Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
44 Chapter 4: Unequal Erasure Protection (UEP) in <strong>Network</strong> <strong>Coding</strong><br />
According to Definition 4.7, there exist seven possible GEKs, one of the first UEP level,<br />
two of the second level, <strong>and</strong> four of the third level, as shown in Table 4.1 [5].<br />
Table 4.1: GEKs, their UEP levels, <strong>and</strong> the resulting network-coded symbols<br />
.<br />
UEP GEKs Resulting<br />
Levels<br />
<strong>Network</strong>-Coded Symbols<br />
1 [1 0 0] T m 1<br />
2 [0 1 0] T m 2<br />
[1 1 0] T m 1 + m 2<br />
3 [0 0 1] T m 3<br />
[1 0 1] T m 1 + m 3<br />
[0 1 1] T m 2 + m 3<br />
[1 1 1] T m 1 + m 2 + m 3<br />
From Table 4.1, the prefix P 2 = [m 1 , m 2 ] can be recovered either from any two symbols<br />
from the levels 1 <strong>and</strong> 2 or from any three symbols from the level 3. For an arbitrary<br />
scalable message M= [m 1 , m 2 , ..., m ω ], we can state as a general rule that, in order to<br />
recover the prefix P i , we need either i network coded-symbols belonging to i linearly<br />
independent GEKs of UEP levels not exceeding i, or more than i symbols in case some<br />
UEP levels of GEKs exceed i [5].<br />
The implication following from the analysis is that the GEKs at lower levels have<br />
more utility than those in higher levels since they contribute more to the recovery of<br />
high-priority bits. In order to determine the expected utility in the presence of erasures,<br />
we now have to consider the erasure probability in each edge-disjoint path discussed in<br />
Section 4.2.<br />
Reconsidering Eq. (4.8), assuming that the k th edge-disjoint path of the sink i is used<br />
to transmit the k th network-coded symbol to the sink i, the parameter ρ i,j , which is the