• 제목/요약/키워드: linear network coding

검색결과 55건 처리시간 0.027초

Multicast Topology에서의 네트워크 코딩 성능 분석 (Network Coding Performance Analysis with Multicast Topology)

  • 이미성;발라카난;이문호
    • 대한전자공학회논문지TC
    • /
    • 제47권11호
    • /
    • pp.30-35
    • /
    • 2010
  • 네트워크 코딩은 실용 네트워크 시스템에서 흥미로운 적용을 보이며 새로운 연구 분야로 인식되고 있다. 네트워크 코딩에서, 중간 노드는 이전에 받은 정보의 선형조합 되어진 패킷을 보낼 수 있다. 수식적으로 이론 및 운영 네트워크는 네트워크 노드들에서 코딩을 고려하는 새로운 관점으로부터 발표되었다. 우리는 다중원천 다중전송 네트워크에서 최적의 채널용량에 점근적으로 달성하는 네트워크 코딩을 제시한다. 우리의 해석방법은 네트워크 코딩 사이에 만든 Connection들을 사용한다. 이 논문에서 우리는 네트워크 코딩의 성능에 대해 해석했다. 또한 우리는 선형 최적화 문제를 가진 네트워크 코딩에 대한 시뮬레이션 결과를 논하고, 어떻게 네트워크 코딩을 사용 할 수 있는지를 보인다.

네트워크 코딩의 병렬처리 성능비교 (Comparison of Parallelized Network Coding Performance)

  • 최성민;박준상;안상현
    • 정보처리학회논문지C
    • /
    • 제19C권4호
    • /
    • pp.247-252
    • /
    • 2012
  • 네트워크 코딩(Network Coding)은 통신망의 성능 향상에 도움을 줄 수 있으나 이의 소프트웨어적 구현은 부호화/복호화 단계에서 매우 큰 지연시간을 유발할 수 있어 이를 줄일 수 있는 병렬화된 구현이 필수적이라 할 수 있다. 본 논문에서는 랜덤 리니어 네트워크 코딩(Random Linear Network Coding)과 랜덤 리니어 네트워크 코딩의 단점을 보완하고자 최근 제안된 파이프라인 네트워크 코딩(Pipeline Network Coding)의 병렬처리 성능을 비교한다. 또한, 네트워크 코딩의 CPU에서의 병렬처리 기법과 GPGPU(General Purpose Graphics Processing Units)에서의 병렬처리 기법을 비교하여 네트워크 코딩의 사용 시 그 파라미터에 따라 적절한 병렬처리 기법을 선택할 필요성이 있음을 보여준다.

PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid

  • He, Shiming;Zeng, Weini;Xie, Kun;Yang, Hongming;Lai, Mingyong;Su, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1510-1532
    • /
    • 2017
  • In smart grid, privacy implications to individuals and their families are an important issue because of the fine-grained usage data collection. Wireless communications are utilized by many utility companies to obtain information. Network coding is exploited in smart grids, to enhance network performance in terms of throughput, delay, robustness, and energy consumption. However, random linear network coding introduces a new challenge for privacy preserving due to the encoding of data and updating of coefficients in forwarder nodes. We propose a distributed privacy preserving scheme for random linear network coding in smart grid that considers the converged flows character of the smart grid and exploits a homomorphic encryption function to decrease the complexities in the forwarder node. It offers a data confidentiality privacy preserving feature, which can efficiently thwart traffic analysis. The data of the packet is encrypted and the tag of the packet is encrypted by a homomorphic encryption function. The forwarder node random linearly codes the encrypted data and directly processes the cryptotext tags based on the homomorphism feature. Extensive security analysis and performance evaluations demonstrate the validity and efficiency of the proposed scheme.

Packet Output and Input Configuration in a Multicasting Session Using Network Coding

  • Marquez, Jose;Gutierrez, Ismael;Valle, Sebastian;Falco, Melanis
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.686-710
    • /
    • 2019
  • This work proposes a model to solve the problem of Network Coding over a one-session multicast network. The model is based on a system of restrictions that defines the packet flows received in the sink nodes as functions of the outgoing flows from the source node. A multicast network graph is used to derive a directed labeled line graph (DLLG). The successive powers of the DLLG adjacency matrix to the convergence in the null matrix permits the construction of the jump matrix Source-Sinks. In its reduced form, this shows the dependency of the incoming flows in the sink nodes as a function of the outgoing flows in the source node. The emerging packets for each outgoing link from the source node are marked with a tag that is a linear combination of variables that corresponds to powers of two. Restrictions are built based on the dependence of the outgoing and incoming flows and the packet tags as variables. The linear independence of the incoming flows to the sink nodes is mandatory. The method is novel because the solution is independent of the Galois field size where the packet contents are defined.

Throughput-Delay Analysis of One-to-ManyWireless Multi-Hop Flows based on Random Linear Network

  • Shang, Tao;Fan, Yong;Liu, Jianwei
    • Journal of Communications and Networks
    • /
    • 제15권4호
    • /
    • pp.430-438
    • /
    • 2013
  • This paper addresses the issue of throughput-delay of one-to-many wireless multi-hop flows based on random linear network coding (RLNC). Existing research results have been focusing on the single-hop model which is not suitable for wireless multi-hop networks. In addition, the conditions of related system model are too idealistic. To address these limitations, we herein investigate the performance of a wireless multi-hop network, focusing on the one-to-many flows. Firstly, a system model with multi-hop delay was constructed; secondly, the transmission schemes of system model were gradually improved in terms of practical conditions such as limited queue length and asynchronous forwarding way; thirdly, the mean delay and the mean throughput were quantified in terms of coding window size K and number of destination nodes N for the wireless multi-hop transmission. Our findings show a clear relationship between the multi-hop transmission performance and the network coding parameters. This study results will contribute significantly to the evaluation and the optimization of network coding method.

Confidential Convergecast Based on Random Linear Network Coding for the Multi-hop Wireless Sensor Network

  • Davaabayar Ganchimeg;Sanghyun Ahn;Minyeong Gong
    • Journal of Information Processing Systems
    • /
    • 제20권2호
    • /
    • pp.252-262
    • /
    • 2024
  • The multi-hop wireless sensor network (WSN) suffers from energy limitation and eavesdropping attacks. We propose a simple and energy-efficient convergecast mechanism using inter-flow random linear network coding that can provide confidentiality to the multi-hop WSN. Our scheme consists of two steps, constructing a logical tree of sensor nodes rooted at the sink node, with using the Bloom filter, and transmitting sensory data encoded by sensor nodes along the logical tree upward to the sink where the encoded data are decoded according to our proposed multi-hop network coding (MHNC) mechanism. We conducted simulations using OMNET++ CASTALIA-3.3 framework and validated that MHNC outperforms the conventional mechanism in terms of packet delivery ratio, data delivery time and energy efficiency.

Integrating Random Network Coding with On-Demand Multicast Routing Protocol

  • Park, Joon-Sang;Baek, Seung Jun
    • ETRI Journal
    • /
    • 제34권5호
    • /
    • pp.775-778
    • /
    • 2012
  • We propose integrating random network coding with the Enhanced On-Demand Multicast Routing Protocol (E-ODMRP). With the Network Coded E-ODMRP (NCE-ODMRP), we present a framework that enables a seamless integration of random linear network coding with conventional ad hoc multicast protocols for enhanced reliability. Simulation results show that the NCE-ODMRP achieves a nearly perfect packet delivery ratio while keeping the route maintenance overhead low to a degree similar to that of the E-ODMRP.

Exact Decoding Probability of Random Linear Network Coding for Tree Networks

  • Li, Fang;Xie, Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권2호
    • /
    • pp.714-727
    • /
    • 2015
  • The hierarchical structure in networks is widely applied in many practical scenarios especially in some emergency cases. In this paper, we focus on a tree network with and without packet loss where one source sends data to n destinations, through m relay nodes employing random linear network coding (RLNC) over a Galois field in parallel transmission systems. We derive closed-form probability expressions of successful decoding at a destination node and at all destination nodes in this multicast scenario. For the convenience of computing, we also propose an upper bound for the failure probability. We then investigate the impact of the major parameters, i.e., the size of finite fields, the number of internal nodes, the number of sink nodes and the channel failure probability, on the decoding performance with simulation results. In addition, numerical results show that, under a fixed exact decoding probability, the required field size can be minimized. When failure decoding probabilities are given, the operation is simple and its complexity is low in a small finite field.

멀티라디오/멀티채널 멀티 홉 무선 네트워크에서 처리율 향상을 위한 인트라세션 네트워크 코딩 (Intra-session Network Coding for Improving Throughput in Multi-Radio Multi-Channel Multi-Hop Wireless Networks)

  • 서경수;윤원식
    • 대한전자공학회논문지TC
    • /
    • 제48권10호
    • /
    • pp.29-34
    • /
    • 2011
  • 본 논문에서는 멀티 홉 무선 네트워크의 처리율을 향상시킬 수 있는 멀티라디오/멀티채널에서의 네트워크 코딩 방법을 제시한다. 무선 네트워크의 처리율은 노드간 동일 채널 간섭과 무선 링크의 전송손실에 의해 제한을 받는다. 무선 네트워크에서 멀티라디오/멀티채널 환경은 무선노드의 채널 간섭 및 채널 경쟁을 줄여 주며, 네트워크 코딩은 스케줄링의 복잡성을 줄이고 링크의 사용을 늘려 처리율 증가를 가져올 수 있다. 본 논문에서는 멀티 홉 네트워크상에서 효율적인 처리율 향상을 위해 네트워크의 수학적 모델링과 선형계획법을 이용하여 인트라세션 네트워크 코딩에서의 채널 할당 및 전송 스케줄링 방법을 제안한다. 또한 AMPL과 CPLEX를 이용하여 인트라세션 네트워크 코딩 방법의 성능을 시험한다. 시험결과 멀티 홉 무선 네트워크의 인트라세션 네트워크 코딩이 일반적인 라우팅보다 처리율의 향상을 가져온다.

Practical Schemes for Tunable Secure Network Coding

  • Liu, Guangjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1193-1209
    • /
    • 2015
  • Network coding is promising to maximize network throughput and improve the resilience to random network failures in various networking systems. In this paper, the problem of providing efficient confidentiality for practical network coding system against a global eavesdropper (with full eavesdropping capabilities to the network) is considered. By exploiting a novel combination between the construction technique of systematic Maximum Distance Separable (MDS) erasure coding and traditional cryptographic approach, two efficient schemes are proposed that can achieve the maximum possible rate and minimum encryption overhead respectively on top of any communication network or underlying linear network code. Every generation is first subjected to an encoding by a particular matrix generated by two (or three) Vandermonde matrices, and then parts of coded vectors (or secret symbols) are encrypted before transmitting. The proposed schemes are characterized by tunable and measurable degrees of security and also shown to be of low overhead in computation and bandwidth.