Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Size: px
Start display at page:

Download "Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding"

Transcription

1 Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Nour KADI LRI, Paris XI University, Orsay, France Ivan Stojmenovic SITE, University of Ottawa, Canada Abstract We consider multiple source asynchronous broadcasting problem. That is, in each broadcast, one of the nodes is the source, and the message is to be received, unaltered, by all the other nodes in the network. We propose to exploit LT code, which is one of the fountain codes, with the source independent backbone in order to reduce the number of transmissions for broadcasting with network coding in ad hoc wireless network. We use the principle of LT code to perform network coding in a simple distributed manner where encoding can be applied with both received singletons and non-singletons, and generated candidates can be used in an optimization criteria. We show by simulation that our approach reduces the number of transmissions required for flooding. I. INTRODUCTION Forward error correcting (FEC) schemes such as fountain codes [1], [2] are provided as a solution for reliable communication in lossy networks. They eliminate the need of retransmission request which increases the bandwidth consumption and increases the delay. The most important characteristic of these codes is its low complexity of encoding and decoding functions. These schemes is considered as endto-end approaches where the source node generates a flow of encoded packets and the destination starts decoding to get the source packets when it receives enough encoded packets. LT (Luby transform) codes [1] are special case of digital fountain s codes. LT encoder [1] chooses randomly from a set of K packets, and according to a distribution, a subset of d packets, and XOR them. In practice, decoding may be possible from a set S of such encoded packets, for S slightly larger than K. Decoding starts from packets with d =1(that we call here singletons), which are then removed (by applying ) from the encoded packets where they participate. The process is repeated until all packets are decoded, or there are no more singletons. This decoding algorithm forces the increased number of singletons to avoid halting decoding process. We are particularly interested in wireless ad hoc and sensor networks, in applications where multiple sources broadcast data to all other nodes. Broadcasting using network coding was studied in [3]. However, XOR and opportunistic listening to neighbor receptions was not applied. In XOR-based algorithm [4], forwarding nodes store only source packets, and also store subset of source packets received by each neighbor (via opportunistic listening). An encoded packet will benefit one of neighbors only if it contains exactly one new source packet. Greedy heuristic starts with one source packet at the head of output queue. Then sequentially other packets would be XORed to previously taken source packets only if they allow all neighbors to decode received packet. [4] chooses some of nodes to retransmit messages, independent on coding process. We refer to this set as backbone nodes. The proposed backbone construction used in [4] is very similar to MPR (multipoint relay). Each node selects its own MPR (multipoint relay) set which is set of one-hop neighbors that cover two-hop neighbors. Broadcasting from a source node then proceeds by retransmitting from any receiving node if it identifies that it is MPR node of sender node. Decoding process is improved in [5]. Their algorithm has similar goal like XORbased algorithm [4], to maximize the number of neighbors that can learn one new source packet. However, they do not require the ability of all neighbors to decode received packet in their greedy heuristics. Packet with longest queue delay is added first to the encoded packet. Each of the remaining source packets is tested for inclusion in the current set of source packets. If any of them would increase the number of neighbors that will benefit then the one with maximal such benefit will be added. Encoded packets are not memorized at sender or receiving nodes, as they all store only decoded source packets throughout the process. [4] also proposes a Reed-Solomon based coding algorithm. The main drawback of this algorithm is the need to send k (maximal number of missing packets at any neighbor) packets at once, and the need for neighbors to receive them all to complete decoding, otherwise the whole set of transmitted packets is wasted (even if a single failure happens at a single neighbor). The LT-code based algorithm from [5] allows nodes to store received encoding packets that couldn t be decoded immediately. Each time a node has a sending opportunity signaled by MAC, it applies LT code over native packets that are in need by at least one of neighbors, and are assigned for retransmission by the node with MPR based backbone. The number of native packets d to be encoded is decided /9/$2. 29 IEEE

2 by selected distribution [1]. If d > 1 then the receiver will eliminate from the encoded packet all native packets that are present in it and already received. After that, all remaining (and stored) encoded packets will be composed of only native packets which are not individually decoded. If the degree of encoded packet is reduced to 1 then new native packet is recognized, and it can be then used to reduce other, previously received and stored, encoded packets. The receiver then piggybacks IDs of newly recognized packets to the next packet data to inform neighbors. In this paper we propose to integrate the notion of network coding with the technique of connected dominating set which represents the source independent backbone in order to improve the broadcast process in ad hoc wireless network. When using the source independent backbone, the intermediate nodes are either responsible for retransmitting all or none of packets. This increases network coding efficiency since forwarder nodes use all available packets in encoding. We use a simple and distributed method to apply LT-based encoding at each forwarder. We propose to increase the options for encoding, by encoding together native packets and already encoded packets instead of only native ones. Our design uses the following principles: It is based on deterministic broadcasting as it employs a source independent backbone where only some forwarders are responsible for rebroadcasting the packets. This technique reduces the redundant retransmissions. It employs opportunistic network coding in order to overload each transmission with additional information as possible without delaying the packets. It implements the coding by using the principle of LT code which is rateless erasure code and is characterized by the simplicity of its encoding and decoding functions. Our simulation results show the efficiency of our approach as it reduces the number of transmissions required for flooding and reduces the packet delay as well. II. RELATED WORK A. Broadcasting with network coding Broadcasting using network coding was studied in [3]. Each node is a source that wants to transmit the same amount of information to all other nodes. Authors apply linear network coding from [6]. Intermediate nodes may combine incoming encoded packets, by making a random linear combination of them. The vector of coefficients (coding vector) over n source packets is transmitted together with the encoded message, and is collected in a decoding matrix G. A received packet is said to be innovative if its coding vector increases the rank of matrix G. Once a node receives n linearly independent combinations, it is able to decode and retrieve the information on n sources. Decoding amounts to solving linear equations with complexity bounded as O(n 3 ) [6]. [3] proposes algorithms for a random ad hoc wireless network. The main problem with linear algebra approaches is that the size of linear combination of packets is not controlled. Another problem is that the number of transmitted encoded packets is probabilistic and is not linked to the decoding needs of neighbors. That is, overhearing (opportunistic listening) neighbor receptions is not utilized, as the algorithm simply assumes that all neighbors need all the packets. Fountain codes were used in [7] to broadcast n packets from the same source. The source generates m encoded packets using LT codes, and floods each of them into the network. Each recipient retransmits each received packet with certain fixed probability. When a recipient has received enough data, it can decode original packets. This is a restricted problem statement, where encoding and decoding is done only at endpoints, while intermediate nodes only forward received packets. This problem can be solved by our techniques also, since it is a special case of our more general many to all asynchronous broadcasting process. Network coding was applied in [4] for deterministic broadcasting. In their XOR-based algorithm, forwarding nodes store only source packets, and also store subset of source packets received by each neighbor (via opportunistic listening). Greedy heuristic is provided to form the encoded packet in which all neighbors can decode received packet. [4] also proposes a Reed-Solomon based coding algorithm. Again, no memorization of received encoded packets is used for combining with future incoming encoded packets. Kadi and Al Agha [5] applied network coding to optimize MPR-based flooding. Each node selects its own MPR (multipoint relay) set which is set of one-hop neighbors that cover two-hop neighbors. Broadcasting from a source node C then proceeds by retransmitting from any receiving node if it identifies that it is MPR node of sender node. The algorithm from [8] allows nodes to store received encoding packets that couldn t be decoded immediately. Each time a node has a sending opportunity signaled by MAC, it applies LT code over native packets that are in need by at least one of neighbors, and are assigned for retransmission by the node with MPR based backbone. The number of native packets d to be encoded is decided by selected distribution [1]. If d>1 then the receiver will eliminate from the encoded packet all native packets that are present in it and already received. After that, all remaining (and stored) encoded packets will be composed of only native packets which are not individually decoded. If the degree of encoded packet is reduced to 1 then new native packet is recognized, and it can be then used to reduce other, previously received and stored, encoded packets. The receiver then piggybacks IDs of newly recognized packets to the next packet data to inform neighbors. B. Connected Dominating Set For each message, there exist a dedicated backbone set of nodes (called forwarders) that needs to retransmit it so that all other nodes receive the message. This type of backbones is also called connected dominating set. A set V is dominating set for G if each node from G is either in V or has a neighbor in V. We will describe here only one type of connected dominating sets, based on the concept of multipoint

3 Fig. 1. MPR-CDS algorithm. relays. It is called here MPR-CDS. Adjih, Jacquet and Viennot [9] proposed a MPR-based algorithm for CDS (MPR-CDS) backbone construction. Each node computes its multipoint relay set by selecting a subset of 1-hop neighbors which cover all 2-hop neighbors. The node attaches the relay list to a hello message which is broadcasted to its neighbors. Upon receiving the hello message, an intermediate node decides to join the CDS if it has either the smallest ID in its neighborhood or if it is the multipoint relay for the neighbor with the smallest ID. Wu [1] improved the rule by eliminating the node that has the smallest ID among its neighbors, but without two unconnected neighbors. The construction of MPR-CDS backbone requires 2-hop neighbor knowledge, plus a message containing the list of relay nodes of each node. This can be treated overall as CDS construction requiring three rounds of messages, plus another round if the CDS decisions are to be communicated to neighbors. Consider the example in Figure1. Since a and b are the nodes with the smallest ID amongst their neighbors, they decide to belong to the CDS. Node a computes its multipoint relay set {g, h} and then attaches the list to its hello message. Upon receiving the hello message, nodes g and h decide to belong to the CDS as well. Similarly, node f decides to belong to the CDS since it is the multipoint relays of b. Finally, nodes {a, b, f, g, h} form a CDS by the algorithm [9]. Using the improved algorithm [1], node b is not selected for CDS, and CDS set is {a, f, g, h}. III. CONTRIBUTIONS This article makes two main contributions to network coding based broadcasting. A. Source independent backbones As mentioned, source dependent backbones, like those defined by MPR, have intermediate nodes which retransmit some packets, but not the others. This means that the power of encoding and assisting neighbors is reduced. We propose to apply instead any source independent backbone concept. One such choice is MPR-DS [9]. There are other choices, and reader can consult [11] for their descriptions. It is obviously also important that the average number of nodes in the backbone is small, or close to the ones selected by MPR, as otherwise the benefits of shared backbones would be reduced. When applying source independent backbone concept, intermediate nodes are either responsible for retransmitting all or none of packets. B. LT encoding from singletons and non-singletons All existing methods are based on encoding and retransmitting native packets, that is, received and/or decoded singletons or native packets generated at the node itself. However, backbone nodes also store all received encoded packets which they could not decode, but are aware of the elements in the corresponding subsets. They can also be used to generate packet with certain desired degree (number of native packets). For example, if a relay node R has singletons x, u, and subset{y, z}, then a candidate subsets for encoding are also {x, y, z}, {u, y, z} and {x, u, y, z} in addition to {x, u}. For instance, if LT coding prefers to encode three variables into a packet, in this case it is possible only with the participation of {y, z} and joining either x or u. To achieve randomness, appropriate weights need to be calculated. In this case, the probability of selecting {y, z} should be.5 since they together represent 2 out of 4 possible variables. Further study is needed to identify proper soliton probabilities, that is probabilities for encoding a singleton, or encoding message with d native packets, for each d. These probabilities are expected to be lower for singletons and higher for others, leading to increased network coding benefits and reduction of overall number of transmitted messages. IV. : HIGHLIGHTS ON THE PROTOCOL Our protocol is an integration of the source independent backbone represented by the connected dominating set and the LT-based network coding. In the following subsections we give an overview of each of these techniques and how we use it. A. LT-based Network Coding The encoding operation is accomplished at each forwarder in a distributed manner. Unlike the original LT code, which use only native packets for the encoding operation, we use both singleton and non-singleton to generate the encoding packet. This can speed up the flooding operation as the node doesn t have to wait any successful decoding before it can submit a packet. So when a forwarder has an opportunity to send signaled by MAC, it checks if it has any native or encoded packets in its buffers, and then choose randomly some of these packets to mix (XOR) together and broadcast it to its neighbors. XOR (bitwise sum modulo 2) is used as coding operation to control the bit length of transmitted messages. To choose the degree of the encoded packet we use a simple distribution such as p(d) = 1 ; <d k where d is the 2 d degree of the encoded packet ( the number of native packets XORed together) and k is the total number of native packets available at the forwarder either decoded or embedded within an encoded packet. For example, suppose that node x has 3 native packets p, q, r and one encoded packet z w. Then x can send packet of degree from 1 to 5, where p(1) = 1 2 represents the probability of node x to send a native packet and p(2) = 1 4 represents the probability to send an encoded packet of degree 2...etc. Note that if the selected length exceeds the maximal one, or is impossible to combine from existing packets, then

4 new value of d is generated. Then, choosing the d packets (coding candidates) to XOR is done randomly. In our previous example if x choose to XOR three packets, it can choose one of the following cases {p q r, p z w, q z w, r z w}. B. Packet Decoding The node needs to retrieve the native packets from the received packet by using the decoding process as follow: 1) If the received packet R is of degree d>1, the node tries to reduce this degree by processing the packet R against all native packets it has stored in the buffer. That means to XOR the packet R with all the native packets stored in the buffer which are coding candidates of R. Each coding candidate found in the buffer reduce the degree of R by 1. If the reduced degree of R is still greater than 1 then R will be stored in the buffer (and used later for encoding future packets). For example, suppose that node x has 2 packets P 1, P 2 in the buffer, and it receives an encoded packet R = P 2 P 3 P 4 of degree 3. By XORing P 2 with R we get R = R P 2 = P 2 P 3 P 4 P 2 = P 3 P 4 which has degree 2. 2) If the received packet R has degree 1 or its degree has been reduced to 1 in the previous step, it is inserted into the buffer as it is a native packet. This native packet is then used to reduce the degree of the other encoded packets by matching it against all the encoded packets residing in the buffer. 3) Whenever the previous step succeeds to reduce degree of any packet in the buffer to 1, this packet is processed against the other encoded packets remaining in the buffer. V. SIMULATION To evaluate the efficiency of the integration of source independent backbone with LT-based Network coding for broadcasting in wireless multi-hop networks, we implemented in a custom network simulator written in C++. At the beginning of the simulation, nodes are placed randomly on the simulation area and don t move during the simulation process. Transmissions are received by all nodes within transmission range. A packet transmission takes exactly one time unit. A node can either send or receive only one packet at a time unit. For network traffic, we assume that each node has one packet to broadcast to all the nodes in the network. All of these packets are generated at the beginning of the simulation, and then the simulation continues to run without inserting further packets until all the packets are delivered to the entire network. We assume that only one node can send at a given time unit and in this way we avoid packet collisions. We compare the performance for different density (average number of neighbors) values. We suppose that the number of nodes is 15. The nodes are placed randomly in a square network area whose size is chosen according to the desired density and selected fixed transmission radius. The average number of neighbors changes from 2 to 7. We only consider Nb. of Transmissions Avg. Delay MPR (a) Number of transmissions MPR (b) Average packet delay Fig. 2. (a) number of transmissions required to broadcast all the packets into the entire network. (b) average delay for a packet to be delivered to all the nodes. connected networks. Our performance metrics are the number of transmissions needed for flooding and average packet delay. Packets delay is measured by the average time needed for one packet to be delivered to the entire network. We compare the performance of three approaches. The first approach is MPRbased flooding. The second approach is the original LT code used in flooding where each forwarding node (in addition to the source node) performs LT code over the packets it has received. The third is, our previous approach [8] that combines the Multi Point Relay (MPR) technique with LT code [1] to perform network coding at each MPR node. The last approach is which combines CDS with LT-based network coding, described in section IV. Figure 2 shows the efficiency of our approach in term of the number of transmissions required for flooding all the packets and the packet delay. Our gain is about 8% in comparison to MPR approach, and is especially notable for low densities. We see that for sparse networks, MPR technique doesn t perform very well in term of number of transmissions required. So exploiting the network coding technique can significantly reduce the number of transmissions as done in and. Further, we observe that the delay of is superior to by about 4%. This is due to two reasons. First, using source independent backbone (CDS) instead of source dependent backbone (MPR) increases the benefit of network coding because all the packets pass through

5 Avg. nb. of coded packets Avg. nb. of decoded packets (a) average packet degree (b) Packet delivery Fig. 3. (a) average number of native packet XORed and sent at each transmission, (b) average number of native packets delivered at each transmission. the same forwarder nodes and this enhances the encoding process. Second, the optimization accomplished in the encoding function increases the number of packets delivered in single transmission as shown in fig3-b. Our new LT probability distribution function proposed in section IV-A decreases the average number of coded packets (fig3-a) and also it speeds up the decoding process (fig3-b). VI. CONCLUSION AND FUTURE WORK We have proposed, an approach which exploit the source independent backbone with LT-based network coding to improve the performance of broadcast process in ad hoc wireless network. We use a connected dominating set definition as the backbone. For network coding, we make use of the principle of LT code which is one of the fountain codes. LT coding is applied at each forwarder in a simple distributed manner. Instead of using soliton distribution we propose a simpler distribution which give us better performance as shown in our simulation. We leave the analysis of this distribution for future work. Another modification proposed here is to use both singleton and non-singleton in the encoding function. Our future work is to optimize LT code furthermore to speed up the decoding process by combining the stored encoding packets instead of waiting to receive more singletons, in order to avoid halting decoding process. We also propose to apply the same algorithm for the secure multi-path routing process between a fixed source-destination pair. Encoded packets are sent over two or more disjoint paths toward destination. All nodes, including intermediate ones, apply the same algorithm, and forward according to selected routing scheme. However, only destination receives enough packets to decode native ones. In some algorithms, the decision on selecting the encoded subset for transmission is based on a criterion, such as maximizing the number of recognized singletons at neighbors, instead of generating one at random. Further, the ability of neighbors to decode certain variable packets should be judged not only on their recognized singletons, but also on other packets they store. Current node may, by having two-hop knowledge, keep a list of received and generated encoded nonsingleton packets and use them in judging the quality of a candidate subset. Further, the optimization criterion itself may go beyond just counting recognized singletons. It could include also the number of newly generated subsets at each neighbor, with proper weights that could depend on the size of these subsets. This also increases the ability of neighbors to decode future incoming packets. ACKNOWLEDGMENTS This research was supported by NSERC Canada Strategic Grants STPSC and STPGP REFERENCES [1] Luby, LT codes, in FOCS: IEEE Symposium on Foundations of Computer Science (FOCS), 22. [2] A. Shokrollahi, Raptor codes, IEEE Transactions on Information Theory, vol. 52, no. 6, pp , 26. [3] C. Fragouli, J. Widmer, and J.-Y. L. Boudec, Efficient broadcasting using network coding, IEEE/ACM Trans. Netw, vol. 16, no. 2, pp , 28. [Online]. Available: [4] E. L. Li, R. Ramjee, M. M. Buddhikot, and S. C. Miller, Network coding-based broadcast in mobile ad-hoc networks, in INFOCOM. IEEE, 27, pp [Online]. Available: [5] N. Kadi and K. A. Agha, Optimized MPR-Based Flooding in Wireless Ad Hoc Network using Network Coding, in IFIP/IEEE Wireless days 8. Dubai, UAE: IEEE Explorer, November 28. [6] P. A. Chou, Y. Wu, and K. Jain, Practical network coding, in Allerton Conference on Communication, Control, and Computing, Monticello, IL, 23. [7] R. Kumar and A. Paul and U. Ramachandran, Fountain broadcast for wireless networks, in IEEE Int. Workshop on Network Sensing Systems, San Diego, USA, 25. [8] N. Kadi and K. A. Agha, Network coding based flooding using fountain codes, Technical Report 15 LRI, Univ. Paris-Sud XI, Tech. Rep. 15, 28. [9] C. Adjih, P. Jacquet, and L. Viennot, Computing connected dominated sets with multipoint relays, Oct. 22. [1] J. Wu, An enhanced approach to determine a small forward node set based on multipoint relay, vol. 4. Vehicular Technology Conference VTC 23-Fall IEEE 58th, 23, pp [11] D. Simplot-Ryl, I. Stojmenovic, and J. Wu, Energy efficient backbone construction, broadcasting, and area coverage in sensor networks,, ser. in: Handbook of Sensor Networks: Algorithms and Architectures (I. Stojmenovic, ed.). Wiley, 25.

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding

Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 0000; 00: 6 Broadcasting with Hard Deadlines in Wireless Multi-hop Networks Using Network Coding Pouya Ostovari, Abdallah Khreishah,

More information

Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach

Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach Journal of Computer Science 8 (6): 920-929, 2012 ISSN 1549-3636 2012 Science Publications Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach 1 Bavithiraja, S.V.M.G.

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network 1 Shuai Wang 2 Athanasios Vasilakos 1 Hongbo Jiang 1 Xiaoqiang Ma 1 Wenyu Liu 1 Kai Peng 1 Bo Liu 1 Yan Dong

More information

Broadcasting Techniques for Mobile Ad Hoc Networks

Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting: It is the process in which one node sends a packet to all other nodes in the network. 1 Usefulness of broadcasting Broadcasting of net-wide

More information

Near Optimal Broadcast with Network Coding in Large Sensor Networks

Near Optimal Broadcast with Network Coding in Large Sensor Networks in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA

More information

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 16 18, 2005 Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast Yunnan Wu

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

' INRIA Rocquencourt, Domaine de Voluceau

' INRIA Rocquencourt, Domaine de Voluceau OPTIMIZED FLOODING AND INTERFERENCE-AWARE QOS ROUTING IN OLSR* Dang Quan ~ ~ u ~ and e n Pascale ' ~inet' ' INRIA Rocquencourt, Domaine de Voluceau Rocquencourt - B.P 105 78153 Le Chesnay Cedex, France

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information

A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance

A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance In Proceedings of 17th International IEEE Conference on Computer Communications and Networks, August 28, pp. 1-6 A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance Chien-Chun Ni, Tien-Ruey

More information

NETWORK coding is an area that has emerged in 2000 [1],

NETWORK coding is an area that has emerged in 2000 [1], 450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider

More information

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks

A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks A Comparative Analysis between Forwarding and Network Coding Techniques for Multihop Wireless Networks Suranjit Paul spaul2@connect.carleton.ca Broadband Network Lab, Carleton University Acknowledgements

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

A Proactive Network Coding Strategy for Pervasive Wireless Networking

A Proactive Network Coding Strategy for Pervasive Wireless Networking A Proactive Network Coding Strategy for Pervasive Wireless Networking Elena Fasolo, Michele Rossi,Jörg Widmer and Michele Zorzi DEI, University of Padova, via Gradenigo 6/B 353 Padova, Italy DoCoMo Euro-Labs,

More information

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks Shuhui Yang, Jie Wu, and Fei Dai Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 12180 Department

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks

The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks The Design of Degree Distribution for Distributed Fountain Codes in Wireless Sensor Networks Jing Yue, Zihuai Lin, Branka Vucetic, and Pei Xiao School of Electrical and Information Engineering, The University

More information

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

More information

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK

A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Clemson University TigerPrints All Theses Theses 8-2014 A LOAD-BASED APPROACH TO FORMING A CONNECTED DOMINATING SET FOR AN AD HOC NETWORK Raihan Hazarika Clemson University, rhazari@g.clemson.edu Follow

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see

CSC310 Information Theory. Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes. November 30, 2005 see CSC310 Information Theory Lecture 22: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

An Iterative Greedy Approach Using Geographical Destination Routing In WSN ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Impact of intra-flow network coding on the relay channel performance: an analytical study

Impact of intra-flow network coding on the relay channel performance: an analytical study Author manuscript, published in "WiMob 22, Barcelone : Espagne (22)" Impact of intra-flow network coding on the relay channel performance: an analytical study Anya Apavatjrut, Claire Goursaud, Katia Jaffrès-Runser

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT

ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT 1 2 3 Department of Computer Science, IBN Tofail University,

More information

Energy Savings for Video Streaming Using Fountain Coding

Energy Savings for Video Streaming Using Fountain Coding Energy Savings for Video Streaming Using Fountain Coding Anders Nilsson Plymoth TelHoc AB Stockholm, Sweden Email: anders@telhoc.se Zhi Zhang Department Of Electrical and Information Technology Lund University,

More information

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,

More information

Xiao Chen* and Jian Shen

Xiao Chen* and Jian Shen Int. J. High Performance Computing and Networking, Vol. x, No. x, 200x 1 Improved schemes for power-efficient broadcast in ad hoc networks Xiao Chen* and Jian Shen Department of Computer Science, Texas

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Connectivity Aware Routing in Ad-Hoc Networks

Connectivity Aware Routing in Ad-Hoc Networks Connectivity Aware Routing in Ad-Hoc Networks Jérémie Leguay PWC 05 With: Timur Friedman (LIP6), Vania Conan(Thales), Serge Fdida (LIP6), André Cotton(Thales) Corporate Communications Context Ad-Hoc Networks

More information

NECO: Network Coding Simulator

NECO: Network Coding Simulator NECO: Network Coding Simulator Diogo Ferreira 1, Luísa Lima 2, João Barros 1 1 Instituto de Telecomunicações Faculdade de Engenharia da Universidade do Porto 2 Instituto de Telecomunicações Faculdade de

More information

A Dominating Sets and Target Radius Based Localized Activity Scheduling and Minimum Energy Broadcast Protocol for Ad Hoc and Sensor Networks.

A Dominating Sets and Target Radius Based Localized Activity Scheduling and Minimum Energy Broadcast Protocol for Ad Hoc and Sensor Networks. A Dominating Sets and Target Radius Based Localized Activity Scheduling and Minimum Energy Broadcast Protocol for Ad Hoc and Sensor Networks. François Ingelrest, David Simplot-Ryl, Ivan Stojmenovic To

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Broadcasting and Activity-Scheduling in Ad Hoc Networks

Broadcasting and Activity-Scheduling in Ad Hoc Networks 1 Broadcasting and Activity-Scheduling in Ad Hoc Networks Ivan Stojmenovic 1 and Jie Wu 2 1 SITE, University of Ottawa, Ottawa, Ontario K1N 6N5, Canada ivan@site.uottawa.ca 2 Dept. of Comp. Sci. & Eng.,

More information

Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation

Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation 1 Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Email:{wlou,

More information

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication Jie Wu, Mihaela Cardei, Fei Dai, and Shuhui Yang Department of Computer Science and Engineering Florida Atlantic

More information

Network coding over connected dominating set: energy minimal broadcasting in wireless ad hoc networks

Network coding over connected dominating set: energy minimal broadcasting in wireless ad hoc networks DOI 10.1007/s11276-013-0648-z Network coding over connected dominating set: energy minimal broadcasting in wireless ad hoc networks Shuai Wang Chonggang Wang Kai eng Guang Tan Hongbo Jiang Yan Dong Ó Springer

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information

Performance of New Broadcast Forwarding Criteria in MANET

Performance of New Broadcast Forwarding Criteria in MANET Performance of New Broadcast Forwarding Criteria in MANET Lijuan Zhu 1, Bu-Sung Lee 1, Boon-Chong Seet 2, Kai-Juan Wong 3, Genping Liu 1, Shell-Ying Huang 1, and Keok-Kee Lee 1 1 Centre for Multimedia

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm Journal of Computer Science 7 (1): 46-51, 2011 ISSN 1549-3636 2011 Science Publications Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

More information

Energy-Efficient Algorithm for Broadcasting in Ad Hoc Wireless Sensor Networks

Energy-Efficient Algorithm for Broadcasting in Ad Hoc Wireless Sensor Networks Sensors 2013, 13, 4922-4946; doi:10.3390/s130404922 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Energy-Efficient Algorithm for Broadcasting in Ad Hoc Wireless Sensor Networks

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS

PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS PRIORITY-BASED BROADCASTING OF SENSITIVE DATA IN ERROR-PRONE WIRELESS NETWORKS Pouya Ostovari, Jie Wu, and Ying Dai Center for Networked Computing http://www.cnc.temple.edu Agenda 2 Introduction Motivation

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Online network coding for optimal throughput and delay the three-receiver case. Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard

Online network coding for optimal throughput and delay the three-receiver case. Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard International Symposium on Information Theory and its Applications, ISITA2008 Auckland, New Zealand, 7-0, December, 2008 Online network coding for optimal throughput and delay the three-receiver case Jay

More information

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks Yamin Li and Shietung Peng Department of Computer Science Hosei University Tokyo 18-858 Japan {yamin, speng}@k.hosei.ac.jp

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai Department of Electrical and Computer Engineering North Dakota State University Fargo, ND 5805 Email: fdai@ece.ndsu.edu

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks

Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks Kazuya Sakai Department of CSSE Auburn University Auburn, AL 36849, USA Min-Te Sun Department of CSIE National Central University Jhongli

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering University of South Florida Tampa,

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

BATS: Achieving the Capacity of Networks with Packet Loss

BATS: Achieving the Capacity of Networks with Packet Loss BATS: Achieving the Capacity of Networks with Packet Loss Raymond W. Yeung Institute of Network Coding The Chinese University of Hong Kong Joint work with Shenghao Yang (IIIS, Tsinghua U) R.W. Yeung (INC@CUHK)

More information

Traffic balancing-based path recommendation mechanisms in vehicular networks Maram Bani Younes *, Azzedine Boukerche and Graciela Román-Alonso

Traffic balancing-based path recommendation mechanisms in vehicular networks Maram Bani Younes *, Azzedine Boukerche and Graciela Román-Alonso WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2016; 16:794 809 Published online 29 January 2015 in Wiley Online Library (wileyonlinelibrary.com)..2570 RESEARCH ARTICLE Traffic

More information

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR) IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Avoiding energy-compromised hotspots in resource-limited wireless networks

Avoiding energy-compromised hotspots in resource-limited wireless networks Avoiding energy-compromised hotspots in resource-limited wireless networks Joseph Rahmé 1, Aline Carneiro Viana 2, Khaldoun Al Agha 1 Abstract The vast literature on the wireless sensor research community

More information

To enhance Routing in ZigBee Wireless Networks

To enhance Routing in ZigBee Wireless Networks To enhance Routing in ZigBee Wireless Networks P.Chanthiya Assistant Professor Department of Computer Science & Engineering, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, India Abstract The

More information

NETWORK coding [1] [3] has attracted much interest in

NETWORK coding [1] [3] has attracted much interest in 1714 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 4, MAY 2011 Analysis of General Network Coding Conditions and Design of a Free-Ride-Oriented Routing Metric Bin Guo, Student Member, IEEE, Hongkun

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Adaptive Random Linear Network Coding with Controlled Forwarding for Wireless Broadcast

Adaptive Random Linear Network Coding with Controlled Forwarding for Wireless Broadcast Adaptive Random Linear Network Coding with Controlled Forwarding for Wireless Broadcast by Kashif Mahmood A thesis submitted to The Faculty of Graduate Studies and Research in partial fulfilment of the

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information