8,742 research outputs found
Performance Analysis of Random Linear Network Coding in Two-Source Single-Relay Networks
This paper considers the multiple-access relay channel in a setting where two
source nodes transmit packets to a destination node, both directly and via a
relay node, over packet erasure channels. Intra-session network coding is used
at the source nodes and inter-session network coding is employed at the relay
node to combine the recovered source packets of both source nodes. In this
work, we investigate the performance of the network-coded system in terms of
the probability that the destination node will successfully recover the source
packets of the two source nodes. We build our analysis on fundamental
probability expressions for random matrices over finite fields and we derive
upper bounds on the system performance for the case of systematic and
non-systematic network coding. Simulation results show that the upper bounds
are very tight and accurately predict the decoding probability at the
destination node. Our analysis also exposes the clear benefits of systematic
network coding at the source nodes compared to non-systematic transmission.Comment: Proc. ICC 2015, Workshop on Cooperative and Cognitive Mobile Networks
(CoCoNet), to appea
Ultra-Reliable Communication in 5G Wireless Systems
Wireless 5G systems will not only be "4G, but faster". One of the novel
features discussed in relation to 5G is Ultra-Reliable Communication (URC), an
operation mode not present in today's wireless systems. URC refers to provision
of certain level of communication service almost 100 % of the time. Example URC
applications include reliable cloud connectivity, critical connections for
industrial automation and reliable wireless coordination among vehicles. This
paper puts forward a systematic view on URC in 5G wireless systems. It starts
by analyzing the fundamental mechanisms that constitute a wireless connection
and concludes that one of the key steps towards enabling URC is revision of the
methods for encoding control information (metadata) and data. It introduces the
key concept of Reliable Service Composition, where a service is designed to
adapt its requirements to the level of reliability that can be attained. The
problem of URC is analyzed across two different dimensions. The first dimension
is the type of URC problem that is defined based on the time frame used to
measure the reliability of the packet transmission. Two types of URC problems
are identified: long-term URC (URC-L) and short-term URC (URC-S). The second
dimension is represented by the type of reliability impairment that can affect
the communication reliability in a given scenario. The main objective of this
paper is to create the context for defining and solving the new engineering
problems posed by URC in 5G.Comment: To be presented at the 1st International Conference on 5G for
Ubiquitous Connectivit
Reliable Physical Layer Network Coding
When two or more users in a wireless network transmit simultaneously, their
electromagnetic signals are linearly superimposed on the channel. As a result,
a receiver that is interested in one of these signals sees the others as
unwanted interference. This property of the wireless medium is typically viewed
as a hindrance to reliable communication over a network. However, using a
recently developed coding strategy, interference can in fact be harnessed for
network coding. In a wired network, (linear) network coding refers to each
intermediate node taking its received packets, computing a linear combination
over a finite field, and forwarding the outcome towards the destinations. Then,
given an appropriate set of linear combinations, a destination can solve for
its desired packets. For certain topologies, this strategy can attain
significantly higher throughputs over routing-based strategies. Reliable
physical layer network coding takes this idea one step further: using
judiciously chosen linear error-correcting codes, intermediate nodes in a
wireless network can directly recover linear combinations of the packets from
the observed noisy superpositions of transmitted signals. Starting with some
simple examples, this survey explores the core ideas behind this new technique
and the possibilities it offers for communication over interference-limited
wireless networks.Comment: 19 pages, 14 figures, survey paper to appear in Proceedings of the
IEE
Mapping DSP algorithms to a reconfigurable architecture Adaptive Wireless Networking (AWGN)
This report will discuss the Adaptive Wireless Networking project. The vision of the Adaptive Wireless Networking project will be given. The strategy of the project will be the implementation of multiple communication systems in dynamically reconfigurable heterogeneous hardware. An overview of a wireless LAN communication system, namely HiperLAN/2, and a Bluetooth communication system will be given. Possible implementations of these systems in a dynamically reconfigurable architecture are discussed. Suggestions for future activities in the Adaptive Wireless Networking project are also given
On Coding for Reliable Communication over Packet Networks
We present a capacity-achieving coding scheme for unicast or multicast over
lossy packet networks. In the scheme, intermediate nodes perform additional
coding yet do not decode nor even wait for a block of packets before sending
out coded packets. Rather, whenever they have a transmission opportunity, they
send out coded packets formed from random linear combinations of previously
received packets. All coding and decoding operations have polynomial
complexity.
We show that the scheme is capacity-achieving as long as packets received on
a link arrive according to a process that has an average rate. Thus, packet
losses on a link may exhibit correlation in time or with losses on other links.
In the special case of Poisson traffic with i.i.d. losses, we give error
exponents that quantify the rate of decay of the probability of error with
coding delay. Our analysis of the scheme shows that it is not only
capacity-achieving, but that the propagation of packets carrying "innovative"
information follows the propagation of jobs through a queueing network, and
therefore fluid flow models yield good approximations. We consider networks
with both lossy point-to-point and broadcast links, allowing us to model both
wireline and wireless packet networks.Comment: 33 pages, 6 figures; revised appendi
Secure Partial Repair in Wireless Caching Networks with Broadcast Channels
We study security in partial repair in wireless caching networks where parts
of the stored packets in the caching nodes are susceptible to be erased. Let us
denote a caching node that has lost parts of its stored packets as a sick
caching node and a caching node that has not lost any packet as a healthy
caching node. In partial repair, a set of caching nodes (among sick and healthy
caching nodes) broadcast information to other sick caching nodes to recover the
erased packets. The broadcast information from a caching node is assumed to be
received without any error by all other caching nodes. All the sick caching
nodes then are able to recover their erased packets, while using the broadcast
information and the nonerased packets in their storage as side information. In
this setting, if an eavesdropper overhears the broadcast channels, it might
obtain some information about the stored file. We thus study secure partial
repair in the senses of information-theoretically strong and weak security. In
both senses, we investigate the secrecy caching capacity, namely, the maximum
amount of information which can be stored in the caching network such that
there is no leakage of information during a partial repair process. We then
deduce the strong and weak secrecy caching capacities, and also derive the
sufficient finite field sizes for achieving the capacities. Finally, we propose
optimal secure codes for exact partial repair, in which the recovered packets
are exactly the same as erased packets.Comment: To Appear in IEEE Conference on Communication and Network Security
(CNS
- …