Cover image for Network coding : an introduction
Title:
Network coding : an introduction
Personal Author:
Publication Information:
New York : Cambridge Univ Press, 2008
Physical Description:
xi, 170 p. : ill. ; 27 cm.
ISBN:
9780521873109

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010169783 TK5105 H674 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Network coding promises to significantly impact the way communications networks are designed, operated, and understood. This book presents a unified and intuitive overview of the theory, applications, challenges, and future directions of this emerging field, and is a must-have resource for those working in wireline or wireless networking. * Uses an engineering approach - explains the ideas and practical techniques * Covers mathematical underpinnings, practical algorithms, code selection, security, and network management * Discusses key topics of inter-session (non-multicast) network coding, lossy networks, lossless networks, and subgraph-selection algorithms Starting with basic concepts, models, and theory, then covering a core subset of results with full proofs, Ho and Lun provide an authoritative introduction to network coding that supplies both the background to support research and the practical considerations for designing coded networks. This is an essential resource for graduate students and researchers in electronic and computer engineering and for practitioners in the communications industry.rs in electronic and computer engineering and for practitioners in the communications industry.rs in electronic and computer engineering and for practitioners in the communications industry.rs in electronic and computer engineering and for practitioners in the communications industry.


Table of Contents

Prefacep. ix
1 Introductionp. 1
1.1 What is network coding?p. 1
1.2 What is network coding good for?p. 2
1.2.1 Throughputp. 2
1.2.2 Robustnessp. 5
1.2.3 Complexityp. 7
1.2.4 Securityp. 8
1.3 Network modelp. 8
1.4 Outline of bookp. 11
1.5 Notes and further readingp. 12
2 Lossless Multicast Network Codingp. 13
2.0 Notational conventionsp. 13
2.1 Basic network model and multicast network coding problem formulationp. 13
2.2 Delay-free scalar linear network codingp. 14
2.3 Solvability and throughputp. 17
2.3.1 The unicast casep. 17
2.3.2 The multicast casep. 18
2.3.3 Multicasting from multiple source nodesp. 19
2.3.4 Maximum throughput advantagep. 19
2.4 Multicast network code constructionp. 21
2.4.1 Centralized polynomial-time constructionp. 21
2.4.2 Random linear network codingp. 23
2.5 Packet networksp. 27
2.5.1 Distributed random linear coding for packet networksp. 28
2.6 Networks with cycles and convolutional network codingp. 30
2.6.1 Algebraic representation of convolutional network codingp. 31
2.7 Correlated source processesp. 34
2.7.1 Joint source-network codingp. 35
2.7.2 Separation of source coding and network codingp. 37
2.8 Notes and further readingp. 37
2.A Appendix Random network codingp. 39
3 Inter-Session Network Codingp. 49
3.1 Scalar and vector linear network codingp. 50
3.2 Fractional coding problem formulationp. 51
3.3 Insufficiency of linear network codingp. 52
3.4 Information theoretic approachesp. 54
3.4.1 Multiple unicast networksp. 58
3.5 Constructive approachesp. 58
3.5.1 Pairwise XOR coding in wireline networksp. 59
3.5.2 XOR coding in wireless networksp. 60
3.6 Notes and further readingp. 63
4 Network Coding in Lossy Networksp. 65
4.1 Random linear network codingp. 67
4.2 Coding theoremsp. 68
4.2.1 Unicast connectionsp. 68
4.2.2 Multicast connectionsp. 82
4.3 Error exponents for Poisson traffic with i.i.d. lossesp. 83
4.4 Notes and further readingp. 85
5 Subgraph Selectionp. 86
5.1 Flow-based approachesp. 87
5.1.1 Intra-session codingp. 87
5.1.2 Computation-constrained codingp. 110
5.1.3 Inter-session codingp. 111
5.2 Queue-length-based approachesp. 114
5.2.1 Intra-session network coding for multiple multicast sessionsp. 115
5.2.2 Inter-session codingp. 128
5.3 Notes and further readingp. 129
6 Security Against Adversarial Errorsp. 130
6.0 Notational conventionsp. 130
6.1 Error correctionp. 131
6.1.1 Error correction bounds for centralized network codingp. 131
6.1.2 Distributed random network coding and polynomial-complexity error correctionp. 142
6.2 Detection of adversarial errorsp. 147
6.2.1 Model and problem formulationp. 148
6.2.2 Detection probabilityp. 150
6.3 Notes and further readingp. 151
Appendix 6.A Proof of results for adversarial error detectionp. 152
Bibliographyp. 157
Indexp. 169