Due to asynchronous packet transmissions and rate mismatch among different coding flows in existing opportunistic network coding architectures, such as COPE, the amount of packets which can be coded together may be in...
详细信息
ISBN:
(纸本)9781509058808
Due to asynchronous packet transmissions and rate mismatch among different coding flows in existing opportunistic network coding architectures, such as COPE, the amount of packets which can be coded together may be insufficient and thus the performance gain of network coding cannot be fully exploited. One feasible solution for this problem is to make coding node purposely delay some packet transmissions so as to increase more coding opportunities. However, extra delay could be introduced and it will impose an adverse influence on delay-sensitive applications, such as video streaming. In this paper, we propose to use buffer management to maximize the coding opportunity while meeting the delay constraints of traffic flows. We formulate the design of delaying policy as an optimization problem. Based on the model, the network-coding-aware buffer management policy (NBM) consists of packet delaying and scheduling mechanisms, and each node independently decides whether and for how long to delay a packet. Numerical results validate our analytical model and show that NBM can substantially improve the performance gain of network coding compared with COPE.
Cooperative communication of network coding system is a technique used to overcome the problems of multipath fading, despite the obstacles that still occur are not yet optimal SNR to be good performance. In this paper...
详细信息
ISBN:
(纸本)9781509054466
Cooperative communication of network coding system is a technique used to overcome the problems of multipath fading, despite the obstacles that still occur are not yet optimal SNR to be good performance. In this paper the author provides a solution by considering two concepts combining which used selection combining (SC) and maximal ratio combining (MRC). By using two general strategies relay protocols of cooperative that amplify-and-forward (AF) and decode-and-forward (DF). Components of the measurement are to calculate the bit error rate (BER) and throughput. Results of the research are SC value BER better than MRC, because network coding have fading coefficient MRC becomes greater than SC only choose one of the best signal. Throughput which on using MRC and SC resulted greater value using network coding than without using network coding.
Currently, various Medium Access Control (MAC) protocols have been proposed for underwater wireless sensor networks. Unlike terrestrial networks, underwater networks utilize acoustic waves, which have comparatively lo...
详细信息
ISBN:
(纸本)9781509022793
Currently, various Medium Access Control (MAC) protocols have been proposed for underwater wireless sensor networks. Unlike terrestrial networks, underwater networks utilize acoustic waves, which have comparatively lower loss and longer range in underwater environments. However, the use of acoustic waves incurs long propagation delays that typically lead to low throughput especially in protocols that require receiver feedback such as multimedia stream delivery and the energy cost of transmission is much higher than receptions. Thus, collision and retransmission should be reduced in practice in order to reduce energy cost and improve throughput. Based on these motivations, we propose a novel MAC protocol called NCDCMAC. NCDC-MAC leverages network coding and duty cycle, the combination of which is seldom explored, to solve these challenges. Heterogeneous wireless networks and node roles are considered while designing our algorithms. Meanwhile, fairness including schedule and service time assignment is supported in our approach. Extensive simulations show that our approach can achieve significantly better performance.
Bufferless network operation is favorable in many application domains such as industrial networks, on-chip networks and optical packet switching (OPS). The main challenge with zero buffers is the avoidance or handling...
详细信息
ISBN:
(纸本)9781479989508
Bufferless network operation is favorable in many application domains such as industrial networks, on-chip networks and optical packet switching (OPS). The main challenge with zero buffers is the avoidance or handling of contention;indeed, many domain-specific contention resolution techniques have been proposed in the literature. In this paper, we propose a generic combined forward error correction (FEC) and network coding (NC) scheme, which mitigates the negative impact of contentions at the network layer. Specifically, we present a case study for OPS utilizing FEC at the ingress node and NC at an intermediary optical packet switch to reduce packet loss due to contention. Our analysis shows that if used in a smart way, our mechanism can reduce decoding error and packet loss with multiple orders of magnitude while adhering to buffering limitations and meeting delay requirements. We believe that such a combined coding scheme has the potential to be utilized both in OPS (data center and core networks) and other networks where (near-)zero buffers are required.
Open air transmission is imperative asset of Multihop wireless network;which enables malicious attackers to do attacks such as traffic analysis. This motivates enormous need of securing privacy of MWN. The necessity o...
详细信息
ISBN:
(纸本)9781509015221
Open air transmission is imperative asset of Multihop wireless network;which enables malicious attackers to do attacks such as traffic analysis. This motivates enormous need of securing privacy of MWN. The necessity of privacy issue pioneers concept of network coding. To avert traffic analysis attacks it has to be implemented which integrates coding and mixing operation at in-between nodes. Simple use of network coding is not enough to resolve privacy threat in MWN. This paper proposes random network coding scheme along with Blowfish encryption algorithm to achieve source anonymity and message data concealment. To effectively prohibit traffic analysis attacks, this algorithm enhances features of homomorphic encryption such as Paillier encryption used in existing system. This proposed system offers the feature of random coding. Property of inverting GEVs with a very high probability is used by each sink to recover the source packets. The strength and efficiency of the proposed system is evident through theoretic exploration and simulative data assessment.
The use of wireless sensor networks (WSN) to support critical monitoring applications is becoming a relevant topic of interest. These networks allow a highly flexible approach to data monitoring and, consequently, a m...
详细信息
ISBN:
(纸本)9781509023394
The use of wireless sensor networks (WSN) to support critical monitoring applications is becoming a relevant topic of interest. These networks allow a highly flexible approach to data monitoring and, consequently, a major breakthrough for several application domains, from industrial control applications to large building domotics and health care applications. One of the major impairments of using wireless networks to support critical monitoring applications is the electromagnetic noise, which may increase the packet loss ratio to unacceptable values. In this paper, we assess different techniques of cooperative communication and network coding that can be useful to mitigate the aforementioned problem. These techniques may be implemented in WSN nodes in conformance with the IEEE 802.15.4 standard, to reduce the impact of electromagnetic interferences upon the packet loss ratio. In this paper, we report an experimental assessment of the network coding and cooperative diversity techniques, where the network is subjected to a controlled electromagnetic interference inside of an anechoic chamber. The experimental results show that, by using these techniques, it is possible to increase the success rate of communication in typical electromagnetic noisy environments.
network coding (NC) enables us to mix two or more packets into a single coded packet at relay nodes and improve performances in mobile ad hoc networks (MANETs). Sliding window network coding is a variation of NC that ...
详细信息
ISBN:
(数字)9789811022098
ISBN:
(纸本)9789811022098;9789811022081
network coding (NC) enables us to mix two or more packets into a single coded packet at relay nodes and improve performances in mobile ad hoc networks (MANETs). Sliding window network coding is a variation of NC that is an addition to data packet streaming and improves the data delay on MANETs. In this paper, we propose a Sliding Window network coding in MANETs (SWNCM). SWNCM preserves the degree distribution of the encoded data packets through the recombination at the nodes. SWNCM enables to control the decoding complexity of each sliding window independently from the data packets received and recover the original data. The performance of the SWNCM is studied using NS2 and evaluated in terms of the network throughput, encoding overhead, decoding delay, packet transmission rate when data packet is transmitted. The simulations result shows that the SWNCM with our proposition can significantly improve the network throughput and achieves higher diversity order.
Asymmetric data transmission is a challenge factor in wireless communication channel. In this paper, we study the issue of data processing in asymmetric data transmission from different sources in wireless communicati...
详细信息
ISBN:
(纸本)9781509006908
Asymmetric data transmission is a challenge factor in wireless communication channel. In this paper, we study the issue of data processing in asymmetric data transmission from different sources in wireless communication channel, and propose a Joint Hierarchical Modulation and network coding (JHMNC) scheme. In the proposed scheme, the procedure of JHMNC is analyzed and compared with the traditional zero padding and Opportunistic User Selection (OUS) schemes which are the generally existed schemes in asymmetric data transmission in wireless channel, and the closed-form expressions of the End-to-End (E2E) Bit Error Rate (BER) for the aforementioned schemes are derived by analyzing the transmission of each node. Simulation results illustrate that the proposed scheme improves the BER performance without additional complexity compared with the traditional zero padding scheme, also can outperform OUS scheme in terms of the average throughput and the channel access probability.
Random linear network coding (RLNC) has been shown to efficiently improve the network performance in terms of reducing transmission delays and increasing the throughput in broadcast and multicast communications. Howev...
详细信息
ISBN:
(纸本)9781509013289
Random linear network coding (RLNC) has been shown to efficiently improve the network performance in terms of reducing transmission delays and increasing the throughput in broadcast and multicast communications. However, it can result in increased storage and computational complexity at the receivers end. In our previous work we considered the broadcast transmission of large file to N receivers. We showed that the storage and complexity requirements at the receivers end can be greatly reduced when segmenting the file into smaller blocks and applying RLNC to these blocks. To that purpose, we proposed a packet scheduling policy, namely the Least Received. In this work we will prove the optimality of our previously proposed policy, in terms of file transfer completion time, when N = 2. We will model our system as a Markov Decision Process and prove the optimality of the policy using Dynamic Programming. Our intuition is that the Least Received policy may be optimal regardless of the number of receivers. Towards that end, we will provide experimental results that verify that intuition.
It has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs, achieving their cut-set capacity bounds. However, network coding is highly s...
详细信息
ISBN:
(数字)9789811015366
ISBN:
(纸本)9789811015366;9789811015359
It has been shown that network coding can effectively improve the throughput of multicast communication sessions in directed acyclic graphs, achieving their cut-set capacity bounds. However, network coding is highly susceptible to eavesdropping and pollution attacks in which malicious nodes attacks cannot be prevented. In this paper, we propose several ways to enhance the security and reliability of random networking coding transmission. Schemes which encrypt the random coefficients and the coding payload could ensure the information has a relatively low probability to be cracked. We also implement the reliable transmission by forward error-correction. It has been shown that random network coding with encryption and forward error-correction can help achieve provably good overall security and reliability performance.
暂无评论