Network Coding-Based Protection of Many-to-One Wireless Flows

被引:40
作者
Al-Kofahi, Osameh M. [1 ]
Kamal, Ahmed E. [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
基金
美国国家科学基金会;
关键词
Network coding; Network survivability; Network fault tolerance; Many-to-One; Wireless sensor networks; wireless mesh networks; network flows;
D O I
10.1109/JSAC.2009.090619
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper addresses the problem of survivability of many-to-one flows in wireless networks, such as wireless mesh networks (WMNs) and wireless sensor networks (WSNs). Traditional protection schemes are either resource-hungry like the (1 + 1) protection scheme, or introduce a delay and interrupt the network operation like the (1 : N) protection scheme. In this paper, we present a network coding-based protection technique that overcomes the deficiencies of the traditional schemes. We derive and prove the necessary and sufficient conditions for our solution on a restricted network topology. Then we relax these connectivity requirements and show how to generalize the sufficient and necessary conditions to work with any other topology. We also show how to perform deterministic coding with {0,1} coefficients to achieve linear independence. Moreover, we discuss some of the practical considerations related to our approach. Specifically, we show how to adapt our solution when the network has a limited min-cut; we therefore define a more general problem that takes this constraint into account, which prove to be NP-complete. Furthermore, we discuss the decoding process at the sink, and show how to make use of our solution in the upstream communication (from sink to sources). We also study the effect of the proposed scheme on network performance. Finally, we consider the implementation of our approach when all network nodes have single transceivers, and we solve the problem through a greedy algorithm that constructs a feasible schedule for the transmissions from the sources.
引用
收藏
页码:797 / 813
页数:17
相关论文
共 19 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
[Anonymous], 1993, NETWORK FLOWS THEORY
[3]  
Domingo MC, 2003, GLOB TELECOMM CONF, P718
[4]  
Dong Q., 2005, P ACM MOBIHOC 05, P449
[5]  
ELROUAYHEB S, 2006, SIMPLE NETWORK CODES
[6]  
Kant L, 2005, IEEE WCNC, P2446
[7]  
Katti S., 2006, PROC ACM SIGCOMM 06, P243
[8]  
Kleinberg J., 2005, Algorithm Design
[9]  
Li N., 2004, P 10 ANN INT C MOBIL, P275
[10]   Variations of the maximum leaf spanning tree problem for bipartite graphs [J].
Li, PC ;
Toulouse, A .
INFORMATION PROCESSING LETTERS, 2006, 97 (04) :129-132