We study the relation between latency and alphabet size in the context of Multicast network coding. Given a graph G = (V, E) representing a communication network, a subset S subset of V of sources, each of which initi...
详细信息
We study the relation between latency and alphabet size in the context of Multicast network coding. Given a graph G = (V, E) representing a communication network, a subset S subset of V of sources, each of which initially holds a set of information messages, and a set T subset of V of terminals;we consider the problem in which one wishes to design a communication scheme that eventually allows all terminals to obtain all the messages held by the sources. In this study we assume that communication is performed in rounds, where in each round each network node may transmit a single (possibly encoded) information packet on any of its outgoing edges. The objective is to minimize the communication latency, i.e., number of communication rounds needed until all terminals have all the messages of the source nodes. For sufficiently large alphabet sizes (i.e., large block length, packet sizes), it is known that traditional linear multicast network coding techniques (such as random linear network coding) minimize latency. In this work we seek to study the task of minimizing latency in the setting of limited alphabet sizes (i.e., finite block length), and alternatively, the task of minimizing the alphabet size in the setting of bounded latency. We focus on the establishing the computation complexity of the problem and present several intractability results. In particular, through reductive arguments, we prove that it is NP-hard to (i) approximate (and in particular to determine) the minimum alphabet size given a latency constraint;(ii) approximate (and in particular to determine) the minimum latency of communication schemes in the setting of limited alphabet sizes.
network virtualization is believed to be a promising way for the next generation Internet to overcome network ossification. It allows multiple heterogeneous virtual networks (VNs) to be embedded onto the shared substr...
详细信息
network virtualization is believed to be a promising way for the next generation Internet to overcome network ossification. It allows multiple heterogeneous virtual networks (VNs) to be embedded onto the shared substrate network (SN) to offer more flexibility and better manageability. With the increasing deployments of VNs in a variety of networks, how to protect the VNs against the single substrate link failure has become a key challenge. In this paper, we propose a survivable VN link protection method based on network coding and protection circuit. First, we provide an integer linear programming formulation for the survivable VN link protection to maximize the long-term average revenue to cost ratio. Second, a novel protection circuit technology is introduced to augment the VN at the VN level to reduce the backup resource consumption and provide more flexible VN management. Then, an efficient heuristic virtual network embedding algorithm is developed, which makes full use of the limited resources and transforms the single substrate link protection into the single virtual link protection in multiple protection circuits. Finally, the data units from different links are encoded using network coding, which not only provides 1 + N protection to virtual links but also reduces the recovery delay. The evaluation results show that our method not only has the best acceptance ratio and long-term average revenue to cost ratio, but it also greatly enhances the achievable backup sharing and shortens the average network recovery delay.
We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. network nodes independently and randomly select linear mappings...
详细信息
We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. network nodes independently and randomly select linear mappings from inputs onto output links over some field. We show that this achieves capacity with probability exponentially approaching I with the code length. We also demonstrate that random linear coding performs compression when necessary in a network, generalizing error exponents for linear Slepian-Wolf coding in a natural way. Benefits of this approach are decentralized operation and robustness to network changes or link failures. We show that this approach can take advantage of redundant network capacity for improved success probability and robustness. We illustrate some potential advantages of random linear network coding over routing in two examples of practical scenarios: distributed network operation and networks with dynamically varying connections. Our derivation of these results also yields a new bound on required field size for centralized network coding on general multicast networks.
An adaptive quantum-inspired evolutionary algorithm based on Hamming distance (HD-QEA) was presented to optimize the network coding resources in multicast networks. In the HD-QEA, the diversity among individuals was...
详细信息
An adaptive quantum-inspired evolutionary algorithm based on Hamming distance (HD-QEA) was presented to optimize the network coding resources in multicast networks. In the HD-QEA, the diversity among individuals was taken into consideration, and a suitable rotation angle step (RAS) was assigned to each individual according to the Hamming distance. Performance comparisons were conducted among the HD-QEA, a basic quantum-inspired evolutionary algorithm (QEA) and an individual's fitness based adaptive QEA. A solid demonstration was provided that the proposed HD-QEA is better than the other two algorithms in terms of the convergence speed and the global optimization capability when they are employed to optimize the network coding resources in multicast networks.
Tactile Internet (TI) has very stringent networking requirements and the transport layer plays a crucial role in meeting these requirements. However, the transport layer has several inherent limitations (e.g., bufferb...
详细信息
Tactile Internet (TI) has very stringent networking requirements and the transport layer plays a crucial role in meeting these requirements. However, the transport layer has several inherent limitations (e.g., bufferbloat, incast issue, and head of line blocking) due to which the performance of the current transport layer solutions is not optimal. We advocate replacing the "store-and-forward" strategy in transport layer solutions with the "compute-and-forward" strategy. One way to implement the "compute-and-forward" strategy is random linear network coding (RLNC). This paper proposes a learning-based RLNC framework called RS-RLNC that utilizes network and receiver feedback to optimally select between block-RLNC and sliding-RLNC to improve overall network performance. We present a simulation-based performance evaluation of current transport layer solutions against the state-of-the-art RLNC and RS-RLNC in terms of throughput, latency, and decoding complexity. Delay is reduced by a factor of 8.5% and decoding complexity is improved up to 20% compared to the state-of-the-art. Simulation results indicate that RS-RLNC has the potential to meet the stringent requirements of TI applications. Additionally, we present three future directions outlining the evolution of RS-RLNC to enhance the transport layer for TI compatibility.
This paper investigates the problem of efficient data dissemination in Mobile Ad hoc NET-work (MANETs). A testbed is presented;which provides a realistic degree of mobility in experiments. The testbed consists of ten ...
详细信息
This paper investigates the problem of efficient data dissemination in Mobile Ad hoc NET-work (MANETs). A testbed is presented;which provides a realistic degree of mobility in experiments. The testbed consists of ten autonomous robots with mobile phones mounted on them. The mobile phones form an IEEE 802.11g ad hoc network to communicate with each other. A dynamic network topology is assumed, where the mobile devices form a cooperative cluster in order to communicate directly with each other. In the investigated scenario, the initial state is that each device carries a unique fragment of the full data set, and the goal is to exchange this data set among all devices. Several alternative strategies are presented that use UDP broadcast transmissions and Random Linear network coding (RLNC) to facilitate the efficient exchange of information in the wireless network. An application is introduced;which implements these strategies on Nokia phones. Results collected during an extensive measurement campaign are presented, and the performance of several strategies is compared using numerous metrics. We observe that network coding can substantially reduce the completion time in our scenario, which also leads to significant energy savings. (C) 2014 Elsevier B.V. All rights reserved.
Given a network of lossless links with rate constraints, a source node, and a set of destination nodes, the multicast capacity is the maximum rate at which the source can transfer common information to the destination...
详细信息
Given a network of lossless links with rate constraints, a source node, and a set of destination nodes, the multicast capacity is the maximum rate at which the source can transfer common information to the destinations. The multicast capacity cannot exceed the capacity of any cut separating the source from a destination;the minimum of the cut capacities is called the cut bound. A fundamental theorem in graph theory by Edmonds established that if all nodes other than the source are destinations, the cut bound can be achieved by routing. In general, however, the cut bound cannot be achieved by routing. Ahlswede et al established that the cut bound can be achieved by performing network coding, which generalizes routing by allowing information to be mixed. This paper presents a unifying theorem that includes Edmonds' theorem and Ahlswede et al.'s theorem as special cases. Specifically, it shows that the multicast capacity can still be achieved even if information mixing is only allowed on edges entering relay nodes. This unifying theorem is established via a graph theoretic hardiviring theorem, together with the network coding theorems for multicasting. The proof of the hardwiring theorem implies a new proof of Edmonds' theorem.
In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery ...
详细信息
ISBN:
(纸本)9781467359399;9781467359382
In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and mobile ad-hoc networks. However, multicasting with replication-based methodologies can induce considerable message traffic and longer delivery delay time, thereby being vulnerable upon system performance. This paper exploits the potential of network coding to design an efficient network-coding multicast mechanism in delay-tolerant networks. In this design, intermediate nodes in a network can perform a specific remix qualification approach which can not only alleviate the dependency problem among coded blocks but also generate more innovative coded blocks for restoring the original message by destination nodes. Simulation results show that the proposed mechanism is able to achieve cost-effective performance as compared with the naive network-coding and the replication-based delivery mechanisms for message multicasting in delay-tolerant networks.
In infrastructure-lacking environments, like military areas of operation, the intermittent availability of backhaul networks leads to greater reliance on peer to peer data exchange. In such settings, mobile nodes use ...
详细信息
ISBN:
(纸本)9781479966646
In infrastructure-lacking environments, like military areas of operation, the intermittent availability of backhaul networks leads to greater reliance on peer to peer data exchange. In such settings, mobile nodes use Delay Tolerant network (DTN) protocols for exchanging location specific data. High transmission delay, packet loss and intermittent connectivity increases the need for efficient data transmission in such scenarios. In this paper, we evaluate network coding for efficient data exchange between mobile wireless nodes under the presence of an intermittent backhaul network, like a satellite or cellular link. We analyze the upper bound of savings achievable with network coding for single-hop packet transmission, and introduce a network coding algorithm focused on reducing the required number of packet transmissions in such a setting. Evaluation of our proposed data exchange protocol shows how network coding can be applied to reduce transmission delay and minimize the dependency on an intermittent backhaul network in a communication scenario typical of a military environment.
The applications in the critical infrastructure systems pose simultaneous resilience and performance requirements to the underlying computer network. To meet such requirements, the networks that use the store-and-forw...
详细信息
ISBN:
(纸本)9781538660430
The applications in the critical infrastructure systems pose simultaneous resilience and performance requirements to the underlying computer network. To meet such requirements, the networks that use the store-and-forward paradigm poses stringent conditions on the redundancy in the network topology and results in problems that becoming computationally challenging to solve at scale. However, with the advent of programmable data-planes, it is now possible to use linear network coding (NC) at the intermediate network nodes to meet resilience requirements of the applications. To that end, we propose an architecture that realizes linear NC in programmable networks by decomposing the linear NC functions into the atomic coding primitives. We designed and implemented the primitives using the features offered by the P4 ecosystem. Using an empirical evaluation, we show that the theoretical gains promised by linear network coding can be realized with a per-packet processing cost.
暂无评论