45 research outputs found
Speeding Multicast by Acknowledgment Reduction Technique (SMART)
We present a novel feedback protocol for wireless broadcast networks that
utilize linear network coding. We consider transmission of packets from one
source to many receivers over a single-hop broadcast erasure channel. Our
method utilizes a predictive model to request feedback only when the
probability that all receivers have completed decoding is significant. In
addition, our proposed NACK-based feedback mechanism enables all receivers to
request, within a single time slot, the number of retransmissions needed for
successful decoding. We present simulation results as well as analytical
results that show the favorable scalability of our technique as the number of
receivers, file size, and packet erasure probability increase. We also show the
robustness of this scheme to uncertainty in the predictive model, including
uncertainty in the number of receiving nodes and the packet erasure
probability, as well as to losses of the feedback itself. Our scheme, SMART, is
shown to perform nearly as well as an omniscient transmitter that requires no
feedback. Furthermore, SMART, is shown to outperform current state of the art
methods at any given erasure probability, file size, and numbers of receivers
MAC Centered Cooperation - Synergistic Design of Network Coding, Multi-Packet Reception, and Improved Fairness to Increase Network Throughput
We design a cross-layer approach to aid in develop- ing a cooperative
solution using multi-packet reception (MPR), network coding (NC), and medium
access (MAC). We construct a model for the behavior of the IEEE 802.11 MAC
protocol and apply it to key small canonical topology components and their
larger counterparts. The results obtained from this model match the available
experimental results with fidelity. Using this model, we show that fairness
allocation by the IEEE 802.11 MAC can significantly impede performance; hence,
we devise a new MAC that not only substantially improves throughput, but
provides fairness to flows of information rather than to nodes. We show that
cooperation between NC, MPR, and our new MAC achieves super-additive gains of
up to 6.3 times that of routing with the standard IEEE 802.11 MAC. Furthermore,
we extend the model to analyze our MAC's asymptotic and throughput behaviors as
the number of nodes increases or the MPR capability is limited to only a single
node. Finally, we show that although network performance is reduced under
substantial asymmetry or limited implementation of MPR to a central node, there
are some important practical cases, even under these conditions, where MPR, NC,
and their combination provide significant gains
Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study
We construct a simple network model to provide insight into network design strategies. We show that the model can be used to address various approaches to network coding, MAC, and multi-packet reception so that their effects on network throughput can be evaluated. We consider several topology components which exhibit the same non-monotonic saturation behavior found within the Katti et. al. COPE experiments. We further show that fairness allocation by the MAC can seriously impact performance and cause this non-monotonic saturation. Using our model, we develop a MAC that provides monotonic saturation, higher saturation throughput gains and fairness among flows rather than nodes. The proposed model provides an estimate of the achievable gains for the cross-layer design of network coding, multi-packet reception, and MAC showing that super-additive throughput gains on the order of six times that of routing are possible.United States. Dept. of Defense (Air Force Contract FA8721-05-C-0002)Irwin Mark Jacobs and Joan Klein Jacobs Presidential FellowshipInformation Systems of ASD(R&E
Lists that are smaller than their parts: A coding approach to tunable secrecy
We present a new information-theoretic definition and associated results,
based on list decoding in a source coding setting. We begin by presenting
list-source codes, which naturally map a key length (entropy) to list size. We
then show that such codes can be analyzed in the context of a novel
information-theoretic metric, \epsilon-symbol secrecy, that encompasses both
the one-time pad and traditional rate-based asymptotic metrics, but, like most
cryptographic constructs, can be applied in non-asymptotic settings. We derive
fundamental bounds for \epsilon-symbol secrecy and demonstrate how these bounds
can be achieved with MDS codes when the source is uniformly distributed. We
discuss applications and implementation issues of our codes.Comment: Allerton 2012, 8 page
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security
We present information-theoretic definitions and results for analyzing
symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when
perfect secrecy is not attained. We adopt two lines of analysis, one based on
lossless source coding, and another akin to rate-distortion theory. We start by
presenting a new information-theoretic metric for security, called symbol
secrecy, and derive associated fundamental bounds. We then introduce
list-source codes (LSCs), which are a general framework for mapping a key
length (entropy) to a list size that an eavesdropper has to resolve in order to
recover a secret message. We provide explicit constructions of LSCs, and
demonstrate that, when the source is uniformly distributed, the highest level
of symbol secrecy for a fixed key length can be achieved through a construction
based on minimum-distance separable (MDS) codes. Using an analysis related to
rate-distortion theory, we then show how symbol secrecy can be used to
determine the probability that an eavesdropper correctly reconstructs functions
of the original plaintext. We illustrate how these bounds can be applied to
characterize security properties of symmetric-key encryption schemes, and, in
particular, extend security claims based on symbol secrecy to a functional
setting.Comment: Submitted to IEEE Transactions on Information Theor
Multi-Path TCP with Network Coding for Mobile Devices in Heterogeneous Networks
Existing mobile devices have the capability to use multiple network technologies simultaneously to help increase performance; but they rarely, if at all, effectively use these technologies in parallel. We first present empirical data to help understand the mobile environment when three heterogeneous networks are available to the mobile device (i.e., a WiFi network, WiMax network, and an Iridium satellite network). We then propose a reliable, multi-path protocol called Multi-Path TCP with Network Coding (MPTCP/NC) that utilizes each of these networks in parallel. An analytical model is developed and a mean-field approximation is derived that gives an estimate of the protocol's achievable throughput. Finally, a comparison between MPTCP and MPTCP/NC is presented using both the empirical data and mean-field approximation. Our results show that network coding can provide users in mobile environments a higher quality of service by enabling the use of multiple network technologies and the capability to overcome packet losses due to lossy, wireless network connections.United States. Dept. of Defense. Assistant Secretary of Defense for Research & Engineering (Air Force Contract FA8721-05-C-0002
Theoretical Study of Cubic Structures Based on Fullerene Carbon Clusters: CC and (C
We study a new hypothetical form of solid carbon \csc, with a unit cell which
is composed of the \cs \ fullerene cluster and an additional single carbon atom
arranged in the zincblende structure. Using {\it ab initio} calculations, we
show that this new form of solid carbon has lower energy than hyperdiamond, the
recently proposed form composed of \cs \ units in the diamond structure. To
understand the bonding character of of these cluster-based solids, we analyze
the electronic structure of \csc \ and of hyperdiamond and compare them to the
electronic states of crystalline cubic diamond.Comment: 15 pages, latex, no figure
A Social Model for Health Promotion for an Aging Population: Initial Evidence on the Experience Corps Model
This report evaluates whether a program for older volunteers, designed for both generativity and health promotion, leads to short-term improvements in multiple behavioral risk factors and positive effects on intermediary risk factors for disability and other morbidities. The Experience Corps® places older volunteers in public elementary schools in roles designed to meet schools\u27 needs and increase the social, physical, and cognitive activity of the volunteers. This article reports on a pilot randomized trial in Baltimore, Maryland. The 128 volunteers were 60-86 years old; 95% were African American. At follow-up of 4-8 months, physical activity, strength, people one could turn to for help, and cognitive activity increased significantly, and walking speed decreased significantly less, in participants compared to controls. In this pilot trial, physical, cognitive, and social activity increased, suggesting the potential for the Experience Corps to improve health for an aging population and simultaneously improve educational outcomes for children