In a number of application domains, the volatility of the environment where Wireless Sensor networks (WSNs) should operate engenders time constraints on the generation, processing, and communication of sensory data. I...
详细信息
ISBN:
(纸本)9781424456383
In a number of application domains, the volatility of the environment where Wireless Sensor networks (WSNs) should operate engenders time constraints on the generation, processing, and communication of sensory data. In this paper, we investigate the use of network coding and service reneging for the timely delivery of messages between wireless sensor nodes that utilize the IEEE 802.15.4 MAC/PHY standard. More specifically, we study the real-time performance of algebraic coding and traffic regulation under different traffic loads and for different timeliness requirements. Our simulation results indicate that both techniques can be on their own effective measures to improve on-time delivery of messages in overload conditions. An additional gain in performance is obtained when coding is carefully coupled with a traffic regulation based on proactive cleaning of transmission queues.
Wireless Smart Home Sensor network (WSHSN) is a home-similar environment, where several wireless sensors can observe the home status and transmit the data streams to the Smart Home Information System (SHIS). Communica...
详细信息
ISBN:
(纸本)9781509025589
Wireless Smart Home Sensor network (WSHSN) is a home-similar environment, where several wireless sensors can observe the home status and transmit the data streams to the Smart Home Information System (SHIS). Communication in Wireless Sensor network (WSN) in small living environments faces noise and data transmission speed problems. Especially in the case of employing mobile agents, the WSN restructures dynamically, hence the network performance reduces dramatically. On the one hand, the Internet of Things (IoT) concept includes a broad application of wireless devices, while on the other hand, the WSN throughput decreases significantly by application of more wireless devices. network coding is a promising technique that can help to broaden the utilization of nodes in WSNs, while network throughput improves by the application of more wireless nodes. In this paper, IoT in WSHSN is modelled as a particular instance of butterfly network and the corresponding network coding based methodology aiming to increase the network throughput is proposed. A case study, supporting the theory of network coding in IoT in small living rooms, is proposed.
Video transmission over wireless network has to face many challenges due to varying channel conditions and limited network resources. To achieve reliable transmission as well as high throughput efficiency over lossy w...
详细信息
ISBN:
(纸本)9789881563811
Video transmission over wireless network has to face many challenges due to varying channel conditions and limited network resources. To achieve reliable transmission as well as high throughput efficiency over lossy wireless channels, a network coding/ARQ hybrid error-control scheme is developed in this paper. Different form the traditional methods, the proposed scheme takes both the reliability and efficiency into account. It allows the adaptation of the coded packets issued from the source to the estimated channel condition. At last, the experimental results show the performance of the error-control scheme.
Underwater acoustic sensor networks offer significant advantages for numerous maritime applications, allowing to connect and coordinate multiple seafloor sensors and autonomous underwater vehicles into a network for r...
详细信息
ISBN:
(纸本)9781479900008;9781479900022
Underwater acoustic sensor networks offer significant advantages for numerous maritime applications, allowing to connect and coordinate multiple seafloor sensors and autonomous underwater vehicles into a network for real-time data collection, monitoring, exploration and navigation. Underwater acoustic channels are characterized by high level of reverberations, big amount of multipath components, limited bandwidth and the half-duplex nature of underwater acoustic communication. These factors explain the underwater channel's essential difference from conventional terrestrial radio channels and complicate data transmissions in an underwater network. Underwater networking technologies are in great demand, so network protocols that ensure reliable underwater operations are of growing importance to the industry. The theory of network coding promises significant benefits to increase channel throughput and reduce data loss by transmitting encoded packets containing data from different source nodes. This paper bridges theory with practice by implementing the theory of network coding to increase the throughput of underwater acoustic networks. There are presented experimental results of network coding in shallow water with 5 nodes, including 2 end points and 3 access points.
In Mobile Ad-Hoc networks, broadcasting is a fundamental operation in the network layer, where a node rebroadcasts a message to all other nodes whenever it receives the message for the first time. It will cause many r...
详细信息
ISBN:
(纸本)9780769551272
In Mobile Ad-Hoc networks, broadcasting is a fundamental operation in the network layer, where a node rebroadcasts a message to all other nodes whenever it receives the message for the first time. It will cause many redundant transmissions and it will develop a serious problem called 'Broadcast Storm problem'. In recent times, researchers have designed 2-Hop Neighbour based protocol like DP, TDP, PDP to reduce broad cast storm problem in MANETs by selecting the minimum number of forwarding nodes from 1-Hop nodes to cover all 2-Hop nodes. Newly the researchers are adapting network coding to reduce the number of transmissions in broadcasting. In this paper, we impose network coding in the existing TDP protocol. We have made an attempt to find the network coding gain in the high and low load situations.
Survivability of many-to-one flow networks such as wireless mesh networks (WMNs) and wireless sensor networks (WSNs) is an important issue that has not received enough attention in the literature. Traditional proactiv...
详细信息
ISBN:
(纸本)9781424414543
Survivability of many-to-one flow networks such as wireless mesh networks (WMNs) and wireless sensor networks (WSNs) is an important issue that has not received enough attention in the literature. Traditional proactive and reactive protection schemes are either resource-hungry like the (1 + 1) protection scheme, or introduce a delay and interrupt the network operation like the (1 : N) protection scheme. In this paper, we present a novel approach that relies on network coding to provide protection to many-to-one flows as in WMNs or WSNs at the speed of proactive protection, but at the cost of reactive protection. We derive and prove the necessary and sufficient conditions for our solution on a restricted network topology. Then we introduce three generalizations of our problem, and provide a heuristic and a mixed integer linear program (MILP) to solve one of them. We also show how to perform deterministic coding with {0, 1} coefficients to achieve linear independence. Finally, we discuss some practical considerations related to our approach, and define a more general problem that takes these considerations into account. We also formulate this general problem as an MILP.
With the enormous increase in the usage of communication networks, protection against node and link failures became essential in the deployment of reliable networks. To manage loss of data due to node failures, we des...
详细信息
ISBN:
(纸本)9781424434343
With the enormous increase in the usage of communication networks, protection against node and link failures became essential in the deployment of reliable networks. To manage loss of data due to node failures, we design a network protection strategy that aims to withstand such failures. In this paper we propose a protection strategy against any single node failure in the network. We deploy network coding and reduced capacity in this strategy without adding extra working paths to the readily available connection paths. The strategy is based on representing node failures by the failure of multiple links, and hence is transformed into a protection against multiple link failures. Consequently, the protection strategies proposed in [2], [8] can also be applied for protection against node failures. In addition, we demonstrate the implementation aspects of the premeditated protection strategies.
While network coding can potentially provide significant throughput benefits by combining packets prior to forwarding them, the achievable gains are directly related to the coding opportunities at a relay that perform...
详细信息
ISBN:
(纸本)9781467315449;9781467315425
While network coding can potentially provide significant throughput benefits by combining packets prior to forwarding them, the achievable gains are directly related to the coding opportunities at a relay that performs encoding. If the relay does not have packets destined for distinct destinations, that can be encoded together, the network coding gains could be marginal. Towards increasing the opportunities for network coding, in this paper we propose a queue management scheme, that arbitrates the rate at which distinct transmitters send packets to a common relay which applies network coding. Our queue management approach prioritizes the channel access of nodes that do not have enough enqueued packets at the common relay, thereby essentially attempting to balance the number of packets from the distinct senders at the relay. We perform extensive simulations of our approach (built as a wrapper on top of the popular network coding approach COPE) in multi-rate scenarios. We find that our approach yields throughput gains of up to 57% compared to COPE due to enhanced opportunities towards encoding packets.
Wireless network coding has attracted significant attention recently over relay channels. In this paper, we are interested in two-way wireless communication and explore the comparative advantages of two popular networ...
详细信息
ISBN:
(纸本)9781424429479
Wireless network coding has attracted significant attention recently over relay channels. In this paper, we are interested in two-way wireless communication and explore the comparative advantages of two popular network coding strategies, binary network coding (NetC) and superposition coding (SupC), also named as analog network coding. In the literature, most works focused on NetC under a three-step framework and recently also SupC but under a two-step one. However, there is still little understanding on the truly optimal configuration. In addition, most works assumed channel knowledge at the transmitters while ignoring the presence of the direct link, which may not be valid in a fading environment. In this work, we focus on the outage performance instead and take into consideration also the time-varying nature of the direct link. Outage regions of various schemes are theoretically characterized and their optimal operating conditions are identified, from which the best combined strategies are derived in terms of the maximum goodput and robustness to channel knowledge defects. Interesting new findings together with insightful discussions are provided.
Many networks today are composed of numerous subnetworks or domains. The connection points of these domains are important and vulnerable parts of the communication. Therefore, one of the key points of protection schem...
详细信息
ISBN:
(纸本)9781424464043
Many networks today are composed of numerous subnetworks or domains. The connection points of these domains are important and vulnerable parts of the communication. Therefore, one of the key points of protection schemes today is being able to protect these interconnections. Hence, in this type of networks a protection mechanism is applied, where there is 1+1 protection inside each domain and dual homing at the borders. With this mechanism, the breakdown due to the failure of the interconnection elements is prohibited. This system enables the network to survive any node or link failure in each domain. However, it suffers from the high capacity need on the border links, where data has to be transmitted bidirectionally for each single demand. We are showing that combining network coding with this protection mechanism gives a realization, which outperforms the existing mechanism by providing high resource savings. We present the theoretical basis and the application methodology of the proposed method.
暂无评论