ebook img

Network Coding. Fundamentals and Applications PDF

332 Pages·2012·6.94 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Network Coding. Fundamentals and Applications

Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 01-fm-i-iv-9780123809186 2011/10/17 23:50 Page 1 #1 NETWORK CODING Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 01-fm-i-iv-9780123809186 2011/10/17 23:50 Page 2 #2 To access full color downloadable figures that feature in the book please visit www.elsevierdirect.com/companions/9780123809186 Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 01-fm-i-iv-9780123809186 2011/10/17 23:50 Page 3 #3 NETWORK CODING Fundamentals and Applications Editedby MURIELME´DARD MassachusettsInstituteofTechnology,Cambridge,MA,USA ALEXSPRINTSON TexasA&MUniversity,CollegeStation,TX,USA AMSTERDAM•BOSTON•HEIDELBERG•LONDON NEWYORK•OXFORD•PARIS•SANDIEGO SANFRANCISCO•SINGAPORE•SYDNEY•TOKYO AcademicPressisanimprintofElsevier Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 01-fm-i-iv-9780123809186 2011/10/14 10:00 Page 1 #1 AcademicPressisanimprintofElsevier TheBoulevard,LangfordLane,Kidlington,Oxford,OX51GB 225WymanStreet,Waltham,MA02451,USA Firstpublished2012 Copyright(cid:13)c 2012ElsevierInc.Allrightsreserved. Nopartofthispublicationmaybereproducedortransmittedinanyformorbyanymeans,electronic ormechanical,includingphotocopying,recording,oranyinformationstorageandretrievalsystem, withoutpermissioninwritingfromthepublisher.Detailsonhowtoseekpermission,further informationaboutthePublisher’spermissionspoliciesandourarrangementwithorganizationssuchas theCopyrightClearanceCenterandtheCopyrightLicensingAgency,canbefoundatourwebsite: www.elsevier.com/permissions. Thisbookandtheindividualcontributionscontainedinitareprotectedundercopyrightbythe Publisher(otherthanasmaybenotedherein). Notices Knowledgeandbestpracticeinthisfieldareconstantlychanging.Asnewresearchandexperience broadenourunderstanding,changesinresearchmethods,professionalpractices,ormedicaltreatment maybecomenecessary. Practitionersandresearchersmustalwaysrelyontheirownexperienceandknowledgeinevaluating andusinganyinformation,methods,compounds,orexperimentsdescribedherein.Inusingsuch informationormethodstheyshouldbemindfuloftheirownsafetyandthesafetyofothers,including partiesforwhomtheyhaveaprofessionalresponsibility. Tothefullestextentofthelaw,neitherthePublishernortheauthors,contributors,oreditors,assume anyliabilityforanyinjuryand/ordamagetopersonsorpropertyasamatterofproductsliability, negligenceorotherwise,orfromanyuseoroperationofanymethods,products,instructions,orideas containedinthematerialherein. BritishLibraryCataloguinginPublicationData AcataloguerecordforthisbookisavailablefromtheBritishLibrary. LibraryofCongressNumber:2011933932 ISBN:978-0-12-380918-6 ForinformationonallAcademicPresspublications visitourwebsiteatwww.elsevierdirect.com PrintedandboundintheUnitedStates 12 13 14 15 10 9 8 7 6 5 4 3 2 1 Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 03-pre-xiii-xvi-9780123809186 2011/10/13 15:25 Page xiii #1 PREFACE The network coding area was initiated at the turn of the millennium in a seminal paper by Ahlswede, Cai, and Yeung, and since then has capti- vated the researchers and practitioners around the world. Recent research effortsshedlightonmanyexcitingnetworkcodingproblems,fundamental capacitylimits,andperformancegains.Theresearcherswereabletodesign capacity-achieving network codes for several important practical settings, establish computational complexity of several fundamental network cod- ing problems, and devise efficient network coding algorithms. In addition, the researchers discovered deep connections between network coding and otherareasofnetworking,complexitytheory,graphtheory,matroidtheory, coding theory, and information theory. Despite significant progress on the theoretical front, practical applica- tionsofnetworkcodingareonlybeginningtoemerge.Whilethenetwork codingtechniquehasbeensuccessfullyappliedinmanyareas,mostnotably content distribution systems, there is a significant untapped potential for leveraging network coding for improving performance in wireless net- works, storage networks, disruption-tolerant networks, and other areas. In addition, the network coding technique has a significant potential to improve security, robustness, manageability, and support of Quality of Service in wired and wireless environments. This book provides an accessible tutorial introduction and a compre- hensive survey of practical applications of network coding in various areas of networking and distributed computing. Our goal is to expose the rich- nessofnetworkcodingapplicationsandpresentnewexcitingopportunities in network coding research. The book consists of ten chapters written by recognized experts in the field. Each chapter focuses on a specific appli- cation area and is written in a clear way, using minimum mathematical notation, so every reader familiar with the basic networking concepts will beabletounderstandthematerial.Eachchapterprovidesacomprehensive literature survey with references to the most relevant work in the area for future reading. Chapter1isatutorial-styleintroductiontothebasicsofnetworkcoding and provides an overview of the network information flow, linear network xiii Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 03-pre-xiii-xvi-9780123809186 2011/10/13 15:25 Page xiv #2 xiv Preface coding, the polynomial-time algorithm for code construction, random network coding, coding advantage, subspace transmissions, and nonlinear network codes. Chapter 2 focuses on the key principles that form the foundation of the network coding implementation in wireless networks. The chapter discusses the principles of opportunistic listening and coding, as well as thedetailsoftheforwardingarchitectureandnetworkcodingperformance gains. The chapter also describes the principles of analog network coding. Chapter 3 discusses the applications of network coding in peer-to-peer networkswiththefocusoncontentdistributionandmultimediastreaming. Thechapterexploresthepossibledesignspaceofpeer-to-peersystemswith network coding, and shows the advantages of using the coding technique in this setting. Chapter4discussestheimplementationofnetworkcodingoncommer- cial mobile platforms. The chapter describes basic system components and design choices as well as practical problems and performance issues associ- atedwithimplementationofnetworkcodingalgorithmsinmobilephones. Chapter 5 discusses the applications of network coding in LTE net- works. The authors focus on user-cooperation schemes for erasure recov- ery, and show that leveraging network coding techniques yields significant performance gains. Chapter 6 focuses on mobile ad hoc networks and describes a fully implemented communication system based on a network coding protocol stack.Thechapterexaminespracticalimplementationissuesassociatedwith implementation of network coding on an embedded system and presents results from field experiments. Chapter 7 focuses on applications of network coding for improving network security. The chapter covers passive adversaries who only have eavesdropping capabilities and active adversaries who can perform both eavesdropping and jamming. The chapter also discusses adversaries with limited computational power. Chapter 8 discusses connections between network coding, source coding, and data compression. Chapter9focusesontheperformanceofnetworkcodinginwirelessnet- worksunderseveralscalingregimes,includingthenetworksize,thecoding windowsize,thenumberofflowsinthenetwork,andtheapplicationdelay constraints.Thechapterderivesandanalyzesscalinglawsthathelpquantify theperformanceofnetworkcodingschemesinlargenetworks. Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 03-pre-xiii-xvi-9780123809186 2011/10/13 15:25 Page xv #3 Preface xv Chapter 10 focuses on the application of network coding in delay and disruption tolerant networks. The chapter discusses unique challenges that arise in the design of such networks and shows that the network coding technique is instrumental in addressing these challenges. The chapter cov- ers transmission and buffer management, and recovery schemes, as well as coding benefits in energy efficiency and improving delay-transmission tradeoffs. TARGETAUDIENCE The book is intended for researchers and practitioners who are interested in the general area of network coding and its applications in various areas of communication networks. We assume that the readers of this book have only a general background in networking, with no prior exposure to the network coding techniques or applications of network coding. This book will be ideal for a networking professional who would like to gain basic knowledge in this area and learn about the application of this technique. The book will also be valuable for graduate students who would like to conduct research on network coding. The book can be used as a textbook or a reference book in courses that focus on network coding or advanced coding technologies. Muriel Me´dard Massachusetts Institute of Technology, Cambridge, MA, USA Alex Sprintson Texas A&M University, College Station, TX, USA Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 04-ack-xvii-xviii-9780123809186 2011/10/13 15:29 Page xvii #1 ACKNOWLEDGMENTS We are grateful to all contributors for their dedication, enthusiasm, and commitmentinwritingandrevisingthechapters.Clearly,thisbookwould not be possible without their very generous efforts. We are also thank- ful to Danilo Silva for his help in reviewing the chapters; Tim Pitts, Naomi Robertson, Charlotte Kent and Lisa Jones from Academic Press for their support, encouragement, flexibility, understanding, and help with all aspects of the editorial work. Last but not least we are thankful to our spouses and families for their encouragement, sacrifice in giving us free time to work on the project, and providing inspiration. xvii Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 05-ate-xix-xx-9780123809186 2011/10/13 15:33 Page xix #1 ABOUT THE EDITORS MURIELME´DARD Muriel Me´dard received B.S. degrees in Electrical Engineering and Com- puter Science (EECS), in Mathematics and in Humanities, as well as M.S. and Sc.D. degrees EE, all from the Massachusetts Institute of Technology (MIT). SheisaProfessorintheEECSDepartmentatMIT.Shewaspreviously an Assistant Professor at the University of Illinois Urbana-Champaign and a Staff Member at MIT Lincoln Laboratory. Her research interests are in network coding, as well as optical and wireless networks. Muriel has served as an Associate Editor (AE) for the Optical Com- municationsandNetworkingSeriesoftheIEEEJournalonSelectedAreasin Communications(JSAC),fortheIEEETransactionsonInformationTheory(IT), and for the OSA Journal of Optical Networking. She has been Guest Editor for the IEEE/OSA Journal of Lightwave Technology (JLT), for IT (twice), for JSAC,andfortheIEEETransactionsonInformationForensicsandSecurity.She is an AE for JLT. She has served as Technical Program Co-chair of IEEE ISIT, of WiOpt, and of ACM CoNEXT. She is a recipient of the 2009 IEEE William R. Bennett Prize in the Field of Communications Networking, the 2009 IEEE Joint Information Theory/Communications Society Paper Prize, the 2002 IEEE Leon K. Kirchmayer Prize Paper Award, and the Best Paper Award at the Fourth International Workshop on the Design of Reliable Communication Net- works,2003.ShereceivedanNSFCAREERAwardin2001andthe2004 Harold E. Edgerton Faculty Achievement Award at MIT. She was named a 2007 Gilbreth Lecturer by the National Academy of Engineering. She has served on the Board of Governors of the IEEE Information Theory Society for several years, currently as First Vice-President. ALEXSPRINTSON Alex Sprintson received the B.Sc. degree (summa cum laude), M.Sc., and Ph.D. degrees in electrical engineering from the Technion–Israel Institute of Technology, Haifa, in 1995, 2001, and 2003, respectively. xix Toprotecttherightsoftheauthor(s)andpublisherweinformyouthatthisPDFisanuncorrectedproofforinternalbusiness useonlybytheauthor(s),editor(s),reviewer(s),ElsevierandtypesetterdiacriTech.Itisnotallowedtopublishthisproofonline orinprint.Thisproofcopyisthecopyrightpropertyofthepublisherandisconfidentialuntilformalpublication. MEDARD 05-ate-xix-xx-9780123809186 2011/10/13 15:33 Page xx #2 xx AbouttheEditors Alex is an Associate Professor with the Department of Electrical and Computer Engineering, Texas A&M University, College Station. From 2003 to 2005, he was a Postdoctoral Research Fellow with the California Institute of Technology, Pasadena. His research interests lie in the general areaofcommunicationnetworkswithafocusonnetworkcoding,network survivability and robustness network algorithms, and QoS routing. Dr. Sprintson received the Viterbi Postdoctoral Fellowship and the NSF CAREER award. He is an Associate Editor of the IEEE Commu- nications Letters and Computer Networks Journal. He has been a member of the Technical Program Committee for IEEE Infocom 2006–2012.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.