In this study, the authors consider the communication scenario where two sources communicate with the help of a single relay, modelled as a half-duplex butterfly network. Closed-form expressions of the outage probabil...
详细信息
In this study, the authors consider the communication scenario where two sources communicate with the help of a single relay, modelled as a half-duplex butterfly network. Closed-form expressions of the outage probabilities are derived in the high signal-to-noise ratio (SNR) regime for the orthogonal amplify-and-forward and non-orthogonal amplify-and-forward protocols. Then the expressions are approximated to enable power allocation. Closed-form power allocation schemes are proposed for each protocol, where only statistical channel knowledge is required. It is shown that the authors analyses match well with simulation results and the approximated versions are very close to the simulation results. The proposed power allocation schemes achieve a large SNR gain over the equal-power strategies and approach the optimal power allocation schemes.
This paper proposes a network coding method with linear mapping and low-complexity estimation for the two-way relay non-reciprocal channel using the M-QAM modulation. The proposed network coding is developed by combin...
详细信息
This paper proposes a network coding method with linear mapping and low-complexity estimation for the two-way relay non-reciprocal channel using the M-QAM modulation. The proposed network coding is developed by combining the channel quantization method and linear estimation based on successive interference cancellation. The effect of residual interference due to channel quantization on the signal decision is analyzed in detail in order to understand the system- behavior. Analytical and simulation results show that the proposed network coding method can achieve high SER performance and up-link throughput while requiring low computational complexity. (C) 2018 Elsevier GmbH. All rights reserved.
In this paper, we study the problem of delay minimization in network function virtualization-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, wher...
详细信息
In this paper, we study the problem of delay minimization in network function virtualization-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this paper, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network but also, perhaps surprisingly, reduces the overall transmission delay. In particular, we establish that by judiciously choosing the subset of nodes which compute each function, in conjunction with a linear network coding scheme to deliver the result of each computation, we can characterize and achieve the optimal end-to-end transmission delay. In addition, we show that using such technique, it is possible to significantly reduce the transmission delay as compared to the conventional approaches. In fact, in some scenarios, such reduction can even scale with the size of the network, where by increasing the number of nodes that can compute the given function in parallel by a multiplicative factor, the end-to-end delay will also decrease by the same factor. Moreover, we show that while finding the subset of nodes for each computation, in general, is a complex integer program, approximation algorithms can be proposed to reduce the computational complexity. In fact, for the case where the number of computing nodes for a given function is upper bounded by a constant, a dynamic programming scheme can be proposed to find the optimum subsets in polynomial times. Our numerical simulations confirm the achieved gain in performance in comparison with conventional approaches.
The demand for wideband communication in the coastal area (i.e., = 100 km from the coastline) has been rapidly increasing in recent years. Compared to the terrestrial scenario, the coastal environment has long-distanc...
详细信息
The demand for wideband communication in the coastal area (i.e., = 100 km from the coastline) has been rapidly increasing in recent years. Compared to the terrestrial scenario, the coastal environment has long-distance and highly dynamic channels, and the communication devices are more strictly constrained by energy supplies. While the RLNC has the fountain erasure-correction property and is suitable for transmissions over the long-distance dynamic channels, it suffers from high coding coefficient delivery cost and decoding complexity. In this article, we look into the application of sparse network coding in coastal communication systems. We identify two typical multicast scenarios that may appear in coastal communications, namely the relay-aided multicast and multicast from a shore-based base station with D2D communication enabled among the subscribers. We provide a detailed comparison of existing sparse network coding schemes. Based on that, we demonstrate through simulations that an appropriate choice of sparse codes is critical to meet the unique requirements in coastal communication systems. We show that batched sparse code is suitable for relay-aided multicast, and subset-based sparse codes are preferable for D2D-enabled multicast.
This paper investigates the problem of delay-constrained encoding by applying transmission power control in wireless networks. First, we formulate the problem using integer nonlinear programming and demonstrate that i...
详细信息
This paper investigates the problem of delay-constrained encoding by applying transmission power control in wireless networks. First, we formulate the problem using integer nonlinear programming and demonstrate that it is NP-complete. Moreover, a heuristic encoding algorithm based on power self-adaptation (EAPS) is proposed, which includes two sub-algorithms: the power optimal algorithm (POA) and encoding selection algorithm (ESA). The POA determines the initial transmission power for each packet by taking advantage of opportunities in which the transmission power is increased, thereby decreasing the transmission time without extra energy consumption. The ESA constructs two linked lists: the packet delay constraint linked list (D-List) and optimal power linked list (P-List) based on the POA. Whenever possible, it selects one packet with a tight delay constraint in the D-List and other packets in the same location as the above packet in the P-List to code. Furthermore, this paper includes an analysis of the probability of increasing any transmission power level without extra energy consumption in the POA. Lastly, the simulation results show that EAPS can significantly improve the delay satisfaction ratio and reduce transmission time compared to the COPE, TAONC, and *** algorithms.
Linear network coding over finite fields is a well-studied problem. We consider the more general setting of linear coding for directed acyclic networks with finite commutative ring alphabets. Our results imply that fo...
详细信息
Linear network coding over finite fields is a well-studied problem. We consider the more general setting of linear coding for directed acyclic networks with finite commutative ring alphabets. Our results imply that for scalar linear network coding over commutative rings, fields can always be used when the alphabet size is flexible, but other rings may be needed when the alphabet size is fixed. We prove that if a network has a scalar linear solution over some finite commutative ring, then the (unique) smallest such commutative ring is a field. We also show that fixed-size commutative rings are quasi-ordered, such that all the scalar linearly solvable networks over any given ring are also scalar linearly solvable over any higher-ordered ring. We study commutative rings that are maximal with respect to this quasi-order, as they may be considered the best commutative rings of a given size. We prove that a commutative ring is maximal if and only if some network is scalar linearly solvable over the ring, but not over any other commutative ring of the same size. Furthermore, we show that maximal commutative rings are direct products of certain fields specified by the integer partitions of the prime factor multiplicities of the ring's size. Finally, we prove that there is a unique maximal commutative ring of size m if and only if each prime factor of m has multiplicity in {1, 2, 3, 4, 6}. As consequences, 1) every finite field is such a maximal ring and 2) for each prime p, some network is scalar linearly solvable over a commutative ring of size p(k) but not over the field of the same size if and only if k is not an element of. {1, 2, 3, 4, 6}.
The Multi-Path, Multi-Hop (MPMH) communications have been extensively used in wireless network. It is especially suitable to big data transmissions due to its high throughput. To provide congestion and end-to-end reli...
详细信息
The Multi-Path, Multi-Hop (MPMH) communications have been extensively used in wireless network. It is especially suitable to big data transmissions due to its high throughput. To provide congestion and end-to-end reliability control, two types of transport layer protocols have been proposed in the literature: the TCP-based protocols and the rateless coding based protocols. However, the former is too conservative to explore the capacity of the MPMH networks, and the latter is too aggressive in filling up the communication capacity and performs poorly when dealing with congestions. To overcome their drawbacks, a novel network coding scheme, namely, Adjustable Batching coding (ABC), was proposed by us, which uses redundancy coding to overcome random loss and uses retransmissions and window size shrink to relieve congestion. The stratified congestion control strategy makes the ABC scheme especially suitable for big data transmissions. However, there is no simulation platform built so far that can accurately test the performance of the network coding based transport protocols. We have built a modular, easy-to-customize simulation system based on an event-based programming method, which can simulate the ABC-based MPMH transport layer behaviors. Using the proposed simulator, the optimal parameters of the protocol can be fine-tuned, and the performance is superior to other transport layer protocols under the same settings. Furthermore, the proposed simulation methodology can be easily extended to other variants of MPMH communication systems by adjusting the ABC parameters. (C) 2018 Elsevier B.V. All rights reserved.
Utilizing device-to-device (D2D) connections among mobile devices is promising to meet the increasing throughput demand over cellular links. In particular, when mobile devices are in close proximity of each other and ...
详细信息
Utilizing device-to-device (D2D) connections among mobile devices is promising to meet the increasing throughput demand over cellular links. In particular, when mobile devices are in close proximity of each other and are interested in the same content, D2D connections such as Wi-Fi Direct can be opportunistically used to construct a cooperative (and jointly operating) cellular and D2D networking system. However, it is crucial to understand, quantify, and exploit the potential of network coding for cooperating mobile devices in the joint cellular and D2D setup. In this paper, we consider this problem, and: 1) develop a network coding framework, namely NCMI, for cooperative mobile devices in the joint cellular and D2D setup, where cellular and D2D link capacities are the same;and 2) characterize the performance of the proposed network coding framework, where we use packet completion time, which is the number of transmission slots to recover all packets, as a performance metric. We demonstrate the benefits of our network coding framework through simulations.
In the upcoming 5G era, many new types of networks will greatly expand the connectivity of the world such as vehicular ad hoc networks (VANETs), Internet of Things (IoT), and device-to-device communications (D2D). Net...
详细信息
In the upcoming 5G era, many new types of networks will greatly expand the connectivity of the world such as vehicular ad hoc networks (VANETs), Internet of Things (IoT), and device-to-device communications (D2D). network coding is a promising technology that can significantly improve the throughput and robustness of these emerging 5G multihop networks. However, network coding is generally very fragile to malicious attacks such as message content corruption and node compromise attacks. To take advantage of network coding in performance gain while refraining malicious network attacks is an interesting and challenging research issue. In this paper, we propose a new error-detection and error-correction (EDEC) scheme that can jointly detect and remove the malicious attacks based on the underlying error-control scheme for general multihop networks that can model the 5G multihop networks. The proposed scheme can increase the throughput for network with pollution attacks compared to existing error-detection based schemes. Then we propose a low-density parity check (LDPC) decoding based EDEC (LEDEC) scheme. Our theoretical analysis demonstrates that the LEDEC scheme can further increase the throughput for heavily polluted network environments. We also provide extensive performance evaluation and simulation results to validate the proposed schemes. This research ensures the expected performance gain for the application of network coding in the 5G network under malicious pollution attacks.
network coding (NC) can reduce the number of packet retransmissions and improve the network reliability in lossy networks. Reliability gain of NC over traditional error control mechanisms has been investigated in rece...
详细信息
network coding (NC) can reduce the number of packet retransmissions and improve the network reliability in lossy networks. Reliability gain of NC over traditional error control mechanisms has been investigated in recent works. In this paper, we study reliable broadcast in a real-world topology where link loss probabilities are different from each other. We derive approximate closed-form expressions and analyse asymptotic behaviour for expected number of transmissions employing stop-and-wait automatic repeat request (ARQ) and NC as error control mechanisms. In physical layer cooperative communication, multiple nodes can transmit collectively to take advantage of spatial diversity. We incorporate the idea of physical layer cooperative communication with ARQ and NC separately, to obtain further reliability. Numerical results based on our asymptotic analysis indicate that NC offers more reliability than stopand-wait ARQ. However, as the size of the cooperating set increases, both the schemes offer the same reliability. Approximate closed-form expressions for the reliability metric of these schemes and their asymptotic results match well with simulation results. Furthermore, simulation results establish that the proposed NC scheme outperforms existing schemes in literature. (C) 2018 Elsevier B.V. All rights reserved.
暂无评论