簡易檢索 / 詳目顯示

研究生: 陳怡婷
Chen, Yi-Ting
論文名稱: 群播環境下的雙層網路編碼
Two-Layer Network Code for Multicast
指導教授: 蔡榮宗
Tsai, Jung-Tsung
學位類別: 碩士
Master
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2012
畢業學年度: 100
語文別: 中文
論文頁數: 62
中文關鍵詞: 網路編碼群播李德-所羅門碼隨機線性編碼
英文關鍵詞: Network Code, Multicast, Reed-Solomon Code, Random Linear Code
論文種類: 學術論文
相關次數: 點閱:168下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • Erasure Codes提供使用者在封包抹除通道(packet erasure channel)擁有可靠的通訊能力,但是在群播網路中存在使用者為了少數需要的編碼區塊而持續等待,產生Coupon Collection Problem問題。網路編碼(Network Coding)利用中繼點的編碼,減少使用者收到資料所需時間。本論文針對one hop wireless network的downlink群播問題提出Two-Layer Network Code,利用Random Linear Code編碼傳送Reed-Solomon Code編碼區塊,並且發送端依據完全訊息(perfect information) 挑選編碼區塊做線性組合,減少使用者接收資料造成的檔案解碼延遲(file decoding time)。
    我們提出兩種使用完全訊息依據選取編碼區塊的方法,分別是從候選集合(candidate set)中uniform隨機選取,與依據提出的不等選擇權重選取。在模擬實驗中,我們比較了Reed-Solomon Code、Random Linear Code與提出的Two-Layer Network Code三種編碼在群播環境下所有使用者接收完整資料所花費的時間。模擬結果顯示,雙層網路編碼在較短的最大線性組合degree threshold時,比其他兩種編碼有較好的效能,減少檔案解碼延遲,並且隨著使用者數量增加而有明顯改善。

    Without proper coding to counter frequent transmission loss over time-varying fading channel, opportunistic multicast in one-hop wireless forward-link still suffers the famous Coupon Collection Problem which incurs a significant amount of delay for some users to receive the last required packet. This issue can be alleviated by viewing the fading channel as an erasure channel and using erasure code over the channel. However, it is unclear how best a coding approach could achieve if there is perfect feedback on channel state. The thesis presents a two-layer network code for use in the multicast scenario and studies its performance. This code is essentially a concatenation of Reed-Solomon code and Random Linear code. The proposed random linear code utilizes channel state and the history of packet reception by each group user to generate coded packets for transmission. Here we use the pair of information on channel state and reception history to create a candidate set. One way is to randomly choose those components in the candidate set. The other is to randomly choose those components with some designed weight. In our simulation, there are three codes used for data transmission: Reed-Solomon Code, Random Linear Code, and proposed two-layer network code. Simulations show that two-layer network code with shorter linear combination degree has better performance than the other two codes. Meanwhile, the decoding delay is reduced. Furthermore, the multicast network with larger group size is more suitable for 2-layer network code.

    摘要 i ABSTRACT ii 目錄 iv 附表目錄 v 附圖目錄 vi 第一章 簡介 1 1.1 研究背景 1 1.2 研究動機 3 1.3 論文架構 4 第二章 相關研究 5 2.1 相關研究 5 2.2 Reed-Solomon Code簡介 7 2.3 Random Linear Network Code 8 第三章 系統模型 9 3.1 Two-Layer Network Code Model 9 3.2 群播封包數的決定 12 3.3 Feedback Information 15 3.4 執行步驟流程 19 第四章 模擬結果與討論 21 4.1 Two-Layer Network Code的模擬方法 21 4.2 Two-Layer Network Code的模擬結果與討論 24 第五章 結論及未來研究方向 60 參考文獻 61

    [1] Vijay K. Garg, WIRELESS COMMUNICATIONS AND NETWORKING, pp.233-234, Elsevier Inc, 2007.

    [2] Gordan L. Stüber, Principles of Mobile Communication, 2nd, pp.408-410, Kluwer Academic Publishers, 2001.

    [3] S.-Y. R. Li, R. W. Yeung, and N. Cai, “Linear Network Coding,” IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371–381, Feb. 2003.

    [4] DJC MacKay, “Fountain Codes,” IEE Proc.-Commun, vol. 152, no. 6, December 2005.

    [5] Christina Fragouli, JeanYves Le Boudec, J¨org Widmer, “Network Coding: An Instant Primer,” ACM SIGCOMM Computer Communication Review, Volume 36 Issue 1, pp.63-68, January 2006.
    [6] Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard, “ARQ for Network Coding,” IEEE international symposium on information theory, July 2008.

    [7] Yongzhao Lin, Wei Liu, Qun Zhang, Chengke Wu, “Application of the Concatenation of Reed Solomon and Luby Transform Codes in Deep Communications,” Third IEEE International Conference on Space Mission Challenges for Information Technology, pp.29-33, July 2009.

    [8] Najmeh Sadat Bathaee, Mohammad Reza Pakravan, “A Bandwidth-Efficient Scheme for Distributed Storage System,” 2nd International Symposium on Advanced Networks and Telecommunication Systems, pp.1-3, May 2009.

    [9] Alexandros G. Dimakis, Vinod Prabhakaran, Kannan Ramchandran, “Decentralized Erasure Codes for Distributed Networked Storage,” IEEE Transactions on Information Theory, vol.52, Issue 6, pp.2809-2816, June 2006.

    [10] Rudolf Ahlswede, Ning Cai, Shuo-Yen Robert Li, Senior Member, IEEE, and Raymond W. Yeung, Senior Member, IEEE, “Network Information Flow,” IEEE Transactions on Information Theory, vol. 46, NO. 4, JULY 2000.

    [11] Suhua TANG, Oyunchimeg SHAGDAR, Hiroyuki YOMO, Mehdad N. SHIRAZI, Ryutaro SUZUKI, Sadao OBANA, “Layer-2 Retransmission and Combining for Network Coding-Based Forwarding in Wireless Networks,” 11th IEEE Singapore International Conference on Communication Systems, pp.1597-1602, Nov. 2008.

    [12] Andrew Hagedorn, Sachin Agarwal, David Starobinski, Ari Trachtenberg, “Rateless Coding with Feedback,” IEEE Infocom, pp.1791-1799, April 2009.

    [13] John W. Byers, Michael Luby, Michael Mitzenmacher, ”A Digital Fountain Approach to Asynchronous Reliable Multicast,” IEEE Journal on Selected Areas in Communications, vol. 20, Issue 8, Oct. 2002.

    [14] J.H. van Lint , Introduction to Coding Theory, pp.99-103, Springer.

    無法下載圖示 本全文未授權公開
    QR CODE