2,938 research outputs found
Channels with Cooperation Links that May Be Absent
It is well known that cooperation between users in a communication network
can lead to significant performance gains. A common assumption in past works is
that all the users are aware of the resources available for cooperation, and
know exactly to what extent these resources can be used. Unfortunately, in many
modern communication networks the availability of cooperation links cannot be
guaranteed a priori, due to the dynamic nature of the network. In this work a
family of models is suggested where the cooperation links may or may not be
present. Coding schemes are devised that exploit the cooperation links if they
are present, and can still operate (although at reduced rates) if cooperation
is not possible.Comment: Accepted for publication in the IEEE transaction on Information
Theory, June 201
Network vector quantization
We present an algorithm for designing locally optimal vector quantizers for general networks. We discuss the algorithm's implementation and compare the performance of the resulting "network vector quantizers" to traditional vector quantizers (VQs) and to rate-distortion (R-D) bounds where available. While some special cases of network codes (e.g., multiresolution (MR) and multiple description (MD) codes) have been studied in the literature, we here present a unifying approach that both includes these existing solutions as special cases and provides solutions to previously unsolved examples
Network coding for transport protocols
With the proliferation of smart devices that require Internet connectivity anytime, anywhere, and the recent technological
advances that make it possible, current networked systems will have to provide a various range of services, such as content
distribution, in a wide range of settings, including wireless environments. Wireless links may experience temporary losses,
however, TCP, the de facto protocol for robust unicast communications, reacts by reducing the congestion window drastically
and injecting less traffic in the network. Consequently the wireless links are underutilized and the overall performance of the
TCP protocol in wireless environments is poor. As content delivery (i.e. multicasting) services, such as BBC iPlayer, become
popular, the network needs to support the reliable transport of the data at high rates, and with specific delay constraints. A
typical approach to deliver content in a scalable way is to rely on peer-to-peer technology (used by BitTorrent, Spotify and
PPLive), where users share their resources, including bandwidth, storage space, and processing power. Still, these systems
suffer from the lack of incentives for resource sharing and cooperation, and this problem is exacerbated in the presence of
heterogenous users, where a tit-for-tat scheme is difficult to implement.
Due to the issues highlighted above, current network architectures need to be changed in order to accommodate the usersÂż
demands for reliable and quality communications. In other words, the emergent need for advanced modes of information
transport requires revisiting and improving network components at various levels of the network stack.
The innovative paradigm of network coding has been shown as a promising technique to change the design of networked
systems, by providing a shift from how data flows traditionally move through the network. This shift implies that data flows are
no longer kept separate, according to the Âżstore-and-forwardÂż model, but they are also processed and mixed in the network. By
appropriately combining data by means of network coding, it is expected to obtain significant benefits in several areas of
network design and architecture.
In this thesis, we set out to show the benefits of including network coding into three communication paradigms, namely point-topoint
communications (e.g. unicast), point-to-multipoint communications (e.g. multicast), and multipoint-to-multipoint
communications (e.g. peer-to-peer networks). For the first direction, we propose a network coding-based multipath scheme and
show that TCP unicast sessions are feasible in highly volatile wireless environments. For point-to-multipoint communications,
we give an algorithm to optimally achieve all the rate pairs from the rate region in the case of degraded multicast over the
combination network. We also propose a system for live streaming that ensures reliability and quality of service to heterogenous
users, even if data transmissions occur over lossy wireless links. Finally, for multipoint-to-multipoint communications, we design
a system to provide incentives for live streaming in a peer-to-peer setting, where users have subscribed to different levels of
quality.
Our work shows that network coding enables a reliable transport of data, even in highly volatile environments, or in delay
sensitive scenarios such as live streaming, and facilitates the implementation of an efficient incentive system, even in the
presence of heterogenous users. Thus, network coding can solve the challenges faced by next generation networks
in order to support advanced information transport.Postprint (published version
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Multiuser Successive Refinement and Multiple Description Coding
We consider the multiuser successive refinement (MSR) problem, where the
users are connected to a central server via links with different noiseless
capacities, and each user wishes to reconstruct in a successive-refinement
fashion. An achievable region is given for the two-user two-layer case and it
provides the complete rate-distortion region for the Gaussian source under the
MSE distortion measure. The key observation is that this problem includes the
multiple description (MD) problem (with two descriptions) as a subsystem, and
the techniques useful in the MD problem can be extended to this case. We show
that the coding scheme based on the universality of random binning is
sub-optimal, because multiple Gaussian side informations only at the decoders
do incur performance loss, in contrast to the case of single side information
at the decoder. We further show that unlike the single user case, when there
are multiple users, the loss of performance by a multistage coding approach can
be unbounded for the Gaussian source. The result suggests that in such a
setting, the benefit of using successive refinement is not likely to justify
the accompanying performance loss. The MSR problem is also related to the
source coding problem where each decoder has its individual side information,
while the encoder has the complete set of the side informations. The MSR
problem further includes several variations of the MD problem, for which the
specialization of the general result is investigated and the implication is
discussed.Comment: 10 pages, 5 figures. To appear in IEEE Transaction on Information
Theory. References updated and typos correcte
Secure Routing in Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation networks such as providing flexible, adaptive,
and reconfigurable architecture while offering cost-effective solutions to the
service providers. Unlike traditional Wi-Fi networks, with each access point
(AP) connected to the wired network, in WMNs only a subset of the APs are
required to be connected to the wired network. The APs that are connected to
the wired network are called the Internet gateways (IGWs), while the APs that
do not have wired connections are called the mesh routers (MRs). The MRs are
connected to the IGWs using multi-hop communication. The IGWs provide access to
conventional clients and interconnect ad hoc, sensor, cellular, and other
networks to the Internet. However, most of the existing routing protocols for
WMNs are extensions of protocols originally designed for mobile ad hoc networks
(MANETs) and thus they perform sub-optimally. Moreover, most routing protocols
for WMNs are designed without security issues in mind, where the nodes are all
assumed to be honest. In practical deployment scenarios, this assumption does
not hold. This chapter provides a comprehensive overview of security issues in
WMNs and then particularly focuses on secure routing in these networks. First,
it identifies security vulnerabilities in the medium access control (MAC) and
the network layers. Various possibilities of compromising data confidentiality,
data integrity, replay attacks and offline cryptanalysis are also discussed.
Then various types of attacks in the MAC and the network layers are discussed.
After enumerating the various types of attacks on the MAC and the network
layer, the chapter briefly discusses on some of the preventive mechanisms for
these attacks.Comment: 44 pages, 17 figures, 5 table
A cross layer multi hop network architecture for wireless Ad Hoc networks
In this paper, a novel decentralized cross-layer multi-hop cooperative network architecture is presented. Our architecture involves the design of a simple yet efficient cooperative flooding scheme,two decentralized opportunistic cooperative forwarding mechanisms as well as the design of Routing
Enabled Cooperative Medium Access Control (RECOMAC) protocol that spans and incorporates the physical, medium access control (MAC) and routing layers for improving the performance of multihop communication. The proposed architecture exploits randomized coding at the physical layer to realize cooperative diversity. Randomized coding alleviates relay selection and actuation mechanisms,and therefore reduces the coordination among the relays. The coded packets are forwarded via opportunistically formed cooperative sets within a region, without communication among the relays and without establishing a prior route. In our architecture, routing layer functionality is submerged into the
MAC layer to provide seamless cooperative communication while the messaging overhead to set up routes, select and actuate relays is minimized. RECOMAC is shown to provide dramatic performance improvements, such as eight times higher throughput and ten times lower end-to-end delay as well as reduced overhead, as compared to networks based on well-known IEEE 802.11 and Ad hoc On Demand
Distance Vector (AODV) protocols
- …