全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

A Computational Perspective on Network Coding

DOI: 10.1155/2010/436354

Full-Text   Cite this paper   Add to My Lib

Abstract:

From the perspectives of graph theory and combinatorics theory we obtain some new upper bounds on the number of encoding nodes, which can characterize the coding complexity of the network coding, both in feasible acyclic and cyclic multicast networks. In contrast to previous work, during our analysis we first investigate the simple multicast network with source rate , and then . We find that for feasible acyclic multicast networks our upper bound is exactly the lower bound given by M. Langberg et al. in 2006. So the gap between their lower and upper bounds for feasible acyclic multicast networks does not exist. Based on the new upper bound, we improve the computational complexity given by M. Langberg et al. in 2009. Moreover, these results further support the feasibility of signatures for network coding. 1. Introduction When network coding was firstly used by Ahlswede et al. [1], the node produced each of its outgoing packets as an arbitrary combination of its incomings, which is referred to as encoding node. Those functions applied by all nodes in the network specify the different network codes, such as linear network codes and random linear network codes via linear function and random linear function, respectively [1–3]. In [3], Li et al. showed that linear network codes are sufficient for achieving the capacity of the network. And in a subsequent work, Koetter and Médard [4] developed an algebraic framework for network coding and studied linear network codes for cyclic networks. Based on this framework, Ho et al. [2] showed that linear network codes can be efficiently constructed through a randomized algorithm. Jaggi et al. [5] presented a deterministic polynomial-time algorithm for finding a feasible network codes in multicast networks. Errors introduced into even a single packet transmitted on the way can propagate and pollute multiple packets making their way to the destination. To prevent the spread of the error packets, signatures for network coding are proposed [6, 7]. Nevertheless, whatever the kind of network codes will be used, the number of encoding nodes plays an important role on the encoding complexity of network coding. In [8, 9], Langberg et al. studied the design of multicast coding networks with a limited number of encoding nodes. And they showed that in a directed acyclic coding network, the number of encoding nodes required to achieve the capacity of the network is bounded by ( is the source rate and is the number of terminal nodes) which is independent of the size of the network. And for the general networks, in which there exist

References

[1]  R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, pp. 1204–1216, 2000.
[2]  T. Ho, M. Médard, R. Koetter et al., “A random linear network coding approach to multicast,” IEEE Transactions on Information Theory, vol. 52, no. 10, pp. 4413–4430, 2006.
[3]  S.-Y. R. Li, R. W. Yeung, and N. Cai, “Linear network coding,” IEEE Transactions on Information Theory, vol. 49, no. 2, pp. 371–381, 2003.
[4]  R. Koetter and M. Médard, “An algebraic approach to network coding,” IEEE/ACM Transactions on Networking, vol. 5, pp. 782–795, 2003.
[5]  S. Jaggi, P. Sanders, P. A. Chou et al., “Polynomial time algorithms for multicast network code construction,” IEEE Transactions on Information Theory, vol. 51, no. 6, pp. 1973–1982, 2005.
[6]  D. Charles, K. Jain, and K. Lauter, “Signatures for network coding,” International Journal of Information and Coding Theory, vol. 1, pp. 3–14, 2009.
[7]  D. Boneh, D. Freeman, J. Katz, and B. Waters, “Signing a linear subspace: signature schemes for network coding,” in Public Key Cryptography—PKC 2009, vol. 5443 of Lecture Notes in Computer Science, pp. 68–87, Springer, Berlin, UK, 2009.
[8]  M. Langberg, A. Sprintson, and J. Bruck, “The encoding complexity of network coding,” IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2386–2397, 2006.
[9]  M. Langberg, A. Sprintson, and J. Bruck, “Network coding: a computational perspective,” IEEE Transactions on Information Theory, vol. 55, no. 1, pp. 147–157, 2009.
[10]  J. Bang-Jensen and G. Gutin, Digraphs. Theory, Algorithms and Applications, Springer, London, UK, 2nd edition, 2008.
[11]  V. Krishnamurthy, Combinatorics: Theory and Applications, Ellis Horwood Series in Mathematics and Its Applications: Statistics and Operational Research, Ellis Horwood, Chichester, UK, 1986.
[12]  M. R. Garey and D. S. Johnson, Computers and Intractability, W. H. Freeman, San Francisco, Calif, USA, 1979.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133