Energy and throughput optimization occupies an important place in the research area of Wireless Sensor networks (WSNs). These networks are a class of useful but challenging networks. Combining network coding (NC) and ...
详细信息
ISBN:
(纸本)9781467387590
Energy and throughput optimization occupies an important place in the research area of Wireless Sensor networks (WSNs). These networks are a class of useful but challenging networks. Combining network coding (NC) and efficient scheduling in the MAC layer of such networks gives more efficiency and copes with the problem of energy waste and inefficiency management as well as transmission's lose and collision. Our work's concern is to assess the contribution of the network coding technique's introduction to improve the efficiency and optimize the energy consumption in the MAC layer of IR-UWB based WSNs. Therefore, we tested this new technique using WideMac Protocol;which is a relevant MAC protocols dedicated to WSNs based on IR-UWB. Furthermore, we used XOR coding to fit low computational capabilities requirement in such networks. The obtained results are very encouraging and the proposed MAC scheme's improvements have demonstrated the positive impact of using NC in terms of both used metrics.
In order to rapidly response to users request in highspeed mobile environment, achieve efficient content distribution in content center network, this paper proposed a novel multipath routing transmission mechanism bas...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
In order to rapidly response to users request in highspeed mobile environment, achieve efficient content distribution in content center network, this paper proposed a novel multipath routing transmission mechanism based on network coding(MRNC). By using network coding technology, users Interest packet is divided into multiple child interest packet, and the content is divide and random linear codes and the content, thus the content is cache fragmentation. Content retrieval process is become into more child content retrieval process by the multipath routing technology. The simulation results show that the proposed mechanism can effectively improve the node success delivery rate, reduce the total road network redundancy, improve the transmission efficiency
The combination network is one of the simplest and insightful networks in coding theory. The vector network coding solutions for this network and some of its sub-networks are examined. For a fixed alphabet size of a v...
详细信息
ISBN:
(纸本)9781538692912
The combination network is one of the simplest and insightful networks in coding theory. The vector network coding solutions for this network and some of its sub-networks are examined. For a fixed alphabet size of a vector network coding solution, an upper bound on the number of nodes in the network is obtained. This bound is an MDS bound for subspaces over a finite field. A family of sub-networks of combination networks is defined. It is proved that for this family of networks, which are minimal multicast networks, there is a gap in the minimum alphabet size between vector network coding solutions and scalar network coding solutions. This gap is obtained for any number of messages and is based on coloring of the q-Kneser graph and a new hypergraph generalization for it.
Recently, network coding (NC) has been considered as a breakthrough to improve throughput, robustness, and security of wireless network. Although there have been many theoretical studies on performance of NCs, there h...
详细信息
ISBN:
(纸本)9781538679630
Recently, network coding (NC) has been considered as a breakthrough to improve throughput, robustness, and security of wireless network. Although there have been many theoretical studies on performance of NCs, there have been few experiments with pure NC schematics. This paper presents the first implementation of NC with multiple media transmission, which uses layered coding. The implementation is real-time and based on Software Define Radio (SDR) technique. The experimental results show that, by combining NC and source coding, we can control quality of received images on demand.
A Mobile Ad Hoc network (MANET) is a dynamic wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. Due to bandwidth constraint and dynamic top...
详细信息
ISBN:
(纸本)9780769546766
A Mobile Ad Hoc network (MANET) is a dynamic wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. Due to bandwidth constraint and dynamic topology of mobile ad hoc networks, multipath supported routing is a very important research issue. This paper proposes a network coding-based on-demand Multipath Routing algorithm in MANET (NCMR). It is typically proposed in order to increase the reliability of data transmission or to provide load balancing. In our simulation, we compare NCMR routing protocol with AODVM routing protocol, in terms of the packet delivery ratio, packet overhead, and average end-to-end delay when a packet is transmitted. The simulation results show that the NCMR routing protocol provide an accurate and efficient method of estimating and evaluating the route stability in dynamic MANETs.
We propose a method to identify structural properties of multicast network configurations, by decomposing networks into regions through which the same information flows. This decomposition allows us to show that very ...
详细信息
We propose a method to identify structural properties of multicast network configurations, by decomposing networks into regions through which the same information flows. This decomposition allows us to show that very different networks are equivalent from a coding point of view, and offers a means to identify such equivalence classes. It also allows us to divide the network coding problem into two almost independent tasks: one of graph theory and the other of classical channel coding theory. This approach to network coding enables us to derive the smallest code alphabet size sufficient to code any network configuration with two sources as a function of the number of receivers in the network. But perhaps the most significant strength of our approach concerns future network coding practice. Namely, we propose deterministic algorithms to specify the coding operations at network nodes without the knowledge of the overall network topology. Such decentralized designs facilitate the construction of codes that can easily accommodate future changes in the network, e.g., addition of receivers and loss of links.
Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, network coding (NC) technology can be foreseen as...
详细信息
Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, network coding (NC) technology can be foreseen as a promising solution for the wireless network of mobile small cells to increase its throughput and improve its performance. However, NC-enabled mobile small cells are vulnerable to pollution attacks due to the inherent vulnerabilities of NC. Although there are several works on pollution attack detection, the attackers may continue to pollute packets in the next transmission of coded packets of the same generation from the source node to the destination nodes. Therefore, in this paper, we present an intrusion detection and location-aware prevention (IDLP) mechanism which does not only detect the polluted packets and drop them but also identify the attacker's exact location so as to block them and prevent packet pollution in the next transmissions. In the proposed IDLP mechanism, the detection and locating schemes are based on a null space-based homomorphic MAC scheme. However, the proposed IDLP mechanism is efficient because, in its initial phase (i.e., Phase 1), it is not needed to be applied to all mobile devices in order to protect the NC-enabled mobile small cells from the depletion of their resources. The proposed efficient IDLP mechanism has been implemented in Kodo, and its performance has been evaluated and compared with our previous IDPS scheme proposed in [1], in terms of computational complexity, communicational overhead, and successfully decoding probability as well.
Conventional linear multicast can be constructed on any acyclic network by increasing the order of the finite field to a sufficiently large amount over which the multicast is defined. In this paper, we first discuss t...
详细信息
Conventional linear multicast can be constructed on any acyclic network by increasing the order of the finite field to a sufficiently large amount over which the multicast is defined. In this paper, we first discuss the reciprocal theorem of the conventional linear multicast and design a linear multicast on any give acyclic network with constant finite field by extending the multicast dimension and relaxing the constraint on the information storage. In particular, we propose the binary linear multicast network coding and the linear multicast with binary coefficients. With the proposed method, the computation complexity for network coding at the intermediate nodes can be significantly reduced;therefore cheap network nodes can be deployed in a large scale due to their low cost for wireless communications. In addition, some applications of the proposed binary linear multicast network coding in wireless communication networks are illustrated and validated.
Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effect...
详细信息
Owing to the long propagation delay and high error rate of acoustic channels, it is very challenging to provide reliable data transfer for underwater sensor networks. Moreover, network coding is proved to be an effective coding technique for throughput and robustness of networks. In this paper, we propose a Reliable Braided Multipath Routing with network coding for underwater sensor networks (RBMR-NC). Disjoint multi-path algorithm is used to build independent actual paths, as called main paths. Some braided paths on each main path are built according to the braided multi-path algorithm, which are called logic paths. When a data packet is transmitted by these nodes, the nodes can employ network coding to encode packets coming from the same group in order to further reduce relativity among these packets, and enhance the probability of successful decoding at the sink node. Braided multi-path can make the main paths to be multiplexed to reduce the probability of long paths. This paper mainly employs successful delivery rate to evaluate RBMR-NC model with theoretical analysis and simulation methods. The results indicate that the proposed RBMR-NC protocol is valuable to enhance network reliability and to reduce system redundancy.
Errors are inherently present in unreliable wireless channels. The primary challenge in designing error-control protocols in the medium-access control ( MAC) or physical layer is to effectively maximize achievable thr...
详细信息
Errors are inherently present in unreliable wireless channels. The primary challenge in designing error-control protocols in the medium-access control ( MAC) or physical layer is to effectively maximize achievable throughput in wireless networks, even when unpredictable and time-varying errors exist. network coding has successfully been applied to improve throughput in IEEE 802.11-based wireless networks with a shared broadcast channel. In state-of-the-art physical-layer designs in multichannel wireless networks [such as IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX)], however, the convenience of a shared wireless broadcast channel to perform opportunistic listening no longer exists, and hybrid automatic repeat request (HARQ) is the predominant error-control protocol in the physical layer, rather than plain automatic repeat request in IEEE 802.11 MAC. Would network coding be well employed in multichannel wireless networks and able to bring further improvements over HARQ? This paper proposes Drizzle, which is a new solution to maximizing throughput with the presence of errors, which takes advantage of network coding at the symbol level in multichannel wireless networks. By operating at the symbol level and using soft-decision values, we show that Drizzle is able to exploit both time and cooperative diversity in realistic multichannel wireless networks, to adapt to time-varying and bursty channel errors, and to efficiently
暂无评论