• 제목/요약/키워드: Network-Coding

검색결과 706건 처리시간 0.024초

네트워크 부호화를 사용한 양방향 협력 ARQ 프로토콜의 성능 분석 (Performance Analysis of Two-way Cooperative ARQ Protocol Using Network Coding)

  • 변일무;이형열;김광순
    • 한국통신학회논문지
    • /
    • 제33권10A호
    • /
    • pp.972-979
    • /
    • 2008
  • 양방향 중계 채널 (two-way relay channel)은 2개의 단말이 중계기 (relay)의 도움을 받아 양방향의 정보를 주고 받는 협력 통신 (cooperative communication) 채널이다. 기존의 협력 통신에서는 중계기가 시간 또는 주파수 자원을 나누어 양방향으로 신호를 송신하지만, 네트워크 부호화 (network coding)를 사용한 양방향 중계 채널에서는 중계기가 동일 자원을 사용하여 두 단말로 신호를 동시에 송신하므로 기존 기법보다 높은 통신용량을 얻을 수 있다. 본 논문에서는 ARQ환경에서 네트워크 부호화를 사용한 헙력통신 프로토콜을 보이고, 이를 스테이트 다이어그램 (state diagram) 을 이용하여 성능을 분석하였다.

Efficient Peer-to-Peer File Sharing Using Network Coding in MANET

  • Lee, Uichin;Park, Joon-Sang;Lee, Seung-Hoon;Ro, Won-W.;Pau, Giovanni;Gerla, Mario
    • Journal of Communications and Networks
    • /
    • 제10권4호
    • /
    • pp.422-429
    • /
    • 2008
  • Mobile peer-to-peer (P2P) systems have recently got in the limelight of the research community that is striving to build efficient and effective mobile content addressable networks. Along this line of research, we propose a new peer-to-peer file sharing protocol suited to mobile ad hoc networks (MANET). The main ingredients of our protocol are network coding and mobility assisted data propagation, i.e., single-hop communication. We argue that network coding in combination with single-hop communication allows P2P file sharing systems in MANET to operate in a more efficient manner and helps the systems to deal with typical MANET issues such as dynamic topology and intermittent connectivity as well as various other issues that have been disregarded in previous MANET P2P researches such as addressing, node/user density, non-cooperativeness, and unreliable channel. Via simulation, we show that our P2P protocol based on network coding and single-hop communication allows shorter file downloading delays compared to an existing MANET P2P protocol.

Limitations of Proof for Benefit of Network Coding to IP Traceback

  • Ngo, Dung Tien;Hong, Choong-Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2012년도 한국컴퓨터종합학술대회논문집 Vol.39 No.1(D)
    • /
    • pp.366-368
    • /
    • 2012
  • Network Coding approach to IP tracback was proposed by Sattari et al. [5] in order to reduce number of packets required to trace the source of a single attack scenario. In this paper, we analysis and point out limitations and problems of their proof for benefit of network coding to IP traceback.

오류 정정 부호를 사용하는 범용 무선 통신 칩으로 구현된 스마트 미터링 무선 네트워크 시스템 성능 분석 (Performance Analysis of Wireless Communication Networks for Smart Metering Implemented with Channel Coding Adopted Multi-Purpose Wireless Communication Chip)

  • 왕한호
    • 전기학회논문지P
    • /
    • 제64권4호
    • /
    • pp.321-326
    • /
    • 2015
  • Smart metering is one of the most implementable internet-of-thing service. In order to implement the smart metering, a wireless communication network should be newly designed and evaluated so as to satisfy quality-of-service of smart metering. In this paper, we consider a wireless network for the smart metering implemented with multi-purpose wireless chips and channel coding-functioned micro controllers. Especially, channel coding is newly adopted to improve successful frame transmission probability. Based on the successful frame transmission probability, average transmission delay and delay violation probability are analyzed. Using the analytical results, service coverage expansion is evaluated. Through the delay analysis, service feasibility can be verified. According to our results, channel coding needs not to be utilized to improve the delay performance if the smart metering service coverage is several tens of meters. However, if more coverage is required, chanel coding adoption definitely reduces the delay time and improve the service feasibility.

Cautious View on Network Coding - From Theory to Practice

  • Heide, Janus;Pedersen, Morten V.;Fitzek, Frank H.P.;Larsen, Torben
    • Journal of Communications and Networks
    • /
    • 제10권4호
    • /
    • pp.403-411
    • /
    • 2008
  • Energy consumption has been mostly neglected in network coding (NC) research so far. This work investigates several different properties of NC that influence the energy consumption and thus are important when designing NC systems for battery-driven devices. Different approaches to the necessary implementation of coding operations and Galois fields arithmetic are considered and complexity expressions for coding operations are provided. We also benchmark our own mobile phone implementation on a Nokia N95 under different settings. Several NC strategies are described and compared, furthermore expressions for transmission times are developed. It is also shown that the use of NC introduces a trade off between reduction in transmission time and increase in energy consumption.

동적 방송을 위한 Batching 기법으로 Network Coding 기법 제안 (Batching scheme using the Network Coding for Dynamic Broadcasting)

  • 유진수;이성우;윤희용
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2011년도 한국컴퓨터종합학술대회논문집 Vol.38 No.1(D)
    • /
    • pp.13-15
    • /
    • 2011
  • 현재 무선 통신을 이용한 IPTV서비스에 대한 요구가 지속적으로 증가 되고 있다. 따라서 제한된 자원을 다수의 사용자들에게 효율적으로 전송하기 위한 기술이 개발되어야 한다. 본 논문에서 우리는 무선 IPTV의 VOD 시스템 성능 향상을 위해 효율적인 Batching 기법과 채널을 효과적으로 사용하기 위하여 Network coding을 활용한 기법을 제안한다. 제안된 기법은 채널을 효과적으로 사용하기 위하여 Network coding을 활용하였다. 현재의 Batching 기법은 다수의 채널을 사용하는 반면에 제안된 기법은 한 개의 채널에서 2개 이상의 세그먼트를 전송함으로써 얻어지는 채널사용의 효율성을 보여준다.

Packet Output and Input Configuration in a Multicasting Session Using Network Coding

  • Marquez, Jose;Gutierrez, Ismael;Valle, Sebastian;Falco, Melanis
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.686-710
    • /
    • 2019
  • This work proposes a model to solve the problem of Network Coding over a one-session multicast network. The model is based on a system of restrictions that defines the packet flows received in the sink nodes as functions of the outgoing flows from the source node. A multicast network graph is used to derive a directed labeled line graph (DLLG). The successive powers of the DLLG adjacency matrix to the convergence in the null matrix permits the construction of the jump matrix Source-Sinks. In its reduced form, this shows the dependency of the incoming flows in the sink nodes as a function of the outgoing flows in the source node. The emerging packets for each outgoing link from the source node are marked with a tag that is a linear combination of variables that corresponds to powers of two. Restrictions are built based on the dependence of the outgoing and incoming flows and the packet tags as variables. The linear independence of the incoming flows to the sink nodes is mandatory. The method is novel because the solution is independent of the Galois field size where the packet contents are defined.

Novel Section-Based Joint Network Coding and Scheduling Scheme in WMNs: JNCS

  • Cha, Jae Ryong;Baek, Gwang Hun
    • ETRI Journal
    • /
    • 제37권2호
    • /
    • pp.380-386
    • /
    • 2015
  • Guaranteeing quality of service over a multihop wireless network is difficult because end-to-end (ETE) delay is accumulated at each hop in a multihop flow. Recently, research has been conducted on network coding (NC) schemes as an alternative mechanism to significantly increase the utilization of valuable resources in multihop wireless networks. This paper proposes a new section-based joint NC and scheduling scheme that can reduce ETE delay and enhance resource efficiency in a multihop wireless network. Next, this paper derives the average ETE delay of the proposed scheme and simulates a TDMA network where the proposed scheme is deployed. Finally, this paper compares the performance of the proposed scheme with that of the conventional sequential scheduling scheme. From the performance analysis and simulation results, the proposed scheme gives more delay-and energy-efficient slot assignments even if the NC operation is applied, resulting in a use of fewer network resources and a reduction in ETE delay.

Energy Efficiency Analysis of Cellular Downlink Transmission with Network Coding over Rayleigh Fading Channels

  • Zhu, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.446-458
    • /
    • 2013
  • Recently, energy-efficient cellular transmission has received considerable research attention to improve the energy efficiency of wireless communication. In this paper, we consider a cellular network consisting of one base station (BS) and multiple user terminals and explore the network coding for enhancing the energy efficiency of cellular downlink transmission from BS to users. We propose the network coded cellular transmission scheme and conduct its energy consumption analysis with target outage probability and data rate requirements in Rayleigh fading environments. Then, the energy efficiency in Bits-per-Joule is further defined and analyzed to evaluate the number of bits delivered per Joule of energy cost. Numerical results show that the network coded cellular transmission significantly outperforms the traditional cellular transmission in terms of energy efficiency, implying that given a Joule of energy cost, the network coded cellular transmission scheme can deliver more bits than the traditional cellular transmission.

채널 부호화를 통한 물리계층 무선네트워크 보안기술 (Channel Coding Based Physical Layer Security for Wireless Networks)

  • 아싸두자만;공형윤
    • 한국인터넷방송통신학회논문지
    • /
    • 제8권3호
    • /
    • pp.57-70
    • /
    • 2008
  • This paper introduces a new paradigm of physical layer security through channel coding for wireless networks. The well known spread spectrum based physical layer security in wireless network is applicable when code division multiple access (CDMA) is used as wireless air link interface. In our proposal, we incorporate the proposed security protocol within channel coding as channel coding is an essential part of all kind of wireless communications. Channel coding has a built-in security in the sense of encoding and decoding algorithm. Decoding of a particular codeword is possible only when the encoding procedure is exactly known. This point is the key of our proposed security protocol. The common parameter that required for both encoder and decoder is generally a generator matrix. We proposed a random selection of generators according to a security key to ensure the secrecy of the networks against unauthorized access. Therefore, the conventional channel coding technique is used as a security controller of the network along with its error correcting purpose.

  • PDF