17,118 research outputs found
Wireless Broadcast with Physical-Layer Network Coding
This work investigates the maximum broadcast throughput and its achievability
in multi-hop wireless networks with half-duplex node constraint. We allow the
use of physical-layer network coding (PNC). Although the use of PNC for unicast
has been extensively studied, there has been little prior work on PNC for
broadcast. Our specific results are as follows: 1) For single-source broadcast,
the theoretical throughput upper bound is n/(n+1), where n is the "min
vertex-cut" size of the network. 2) In general, the throughput upper bound is
not always achievable. 3) For grid and many other networks, the throughput
upper bound n/(n+1) is achievable. Our work can be considered as an attempt to
understand the relationship between max-flow and min-cut in half-duplex
broadcast networks with cycles (there has been prior work on networks with
cycles, but not half-duplex broadcast networks).Comment: 23 pages, 18 figures, 6 table
Recommended from our members
Enabling decentralized wireless index coding in practice
Index coding is a problem in theoretical computer science and network information theory that studies the optimal coding scheme for transmitting multiple messages across a network to receivers with different side information. The ultimate goal of index coding is to reduce transmission time in a communication network by minimizing the number of messages based on shared information. Index coding theory extends to several key engineering problems in network communication including peer to peer communication, distributed broadcast networks, and interference alignment. Although the theoretical connection between index coding and wireless networks is valuable, we focus on finding index coding strategies for a realistic wireless network. More specifically, we investigate how index coding can be applied to an OFDMA downlink network during the retransmission phase. An orthogonal frequency-division multiple access (OFDMA) downlink network is a network where data is sent downward from a designated higher-level transmitter to a group of receiving nodes. In addition, receivers can often decode the other receivers' physical layer signals on the other sub-channels that can be exploited as side information. If this side information is sent back to the transmitter, it can then be coded to cancel the interference in subsequent retransmission phases resulting in fewer retransmission messages. In this report, we explain the coding model and characterize the benefits of index coding for retransmissions within an OFDMA downlink network. In addition, we demonstrate the results of applying this index coding scheme in such network in both simulation and in an active wireless mesh network.Electrical and Computer Engineerin
Compute-and-forward on a line network with random access
Signal superposition and broadcast are important features of the wireless medium. Compute-and-Forward, also known as Physical Layer Network Coding (PLNC), is a technique exploiting these features in order to improve performance of wireless networks. More precisely, it allows wireless terminals to reliably de- code a linear combination of all messages, when a superposition of the messages is received through the physical medium.\ud
In this paper, we propose a random PLNC scheme for a local interference line network in which nodes perform random access scheduling. We prove that our PLNC scheme is capacity achieving in the case of one symmetric bi-directional session with terminals on both ends of this line network model. We demonstrate that our scheme significantly outperforms any other scheme. In particular, by eligibly choosing the access rate of the random access scheduling mechanism for the network, the throughput of our PLNC scheme is at least 3.4 and 1.7 times better than traditional routing and plain network coding, respectively
Reliable Physical Layer Network Coding
When two or more users in a wireless network transmit simultaneously, their
electromagnetic signals are linearly superimposed on the channel. As a result,
a receiver that is interested in one of these signals sees the others as
unwanted interference. This property of the wireless medium is typically viewed
as a hindrance to reliable communication over a network. However, using a
recently developed coding strategy, interference can in fact be harnessed for
network coding. In a wired network, (linear) network coding refers to each
intermediate node taking its received packets, computing a linear combination
over a finite field, and forwarding the outcome towards the destinations. Then,
given an appropriate set of linear combinations, a destination can solve for
its desired packets. For certain topologies, this strategy can attain
significantly higher throughputs over routing-based strategies. Reliable
physical layer network coding takes this idea one step further: using
judiciously chosen linear error-correcting codes, intermediate nodes in a
wireless network can directly recover linear combinations of the packets from
the observed noisy superpositions of transmitted signals. Starting with some
simple examples, this survey explores the core ideas behind this new technique
and the possibilities it offers for communication over interference-limited
wireless networks.Comment: 19 pages, 14 figures, survey paper to appear in Proceedings of the
IEE
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …