11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

44 Chapter 4: Unequal Erasure Protection (UEP) in <strong>Network</strong> <strong>Coding</strong><br />

According to Definition 4.7, there exist seven possible GEKs, one of the first UEP level,<br />

two of the second level, <strong>and</strong> four of the third level, as shown in Table 4.1 [5].<br />

Table 4.1: GEKs, their UEP levels, <strong>and</strong> the resulting network-coded symbols<br />

.<br />

UEP GEKs Resulting<br />

Levels<br />

<strong>Network</strong>-Coded Symbols<br />

1 [1 0 0] T m 1<br />

2 [0 1 0] T m 2<br />

[1 1 0] T m 1 + m 2<br />

3 [0 0 1] T m 3<br />

[1 0 1] T m 1 + m 3<br />

[0 1 1] T m 2 + m 3<br />

[1 1 1] T m 1 + m 2 + m 3<br />

From Table 4.1, the prefix P 2 = [m 1 , m 2 ] can be recovered either from any two symbols<br />

from the levels 1 <strong>and</strong> 2 or from any three symbols from the level 3. For an arbitrary<br />

scalable message M= [m 1 , m 2 , ..., m ω ], we can state as a general rule that, in order to<br />

recover the prefix P i , we need either i network coded-symbols belonging to i linearly<br />

independent GEKs of UEP levels not exceeding i, or more than i symbols in case some<br />

UEP levels of GEKs exceed i [5].<br />

The implication following from the analysis is that the GEKs at lower levels have<br />

more utility than those in higher levels since they contribute more to the recovery of<br />

high-priority bits. In order to determine the expected utility in the presence of erasures,<br />

we now have to consider the erasure probability in each edge-disjoint path discussed in<br />

Section 4.2.<br />

Reconsidering Eq. (4.8), assuming that the k th edge-disjoint path of the sink i is used<br />

to transmit the k th network-coded symbol to the sink i, the parameter ρ i,j , which is the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!