network coding (NC) holds great significance in the upcoming 5G paradigm because of the potential improvements it offers in terms of network throughput, energy efficiency and data security. However, the evidence for t...
详细信息
ISBN:
(纸本)9781538663554
network coding (NC) holds great significance in the upcoming 5G paradigm because of the potential improvements it offers in terms of network throughput, energy efficiency and data security. However, the evidence for these potential advantages comes mainly from within a theoretical framework or is based on simulations;there is a paucity of empirical evidence. Secondly, few works have evaluated NC in terms of its impacts on both throughput and bit error rate (BER) simultaneously. The work outlined in this paper addresses both of the aforementioned issues. We implement both the NC and non-NC schemes for a communication system in the context of n-source multiple-input single-output (MISO) topologies on software-defined radios (SDRs). The performances of the two schemes have been compared in terms of BER, throughput and goodput or useful throughput. Our results show that the goodput improvement in NC when compared to non-NC is more pronounced at higher transmitter (Tx) gains and that below a certain Tx gain threshold, non-NC should be preferred over NC.
This paper shows how network coding and superdense coding can be combined to increase the classical data throughput by a factor 2 − Ε (for arbitrarily small Ε > 0) compared to the maximum that could be achieved u...
详细信息
For support of interactive multimedia applications in wireless multihop networks, a sequence of data messages are required to be transmitted simultaneously in both directions. Here, intermediate wireless nodes hold te...
详细信息
ISBN:
(数字)9781728155845
ISBN:
(纸本)9781728155852
For support of interactive multimedia applications in wireless multihop networks, a sequence of data messages are required to be transmitted simultaneously in both directions. Here, intermediate wireless nodes hold temporarily data messages in both directions with high probability. network coding methods have been proposed for reduction of forwarding and end-to-end transmission delays and for increase of end-to-end data message throughput. However, for collision-free transmissions, all the 2-hop neighbor intermediate nodes are required to be suspended during a data message transmission. Some extended Request To Send/Clear To Send (RTS/CTS) controls have been proposed for network coding support; however, for avoidance of collisions between control messages, longer transmission delay is inevitable. This paper proposes a novel RTS/CTS control method for supporting network coding in bidirectional data message transmission. Here, the CTS and ACK control messages are transmitted with the usual Short Inter Frame Space (SIFS) interval and their correct simultaneous transmissions are detected by their collisions. In simulation experiments, 30.2% higher end-to-end throughput of data messages is achieved by the proposed RTS/CTS control in comparison with conventional methods.
Due to an explosive growing demand for higher data rates that have led to the 5th generation of mobile networks, network coding-enabled mobile small cells are observed as a promising technology for 5G networks that ca...
详细信息
Due to an explosive growing demand for higher data rates that have led to the 5th generation of mobile networks, network coding-enabled mobile small cells are observed as a promising technology for 5G networks that can cover the urban landscape by being set up on-demand at any place, and at any time on any device. Despite the benefits of network coding technology on these networks, pollution attacks should be addressed before network coding technology reaches its full potential in 5G mobile small cells. In this paper, we have proposed an intrusion detection and prevention scheme which is able not only to detect and prevent pollution attacks but also to detect the exact location of adversary nodes which are the source of pollution attacks.
A social network is a social structure made up of a set of social actors and a set of dyadic ties between these actors. The actors form a number of communities. In communities, some actors want to transmit their infor...
详细信息
ISBN:
(纸本)9781538617342
A social network is a social structure made up of a set of social actors and a set of dyadic ties between these actors. The actors form a number of communities. In communities, some actors want to transmit their information to all other actors. Each actor corresponds to a user equipment (UE). The UE of the actor which has information to be transmitted is also called the source, and the UEs of all other actors are called destinations. The information is transmitted from the source to destinations with the assistance of helpers, which can be small cell base stations (SCBSs). A novel information dissemination approach, namely expanded network coding with a finite buffer size (ENCFB), is proposed for the case when the buffer size of helpers is limited. The performance comparison of the uncoded information dissemination approach, the network coded approach and the ENCFB approach is conducted. Comparison results show that the ENCFB approach can significantly improve the performance of information dissemination when the buffer size is limited.
Protile-cast is a novel data dissemination paradigm in mobile opportunistic networks, which allows messages to be disseminated to nodes defined by their profiles rather than network identities. Profile-cast has attrac...
详细信息
ISBN:
(纸本)9781538671771
Protile-cast is a novel data dissemination paradigm in mobile opportunistic networks, which allows messages to be disseminated to nodes defined by their profiles rather than network identities. Profile-cast has attracted increasing attention, but most of existing algorithms cannot account for some scenarios where multiple attributes need to be considered simultaneously in a profile. By contrast, we focus on the Multi-Attribute Profile-Cast (MapCast), where the concept of group profile is defined, and a new high-efficient algorithm, Group-profile based MapCast (G-MapCast), is proposed to limit the scope of message forwarding or delivering to the nodes whose profile or group profile are similar to the target profile. To further reduce the network overhead, we propose a network coding based MapCast (NC-MapCast) algorithm on the basis of G-MapCast, which can meanwhile reduce the message decoding time. Real human contact dataset driven simulations are conducted to verify the effectiveness of our algorithms.
We propose a novel multipath multi-hop adaptive and causal random linear network coding (AC-RLNC) algorithm with forward error correction. This algorithm generalizes our joint optimization coding solution for point-to...
详细信息
With the rapid development of the contemporary society, wide use of smart phone and vehicle sensing devices brings a huge influence on the extensive data collection. network coding can only provide weak security priva...
详细信息
With the rapid development of the contemporary society, wide use of smart phone and vehicle sensing devices brings a huge influence on the extensive data collection. network coding can only provide weak security privacy protection. Aiming at weak secure feature of network coding, this paper proposes an information transfer mechanism, Weak Security network coding with Homomorphic Encryption (HE-WSNC), and it is integrated into routing policy. In this mechanism, a movement model is designed, which allows information transmission process under Wi-Fi and Bluetooth environment rather than consuming 4G data flow. Not only does this application reduce the cost, but also improve reliability of data transmission. Moreover, it attracts more users to participate.
Named Data networking (or NDN) represents a potential new approach to the current host based Internet architecture which prioritize content over the communication between end nodes. NDN relies on caching functionaliti...
详细信息
ISBN:
(纸本)9781538621950
Named Data networking (or NDN) represents a potential new approach to the current host based Internet architecture which prioritize content over the communication between end nodes. NDN relies on caching functionalities and local data storage, such as a content request could be satisfied by any node holding a copy of the content in its storage. Due to the fact that users in the same network domain can share their cached content with each other and in order to reduce the transmission cost for obtaining the desired content, a cooperative network coding mechanism is proposed in this paper. We first formulate our optimal coding and homomorphic signature scheme as a MIP problem and we show how to leverage Software Defined networking to provide seamless implementation of the proposed solution. Evaluation results demonstrate the efficiency of the proposed coding scheme which achieves better performance than conventional NDN with random coding especially in terms of transmission cost and security.
The limited spectrum resource is shared by energy harvesting (EH), spectrum sensing, and data transmission in RF-Powered cognitive wireless sensor networks (CWSNs). Aiming at improving the energy and spectrum efficien...
详细信息
ISBN:
(纸本)9781538674130
The limited spectrum resource is shared by energy harvesting (EH), spectrum sensing, and data transmission in RF-Powered cognitive wireless sensor networks (CWSNs). Aiming at improving the energy and spectrum efficiency under the energy causality and the collision causality, an EH-first optimization scheme for RF-Powered CWSNs is proposed in this paper. Firstly, it combines network coding with low energy adaptive clustering hierarchy (LEACH) algorithm to achieve the load and energy balance in the data transmission process of energy-constrained sensor units. Then, in order to improve the spectrum efficiency, a spectrum resource allocation strategy based on the EH-first model is proposed in our scheme. The simulation results show that our scheme outperforms other state-of-the-art schemes in terms of average throughput. Furthermore, it reduces the energy outage probability by 5.3%10.1% and 2.25%-4.5% compared with the cluster-based static optimization scheme and cluster-based joint optimization scheme respectively.
暂无评论