hamming distance from any other pattern likely to be seen on the line The delineation part is what would give us the FEC codeword alignment

EPON burst preamble EPON has no ‘special’ data patterns –Burst (from MAC control) just starts with any ordinary data frame –PHY is receiving idle codes all the time –Data detector turns on the laser with enough lead time to ensure good Tx Extending this to 10G EPON seems the likely approach –Need a way to form a burst leader

The Leader frame At the beginning of the burst, MAC control sends the Leader Frame –An Ethernet frame, with all the usual header and trailer parts –Payload is designed to provide an efficient delimiter, and perhaps the preamble Signal on line would consist of –X garbled idle blocks (laser warming up) –Y clean idle blocks (should be minimized) –Leader frame (Z blocks long)

FEC alignment 66b coding sublayer receives leader frame from MAC –Would align 66b codeword to start of leader frame –Could hard reset the 66b coder (this is before burst starts, after all, so we don’t care about detailed data pattern) –Could initialize the scrambler at end of the leader frame (important – leader frame pattern must not be scrambled!) FEC coding sublayer receives leader frame from 66b coding sublayer –FEC codeword could be aligned to the leader frame –Could hard reset the FEC coder, since previous data need not be protected

Leader payload format Payload would consist of –X Preamble blocks Maximal density pattern: 0x55 Decide how many blocks depending on PMD –Y Delimiter blocks Pattern would be a special Barker-like sequence Designed to be maximally distant from all shifts of the leader payload Frame could be up to ~180 blocks (1.2 µs) –Should be plenty for our needs

Hamming Distance If a delimiter is 4N bits long, then a sequence can be found that has a hamming distance of 2N-1 Such a sequence can tolerate up to N-1 errors (in N bits) and still find burst How many errors do we need to tolerate? –P (lost burst) = (4N)! / N! / (3N)! * BER ^ N –Assume 100Kburst/sec (very fast)

Mean Time to Lost Burst Millennium BER

Finding the Golden Block The 64 bit block that has maximal distance 31 from every shift of itself and the preamble is the ‘Golden Block’ Found empirically, using trial and error For a 64 bit delimiter, there are 3.6E17 delimiters that have DC balance and odd-even balance Initial studies have revealed many blocks with distance 29, e.g.: 254A C91F 0FE3 21B7

Receiver processing Receiver would have bit-wise correlator –Received pattern XOR Golden Block –Count the number of different bits D For delimiter with 2X+1 distance, apply following rule –If D<=X, then delimiter found, synchronize 66b and FEC coders at set position from this instant –If D>X, look at next position Using the previous example, X=14 –14 errors in 64 bits is tolerable! –11 bits tolerance still gives MTLB ~ life of universe, and lower false-positive rate

Fast sync suppression Looking for a delimiter in random data should be avoided –False positives are much more common Fast locking (operation of the correlator) should be disabled once lock is achieved Re-enabled once lock is lost hard (that is, estimated BER~0.5) –This should happen only between bursts