Results 1 - 10
of
196
Hot topic: physical-layer network coding
- in Proc. of ACM Mobicom
, 2006
"... A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated ..."
Abstract
-
Cited by 190 (18 self)
- Add to MetaCart
(Show Context)
A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11). The goal of this paper is to show how the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physicallayer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to “straightforward ” network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM) waves for equivalent coding operation. PNC can yield higher capacity than straight-forward network coding when applied to wireless networks. We believe this is a first paper that ventures into EMwave-based network coding at the physical layer and demonstrates its potential for boosting network capacity. PNC opens up a whole new research area because of its implications and new design requirements for the physical, MAC, and network layers of ad hoc wireless stations. The resolution of the many outstanding but interesting issues in PNC may lead to a revolutionary new paradigm for wireless ad hoc networking.
Physical network coding in two-way wireless relay channel
- in the Proc. of IEEE International Conf. on Comm. (ICC
, 2007
"... Abstract—It has recently been recognized that the wireless networks represent a fertile ground for devising communication modes based on network coding. A particularly suitable application of the network coding arises for the two–way relay channels, where two nodes communicate with each other assist ..."
Abstract
-
Cited by 115 (8 self)
- Add to MetaCart
(Show Context)
Abstract—It has recently been recognized that the wireless networks represent a fertile ground for devising communication modes based on network coding. A particularly suitable application of the network coding arises for the two–way relay channels, where two nodes communicate with each other assisted by using a third, relay node. Such a scenario enables application of physical network coding, where the network coding is either done (a) jointly with the channel coding or (b) through physical combining of the communication flows over the multiple access channel. In this paper we first group the existing schemes for physical network coding into two generic schemes, termed 3–step and 2–step scheme, respectively. We investigate the conditions for maximization of the two–way rate for each individual scheme: (1) the Decode–and–Forward (DF) 3–step schemes (2) three different schemes with two steps: Amplify–and–Forward (AF), JDF and Denoise–and–Forward (DNF). While the DNF scheme has a potential to offer the best two–way rate, the most interesting result of the paper is that, for some SNR configurations of the source—relay links, JDF yields identical maximal two–way rate as the upper bound on the rate for DNF. I.
Asynchronous physical-layer network coding,” technical report. Available: http://arxiv.org/abs/1105.3144
"... Abstract—A key issue in physical-layer network coding (PNC) is how to deal with the asynchrony between signals transmit-ted by multiple transmitters. That is, symbols transmitted by different transmitters could arrive at the receiver with symbol misalignment as well as relative carrier-phase offset. ..."
Abstract
-
Cited by 100 (11 self)
- Add to MetaCart
Abstract—A key issue in physical-layer network coding (PNC) is how to deal with the asynchrony between signals transmit-ted by multiple transmitters. That is, symbols transmitted by different transmitters could arrive at the receiver with symbol misalignment as well as relative carrier-phase offset. A second important issue is how to integrate channel coding with PNC to achieve reliable communication. This paper investigates these two issues and makes the following contributions: 1) We propose and investigate a general framework for decoding at the receiver based on belief propagation (BP). The framework can effectively deal with symbol and phase asynchronies while incorporating channel coding at the same time. 2) For unchannel-coded PNC, we show that for BPSK and QPSK modulations, our BP method can significantly reduce the asynchrony penalties compared with prior methods. 3) For QPSK unchannel-coded PNC, with a half symbol offset between the transmitters, our BP method can drastically reduce the performance penalty due to phase asynchrony, from more than 6 dB to no more than 1 dB. 4) For channel-coded PNC, with our BP method, both symbol and phase asynchronies actually improve the system performance compared with the perfectly synchronous case. Furthermore, the performance spread due to different combinations of symbol and phase offsets between the transmitters in channel-coded PNC is only around 1 dB. The implication of 3) is that if we could control the symbol arrival times at the receiver, it would be advantageous to deliberately introduce a half symbol offset in unchannel-coded PNC. The implication of 4) is that when channel coding is used, symbol and phase asynchronies are not major performance concerns in PNC. Index Terms—Physical-layer network coding, network coding, synchronization. I.
Wireless Broadcasting Using Network Coding
"... Traditional approaches to transmit information reliably over an error-prone network employ either Forward Error Correction (FEC) or retransmission techniques. In this paper we consider an application of network coding to increase the bandwidth efficiency of reliable broadcast in a wireless network ..."
Abstract
-
Cited by 73 (2 self)
- Add to MetaCart
(Show Context)
Traditional approaches to transmit information reliably over an error-prone network employ either Forward Error Correction (FEC) or retransmission techniques. In this paper we consider an application of network coding to increase the bandwidth efficiency of reliable broadcast in a wireless network. In particular, we propose two schemes which employ network coding to reduce the number of retransmissions as a result of packet losses. Our proposed schemes combine different lost packets from different receivers in such a way that multiple receivers are able to recover their lost packets with one transmission by the source. The advantages of the proposed schemes over the traditional wireless broadcast are shown through simulations and theoretical analysis. Specifically, we provide a few results on the retransmission overhead of the proposed schemes under different channel conditions.
An efficient signature-based scheme for securing network coding against pollution attacks
- In Proceedings of INFOCOM 08
, 2008
"... Abstract — Network coding provides the possibility to maxi-mize network throughput and receives various applications in traditional computer networks, wireless sensor networks and peer-to-peer systems. However, the applications built on top of network coding are vulnerable to pollution attacks, in w ..."
Abstract
-
Cited by 63 (1 self)
- Add to MetaCart
Abstract — Network coding provides the possibility to maxi-mize network throughput and receives various applications in traditional computer networks, wireless sensor networks and peer-to-peer systems. However, the applications built on top of network coding are vulnerable to pollution attacks, in which the compromised forwarders can inject polluted or forged messages into networks. Existing schemes addressing pollution attacks either require an extra secure channel or incur high computation overhead. In this paper, we propose an efficient signature-based scheme to detect and filter pollution attacks for the applications adopting linear network coding techniques. Our scheme exploits a novel homomorphic signature function to enable the source to delegate its signing authority to forwarders, that is, the forwarders can generate the signatures for their output messages without contacting the source. This nice property allows the forwarders to verify the received messages, but prohibit them from creating the valid signatures for polluted or forged ones. Our scheme does not need any extra secure channels, and can provide source authentication and batch verification. Experimen-tal results show that it can improve computation efficiency up to ten times compared to some existing one. In addition, we present an alternate lightweight scheme based on a much simpler linear signature function. This alternate scheme provides a tradeoff between computation efficiency and security. I.
Capacity for classes of broadcast channel with receiver side information
- in IEEE Information Theory Workshop
, 2007
"... Abstract—Methods are developed that achieve all rate points inside the capacity region of two-receiver memoryless broadcast channels where each receiver knows the message it need not decode. The capacity result generalizes to channels with per-letter average cost constraints, e.g., additive white Ga ..."
Abstract
-
Cited by 43 (2 self)
- Add to MetaCart
(Show Context)
Abstract—Methods are developed that achieve all rate points inside the capacity region of two-receiver memoryless broadcast channels where each receiver knows the message it need not decode. The capacity result generalizes to channels with per-letter average cost constraints, e.g., additive white Gaussian noise channels with power constraints. The result further generalizes to cases where the receivers have only partial message information and where one receiver must decode both messages. I.
Analyzing Network Coding Gossip Made Easy
, 2011
"... We introduce projection analysis – a new technique to analyze the stopping time of gossip protocols that are based on random linear network coding (RLNC). Projection analysis drastically simplifies, extends and strengthens previous results. We analyze RLNC gossip in a general framework for network a ..."
Abstract
-
Cited by 41 (16 self)
- Add to MetaCart
(Show Context)
We introduce projection analysis – a new technique to analyze the stopping time of gossip protocols that are based on random linear network coding (RLNC). Projection analysis drastically simplifies, extends and strengthens previous results. We analyze RLNC gossip in a general framework for network and communication models that encompasses and unifies the models used previously in this context. We show, in most settings for the first time, that the RLNC gossip converges with high probability in optimal time. Most stopping times are of the form O(k + T), where k is the number of messages to be distributed and T is the time it takes to disseminate one message. This means RLNC gossip achieves “perfect pipelining”. Our analysis directly extends to highly dynamic networks in which the topology can change completely at any time. This remains true, even if the network dynamics are controlled by a fully adaptive adversary that knows the complete network state. Virtually nothing besides simple O(kT) sequential flooding protocols was previously known for such a setting. While RLNC gossip works in this wide variety of networks our analysis remains the same and extremely simple. This contrasts with more complex proofs that were put forward to give less strong results for various special cases.
Complex Field Network Coding for Multiuser Cooperative Communications
"... Abstract—Multi-source relay-based cooperative communications can achieve spatial diversity gains, enhance coverage and potentially increase capacity when multiuser detection is used to effect maximum likelihood demodulation. If considered for large networks, traditional relaying entails loss in spec ..."
Abstract
-
Cited by 32 (1 self)
- Add to MetaCart
(Show Context)
Abstract—Multi-source relay-based cooperative communications can achieve spatial diversity gains, enhance coverage and potentially increase capacity when multiuser detection is used to effect maximum likelihood demodulation. If considered for large networks, traditional relaying entails loss in spectral efficiency that can be mitigated through network coding at the physical layer. These considerations motivate the complex field network coding (CFNC) approach introduced in this paper. Different from network coding over the Galois field, where wireless throughput is limited as the number of sources increases, CFNC always achieves throughput as high as 1/2 symbol per source per channel use. In addition to improved throughput, CFNCbased relaying achieves full diversity gain regardless of the underlying signal-to-noise-ratio (SNR) and the constellation used. Furthermore, the CFNC approach is general enough to allow for transmissions from sources to a common destination as well as simultaneous information exchanges among sources. Index Terms—Cooperative communications, multiuser detection, complex field coding, network coding, diversity gain, linkadaptive regeneration. I.
CORMAN: a novel cooperative opportunistic routing scheme in mobile ad hoc networks
- IEEE J. Select. Areas Commun
, 2012
"... Abstract—The link quality variation of wireless channels has been a challenging issue in data communications until recent explicit exploration in utilizing this characteristic. The same broadcast transmission may be perceived significantly differently, and usually independently, by receivers at diff ..."
Abstract
-
Cited by 27 (6 self)
- Add to MetaCart
Abstract—The link quality variation of wireless channels has been a challenging issue in data communications until recent explicit exploration in utilizing this characteristic. The same broadcast transmission may be perceived significantly differently, and usually independently, by receivers at different geographic locations. Furthermore, even the same stationary receiver may experience drastic link quality fluctuation over time. The combi-nation of link-quality variation with the broadcasting nature of wireless channels has revealed a direction in the research of wire-less networking, namely, cooperative communication. Research on cooperative communication started to attract interests in the community at the physical layer but more recently its importance and usability have also been realized at upper layers of the network protocol stack. In this article, we tackle the problem of opportunistic data transfer in mobile ad hoc networks. Our solution is called Cooperative Opportunistic Routing in Mobile Ad hoc Networks (CORMAN). It is a pure network layer scheme that can be built atop off-the-shelf wireless networking equipment. Nodes in the network use a lightweight proactive source routing protocol to determine a list of intermediate nodes that the data packets should follow en route to the destination. Here, when a data packet is broadcast by an upstream node and has happened to be received by a downstream node further along the route, it continues its way from there and thus will arrive at the destination node sooner. This is achieved through cooperative data communication at the link and network layers. This work is a powerful extension to the pioneering work of ExOR. We test CORMAN and compare it to AODV, and observe significant performance improvement in varying mobile settings. Index Terms—Cooperative communication, opportunistic rout-ing, opportunistic forwarding, mobile ad hoc networks, proactive source routing, local retransmission, forwarder list update I.