This paper presents a peer-to-peer (P2P) framework for the deployment of live video streaming applications over P2P overlay networks. The proposed framework provides support for flash-crowds, decentralizes decision ma...
详细信息
ISBN:
(纸本)9781479977956
This paper presents a peer-to-peer (P2P) framework for the deployment of live video streaming applications over P2P overlay networks. The proposed framework provides support for flash-crowds, decentralizes decision making and makes use of network coding to reduce bandwidth consumption. We present the framework and the simulation results that demonstrate the framework's effectiveness.
When two terminals exchange information through an intermediate relay, physical-layer network coding (PLNC) improves the spectrum efficiency by allowing cocurrent packet transmission. Synchronisation is one of the mos...
详细信息
When two terminals exchange information through an intermediate relay, physical-layer network coding (PLNC) improves the spectrum efficiency by allowing cocurrent packet transmission. Synchronisation is one of the most important issues in distributed wireless communications systems. In time-domain (TD)-based PLNC, signals transmitted from user terminals may arrive the relay at different time. The fractional symbol level delay will introduces inter-symbol interference because of the use of practical pulse-shaping and matched-filter. Orthogonal-frequency division-multiplexing (OFDM) can be used to deal with time asynchrony. However, OFDM systems are very sensitive to carrier frequency offsets, which will introduce inter-carrier interference. In this study, a novel low-complexity symbol-based decoding iterative interference cancellation schemes are proposed for TD-based and OFDM-based PLNC. Signals from two sources are separately decoded, and interference is reconstructed and eliminated. Monte Carlo simulations show that the proposed scheme with over just one iteration can significantly improve the bit error rate performance.
In this paper, we consider a multiple-access broad-cast channel (MABC) with ARQ feedback, in which M end-users wish to exchange messages with a central node or base-station. In this scenario, an end-user may overhear ...
详细信息
ISBN:
(纸本)9781479966653
In this paper, we consider a multiple-access broad-cast channel (MABC) with ARQ feedback, in which M end-users wish to exchange messages with a central node or base-station. In this scenario, an end-user may overhear other end-users' messages prior to the re-transmission phase. We propose a new network coded (NCed)-ARQ scheme with reverse-link-assistance (RLA) that exploits this overheard information in uplink transmission to increase the downlink throughput. We derive throughput expressions for the new NCed-ARQ scheme in wireless additive white Gaussian noise with Rayleigh fading channel, which we numerically evaluate. For low/moderate SNRs, NCed-ARQ with RLA greatly improves the performance of downlink throughput.
The existing anti-eavesdropping researches on wireless network coding are mainly based on the assumption that the eavesdroppers can only monitor limited channels and don't cooperate with each other. But in real se...
详细信息
ISBN:
(纸本)9781509053827
The existing anti-eavesdropping researches on wireless network coding are mainly based on the assumption that the eavesdroppers can only monitor limited channels and don't cooperate with each other. But in real settings, the eavesdroppers share overheard information, which makes data leakage come true. Moreover, these approaches just encrypt or permutate the coding coefficients to prevent the adversaries from understanding the transmission data, they can't resist pollution attacks, such as forgery and tamper attacks. In this case, we propose a novel secure linear network coding scheme that is based on IBC(Identity-Based Cryptography) algorithm and has the characteristic of preventing eavesdropping and pollution attacks. Theoretical analysis and experiment demonstrate that our scheme guarantees the data security for each node, which significantly prevents the nodes from being eavesdropped and resists pollution attacks. Furthermore, our scheme enriches the approaches of anti-eavesdropping research in wireless network coding.
network coding is a communication paradigm that allows intermediate nodes to mix packets instead of simply relaying them. Motivated by applications in military tactical networks, this paper explores the use of the net...
详细信息
ISBN:
(纸本)9788393484850
network coding is a communication paradigm that allows intermediate nodes to mix packets instead of simply relaying them. Motivated by applications in military tactical networks, this paper explores the use of the network coding. It has been proved that network coding has many benefits in wireless communications such as optimal capacity achievement and packet loss recovery. In this paper, we present a generic architecture for network coding for broadcast in wireless networks called GardiNet. GardiNet is generic;its design is divided into building blocks in order to enable it to adapt to different application scenarios. In this paper, we start by describing GardiNet for wireless ad hoc networks and in particular for wireless sensor networks (WSNs). Then, we present experiment results of GardiNet in FIT IoT-LAB, a real testbed of WSNs. Results show that network coding performs well under real wireless conditions. In addition, we highlight the benefit of the Sliding Encoding Window scheme of GardiNet (SEW) to allow sensors to decode packets in real time.
Most existing studies on Delay/Disruption Tolerant networks (DTNs) consider pair-wise node encountering that assumes nodes only meet in pairs. In many mobile wireless networks, a group of nodes, instead of only a pair...
详细信息
ISBN:
(纸本)9781467385909
Most existing studies on Delay/Disruption Tolerant networks (DTNs) consider pair-wise node encountering that assumes nodes only meet in pairs. In many mobile wireless networks, a group of nodes, instead of only a pair of nodes, may meet each other. In this paper, we study how to effectively transmit a set of packets from a source to a destination in such group meeting scenarios. The optimization goal is to minimize the delay for the packets to reach the destination while limiting the energy consumption. We first assume that node encountering is known beforehand, and develop an algorithm to obtain the minimum delay. We then develop two practical network coding based schemes. Both schemes use a token technique to limit the total number of transmissions, and only incur signaling at the beginning of a group meeting. One scheme requires nodes in a group to exchange their encoding matrices with each other, while the other only requires exchanging rank information. Simulation results demonstrate that both schemes achieve delays close to the minimum delay for moderate number of tokens. They present different tradeoffs in the number of transmissions and the signaling overhead.
Advancements in hardware, software, and computing technologies make the design and application of series and diverse kinds of networks deployment in several environments possible. An instance of such networks greeted ...
详细信息
ISBN:
(纸本)9781479982677
Advancements in hardware, software, and computing technologies make the design and application of series and diverse kinds of networks deployment in several environments possible. An instance of such networks greeted with the enormous interest in research and industries is the vehicular ad-hoc networks (VANETs). Currently, information dissemination in the practical communication networks is achieved by routing. However, network coding can be thought of as the hopeful generalisation of routing that has further potential to network changing situations. Despite the existence of numerous studies on the applicability of network coding to broadcasting communications for mobile ad-hoc networks, there are few broadcasting protocols designed for VANETs that applied network coding. This paper reviews some of the applications of network coding for reliable safety message communication in VANETs, classifying them based on the transmission orientation and divulging the gain realized when the method is used. A summary table presenting the comparative study of the protocols is provided.
An adaptive quantum-inspired evolutionary algorithm based on Hamming distance (HD-QEA) was presented to optimize the network coding resources in multicast networks. In the HD-QEA, the diversity among individuals was...
详细信息
An adaptive quantum-inspired evolutionary algorithm based on Hamming distance (HD-QEA) was presented to optimize the network coding resources in multicast networks. In the HD-QEA, the diversity among individuals was taken into consideration, and a suitable rotation angle step (RAS) was assigned to each individual according to the Hamming distance. Performance comparisons were conducted among the HD-QEA, a basic quantum-inspired evolutionary algorithm (QEA) and an individual's fitness based adaptive QEA. A solid demonstration was provided that the proposed HD-QEA is better than the other two algorithms in terms of the convergence speed and the global optimization capability when they are employed to optimize the network coding resources in multicast networks.
The recent research studies showed that inter-layered network coding is a promising approach to provide the unequal error protection for scalable video multicast under the channel heterogeneity. The selection of the o...
详细信息
ISBN:
(纸本)9781509024018
The recent research studies showed that inter-layered network coding is a promising approach to provide the unequal error protection for scalable video multicast under the channel heterogeneity. The selection of the optimal transmission distribution performed at eNB increases the system performance with the cost of time and computational complexities. In this paper, we propose an optimal transmission strategy for the scalable video multicast using triangular network coding at the application layer in LTE/LTE-Advanced networks. The proposed transmission strategy comprises of two optimization phases: space reduction and performance maximization. The first optimization reduces the number of searching steps in the dictionary of possible transmission distributions by using a proposed performance predictive algorithm. The following optimization not only maximizes the average number of successfully decoded layers among receivers but also maximizes the number of receivers decoding the video base layer successfully in the second phase. We evaluate the proposed transmission strategy through various simulations with the performance metrics regarding the average number of successfully decoded layers among receivers in a multicast group, throughput, and video quality measurement. The simulation results show that our proposed scheme outperforms other recent studies and adapts well with the variable streaming rates of the video under the extreme time constraints.
As the rapid growth of data, many storage systems have used erasure codes instead of replication to reduce the storage cost under the same level of reliability. Maximum-Distance-Separable (MDS) codes have been the mos...
详细信息
ISBN:
(纸本)9781479919116
As the rapid growth of data, many storage systems have used erasure codes instead of replication to reduce the storage cost under the same level of reliability. Maximum-Distance-Separable (MDS) codes have been the most widely adopted, due to their optimal storage efficiency. It is well understood that the application of codes in storage systems, where the data is less frequently accessed. For the data, which is stored in cloud storage systems, is frequently accessed (or so-called "hot data"), the performance of data-retrieving is the key metric. To the best of our knowledge, there has been only a little work on the performance of data-retrieving in cloud storage systems with erasure codes. They combined queuing theory with coding theory to analyze and optimize the effect of MDS codes in the performance of data-retrieving. Their studies were based on MDS codes and they gave the solutions. In this paper, we transfer the perspective of study of based on MDS codes to that of optimizing MDS codes in order to improve the performance of data-retrieving, that is, from optimizing the system retrieving strategies to optimizing the coding schemes. We apply network coding to optimize the coding schemes and propose a new family of MDS codes, which reach optimal performance of data-retrieving in theory.
暂无评论