10,869 research outputs found
Reliable Broadcast to A User Group with Limited Source Transmissions
In order to reduce the number of retransmissions and save power for the
source node, we propose a two-phase coded scheme to achieve reliable broadcast
from the source to a group of users with minimal source transmissions. In the
first phase, the information packets are encoded with batched sparse (BATS)
code, which are then broadcasted by the source node until the file can be
cooperatively decoded by the user group. In the second phase, each user
broadcasts the re-encoded packets to its peers based on their respective
received packets from the first phase, so that the file can be decoded by each
individual user. The performance of the proposed scheme is analyzed and the
rank distribution at the moment of decoding is derived, which is used as input
for designing the optimal BATS code. Simulation results show that the proposed
scheme can reduce the total number of retransmissions compared with the
traditional single-phase broadcast with optimal erasure codes. Furthermore,
since a large number of transmissions are shifted from the source node to the
users, power consumptions at the source node is significantly reduced.Comment: ICC 2015. arXiv admin note: substantial text overlap with
arXiv:1504.0446
Whether and Where to Code in the Wireless Relay Channel
The throughput benefits of random linear network codes have been studied
extensively for wirelined and wireless erasure networks. It is often assumed
that all nodes within a network perform coding operations. In
energy-constrained systems, however, coding subgraphs should be chosen to
control the number of coding nodes while maintaining throughput. In this paper,
we explore the strategic use of network coding in the wireless packet erasure
relay channel according to both throughput and energy metrics. In the relay
channel, a single source communicates to a single sink through the aid of a
half-duplex relay. The fluid flow model is used to describe the case where both
the source and the relay are coding, and Markov chain models are proposed to
describe packet evolution if only the source or only the relay is coding. In
addition to transmission energy, we take into account coding and reception
energies. We show that coding at the relay alone while operating in a rateless
fashion is neither throughput nor energy efficient. Given a set of system
parameters, our analysis determines the optimal amount of time the relay should
participate in the transmission, and where coding should be performed.Comment: 11 pages, 12 figures, to be published in the IEEE JSAC Special Issue
on Theories and Methods for Advanced Wireless Relay
Latency Analysis of Coded Computation Schemes over Wireless Networks
Large-scale distributed computing systems face two major bottlenecks that
limit their scalability: straggler delay caused by the variability of
computation times at different worker nodes and communication bottlenecks
caused by shuffling data across many nodes in the network. Recently, it has
been shown that codes can provide significant gains in overcoming these
bottlenecks. In particular, optimal coding schemes for minimizing latency in
distributed computation of linear functions and mitigating the effect of
stragglers was proposed for a wired network, where the workers can
simultaneously transmit messages to a master node without interference. In this
paper, we focus on the problem of coded computation over a wireless
master-worker setup with straggling workers, where only one worker can transmit
the result of its local computation back to the master at a time. We consider 3
asymptotic regimes (determined by how the communication and computation times
are scaled with the number of workers) and precisely characterize the total
run-time of the distributed algorithm and optimum coding strategy in each
regime. In particular, for the regime of practical interest where the
computation and communication times of the distributed computing algorithm are
comparable, we show that the total run-time approaches a simple lower bound
that decouples computation and communication, and demonstrate that coded
schemes are times faster than uncoded schemes
Centralized and Cooperative Transmission of Secure Multiple Unicasts using Network Coding
We introduce a method for securely delivering a set of messages to a group of
clients over a broadcast erasure channel where each client is interested in a
distinct message. Each client is able to obtain its own message but not the
others'. In the proposed method the messages are combined together using a
special variant of random linear network coding. Each client is provided with a
private set of decoding coefficients to decode its own message. Our method
provides security for the transmission sessions against computational
brute-force attacks and also weakly security in information theoretic sense. As
the broadcast channel is assumed to be erroneous, the missing coded packets
should be recovered in some way. We consider two different scenarios. In the
first scenario the missing packets are retransmitted by the base station
(centralized). In the second scenario the clients cooperate with each other by
exchanging packets (decentralized). In both scenarios, network coding
techniques are exploited to increase the total throughput. For the case of
centralized retransmissions we provide an analytical approximation for the
throughput performance of instantly decodable network coded (IDNC)
retransmissions as well as numerical experiments. For the decentralized
scenario, we propose a new IDNC based retransmission method where its
performance is evaluated via simulations and analytical approximation.
Application of this method is not limited to our special problem and can be
generalized to a new class of problems introduced in this paper as the
cooperative index coding problem
Kalman Filtering With Relays Over Wireless Fading Channels
This note studies the use of relays to improve the performance of Kalman
filtering over packet dropping links. Packet reception probabilities are
governed by time-varying fading channel gains, and the sensor and relay
transmit powers. We consider situations with multiple sensors and relays, where
each relay can either forward one of the sensors' measurements to the
gateway/fusion center, or perform a simple linear network coding operation on
some of the sensor measurements. Using an expected error covariance performance
measure, we consider optimal and suboptimal methods for finding the best relay
configuration, and power control problems for optimizing the Kalman filter
performance. Our methods show that significant performance gains can be
obtained through the use of relays, network coding and power control, with at
least 30-40 less power consumption for a given expected error covariance
specification.Comment: 7 page
Throughput Bound of XOR Coded Wireless Multicasting to Three Clients
It is a well-known result that constructing codewords over to
minimize the number of transmissions for a single-hop wireless multicasting is
an NP-complete problem. Linearly independent codewords can be constructed in
polynomial time for all the clients, known as maximum distance separable
(MDS) code, when the finite field size is larger than or equal to the
number of clients, . In this paper we quantify the exact minimum
number of transmissions for a multicast network using erasure code when
and , such that . We first show that the use of Markov chain model to
derive the minimum number of transmissions for such a network is limited for
very small number of input packets. We then use combinatorial approach to
derive an upper bound on the exact minimum number of transmissions. Our results
show that the difference between the expected number of transmissions using XOR
coding and MDS coding is negligible for .Comment: This paper appears in the proceedings of 20th IEEE International
Workshop on Computer Aided Modelling and Design of Communication Links and
Networks (CAMAD), 7-9 September 2015, University of Surrey, Guildford, U
Doped Fountain Coding for Minimum Delay Data Collection in Circular Networks
This paper studies decentralized, Fountain and network-coding based
strategies for facilitating data collection in circular wireless sensor
networks, which rely on the stochastic diversity of data storage. The goal is
to allow for a reduced delay collection by a data collector who accesses the
network at a random position and random time. Data dissemination is performed
by a set of relays which form a circular route to exchange source packets. The
storage nodes within the transmission range of the route's relays linearly
combine and store overheard relay transmissions using random decentralized
strategies. An intelligent data collector first collects a minimum set of coded
packets from a subset of storage nodes in its proximity, which might be
sufficient for recovering the original packets and, by using a message-passing
decoder, attempts recovering all original source packets from this set.
Whenever the decoder stalls, the source packet which restarts decoding is
polled/doped from its original source node. The random-walk-based analysis of
the decoding/doping process furnishes the collection delay analysis with a
prediction on the number of required doped packets. The number of doped packets
can be surprisingly small when employed with an Ideal Soliton code degree
distribution and, hence, the doping strategy may have the least collection
delay when the density of source nodes is sufficiently large. Furthermore, we
demonstrate that network coding makes dissemination more efficient at the
expense of a larger collection delay. Not surprisingly, a circular network
allows for a significantly more (analytically and otherwise) tractable
strategies relative to a network whose model is a random geometric graph
- …