Network Coding in Underwater Sensor Networks

Size: px
Start display at page:

Download "Network Coding in Underwater Sensor Networks"

Transcription

1 in Underwater Sensor Networks Claude Manville, Abdulaziz Miyajan, Ayman Alharbi, Haining Mo, Michael Zuba and Jun-Hong Cui Computer Science & Engineering Department, University of Connecticut, Storrs, CT, USA {claude.manville, abdulaziz.miyajan, ayman.alharbi, haining.mo, michael.zuba, Abstract In this paper, we expand upon previous work in the application of network coding to Underwater Sensor Networks (UWSN). Network coding allows information from multiple packets to be encoded into a single packet and decoded upon receiving sufficient linearly independent encoded packets, improving throughput and providing redundancy for error recovery. Encoding and decoding algorithms for network coding are reviewed, and an algorithm capable of implementing network coding on an UWSN with arbitrary block size, packet length, and symbol size is presented. The network coding algorithms are implemented on real UWSN nodes utilizing our hardware and software platforms and tested using our UWSN testbed. Initial results indicate improved throughput with less overhead than other error-recovery techniques. I. INTRODUCTION AND MOTIVATION In recent years, underwater sensor networking has become an active field of research with applications ranging from environmental monitoring to underwater surveillance. Acoustic networking of aqueous sensors provides a broad range of possibilities for large-scale automated data collection. However, before the full realization of such potential, the implementation of fast and efficient Underwater Sensor Networks (UWSN) presents many challenges [1] [4]. The naturally lossy nature of underwater acoustic channels introduces significant barriers to the effective transmission of network traffic. High error rates and long propagation delays suffered by any acoustic underwater network require intelligent and efficient means of error-recovery. A number of approaches exist to mitigate the effects of high error rates, though many incur high overhead costs. Forward Error Correction (FEC) introduces redundancy at the sender to compensate for the assumed loss of packets. The effectiveness of an FEC scheme depends highly on the use of an appropriate amount of redundancy. Without enough redundancy the network will continue to suffer losses; too much redundancy wastes valuable battery power. The difficulty of accurately estimating error rates, and therefore the necessary redundancy, renders FEC less than ideal for UWSNs [1]. Automatic Repeat Request (ARQ) waits for the receiver to detect a loss and transmit a message back to the sender requesting retransmission of the lost packet. This approach does not require that the error rate be known ahead of time, but it significantly increases the delay for successful packet transmission and introduces additional traffic to the network. One technique with great promise for error recovery and improved data throughput is network coding, first proposed in [5]. In network coding, a node may encode several packets together before sending the information. This approach Fig. 1: Example of network coding on a butterfly network [5] allows for the maximum information flow through a network s resources while requiring minimal overhead when compared to other error-recovery techniques [6]. Figure 1 demonstrates how network coding can improve the throughput of a network by transmitting information encoded from multiple packets simultaneously [5]. Without network coding, the paths leaving the two center relay nodes can carry either packet A or B, but not both, therefore one of the destination nodes is able to receive only one of the two desired packets. Network coding can encode the information from both A and B at the relays, allowing both destination nodes to receive enough information to decode both packets. The same principle can be used to introduce redundancy into a network as a means of error-recovery. Previous work [7] contributed a promising theoretical proof of concept for network coding in underwater sensor networks. This paper contributes to this end by implementing a broader and more general network coding scheme and evaluating it on a real world system. The rest of this paper is organized as follows: Section II discusses previous work in the area. Section III introduces the mathematical theory and general algorithms used in the implementation of network coding. Section IV details the scheme implemented to test networking coding as part of a physical UWSN, and Section V presents and analyzes the empirical results. Finally, Section VI concludes the paper and considers future work.

2 2 II. RELATED WORKS Ahlswede et al. [5] show that for multicast to multiple sinks, the upper bound on throughput, as determined by the max-flow min-cut theorem [8] [9], cannot be obtained with traditional routing. They then proceed to prove that maximum throughput is possible through the use of network coding. Li et al. [6] prove that the max flow bound on information transmission can be achieved with multicast in a network using linear coding, allowing for computationally realistic implementations of network coding. Ho et al. [10] further reduce the computational complexity of network coding by using a randomized approach to the construction of linear coding schemes. They show that an independent, random linear code design at each node achieves the max-flow rate with probability approaching one with a tight lower bound as the finite field size increases with respect to the number of sinks. They present a distributed algorithm with runtime logarithmic in the size of the finite field. Chou et al. [11] present a practical, distributed, asynchronous implementation of network coding without the need for centralized knowledge of the graph topology. They show that their scheme is able to achieve near maximum throughput while remaining robust to topological and capacity changes resulting from node joins and leaves, node or link failures and congestion. Wu et al. [12] compare network coding to routing solutions through simulation over the network graphs of six internet service providers. Their results indicate that the improvement in throughput gained through network coding is marginal for the simulated networks, however the approach presents additional benefits in management, robustness, and reduced resource consumption. Jaggi et al. [13] present polynomial time algorithms to design linear multicast network codes proven to achieve maximum throughput. They further show that not only is the maximum throughput without coding significantly smaller, but finding that maximum-rate routing is NP-hard. Network coding has since proven useful for many applications, including wireless networking [14], distributed storage systems [15], peer to peer file distribution, network security and tomography, and of course sensor networks [16]. Recent research in joint channel-network coding has seen network coding move into the physical layer [17]. As it pertains to UWSNs, Guo et al. [7] analyze the benefits that network coding can provide for UWSN, and devise a network coding scheme specifically for UWSN. They present simulation results that demonstrate the value of network coding as a means of error recovery. This paper expands upon previous work by implementing a more general network coding scheme for UWSN capable of utilizing arbitrary symbol size, packet length, and block size, and producing empirical data through testing on a physical system. III. ALGORITHM DESCRIPTION The general algorithms for implementing linear network coding are as follows. A. Encoding We start by assuming that a number of original packets M 1,..., M n are generated by one or more sources. We associate with each packet a sequence of coefficients g 1,..., g n in the finite field GF (2 s ) by applying the following formula [16]: X = n (g i Mk) i (1) For the encoded information to be decoded, it is necessary that the encoded packets be linearly independent. This presents an issue in the computational complexity of deciding the linear combinations that each node should perform. Random network coding solves this issue by having each node in the network select coefficients independently and uniformly at random over the field GF (2 s ) [10]. With random network coding there exists a probability of selecting linearly dependent combinations; however, it has been shown that this probability decreases with increasing finite field size [13], and simulation results indicate that it becomes negligible in the case of GF (2 8 ) [12]. In testing, we choose an encoding symbol size of one byte (8 bits) since it is realistic and convenient, resulting in the use of GF (2 8 ) for the finite field arithmetic involved in all encoding and decoding calculations, though the algorithm is not limited to this choice. If a relay node r has received and stored a set of packets that have already been encoded (g 1,x 1 ),..., (g n,x n ), this relay node may generate a new recursively encoded packet (g,x ) by randomly picking a set of coefficients h 1,..., h m and computing the linear combination [16]: m X = (g i X i ) (2) The corresponding encoding vector g can be computed as follows: g i = m (h j g j i ) (3) j=1 B. Decoding The destination node receives the set (g 1,X 1 ),..., (g m,x m ). In order to recover the original packets, it must solve the system [16]: n X j = (g j i M i ) (4) Which has m equations and n unknowns. All M packets can be recovered when m n; meaning the number of received packets must be at least the number of original packets used in the encoding. Since the original transmission

3 3 is likely to be heard by multiple relay nodes and retransmitted, redundancy is a natural consequence and the likelihood that the destination node will receive enough encoded information to decode the original block of packets increases. Also, the sender of the encoded packets can transmit more than m encodings of the original sequence of packets to introduce additional redundancy. When an encoded packet is received, the receiver builds a decoding matrix by inserting the new packet s encoding vector into the last row. By using Gaussian elimination, the decoding matrix is then transformed to triangular form. When the matrix is of rank equal to the number of original packets, it is possible to recover the encoded information. Before solving the matrix, however, the receiver must guarantee there are not any zeros in the diagonals of the matrix. If there exists a zero diagonal, it is necessary to pivot that row with those beneath it in decreasing order and reorder all of the corresponding values to the altered rows [11]. Once Gaussian elimination produces the correct coefficient values, they are applied to each subsequent symbol in the information vector until the original message is fully decoded. The same coefficient values are then used to decode the information vectors for every other packet that contributed an encoding vector to the decoding matrix. Once this process is complete, the messages from the original packets M 1,..., M n are all obtained and may be passed along up the network stack. IV. IMPLEMENTATION The network coding encoding and decoding algorithms were implemented on the University of Connecticut Underwater Sensor Network (UWSN) laboratory s underwater network protocol stack framework Aqua-Net [18]. A network coding scheme was developed and data was collected by utilizing Teledyne Benthos acoustic modems in multiple laboratory tests. The network coding scheme involves three separate node roles. The first role is that of a source node, the second is a Source A/B/C/D relay node, and the third is the destination node. In our test, the source node creates packets containing a series of characters designed to fill the desired packet length, along with numerical data increased at a fixed increment with each packet sent. The outbound packets are stored in order to build a block of packets for encoding. The number of packets in a block can be set to any value; for the tests presented in this paper we chose a block size of four packets. Upon receiving a full block bound for one destination node, the source node uses the previously defined randomized linear encoding algorithm to encode the packets payloads into four separate information vectors and corresponding encoding vectors. The source node then broadcasts the encoded packets sequentially, placing the destination in the MAC layer header, the encoding vector and block ID in the network layer header, and the encoded information vector in the packet s payload. The only additional packet data our scheme requires is the encoding vector, of length equal to the block size, and packet block identification information. This data easily fits inside the existing network layer header and so does not produce any overhead. The redundancy is provided through the broadcast nature of the information transmission. Compared with other error recovery techniques that require entire additional packets to be introduced to the network traffic, our network coding scheme provides a significant reduction in overhead. For the purposes of testing, the packets sent by a source node are ensured, through the topological definition of the network, to be receivable only by relay nodes and not by the destination node to guarantee the packets will pass through a relay. The source node also cannot receive packets from any other node, and relay nodes cannot receive packets from one another. These effects can be produced by adding the sourcedestination pair to the network header and having nodes ignore packets identical to any recently received. A relay node, upon receiving a packet from the source node bound for the destination node, simulates packet loss on an unreliable channel by randomly dropping the packet with a configurable probability. At startup, each node is given a packet drop probability from zero to 100 as an argument. E 1 /E 2 /E 3 /E 4 E 1 /E 2 /E 3 /E 4 R1 R2 E 1 /E 2 /E 3 /E 4 E 1 /E 2 /E 3 /E 4 Destination A/B/C/D Fig. 2: Diagram of test setup. The example data flow shown demonstrates a case where both relay nodes drop half of the packets they receive and the destination node is able to recover all of the original data sent by the source node. Fig. 3: Experiment setup. Four Teledyne Benthos modems, two ATM-920 (tall, back) and two UDB Deck Box.

4 Throughput (bps) Throughput (bps) Packet Length (Bytes) (a) Throughput vs. Packet Length Packet Loss Rate (%) (b) Throughput vs. Packet Loss Rate Fig. 4: Effect of packet length and packet loss rate on network throughput. Each time a node receives a packet for which it is not the destination, it will produce a (pseudo) random number from 1 to 100. If the randomly generated number is greater than the specified packet drop probability, then the node will relay the packet, otherwise it will drop it. Finally, a destination node receiving the packets from a relay node will build a block of packets based on the block ID found in the network layer header in a fashion similar to that of the source node. It will first check if it has already received an identical packet and if so ignore it. If the packet received is novel, it is added to the decoding block. When a destination node has received sufficient packets for a given block to build a matrix of rank equal to the block size, the destination node uses the previously defined decoding algorithm to decode all of the packets in the block at once and send the decoded original messages up the stack. With these three node roles in place, our test setup was configured as in Figure 2. The two relay nodes between the source and destination nodes in the diamond topology provide complete data redundancy. For our test environment we set fixed delays on the relay nodes to control for collisions and focus on the effect of the simulated packet loss rate, though collisions can also be effectively countered using random relay delays [19]. With a block size of four, the destination node must receive four linearly independent encoded packets to decode the four original messages, otherwise it will not be able to recover any of them. This means that if one of the encoded packets is dropped by both relay nodes, then all of the packets in that block will be lost. However, if every packet in a block is passed along by either one or both of the relay nodes, then the entire block can be recovered. Figure 2 shows a case in which half of the packets are dropped, yet all of the original data is recovered after only two hops. In large networks with unpredictable link reliability such as those in UWSNs, network coding provides dynamic error-recovery. Multicast networks with multiple sinks can benefit even more from the encoding process, though we do not test for that effect here. Figure 3 shows the physical laboratory test setup using Teledyne Benthos modems. V. PERFORMANCE RESULTS AND ANALYSIS With the test environment set up, we ran multiple tests to analyze the system s throughput and error recovery rates. Each test was compared with the baseline performance of the existing Aqua-Net static routing protocol. In the static routing protocol, routes are predefined for source-destination pairs. At each hop, a single next hop destination is determined until the packet arrives at its destination. Since only one route is used, only one relay node receives the packet bound for the destination node. Therefore no dropped data can be recovered and the rate of packet loss is equal to the rate at which relay nodes drop packets. First, the relay packet drop probability was fixed to 20% and the packet length was varied to determine the effect on throughput. The test was set to run for an extended time period. The source node maintained logs on the data sent, the relay nodes maintained data on the packets dropped and relayed, while the destination node kept track of how many blocks were missed. The destination node was also able to ensure that the decoded data matched the data sent since the source node produced packets with messages following a predictable pattern. Since none of the packet lengths tested were long enough to require splitting across multiple packets, the results follow the expected linear increase and are shown in Figure 4(a). The throughput obtained with network coding rises slightly faster than that of static routing due to its capacity for error recovery. Next, the packet length was fixed at 200 bytes and the relay packet drop probability was varied to measure its effect on the network throughput directly. Since the test setup drops packets randomly with a certain probability, it was not possible to guarantee a specific packet drop rate without running a test indefinitely. Therefore, the tests were allowed to run long enough for the percent of packets dropped to converge to a reasonable level roughly half an hour in our tests.

5 5 The process was repeated with enough distinct packet drop probabilities to produce sufficiently varied data to establish a trend. As can be seen in Figure 4(b), the throughput with network coding drops off more slowly than with static routing as it recovers lost packets. Finally we present the collected data in Figure 5 to show the percent of packets recovered as a function of the packet loss rate. Since static routing cannot receive any packet dropped by the relay node, its packet recovery rate falls linearly with the packet loss rate, while network coding is able to delay its drop in recovery rate. With lower packet loss rates below 10%, the network coding scheme maintained enough redundancy to recover every packet sent. The packet recovery rate does decrease with increasing packet loss rate, but remains above the baseline static routing rate. Note that encoding the packets in blocks means that either every packet in a block is recoverable, or none of them are. Therefore the packet recovery is quantized to the size of a block; an effect which can be seen in the steep drops in packet recovery rate. VI. CONCLUSIONS AND FUTURE WORK In this paper, we propose an application of network coding principles on an underwater acoustic sensor network. For the encoding of information, we implement an algorithm to encode with arbitrary block size, packet length, and symbol size. We correspondingly implement a decoding algorithm accounting for equally arbitrary parameters. We implement network coding on real underwater acoustic network nodes and test using real UWSN equipment. Real world testing demonstrates the ability of network coding to compensate for the naturally lossy channels of underwater environments and perform effective error recovery. The chosen test setup demonstrates the full functionality of the network coding scheme developed and implemented, if not necessarily providing an ideal scenario for utilizing the full potential of network coding. Choosing a block size of four packets demonstrates our implementation s ability to perform network coding, and still follows the same overall trend of packet recovery rate, even though a block size of one (no encoding) would have reduced the quantization of packet loss. This work focused solely on network coding as a means of error recovery. Future work will aim to realize the full potential of network coding by deploying it in a multicast scenario. With multiple destination nodes, we can test the practical capacity for information encoding to increase network throughput in UWSN. A thorough network coding implementation can increase both the data throughput and reliability of underwater acoustic sensor networks. REFERENCES [1] Jun-Hong Cui, Jiejun Kong, Mario Gerla, and Shengli Zhou. Challenges: building scalable mobile underwater wireless sensor networks for aquatic applications. IEEE Network, Special Issue on Wireless Sensor Networking, 20(3):12 18, May [2] J. Heidemann, Y Li, A. Syed, J. Wills, and W Ye. Research challenges and applications for underwater sensor networking. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages , Packet Recovery Rate (%) Packet Loss Rate (%) Fig. 5: Percent of packets recovered by destination node. [3] I. F. Akyildiz, D. Pompili, and T. Melodia. Underwater acoustic sensor networks: Research challenges. Ad Hoc Networks (Elsevier), 3(3): , March [4] Ian F. Akyildiz, Dario Pompili, and Tommaso Melodia. Challenges for efficient communication in underwater acoustic sensor networks. ACM SIGBED Review, 1(1):3 8, July [5] Rudolf Ahlswede, Ning Cai, Shuo-Yen Robert Li, and Raymond W. Yeung. Network Information Flow. IEEE Transactions on Information Theory, 46(4): , [6] Shuo-Yen Robert Li, Raymond W. Yeung, and Ning Cai. Linear Network Coding. IEEE Transactions on Information Theory, 49(2): , [7] Zheng Guo, Peng Xie, Jun-Hong Cui, and Bing Wang. On Applying to Underwater Sensor Networks. In Proceedings of the 1st ACM international workshop on Underwater networks, WUWNet 06, pages , Los angeles, CA, USA, [8] P. Elias, A. Feinstein, and C. E. Shannon. A note on the maximum flow through a network. IEEE Transactions On Information Theory, 2(4): , Dec [9] L. R. Ford Jr. and D. R. Fulkerson. Maximal flow through a network. Canadian journal of mathematics, 8(3): , [10] Tracey Ho, Ralf Koetter, Muriel Medard, David R. Karger, and Michelle Effros. The Benefits of Coding Over Routing in a Randomized Setting. In Proceedings of IEEE International Symposium on Information Theory (ISIT), [11] Philip A. Chou, Yunnan Wu, and Kamal Jain. Practical network coding. In Allerton Conference on Communication, Control, and Computing, [12] Yunnan Wu, Philip A. Chou, and Kamal Jain. A comparison of network coding and tree packing. In Proceedings of IEEE International Symposium on Information Theory (ISIT), [13] Sidharth Jaggi, Peter Sanders, Philip A. Chou, Michelle Effros, Sebastian Egner, Kamal Jain, and Ludo M. G. M. Tolhuizen. Polynomial Time Algorithms for Multicast Network Code Construction. IEEE Transactions On Information Theory, 51(6): , June [14] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Mdard, and J. Crowcroft. XORs in the air: practical wireless network coding. IEEE/ACM Transactions on Networking, 16(3): , [15] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran. Network coding for distributed storage systems. IEEE Transactions On Information Theory, 56(9): , [16] Christina Fragouli, Jean-Yves Le Boudec, and Jorg Widmer. Network Coding: an Instant Primer. SIGCOMM Computer Communication Review, 36(1):63 68, [17] L. Lu and S. C. Liew. Asynchronous Physical-Layer. IEEE Transactions On Wireless Communications, 11(2): , [18] Zheng Peng, Zhong Zhou, Jun-Hong Cui, and Zhijie Shi. Aqua-net: An underwater sensor network architecture - design and implementation. In Proceedings of MTS/IEEE OCEANS, [19] Nabhendra Bisnik and Alhussein Abouzeid. Queuing delay and achievable throughput in random access wireless ad hoc networks. In Sensor and Ad Hoc Communications and Networks (SECON), volume 3, 2006.

Efficient Error Recovery Using Network Coding in Underwater Sensor Networks

Efficient Error Recovery Using Network Coding in Underwater Sensor Networks Efficient Error Recovery Using Network Coding in Underwater Sensor Networks Zheng Guo, Bing Wang, and Jun-Hong Cui Computer Science & Engineering Department, University of Connecticut, Storrs, CT, 06269

More information

UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test

UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test Haining Mo, Ahmet Can Mingir, Hesham Alhumyani, Yusuf Albayram, and Jun-Hong Cui Computer Science & Engineering Department,

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

NECO: Network Coding Simulator

NECO: Network Coding Simulator NECO: Network Coding Simulator Diogo Ferreira 1, Luísa Lima 2, João Barros 1 1 Instituto de Telecomunicações Faculdade de Engenharia da Universidade do Porto 2 Instituto de Telecomunicações Faculdade de

More information

Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests

Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests Haining Mo, Zheng Peng, Zhong Zhou, Michael Zuba, Zaihan Jiang 2, and Jun-Hong

More information

An Application of deterministic Network Coding in MANETs

An Application of deterministic Network Coding in MANETs An Application of deterministic Network Coding in MANETs Leenta M.J. Grobler, Albert S.J. Helberg, Henri Marais, Coenraad C. Naudé School for Electrical, Electronic and Computer Engineering North-West

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering University of South Florida Tampa,

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

Towards Reliable Broadcasting using ACKs

Towards Reliable Broadcasting using ACKs Towards Reliable Broadcasting using ACKs Mathilde Durvy Email: mathilde.durvy@epfl.ch Christina Fragouli Email: christina.fragouli@epfl.ch Patrick Thiran Email: patrick.thiran@epfl.ch Abstract We propose

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks

Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Topology Affects the Efficiency of Network Coding in Peer-to-Peer Networks Tara Small, Baochun Li, and Ben Liang Department of Electrical and Computer Engineering University of Toronto {tsmall, bli}@eecg.toronto.edu,

More information

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage:

Ad Hoc Networks 7 (2009) Contents lists available at ScienceDirect. Ad Hoc Networks. journal homepage: Ad Hoc Networks 7 (2009) 79 802 Contents lists available at ScienceDirect Ad Hoc Networks journal homepage: www.elsevier.com/locate/adhoc Efficient error recovery with network coding in underwater sensor

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut, Storrs,

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Network Monitoring in Multicast Networks Using Network Coding

Network Monitoring in Multicast Networks Using Network Coding Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: trace@mit.edu Ben Leong, Yu-Han Chang, Yonggang Wen

More information

A Systematic Approach to Network Coding Problems using Conflict Graphs

A Systematic Approach to Network Coding Problems using Conflict Graphs A Systematic Approach to Network Coding Problems using Conflict Graphs Jay Kumar Sundararajan Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139,

More information

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast

Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 16 18, 2005 Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast Yunnan Wu

More information

Published in: Mobile Wireless Middleware, Operating Systems, and Applications - Workshops

Published in: Mobile Wireless Middleware, Operating Systems, and Applications - Workshops Aalborg Universitet Connecting the islands - enabling global connectivity through local cooperation Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank Hanns Paul; Larsen, Torben Published in: Mobile

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Implementation of Random Linear Network Coding using NVIDIA's CUDA toolkit

Implementation of Random Linear Network Coding using NVIDIA's CUDA toolkit Implementation of Random Linear Network Coding using NVIDIA's CUDA toolkit Péter Vingelmann* and Frank H. P. Fitzek * Budapest University of Technology and Economics Aalborg University, Department of Electronic

More information

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1059-1066 Research India Publications http://www.ripublication.com A Review on Efficient Opportunistic Forwarding

More information

BATS: Achieving the Capacity of Networks with Packet Loss

BATS: Achieving the Capacity of Networks with Packet Loss BATS: Achieving the Capacity of Networks with Packet Loss Raymond W. Yeung Institute of Network Coding The Chinese University of Hong Kong Joint work with Shenghao Yang (IIIS, Tsinghua U) R.W. Yeung (INC@CUHK)

More information

Low Complexity Opportunistic Decoder for Network Coding

Low Complexity Opportunistic Decoder for Network Coding Low Complexity Opportunistic Decoder for Network Coding Bei Yin, Michael Wu, Guohui Wang, and Joseph R. Cavallaro ECE Department, Rice University, 6100 Main St., Houston, TX 77005 Email: {by2, mbw2, wgh,

More information

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore,

More information

Insecure Provable Secure Network Coding

Insecure Provable Secure Network Coding Insecure Provable Secure Network Coding Yongge Wang UNC Charlotte, USA yonwang@uncc.edu October 18, 2009 Abstract Network coding allows the routers to mix the received information before forwarding them

More information

A Two-phase Broadcast Scheme for Underwater Acoustic Networks

A Two-phase Broadcast Scheme for Underwater Acoustic Networks A Two-phase Broadcast Scheme for Underwater Acoustic Networks Haining Mo, Zheng Peng, Zhong Zhou and Jun-Hong Cui Computer Science & Engineering Department, University of Connecticut, Storrs, CT, USA 6269

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks

Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks Alireza Keshavarz-Haddad Department of Electrical and Computer Engineering Rice University, 6100 Main Street,

More information

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model

Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Energy Consumption Estimation in Cluster based Underwater Wireless Sensor Networks Using M/M/1 Queuing Model Manijeh Keshtgary Reza Mohammadi Mohammad Mahmoudi Mohammad Reza Mansouri ABSTRACT Underwater

More information

Lecture 4 September 17

Lecture 4 September 17 CS 559: Algorithmic Aspects of Computer Networks Fall 2007 Lecture 4 September 17 Lecturer: John Byers BOSTON UNIVERSITY Scribe: Sowmya Manjanatha In today s lecture, we discussed and characterized the

More information

Efficient Surface Gateway Deployment. For Underwater Sensor Networks

Efficient Surface Gateway Deployment. For Underwater Sensor Networks 1 Efficient Surface Gateway Deployment For Underwater Sensor Networks Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut,

More information

Adaptive Network Coding Scheme for TCP over Wireless Sensor Networks

Adaptive Network Coding Scheme for TCP over Wireless Sensor Networks INT J COMPUT COMMUN, ISSN 1841-9836 8(6):8-811, December, 213. Adaptive Network Coding Scheme for TCP over Wireless Sensor Networks Y.-C. Chan, Y.-Y. Hu Yi-Cheng Chan*, Ya-Yi Hu Department of Computer

More information

The Importance of Being Opportunistic

The Importance of Being Opportunistic High Performance Switching and Routing Telecom Center Workshop: Sept 4, 1997. The Importance of Being Opportunistic Sachin Katti Dina Katabi, Wenjun Hu, Hariharan Rahul, and Muriel Medard Bandwidth is

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Real Network Codes 1 INTRODUCTION. WeD2.1

Real Network Codes 1 INTRODUCTION. WeD2.1 Forty-Fifth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 26-28, 2007 Real Network Codes Sachin Katti Saurabh Shintre Sidharth Jaggi Dina Katabi Muriel Medard skatti@mit.edu

More information

Is Random Network Coding Helpful in WiMAX?

Is Random Network Coding Helpful in WiMAX? Is Random Network Coding Helpful in WiMAX? Jin Jin, Baochun Li Department of Electrical and Computer Engineering University of Toronto {jinjin, bli}@eecg.toronto.edu Taegon Kong LG Electronics, Inc. tgkong@lge.com

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs

Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs Suhas Shetty Ahmed E. Kamal Department of Electrical and Computer Engineering, Iowa State University, Ames,

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks WTS 2014 April 9-11, 2014 Washington, DC Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

A Proposal for Network Coding with the IEEE Standard

A Proposal for Network Coding with the IEEE Standard A Proposal for Network Coding with the IEEE 802.15.6 Standard The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published

More information

Performance Analysis of Digital Network Coding Based Two Way Amplify and Forward Relay Networks

Performance Analysis of Digital Network Coding Based Two Way Amplify and Forward Relay Networks International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 National Conference on Performance Analysis of Digital Network Coding Based Two Way Amplify and Forward Relay Networks

More information

ATCS: An Adaptive TCP Coding Scheme for Satellite IP Networks

ATCS: An Adaptive TCP Coding Scheme for Satellite IP Networks KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 5, NO. 5, May 2011 1013 Copyright @ 2011 KSII ATCS: An Adaptive TCP Coding Scheme for Satellite IP Networks Wei Dong 1, Junfeng Wang 1, Minhuan

More information

Network Coding Approach: Intra-Cluster Information Exchange in Sensor Networks

Network Coding Approach: Intra-Cluster Information Exchange in Sensor Networks 1 Network oding pproach: Intra-luster Information Exchange in Sensor Networks Zhiqiang Xiong, Wei Liu, Jiaqing Huang, Wenqing heng, Zongkai Yang Huazhong University of Science and Technology Wuhan, Hubei

More information

PictureViewer Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul; Larsen, Torben

PictureViewer Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul; Larsen, Torben Aalborg Universitet PictureViewer Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul; Larsen, Torben Published in: European Wireless 29 DOI (link to publication from Publisher): 1.119/EW.29.5357968

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

MULTICAST broadcast services (MBS) have become essential

MULTICAST broadcast services (MBS) have become essential IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 3, JUNE 2011 869 An Adaptive Network Coded Retransmission Scheme for Single-Hop Wireless Multicast Broadcast Services Sameh Sorour, Student Member, IEEE,

More information

Efficient Distribution of Large Files in UMTS supported by Network Coded M2M Data Transfer with Multiple Generations

Efficient Distribution of Large Files in UMTS supported by Network Coded M2M Data Transfer with Multiple Generations Efficient Distribution of Large Files in UMTS supported by Network Coded M2M Data Transfer with Multiple Generations Larissa N. Popova, Wolfgang H. Gerstacker, and Wolfgang Koch Chair of Mobile Communications

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Countering Byzantine Attacks in the Networks with Random Linear Network Coding

Countering Byzantine Attacks in the Networks with Random Linear Network Coding Countering Byzantine Attacks in the Networks with Random Linear Network Coding Jen-Yeu Chen Department of Electrical Engineering National Dong Hwa University Email:jenyeu@mail.ndhu.edu.tw Yi-Ying Tseng

More information

New Approaches to Reliable Wireless Body Area Networks

New Approaches to Reliable Wireless Body Area Networks IEEE International Conference on Microwaves, Communications, Antennas and Electronics Systems (COMCAS 2011) Tel Aviv, Israel November 7-9, 2012 New Approaches to Reliable Wireless Body Area Networks Gabriel

More information

Network coding to combat packet loss in underwater networks

Network coding to combat packet loss in underwater networks Network coding to combat packet loss in underwater networks Mandar Chitre Department of Electrical & Computer Engineering & ARL, Tropical Marine Science Institute National University of Singapore mandar@arl.nus.edu.sg

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Comparison of Analytical and Measured Performance Results on Network Coding in IEEE Ad-Hoc Networks

Comparison of Analytical and Measured Performance Results on Network Coding in IEEE Ad-Hoc Networks Comparison of Analytical and Measured Performance Results on Network Coding in IEEE 802.11 Ad-Hoc Networks Fang Zhao Singapore-MIT Alliance for Research and Technology, Singapore Email:fang.zhao@smart.mit.edu

More information

Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks

Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks Zhong Zhou 1, Haining Mo 1, Yibo Zhu 1, Zheng Peng 1, Jie Huang 2, Jun-Hong Cui 1 {zhongzhou, haining.mo,

More information

Performance Evaluation of Wireless Network Coding under Practical Settings

Performance Evaluation of Wireless Network Coding under Practical Settings Performance Evaluation of Wireless Network Coding under Practical Settings Ihsan A. Qazi Pratik Gandhi Department of Computer Science School of Information Sciences University of Pittsburgh, Pittsburgh,

More information

A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks

A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks A Joint Network-Channel Coding Technique for Single-Hop Wireless Networks Tuan Tran, Thinh Nguyen and Bella Bose School of EECS, Oregon State University Corvallis, OR 97, USA {trantu, thinhq}@eecs.oregonstate.edu;

More information

A Proactive Network Coding Strategy for Pervasive Wireless Networking

A Proactive Network Coding Strategy for Pervasive Wireless Networking A Proactive Network Coding Strategy for Pervasive Wireless Networking Elena Fasolo, Michele Rossi,Jörg Widmer and Michele Zorzi DEI, University of Padova, via Gradenigo 6/B 353 Padova, Italy DoCoMo Euro-Labs,

More information

Chapter 4: Implicit Error Detection

Chapter 4: Implicit Error Detection 4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming

Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming 1 Lava: A Reality Check of Network Coding in Peer-to-Peer Live Streaming Mea Wang, Baochun Li Department of Electrical and Computer Engineering University of Toronto {mea, bli}@eecg.toronto.edu Abstract

More information

A Novel Network Coded Parallel Transmission Framework for High-Speed Ethernet

A Novel Network Coded Parallel Transmission Framework for High-Speed Ethernet A Novel Network Coded Parallel Transmission Framework for High-Speed Ethernet Xiaomin Chen, Admela Jukan and Muriel Médard Technische Universität Carolo-Wilhelmina zu Braunschweig, Germany Massachusetts

More information

Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks

Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networs Zhong Zhou 1, Haining Mo 1, Yibo Zhu 1, Zheng Peng 1, Jie Huang 2 and Jun-Hong Cui 1 {zhongzhou, haining.mo,

More information

Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks

Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, and Zhijie Shi Computer Science & Engineering Department, University of Connecticut,

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

Near Optimal Broadcast with Network Coding in Large Sensor Networks

Near Optimal Broadcast with Network Coding in Large Sensor Networks in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA

More information

INTEGRATING NETWORK CODING INTO HETEROGENEOUS WIRELESS NETWORKS

INTEGRATING NETWORK CODING INTO HETEROGENEOUS WIRELESS NETWORKS INTEGRATING NETWORK CODING INTO HETEROGENEOUS WIRELESS NETWORKS Minkyu Kim*, Muriel Medard*, Una-May O'Reillyt *Laboratory for Information and Decision Systems tcomputer Science and Artificial Intelligence

More information

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments

The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments Sachin Katti Dina Katabi Wenjun Hu Hariharan Rahul Muriel Médard {skatti@, dk@, wenjun@csail., rahul@csail., medard@}mit.edu

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Network Coding for the Internet and Wireless Networks

Network Coding for the Internet and Wireless Networks Network Coding for the Internet and Wireless Networks Philip A. Chou and Yunnan Wu June 2007 MSR-TR-2007-70 Microsoft Research One Microsoft Way, Redmond, WA, 98052 Network Coding for the Internet and

More information

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Email: alagha@lri.fr

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

Network Coding Schemes for Underwater Networks

Network Coding Schemes for Underwater Networks Network Coding Schemes for Underwater Networks The benefits of implicit acknowledgement Daniel Lucani Muriel Médard Milica Stojanovic Massachusetts Institute Of Technology dlucani@mit.edu medard@mit.edu

More information

On the Benefits of Network Coding for Wireless Applications

On the Benefits of Network Coding for Wireless Applications On the Benefits of Network Coding for Wireless Applications Christina Fragouli EPFL Lausanne, Switzerland Email: christina.fragouli@epfl.ch Jörg Widmer DoCoMo Euro-Labs Munich, Germany Email: widmer@docomolab-euro.com

More information

Aalborg Universitet. Published in: Globecom. I E E E Conference and Exhibition. DOI (link to publication from Publisher): /GLOCOM.2011.

Aalborg Universitet. Published in: Globecom. I E E E Conference and Exhibition. DOI (link to publication from Publisher): /GLOCOM.2011. Aalborg Universitet On-the-fly Packet Error Recovery in a Cooperative Cluster of Mobile Devices Vingelmann, Peter; Heide, Janus; Pedersen, Morten Videbæk; Fitzek, Frank Hanns Paul Published in: Globecom.

More information

Computing over Multiple-Access Channels with Connections to Wireless Network Coding

Computing over Multiple-Access Channels with Connections to Wireless Network Coding ISIT 06: Computing over MACS 1 / 20 Computing over Multiple-Access Channels with Connections to Wireless Network Coding Bobak Nazer and Michael Gastpar Wireless Foundations Center Department of Electrical

More information

Efficient Synchronization of Multiple Databases over Broadcast Networks

Efficient Synchronization of Multiple Databases over Broadcast Networks Efficient Synchronization of Multiple Databases over Broadcast Networks Muhammad Muhammad, Stefan Erl, and Matteo Berioli German Aerospace Center (DLR) Institute of Communications and Navigation 82234,

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,

More information

Management Science Letters

Management Science Letters Management Science Letters 4 (2014) 2509 2516 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Delay-based network coding packet selection Rasoul

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Trade-off between Redundancy and Feedback in Wireless Network Communication

Trade-off between Redundancy and Feedback in Wireless Network Communication Trade-off between Redundancy and Feedback in Wireless Network Communication POUYA OSTOVARI 1, ABDALLAH KHREISHAH 2, JIE WU 1, WEI-SHIH YANG 3 1 Department of Computer & Information Sciences, Temple University,

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

On Benefits of Network Coding in Bidirected Networks and Hyper-networks

On Benefits of Network Coding in Bidirected Networks and Hyper-networks On Benefits of Network Coding in Bidirected Networks and Hyper-networks Zongpeng Li University of Calgary / INC, CUHK December 1 2011, at UNSW Joint work with: Xunrui Yin, Xin Wang, Jin Zhao, Xiangyang

More information

NETWORK coding is an area that has emerged in 2000 [1],

NETWORK coding is an area that has emerged in 2000 [1], 450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES Haotian Zhao, Yinlong Xu and Liping Xiang School of Computer Science and Technology, University of Science

More information

Network Coding Aware Power Control in Wireless Networks

Network Coding Aware Power Control in Wireless Networks Network Coding Aware Power Control in Wireless Networks Kai Su, Dan Zhang, Narayan B Mandayam WINLAB, Rutgers University 67 Route South, North Brunswick, NJ 892 Email: {kais, bacholic, narayan}@winlabrutgersedu

More information

Network coding to combat packet loss in underwater networks

Network coding to combat packet loss in underwater networks Network coding to combat packet loss in underwater networks ABSTRACT Mandar Chitre Department of Electrical & Computer Engineering & ARL, Tropical Marine Science Institute National University of Singapore

More information

Exercises TCP/IP Networking With Solutions

Exercises TCP/IP Networking With Solutions Exercises TCP/IP Networking With Solutions Jean-Yves Le Boudec Fall 2009 3 Module 3: Congestion Control Exercise 3.2 1. Assume that a TCP sender, called S, does not implement fast retransmit, but does

More information

An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor

An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor IJCTA, 9(12), 2016, pp. 5727-5731 International Science Press 5727 An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor Networ orks *L. Sivagami **J.Martin Leo Manickam, Member, IEEE

More information

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 *Dimakis, A.G.; Godfrey, P.B.; Wu, Y.; Wainwright, M.J.; Ramchandran, K. "Network Coding for Distributed

More information

On the Multiple Unicast Network Coding Conjecture

On the Multiple Unicast Network Coding Conjecture On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics

More information

Practical Network Coding in Sensor Networks: Quo Vadis?

Practical Network Coding in Sensor Networks: Quo Vadis? Practical Network Coding in Sensor Networks: Quo Vadis? Thiemo Voigt 1, Utz Roedig 2, Olaf Landsiedel 3,4, Kasun Samarasinghe 1, Mahesh Bogadi Shankar Prasad 1 1 Swedish Institute of Computer Science (SICS),

More information

On the Performance of Network Coding in Multi-Resolution Wireless Video Streaming

On the Performance of Network Coding in Multi-Resolution Wireless Video Streaming On the Performance of Network Coding in Multi-Resolution Wireless Video Streaming Steluta Gheorghiu Luísa Lima Alberto Lopez Toledo João Barros Muriel Médard Abstract Scalable video can be used to provide

More information

Coded Cooperative Data Exchange for Multiple Unicasts

Coded Cooperative Data Exchange for Multiple Unicasts Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:

More information

Error Control in Wireless Sensor Networks: A Cross Layer Analysis

Error Control in Wireless Sensor Networks: A Cross Layer Analysis University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 2009 Error Control in Wireless Sensor Networks: A Cross

More information