NETWORK CODING OVERHEAD



Similar documents
Wireless Network Coding with partial Overhearing information

A Methodology and the Tool for Testing SpaceWire Routing Switches Session: SpaceWire test and verification

Network Coding for Security and Error Correction

BOSCH. CAN Specification. Version , Robert Bosch GmbH, Postfach , D Stuttgart

Network coding for security and robustness

On Secure Communication over Wireless Erasure Networks

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

How To Understand The Structure Of A Can (Can)

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

A Quality of Service Scheduling Technique for Optical LANs

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Security for Wiretap Networks via Rank-Metric Codes

Power Control is Not Required for Wireless Networks in the Linear Regime


Weakly Secure Network Coding

Enhancing Wireless Security with Physical Layer Network Cooperation

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

PART III. OPS-based wide area networks

Achievable Strategies for General Secure Network Coding

MIMO CHANNEL CAPACITY

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

A Practical Scheme for Wireless Network Operation

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

SYSTEMATIC NETWORK CODING FOR LOSSY LINE NETWORKS. (Paresh Saxena) Supervisor: Dr. M. A. Vázquez-Castro

A Network Flow Approach in Cloud Computing

Controlled Random Access Methods

Secure Network Coding for Wiretap Networks of Type II

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

PEER TO PEER FILE SHARING USING NETWORK CODING

Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications

Delay Impulsive Systems: A Model For NCSs. Motivation

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

CMA5000 SPECIFICATIONS Gigabit Ethernet Module

Module 15: Network Structures

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Protocolo IEEE Sergio Scaglia SASE Agosto 2012

Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation


A NOVEL RESOURCE EFFICIENT DMMS APPROACH

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

BEST RELAY SELECTION METHOD FOR DETECT AND FORWARD AIDED COOPERATIVE WIRELESS NETWORK

Secure Network Coding via Filtered Secret Sharing

Forced Low latency Handoff in Mobile Cellular Data Networks

5.5. Solving linear systems by the elimination method

Internet Packets. Forwarding Datagrams

ECE 333: Introduction to Communication Networks Fall 2002

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

MIMO Antenna Systems in WinProp

Chapter 14: Distributed Operating Systems

Peer-to-Peer Networks. Chapter 6: P2P Content Distribution

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Bluetooth voice and data performance in DS WLAN environment

Exploiting Opportunistic Scheduling in Cellular Data Networks

A Network Coding Approach to Overlay Network Monitoring

Dynamic Antenna Mode Selection for Link Maintenances in Mobile Ad Hoc Network

Chapter 16: Distributed Operating Systems

APPENDIX B. Routers route based on the network number. The router that delivers the data packet to the correct destination host uses the host ID.

Fiber-Optic Real-Time Networks for Distributed Computing Systems. Magnus Jonsson. Node 2. Magnus Jonsson, Halmstad University, Sweden.

Energy Optimal Routing Protocol for a Wireless Data Network

Link-State Routing Can Achieve Optimal Traffic Engineering: From Entropy To IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Intelligent Multimedia Coding over Oblivious Networking Protocols A Case for a Cross Layer Multimedia Architecture.

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Lecture 21 ISDN Integrated Digital Network.

White Paper Abstract Disclaimer

SC-FDMA and LTE Uplink Physical Layer Design

Link Status Monitoring Using Network Coding

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks

Functional-Repair-by-Transfer Regenerating Codes

NUIT Tech Talk: Trends in Research Data Mobility

Capacity Limits of MIMO Channels

A Digital Fountain Approach to Reliable Distribution of Bulk Data

Network Tomography and Internet Traffic Matrices

Effect of EEP and UEP on channel coding for AMR

Adaptive DCF of MAC for VoIP services using IEEE networks

CHAPTER 18 THE PUBLIC TELEPHONE NETWORK # DEFINITIONS TERMS

8 Conclusion and Future Work

Achievable Transmission Rates and Self-Interference Channel Estimation in Hybrid Full-Duplex/Half-Duplex MIMO Relaying

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Performance Analysis of QoS Multicast Routing in Mobile Ad Hoc Networks Using Directional Antennas

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié.

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Network Coding and Wireless Physical-layer Secret-key Generation: From Unequal Erasure Protection (UEP) to Unequal Security Protection (USP)

Route Discovery Protocols

Network management and QoS provisioning - QoS in the Internet

CS263: Wireless Communications and Sensor Networks

AE64 TELECOMMUNICATION SWITCHING SYSTEMS

Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding

Whitepaper n The Next Generation in Wireless Technology

On the Mobile Wireless Access via MIMO Relays

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani

Transcription:

NETWORK CODING OVERHEAD Yalin Saguyu y-saguyu@northwestern.eu Department of Electrical Engineering an Computer Science Northwestern University Joint work with M. Rimensberger, M. L. Honig, an W. Utschick 1

Introuction & Motivation Network coing optimizes multicast rates to max-flow min-cut boun (Ahlswee, et. al. 00). Plain routing is not optimal & Linear network coing is sufficient (Li, et al. 03, Koetter-Mear 03). Typical assumption: Destinations know how packets are network-coe. Protocol Information Heaer? Data Symbols Limiting effects of network coing overhea. Joint channel coing/training for robust network coing. 2

Network Coing Overhea Network: Source: X Any Destination: Y = G X network coing matrix (elements from finite fiel F q ) Distribute solution: Ranom network coing (Ho, et. al 06). Communicate G to estinations in packet heaer: G Data Challenge: Decoing impossible, if error/erasure in G. 3

System Moel for Overhea Analysis Question: What is overhea for reliable communication of G & ata? Source Network Destinations N Packets Length D N D N L ranom network coing en-to-en channel (error/erasure) Unknown topology & G (i.i. assumption). 4

Network Coing Meets MIMO: Training Approach Detection of network coing matrix G MIMO channel estimation. Source transmits known training sequence. Destination receives. Rows of are encoe by Interpretation: is a coe generator matrix (e.g., MDS coe) Rows of are the transmitte packets 5

Encoing with Training Separate training an coing (STC). training overhea ata channel coe Joint training an coing (JTC). uncoe overhea ata joint encoing 6

Decoing Channel & Network Coes (1) Decoe channel coe: Ĝ Û for ranom network coing matrix for network-coe ata: U = G G S ( S: source packets) JTC: Jointly ecoe entire packet. STC: Separately ecoe training an ata parts. Maximum Likelihoo (ML) estimates (2) Decoe network coe: Ŝ Solve Û = Ĝ Ŝ for ata from ML estimates an. Ĝ Û 7

Throughput & Overhea Two types of ecoing error: Errors/erasures in packets Rank-eficient network coing matrix Ĝ Decoing probability P is erive via ranom coing bouns. En-to-en achievable rate: Λ * = max N, D N D L min P Overhea: O = L D L N : D : L : inepenent messages per transmission ata symbols per packet total packet length 8

Limiting Effects of Overhea Example 1: Combination network - Network Throughput Λ Μ : min-cut capacity optimal Ν Ν = Μ overhea kicks in 9

Throughput-Overhea Performance (Cont ) Example 2: Gri network source estination Each link carries M / 2 packets per time slot Fiel q = 2 8, 60 bits per packet Bit error probability 10 3 simulation analysis JTC: Joint training & coing ITC: Iniviual training & coing REF: Destination knows G analysis: Ranom coing boun on probability of successful ecoing simulation: Average error rates over ranom coing matrices & error events with MDS channel coes 10

En-to-En Distribute Network Coing Oblivious to network topology (mobility effects, malicious behavior, ). No nee to know network coing matrix G. Nee to know min-cut capacity (s.t. ) M N M N : inepenent messages per transmission Rate control: Aapt N base on estination feeback (ACK/NACK). N Increase, if channel & network coes are successfully ecoe. N Decrease, otherwise. 11

Conclusions Training can be combine with channel coing. Enables joint ecoing of ata an network coing matrix. Simplifies an balances protection of overhea. Network coing gain is limite by the necessary protocol overhea. Overhea grows with the min-cut capacity. Future Work: Extension to general error an erasure moels. Exploit reunancy in sequence of coing matrices. Aaptive training an feeback schemes to learn error statistics. 12