Network coding an introduction. Playing The Butterfly Lovers melody

Size: px
Start display at page:

Download "Network coding an introduction. Playing The Butterfly Lovers melody"

Transcription

1 Network coding an introduction Playing The Butterfly Lovers melody

2 Store-and-forward conventional mode of transport

3 Store-and-forward inherited by telecommunications Internet

4 Store-and-forward over the Butterfly Network Either x or y x = 0 or y = 0 or Every channels transmits one bit. 0 if x = y x y Store-and-forward = if x y Figure adapted from Scientific American, Chinese 7/2007 edition

5 Store-and-forward incurs traffic congestion. Either x or y x = 0 or y = 0 or Every channels transmits one bit. 0 if x = y x y Store-and-forward = if x y Figure adapted from Scientific American, Chinese 7/2007 edition

6 Store-and-forward fails. Traffic jam Figure adapted from Scientific American, Chinese 7/2007 edition

7 A new transport mode Decode y Decode x Figure adapted from Scientific American, Chinese 7/2007 edition

8 Network coding (NC) Figure adapted from Scientific American, Chinese 7/2007 edition

9 Intracellular communications Quantum information theory Information theory Channel coding Wireless networks Graph theory Optimization theory Network coding Computer networks Switching theory Game theory Matroid theory Cryptography Computer science 0

10 Intracellular communications Quantum information theory Information theory Channel coding Wireless networks Graph theory Optimization theory Discover an store-&-forward assumption in a network in any field. Liberate yourself from it and Bingo! Computer networks Switching theory Game theory Matroid theory Cryptography Computer science

11 The Butterfly Effect diff = 0 if x = y if x y diff diff diff Figure adapted from Scientific American, Chinese 7/2007 edition

12 Is NC always based on a field? Figure adapted from Scientific American, Chinese 7/2007 edition

13 Redundancy of Data Storage Disks A B Backup A Backup B

14 Redundant Array of Independent Disks (RAID) Disks A B A B A

15 Redundant Array of Independent Disks (RAID) Disks A B A B B

16 Equivalence to the Butterfly Network A Source B A B A A B B A B A

17 Equivalence to the Butterfly Network A Source B A B A A B B B A B

18 To sustain failure of 2 disks A B Backup A Backup B Still OK

19 To sustain failure of 2 disks A B Backup A Backup B Not OK

20 To sustain failure of 2 disks A B Backup A Backup B OK again Backup A Backup B

21 NC sustains all 2-disk failures. A B A+B A B OK again

22 Distributed storage (erasure coding) [W-D 09] 2 disks per site A, B A B C D C, D A+C, 2B+D Any 2 sites suffice for recovery (2 sites 4 linearly indep. vectors) 2A+C, B+D

23 Straightforward repair 2 disks per site A, B Total transmission = 4 disks A, B A B C, D C, D A+C, 2B+D C D A+C, 2B+D 2A+C, B+D

24 Repair by NC [W-D 09] 2 disks per site Total transmission = 3 disks A B A, B C+D A, B C, D A+2B+C+D C D A+C, 2B+D 2A+B+C+D 2A+C, B+D

25 Repair when two sites fail [K. Shum 20] 2 disks per site Total transmission = 8 disks A, B A, B A B C, D C, D A+C, 2B+D C D A+C, 2B+D C, D 2A+C, B+D A+C, 2B+D 2A+C, B+D

26 Repair 2 sites by NC 2 disks per site Total transmission = 6 disks A, B A, B A B C, D A, B C, D C D A+C, 2B+D 2A+C, B+D 2A+C, B+D 2A+C, B+D

27 To backup 8 disks via block coding Single backup Disks A B C D E F G H A B H D

28 To backup 8 disks via block coding Single backup Disks A B C D E F G H A B H Analogue: A parallel bus to transmit a byte Bits A B C D E F G H A B H = Parity check bit = An erasure code = A simple block code

29 To backup 8 disks via block coding Single backup Disks A B C D E F G H A B H Analogue: A parallel bus to transmit a byte Bits A B C D E F G H A B H = Parity check bit = Block coding = NC, too

30 NC = data mixing via linear algebra at intersection points of transmission paths

31 Transmission paths in the space-time domain Point A Space Point B Time

32 Data mixing at intersection points of transmission paths in the space-time domain Point A Space Point B Time

33 A tandem of noisy channel Allow m losses out of n Allow m losses 2 3 out of n The maximum throughput from node to node 3 is m/n. To achieve this throughput via conventional 2-stage erasure coding, the middle node incurs the delay of decoding plus re-coding.

34 NC among successive packets instead of 2nd-stage coding [Lun 2006] Allow loss out of Allow loss out of 3 Packets A, B at source plus A+B A B A+B 3 scenarios of receiving 2 packets A, B or A, A+B or B, A+B

35 NC among successive packets instead of 2nd-stage coding [Lun 2006] Allow loss out of Allow loss out of 3 Packets A, B at source plus A+B A B A+B A, B or A, A+B or B, A+B Create a linear sum of the 2 received. A A+B 2A+B

36 NC among successive packets instead of 2nd-stage coding [Lun 2006] Allow loss out of Allow loss out of 3 Packets A, B at source plus A+B 3 scenarios of receiving 2 packets A A, B A A, A+B or or B A, A+B A+B A, 2A+B or or A+B B, A+B 2A+B A+B, 2A+B

37 Extension and variation (Linear combination) n = Linear combination Allow /3 loss 2 Allow /3 loss 3 Allow /3 loss 4 A network by relay or direct transmission [Lun 2006] x% loss 2 y% loss z% loss 3

38 NC for Security An eavesdropper may wiretap any one channel. x+y x+y x+y Data symbols are a and b. Let x and y be their linear combinations, say, x = a+8b, y = 2a+3b Two issues: Straightforward decoding involves multiplication and division in a finite field. Receiving nodes B and C must know the private coding coefficients, 8, 2, 3. Figure adapted from Scientific American, Chinese 7/2007 edition 43

39 Addition/shift in lieu of multiplication/division When nodes B and C have decoded x and y, there is the extra step to convert x and y into a and b. x+y x+y x+y (x y) = (a b) (x y) = (a b) = (9a 9b) // adjugate matrix Then, use a fast constant division routine to divide 9a and 9b by 9. [Li 85] IEEE Trans. on Computer.

40 Addition/shift in lieu of multiplication/division x+y z z*2 + z + 2 z z/8 + z z z/(2**8) + z z z/64 x+y x+y Then, use a fast constant division routine to divide 9a and 9b by 9. [Li 85] IEEE Trans. on Computer. (Application of Fermat s Little Thm)

41 Rid of code book vs. data rate a+x a+x a+x X a+2x a+2x a+2x Again, data symbols and coding coefficients are treated as integers modulo 2 n. Now consider publickey encryption. Coding coefficients are now public information. Something else has to be private. X X Keep a as data payload, and let X be a randomizer generated by the source node, which sends out two linear combinations of a and X, say, a+x and a+2x.

42 Variation: Secure NC with public middle channel a+x a+x a X a X The eavesdropper may wiretap a private channel and thereby receives a total of two pieces of information. a+x Public 2X a X X X

43 Variation: Secure NC with public middle channel a+x a+x M a X a X The eavesdropper may wiretap a private channel and thereby receives a total of two pieces of information. a+x X Y 2X+Y N X a X One solution is to install a new channel from node N to node M, through which N sends a new randomizer Y to M. Example by C. Chan. Node M then responds with 2X+Y by the public channel.

44 Interpreting butterfly network as 2-way relay channel T x y T R x+y T R x+y x+y R Physically, x y

45 Space T x y T R x+y T R x+y x+y R Time x y

46 Interpreting butterfly network as 2-way relay channel T x y T R x+y Wireless transmission is multicasting in nature. Perfect for applying NC! R x+y T Multicast x+y R Physically, x y

47 Half-duplex 2-way relay x y Store-and-forward, 4 steps to exchange a message through the middle relay 52

48 Half-duplex 2-way relay x y Store-and-forward, 4 steps to exchange a message through the middle relay 53

49 Half-duplex 2-way relay x y Store-and-forward, 4 steps to exchange a message through the middle relay x y NC, 3 steps 54

50 Half-duplex 2-way relay x y Store-and-forward, 4 steps to exchange a message through the middle relay x y NC, 3 steps M.I.T. prototype standard of wireless LAN (802. Wi-Fi) 3GPP2 selects NC as its potential technology in 4G wireless systems. 55

51 Communications on Mars A+B 56

52 Physical-layer NC (PNC) x y Store-and-forward, 4 steps x x y y NC, 3 steps x y 2 steps ( reception & transmission, naturally) 57

53 Physical-layer NC (PNC) x y Store-and-forward, 4 steps x x y y NC, 3 steps x+y Physical-layer NC, 2 steps 58

54 Physical-layer NC (PNC) Interference is good free higher throughput Step : Receive from multi-sources Superimposed electromagnetic waves with fading and noise 59

55 Digital PNC [Zhang et al. 06] Step : Receive from multi-sources 0/ Cos( t) 2 Cos( t) or 0 Cos( t) 0/ (BPSK) plus noise and fading (BPSK) (assuming perfect sync) 60

56 Digital PNC [Zhang et al. 06] Not easy Step a: Translation into binary 0/ Cos( t) 2 Cos( t) or 0 (+ noise, fading) Cos( t) 0/ 0 (= XOR) 6

57 Digital PNC [Zhang et al. 06] Step 2: Broadcast XOR 62

58 Analog PNC Step : Receive from multi-sources Superimposed electromagnetic waves plus noise and fading 63

59 Analog PNC Step 2: Amplify and broadcast 64

60 Analog PNC Step 2: Amplify and broadcast 65

61 Analog PNC Not easy Step 2a : Decoding at each end 66

62 Full-duplex (B. Jiao of PKU) with NC x y y x x+y x"+y x +y y x x +y 67

63 More applications Protection from one link failure a a a b b b a a a+b b b a a b b a a+b b Conventional protection requires 0 channels. NC requires only 8. 68

64 NC in multicasting & conference Multicast both symbols a and b to 3 receivers. S S a b a b a b b a+b b a a a+b By store-and-forward, symbol b goes through 3 hops. With NC, just 2 hops. [Example by P. Chou] 69

65 All-to-all transmission: In each round of transmission, every node can multicast to or receive from the two neighbors. By store-and-forward, n 2 rounds of transmissions. With NC, just (n )/2 rounds of transmission. [Ex. by F-S]

66 All-to-all transmission: In each round of transmission, every node can multicast to or receive from the two neighbors. st round: a a 2 nd round: a+c a+b c b a+c a+b c b c+d b+d d d c+d b+d We illustrate green-to-all transmission in 4 rounds. Parallel red-to-all transmission is always in opposite directions.

67 NC in network tomography Network Tomography To characterize network behavior by taking measurements at the edge. Conventional active probing Many packets are multicast to several receivers via a multicast tree inside the network. Receivers experience the loss event which helps identifying shared links and estimating the loss rates. NC probing Coding coefficients contained in probe packets provide additional information about the original packets that were combined. 74

68 (2) Basic theory over acyclic networks + more applications Playing The Butterfly Lovers melody

69 Introduction to NC theory Represent the alphabet of data symbols in transmission by a finite field F. Here F = GF(2). The source S sends out symbols x and y, one through each outgoing channels. Then, every channel transmits a linear combination of x and y subject to (Rule ) x x x s x+y y y y x+y x+y

70 Transmitted symbol coding vector = (x y) Then, every channel transmits a linear combination of x and y subject to (Rule ) We can express each transmitted symbol as the dot product between (x y) and a coding vector: x x s y y x = (x y) 0 x x+y y y = (x y) 0 x+y x+y x+y = (x y)

71 Definition of a network code Definition. An F-linear network code on the network or, an F-code in short, assigns an -dim coding vector f e F to each channel e subject to (Rule ) For every node x on the network, let V x denote the vector space generated by incoming coding vectors to x. Then, the coding vector assigned to each outgoing vector of x belongs to V x s 0 0 0

72 Definition of a network code Definition. An F-linear network code on the network or, an F-code in short, assigns an -dim coding vector f e F to each channel e subject to (Rule ) For every node x on the network, let V x denote the vector space spanned by incoming coding vectors to x. Then, the coding vector assigned to each outgoing vector of x belongs to V x. Example s x V x =, = F 2 and F 2 0

73 Definition of a network code Definition. An F-linear network code on the network or, an F-code in short, assigns an -dim coding vector f e F to each channel e subject to (Rule ) For every node x on the network, let V x denote the vector space generated by incoming coding vectors to x. Then, the coding vector assigned to each outgoing vector of x belongs to V x s x (Rule 2) Coding vectors on outgoing channels from S form the natural basis of F 2.

74 Adjacent pair of channels When channel d ends at the node where channel e begins, an adjacent pair (d, e) is formed. It corresponds to a red arrow inside the joining node. Think of each channel as a highway and each adjacent pair an interconnecting ramp. Channel d (d, e) Channel e s

75 Alternative definition of a network code Definition. An F-code assigns a coding coefficient k d,e F to each adjacent pair (d, e). s Channel d (d, e) Channel e

76 Alternative definition of a network code Definition. An F-code assigns a coding coefficient k d,e F to each adjacent pair (d, e). Example. Every coding coefficient = GF(2) on the Butterfly Network. s

77 Transmitted symbol over a channel At an intermediate node, every outgoing symbol is a linear combination of incoming symbols so that each coding coefficient represents the linear gain. Through top-down telescoping on an acyclic network, the symbol transmitted over every channel e is a linear combination of x and y in correspondence to the coding vector f e. x x x+y s x y x+y y x+y y

78 Relationship between two definitions A set of coding coefficients (handy for encoding) top-down derivation A set of coding vectors (handy for decoding) The mapping is -to- only when all incoming coding vectors to each node are linearly indep s

79 Relationship between two definitions A set of coding coefficients (handy for encoding) 0 s 0 top-down derivation A set of coding vectors (handy for decoding) The mapping is -to- only when all incoming coding vectors to each node are linearly indep

80 Decoding at a node The two incoming channels to the node v are tv and uv. Juxtapose their associated coding vectors f tv and f uv into the matrix M v = 0 Given the message (a b) from the source, the two symbols received by node v form the row vector (a a+b) = (a b) M v The message is then decoded by: (a b) = (a a+b) M v t 0 s v u

81 Decoding at a node M v = 0 Given the message (a b) from the source, the two symbols received by node v form the row vector s (a a+b) = (a b) M v The message is then decoded by: t (a b) = (a a+b) M v Conditions for decodability at v: Incoming coding vectors span the full rank (= 2 here). The node v knows the incoming encoding vectors. v 0 u

82 Do incoming vectors span full rank? The dimension spanned by incoming coding vectors to node v = Information rate from s to node v maxflow(v) = max flow from s to v = min cut between s and v The cut beneath s = The message size s v

83 Intrinsic limitation on information rate Constraints on linear independence among coding vectors are: Information rate to v maxflow(v) the message size // A constraint by the network topology A subtle constraint by the choice of the symbol field F

84 Choice of the symbol field F matters. Q. Can 2 symbols be transmitted from s to all six receivers? // Here maxflow of every receiver = 2. No, when a symbol = a bit. Yes, when a symbol = a byte or two bits. s 9

85 Choice of the symbol field F matters. A symbol = a bit when F = GF(2). A symbol = a byte when F = GF(256). Here we need four 2-dim vectors that are pairwise linearly independent. There are at most F + such vectors. s 92

86 Fundamental theorem of NC Linear dependence among coding vectors are: Information rate to v maxflow(v) the message size // A constraint by the network topology A subtle constraint by the choice of the symbol field F Theory of NC will finesse this constraint by assuming large enough F so as to guarantee the existence of an optimal network code. 93

87 Existence/construction of optimal network code Theorem of Linear NC. Given a positive integer and an acyclic network, there exists an -dim NC F-valued generic NC (and hence an -dim NC that is optimal in every conceivable sense) when F is sufficiently large. Proof. Delayed till a later topic on Fundamental theorem of NC. 94

88 A hierarchy of NC optimality s Definition. An -dim F -NC qualifies as: a generic NC 95

89 A hierarchy of NC optimality s Definition. An -dim F -NC qualifies as: a generic NC a linear broadcast when info rate to v = maxflow(v) for all v 97

90 A hierarchy of NC optimality s Definition. An -dim F -NC qualifies as: a generic NC a linear broadcast when info rate to v = maxflow(v) for all v a linear multicast when info rate to v = for all eligible v // A node v is eligible when maxflow(v) =. Decodability 99

91 A hierarchy of NC optimality s Definition. An -dim F -NC qualifies as: a generic NC a linear broadcast when info rate to v = maxflow(v) for all v a linear multicast when info rate to v = for all eligible v // A node v is eligible when info rate to v is. optimal w.r.t. some designated eligible receivers // Good enough for most applications 00

92 How are coding vectors known? Method. Predetermined All coding coefficients throughout the network are fixed, hence so are all coding vectors. 0

93 Method 2. Include f e in the packet header for transmission over the channel e. An intermediate node chooses the coding coefficients, which may be secret, random, dynamically changing, for flexible applications. In this case, the coding coefficients are 0 and Any linearly independent packets suffice for decoding

94 Method 2. Include f e in the packet header for transmission over the channel e. Example. 00 packets to be disseminated A packet = 000 data symbols A data symbol = 2 bytes = an element in a field of the size 2 6 NC overhead = 00 extra symbols per transmission of a 000-symbol payload = 0%

95 Random NC Coding coefficients x and y are randomly distributed over a sizable base field F. x x+5y 2x+6y 3x+7y 4x+8y y 04

96 Problems of P2P by Bit Torrent Constant problems in Bit Torrent (BT) operation: Which packet to send to neighboring peers? Which packet to ask for from upstream? Heuristic algorithm of BT: Randomness at the beginning Local rarest scheme after a node has acquired a few packets. 05

97 P2P content delivery by random NC [Ho et al.] Constant problems in Bit Torrent (BT) operation: Which packet to send to neighboring peers? Which packet to ask for from them? Heuristic algorithm of BT: Randomness at the beginning Local rarest scheme after a node has acquired a few packets. x x+5y 2x+6y 3x+7y 4x+8y y 06

98 NC for P2P file-sharing, video streaming 08

99 Benefit of random NC over BT Benefits: Performance insensitive to topology of the overlay P2P network Robustness w.r.t. to dynamical change of topology (high churn rate). Speed, i.e., increased bandwidth Favorable analysis of Avalanche [G-R] Opposite analysis. In practice, there is little increase in bandwidth, because the critical constraint in P2P is node capacity [Chen et al.]. 09

100 蝴蝶网的蝴蝶效应 Figure adapted from Scientific American, Chinese 7/2007 edition

101 蝴蝶网的蝴蝶效应 Figure adapted from Scientific American, Chinese 7/2007 edition

102 蝴蝶网的蝴蝶效应 Figure adapted from Scientific American, Chinese 7/2007 edition

103 Initial development of NC theory Li discovered the example of the Butterfly Network and generalized it into a linear-algebraic theory of network coding (997 manuscript). Li-Yeung, Proc. ISORA Conference, 8/998. Li-Yeung, Proc. IT Workshop, 7/999. Li et al., Linear network coding, IEEE Trans. IT, 2/2003. Kotter-Medard, IEEE/ACM Trans. on Networking, 0/2003. The Butterfly Network later became the icon of network coding. About 0,000 papers followed up. Initial publications of the Butterfly Network Li-Sun, IEEE Trans. IT, /20, (about convolutional network coding theory on non-acyclic networks)

104 Before NC, there were work on joint coding at intersection points of transmission paths Earliest papers with a flavor of NC: Celebiler-Stette, Proceedings of IEEE, /978 (about increasing down-link capacity of regenerative satellite repeater.) Patterson et al., Proceedings of VLDB, 4/988 (about redundant array of independent disks in magnetic data storage.) Li, Proceedings of IT Workshop, 7/988, (about optimizing transmission capacity by mix coding among parallel channels).

105 Network coding Conference paper in 8/998. Li et al., Linear network coding, IEEE Trans. IT, 2/2003. Kotter-Medard, An algebraic approach to network coding, IEEE/ACM Tr. Netw., 0/ ,000 papers followed up. Theories with NC flavor Celebiler-Stette, 978 Patterson et al., 988 Li, 988 Ahlswede et al., conference paper in 8/998. Ahlswede et al., Network Information Flow, IEEE Trans. IT, 7/2000 (Information theory in the form of limiting probability when something ). An incompatible theory in terms of angle of viewpoint, formulation, mathematical approach, elegance, result, transparency, applicability, and implementability.

106 What is NC theory is made murky. Conference paper in 8/998. Li et al., Linear network coding, IEEE Trans. IT, 2/2003. Kotter-Medard, An algebraic approach to network coding, IEEE/ACM Tr. Netw., 0/ ,000 papers followed up. Theories with NC flavor Celebiler-Stette, 978 Patterson et al., 988 Li, 988 Ahlswede et al., conference paper in 8/998. Ahlswede et al., Network Information Flow, IEEE Trans. IT, 7/2000 (Information theory in the form of limiting probability when something ). An incompatible theory in terms of angle of viewpoint, formulation, mathematical approach, elegance, result, transparency, applicability, and implementability.

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Information is stored and exchanged in the form of streams of characters from some alphabet. An alphabet is a finite set of symbols, such as the lower-case Roman alphabet {a,b,c,,z}.

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

Intuitive Guide to Principles of Communications By Charan Langton Coding Concepts and Block Coding

Intuitive Guide to Principles of Communications By Charan Langton  Coding Concepts and Block Coding Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Coding Concepts and Block Coding It s hard to work in a noisy room as it makes it harder to think. Work done in such

More information

Secure Network Coding for Wiretap Networks of Type II

Secure Network Coding for Wiretap Networks of Type II 1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson arxiv:0907.3493v1 [cs.it] 20 Jul 2009 Abstract We consider the problem of securing a multicast

More information

Error Protection: Detection and Correction

Error Protection: Detection and Correction Error Protection: Detection and Correction Communication channels are subject to noise. Noise distorts analog signals. Noise can cause digital signals to be received as different values. Bits can be flipped

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta

More information

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Weimin Liu, Rui Yang, and Philip Pietraski InterDigital Communications, LLC. King of Prussia, PA, and Melville, NY, USA Abstract

More information

IDMA Technology and Comparison survey of Interleavers

IDMA Technology and Comparison survey of Interleavers International Journal of Scientific and Research Publications, Volume 3, Issue 9, September 2013 1 IDMA Technology and Comparison survey of Interleavers Neelam Kumari 1, A.K.Singh 2 1 (Department of Electronics

More information

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use?

Digital Transmission using SECC Spring 2010 Lecture #7. (n,k,d) Systematic Block Codes. How many parity bits to use? Digital Transmission using SECC 6.02 Spring 2010 Lecture #7 How many parity bits? Dealing with burst errors Reed-Solomon codes message Compute Checksum # message chk Partition Apply SECC Transmit errors

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

On Multi-Server Coded Caching in the Low Memory Regime

On Multi-Server Coded Caching in the Low Memory Regime On Multi-Server Coded Caching in the ow Memory Regime Seyed Pooya Shariatpanahi, Babak Hossein Khalaj School of Computer Science, arxiv:80.07655v [cs.it] 0 Mar 08 Institute for Research in Fundamental

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Variations on the Index Coding Problem: Pliable Index Coding and Caching

Variations on the Index Coding Problem: Pliable Index Coding and Caching Variations on the Index Coding Problem: Pliable Index Coding and Caching T. Liu K. Wan D. Tuninetti University of Illinois at Chicago Shannon s Centennial, Chicago, September 23rd 2016 D. Tuninetti (UIC)

More information

Multiple Input Multiple Output (MIMO) Operation Principles

Multiple Input Multiple Output (MIMO) Operation Principles Afriyie Abraham Kwabena Multiple Input Multiple Output (MIMO) Operation Principles Helsinki Metropolia University of Applied Sciences Bachlor of Engineering Information Technology Thesis June 0 Abstract

More information

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday

Lecture 4: Wireless Physical Layer: Channel Coding. Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Lecture 4: Wireless Physical Layer: Channel Coding Mythili Vutukuru CS 653 Spring 2014 Jan 16, Thursday Channel Coding Modulated waveforms disrupted by signal propagation through wireless channel leads

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Distributed LT Codes

Distributed LT Codes Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA Email: {spuduche, jliewer, tfuja}@nd.edu

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 18 Today: (1) da Silva Discussion, (2) Error Correction Coding, (3) Error Detection (CRC) HW 8 due Tue. HW 9 (on Lectures

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

Noisy Index Coding with Quadrature Amplitude Modulation (QAM)

Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian

More information

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic M U LT I C A S T C O M M U N I C AT I O N S Tarik Cicic 9..08 O V E R V I E W One-to-many communication, why and how Algorithmic approach: Steiner trees Practical algorithms Multicast tree types Basic

More information

Digital Communication Systems ECS 452

Digital Communication Systems ECS 452 Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong prapun@siit.tu.ac.th 5. Channel Coding 1 Office Hours: BKD, 6th floor of Sirindhralai building Tuesday 14:20-15:20 Wednesday 14:20-15:20

More information

Receiver Design for Noncoherent Digital Network Coding

Receiver Design for Noncoherent Digital Network Coding Receiver Design for Noncoherent Digital Network Coding Terry Ferrett 1 Matthew Valenti 1 Don Torrieri 2 1 West Virginia University 2 U.S. Army Research Laboratory November 3rd, 2010 1 / 25 Outline 1 Introduction

More information

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

On the Optimal Block Length for Joint Channel and Network Coding

On the Optimal Block Length for Joint Channel and Network Coding On the Optimal Block Length for Joint Channel and Network Coding Christian Koller, Martin Haenggi, Jörg Kliewer, and Daniel J. Costello, Jr. Department of Electrical Engineering, University of Notre Dame,

More information

From Wireless Network Coding to Matroids. Rico Zenklusen

From Wireless Network Coding to Matroids. Rico Zenklusen From Wireless Network Coding to Matroids Rico Zenklusen A sketch of my research areas/interests Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications

More information

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014

Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 7 Public Key Cryptography Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 Cryptography studies techniques for secure communication in the presence of third parties. A typical

More information

Smart Antenna ABSTRACT

Smart Antenna ABSTRACT Smart Antenna ABSTRACT One of the most rapidly developing areas of communications is Smart Antenna systems. This paper deals with the principle and working of smart antennas and the elegance of their applications

More information

The throughput analysis of different IR-HARQ schemes based on fountain codes

The throughput analysis of different IR-HARQ schemes based on fountain codes This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 008 proceedings. The throughput analysis of different IR-HARQ schemes

More information

Vector-LDPC Codes for Mobile Broadband Communications

Vector-LDPC Codes for Mobile Broadband Communications Vector-LDPC Codes for Mobile Broadband Communications Whitepaper November 23 Flarion Technologies, Inc. Bedminster One 35 Route 22/26 South Bedminster, NJ 792 Tel: + 98-947-7 Fax: + 98-947-25 www.flarion.com

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 Jurnal Ilmiah KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 ISSN 0216 0544 e-issn 2301 6914 OPTIMAL RELAY DESIGN OF ZERO FORCING EQUALIZATION FOR MIMO MULTI WIRELESS RELAYING NETWORKS

More information

Cooperation in Random Access Wireless Networks

Cooperation in Random Access Wireless Networks Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department

More information

Energy Saving Routing Strategies in IP Networks

Energy Saving Routing Strategies in IP Networks Energy Saving Routing Strategies in IP Networks M. Polverini; M. Listanti DIET Department - University of Roma Sapienza, Via Eudossiana 8, 84 Roma, Italy 2 june 24 [scale=.8]figure/logo.eps M. Polverini

More information

Lecture 3 Data Link Layer - Digital Data Communication Techniques

Lecture 3 Data Link Layer - Digital Data Communication Techniques DATA AND COMPUTER COMMUNICATIONS Lecture 3 Data Link Layer - Digital Data Communication Techniques Mei Yang Based on Lecture slides by William Stallings 1 ASYNCHRONOUS AND SYNCHRONOUS TRANSMISSION timing

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

The Physical Layer Outline

The Physical Layer Outline The Physical Layer Outline Theoretical Basis for Data Communications Digital Modulation and Multiplexing Guided Transmission Media (copper and fiber) Public Switched Telephone Network and DSLbased Broadband

More information

Module 3: Physical Layer

Module 3: Physical Layer Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud

More information

Outline. Communications Engineering 1

Outline. Communications Engineering 1 Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband channels Signal space representation Optimal

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

From Fountain to BATS: Realization of Network Coding

From Fountain to BATS: Realization of Network Coding From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving

More information

Wireless Internet Routing. IEEE s

Wireless Internet Routing. IEEE s Wireless Internet Routing IEEE 802.11s 1 Acknowledgments Cigdem Sengul, Deutsche Telekom Laboratories 2 Outline Introduction Interworking Topology discovery Routing 3 IEEE 802.11a/b/g /n /s IEEE 802.11s:

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes

Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes Ahmed Douik, Mohammad S. Karim, Parastoo Sadeghi, and Sameh Sorour California Institute of Technology (Caltech), California,

More information

Introduction to Coding Theory

Introduction to Coding Theory Coding Theory Massoud Malek Introduction to Coding Theory Introduction. Coding theory originated with the advent of computers. Early computers were huge mechanical monsters whose reliability was low compared

More information

Design of Parallel Algorithms. Communication Algorithms

Design of Parallel Algorithms. Communication Algorithms + Design of Parallel Algorithms Communication Algorithms + Topic Overview n One-to-All Broadcast and All-to-One Reduction n All-to-All Broadcast and Reduction n All-Reduce and Prefix-Sum Operations n Scatter

More information

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques 1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink

More information

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 19-21 www.iosrjen.org Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing 1 S.Lakshmi,

More information

Chapter 2 Overview - 1 -

Chapter 2 Overview - 1 - Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next

More information

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY

REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 REVIEW OF COOPERATIVE SCHEMES BASED ON DISTRIBUTED CODING STRATEGY P. Suresh Kumar 1, A. Deepika 2 1 Assistant Professor,

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Information Theory at the Extremes

Information Theory at the Extremes Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.

More information

Physical Layer Network Coding with Multiple Antennas

Physical Layer Network Coding with Multiple Antennas This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 00 proceedings Physical Layer Network Coding with Multiple Antennas

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information

Study of Second-Order Memory Based LT Encoders

Study of Second-Order Memory Based LT Encoders Study of Second-Order Memory Based LT Encoders Luyao Shang Department of Electrical Engineering & Computer Science University of Kansas Lawrence, KS 66045 lshang@ku.edu Faculty Advisor: Erik Perrins ABSTRACT

More information

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society Abstract MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING A Public Lecture to the Uganda Mathematics Society F F Tusubira, PhD, MUIPE, MIEE, REng, CEng Mathematical theory and techniques play a vital

More information

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p-issn: 2278-8727, Volume 20, Issue 3, Ver. III (May. - June. 2018), PP 78-83 www.iosrjournals.org Hybrid throughput aware variable puncture

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication

Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Available online at www.interscience.in Convolutional Coding Using Booth Algorithm For Application in Wireless Communication Sishir Kalita, Parismita Gogoi & Kandarpa Kumar Sarma Department of Electronics

More information

An Efficient Forward Error Correction Scheme for Wireless Sensor Network

An Efficient Forward Error Correction Scheme for Wireless Sensor Network Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 737 742 C3IT-2012 An Efficient Forward Error Correction Scheme for Wireless Sensor Network M.P.Singh a, Prabhat Kumar b a Computer

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding

On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding by Zahra Faraji-Dana A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree

More information

Physical-Layer Services and Systems

Physical-Layer Services and Systems Physical-Layer Services and Systems Figure Transmission medium and physical layer Figure Classes of transmission media GUIDED MEDIA Guided media, which are those that provide a conduit from one device

More information

(2016) Network Coding Cooperation Performance. Analysis in Wireless Network over a Lossy Channel, M Users and a Destination Scenario

(2016) Network Coding Cooperation Performance. Analysis in Wireless Network over a Lossy Channel, M Users and a Destination Scenario Communications and Network, 2016, 8, 257-280 http://www.scirp.org/journal/cn ISSN Online: 1947-3826 ISSN Print: 1949-2421 Network Coding Cooperation Performance Analysis in Wireless Network over a Lossy

More information

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction

Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Simulink Modelling of Reed-Solomon (Rs) Code for Error Detection and Correction Okeke. C Department of Electrical /Electronics Engineering, Michael Okpara University of Agriculture, Umudike, Abia State,

More information

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System (AeroMACS) Candidate: Paola Pulini Advisor: Marco Chiani Outline Introduction and Motivations Thesis

More information

K.NARSING RAO(08R31A0425) DEPT OF ELECTRONICS & COMMUNICATION ENGINEERING (NOVH).

K.NARSING RAO(08R31A0425) DEPT OF ELECTRONICS & COMMUNICATION ENGINEERING (NOVH). Smart Antenna K.NARSING RAO(08R31A0425) DEPT OF ELECTRONICS & COMMUNICATION ENGINEERING (NOVH). ABSTRACT:- One of the most rapidly developing areas of communications is Smart Antenna systems. This paper

More information

Intro to coding and convolutional codes

Intro to coding and convolutional codes Intro to coding and convolutional codes Lecture 11 Vladimir Stojanović 6.973 Communication System Design Spring 2006 Massachusetts Institute of Technology 802.11a Convolutional Encoder Rate 1/2 convolutional

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

VP3: Using Vertex Path and Power Proximity for Energy Efficient Key Distribution

VP3: Using Vertex Path and Power Proximity for Energy Efficient Key Distribution VP3: Using Vertex Path and Power Proximity for Energy Efficient Key Distribution Loukas Lazos, Javier Salido and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

n Based on the decision rule Po- Ning Chapter Po- Ning Chapter

n Based on the decision rule Po- Ning Chapter Po- Ning Chapter n Soft decision decoding (can be analyzed via an equivalent binary-input additive white Gaussian noise channel) o The error rate of Ungerboeck codes (particularly at high SNR) is dominated by the two codewords

More information

Wireless Communication Systems: Implementation perspective

Wireless Communication Systems: Implementation perspective Wireless Communication Systems: Implementation perspective Course aims To provide an introduction to wireless communications models with an emphasis on real-life systems To investigate a major wireless

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Clay Codes: Moulding MDS Codes to Yield an MSR Code

Clay Codes: Moulding MDS Codes to Yield an MSR Code Clay Codes: Moulding MDS Codes to Yield an MSR Code Myna Vajha, Vinayak Ramkumar, Bhagyashree Puranik, Ganesh Kini, Elita Lobo, Birenjith Sasidharan Indian Institute of Science (IISc) P. Vijay Kumar (IISc

More information

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology

RADIO SYSTEMS ETIN15. Channel Coding. Ove Edfors, Department of Electrical and Information Technology RADIO SYSTEMS ETIN15 Lecture no: 7 Channel Coding Ove Edfors, Department of Electrical and Information Technology Ove.Edfors@eit.lth.se 2016-04-18 Ove Edfors - ETIN15 1 Contents (CHANNEL CODING) Overview

More information

Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system

Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system Nidhi Sindhwani Department of ECE, ASET, GGSIPU, Delhi, India Abstract: In MIMO system, there are several number of users

More information

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering

More information

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels IET Communications Research Article Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels ISSN 1751-8628 Received on 28th July 2014 Accepted

More information

ETSI TS V1.1.2 ( )

ETSI TS V1.1.2 ( ) Technical Specification Satellite Earth Stations and Systems (SES); Regenerative Satellite Mesh - A (RSM-A) air interface; Physical layer specification; Part 3: Channel coding 2 Reference RTS/SES-25-3

More information

Message Passing in Distributed Wireless Networks

Message Passing in Distributed Wireless Networks Message Passing in Distributed Wireless Networks Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08540. vaggarwa @princeton.edu Youjian Liu Department of ECEE,

More information

Reliable Wireless Video Streaming with Digital Fountain Codes

Reliable Wireless Video Streaming with Digital Fountain Codes 1 Reliable Wireless Video Streaming with Digital Fountain Codes Raouf Hamzaoui, Shakeel Ahmad, Marwan Al-Akaidi Faculty of Computing Sciences and Engineering, De Montfort University - UK Department of

More information