Chapter 4: Unequal Erasure Protection (UEP) in <strong>Network</strong> <strong>Coding</strong> 47 4.8 Subtree Decomposition Technique for Complexity Reduction of the GEK Assignment Problem S A B C D E F G R 2 R 3 R 1 R 4 Figure 4.4: <strong>Network</strong> example with scalable data multicast T 1 T 2 T 3 SA SB SC AR 1 AR 2 AR 3 AD BD BR 2 BE CE CR 1 CR 3 CR 4 T 4 T 5 DF EG FR 1 FR 3 FR 4 GR 2 GR 4 Figure 4.5: Line graph derived from Fig. 4.4 Consider the network in Fig. 4.4. The source S would like to multicast an ordered scalable message M = [m 1 , m 2 , m 3 ], of which elements m 1 , m 2 , <strong>and</strong> m 3 have dependency levels of 1, 2, <strong>and</strong> 3, respectively, to four sink nodes R 1 , R 2 , R 3 , <strong>and</strong> R 4 . Every edge in the graph is capable of transmitting one symbol per time unit. Before assigning a GEK to each edge, we can simplify the graph in Fig. 4.4, using
48 Chapter 4: Unequal Erasure Protection (UEP) in <strong>Network</strong> <strong>Coding</strong> Fragouli, Soljanin, <strong>and</strong> Shokrollahi’s approach [14]. Figure 4.4 is first transformed into a line graph shown in Fig. 4.5, where each node represents an edge from Fig. 4.4. Any two nodes in Fig. 4.5 are connected if the corresponding edges in Fig. 4.4 are adjacent. The nodes in Fig. 4.5 are grouped into five subtrees, each of which is bounded by dashed lines, such that the members in each subtree are forced by the topology to have the same GEK. For example, in the subtree T 1 , SA <strong>and</strong> AD must have the same GEK, since, according to Fig. 4.4, the node A has only one incoming edge SA <strong>and</strong> thus can do nothing but copy the received symbols <strong>and</strong> forward the copies to all outgoing edges AR 1 , AR 2 , AR 3 , <strong>and</strong> AD, hence the same GEK among them. Accordingly, our problem of assigning GEKs to twenty-one edges is reduced to that of assigning GEKs to five subtrees. The minimum subtree graph is shown in Fig. 4.6. T 1 T 4 T 2 T 3 T 5 Figure 4.6: The minimum subtree graph derived from Fig. 4.5 In this case, the subtrees T 1 = {SA, AD, AR 1 , AR 2 , AR 3 }, T 2 = {SB, BD, BE, BR 2 }, T 3 = {SC, CE, CR 1 , CR 3 , CR 4 }, T 4 = {DF, F R 1 , F R 3 , F R 4 }, T 5 = {EG, GR 2 , GR 4 }. The edges connecting T 1 <strong>and</strong> T 2 to T 4 , as well as T 2 <strong>and</strong> T 3 to T 5 in Fig. 4.6 imply that the GEK of T 4 must be derived from those of T 1 <strong>and</strong> T 2 whereas that of T 5 must be derived from those of T 2 <strong>and</strong> T 3 , i.e., the sets of vectors {f T1 , f T2 , f T4 } <strong>and</strong> {f T2 , f T3 , f T5 }, where f Tx denotes the GEK of the subtree T x , must be linearly dependent. In a similar manner, linear independence constraints can be represented by the sets {f T1 , f T2 , f T3 }, {f T1 , f T3 , f T4 }, {f T1 , f T2 , f T5 }, <strong>and</strong> {f T3 , f T4 , f T5 }. The three GEKs in each set must be linearly independent in order to ensure a full-rank system of linear equations at each of the source <strong>and</strong> the sinks, when there is no erasure. For example, the source S is connected to the subtrees T 1 , T 2 , <strong>and</strong> T 3 , hence the linearly independent constraint {f T1 , f T2 , f T3 }. The next two sections show how to solve the problem under these constraints with different optimization objectives. In Section 4.9, the objective is equity of received data
- Page 1:
Network Coding and Wireless Physica
- Page 4 and 5:
Abstract The general abstraction of
- Page 6 and 7:
Contents Abstract i Abstract ii Dec
- Page 8 and 9:
vi CONTENTS 5.4 Degree Distribution
- Page 10 and 11: List of Figures 2.1 A basic digital
- Page 12 and 13: x LIST OF FIGURES 5.11 Comparison o
- Page 14 and 15: Part I Motivation, Overview, and In
- Page 16 and 17: Chapter 1: Motivation and Overview
- Page 18 and 19: Chapter 2 Introduction to Digital C
- Page 20 and 21: Chapter 2: Introduction to Digital
- Page 22 and 23: Chapter 2: Introduction to Digital
- Page 24 and 25: Chapter 2: Introduction to Digital
- Page 26 and 27: Chapter 2: Introduction to Digital
- Page 28 and 29: Chapter 2: Introduction to Digital
- Page 30 and 31: Chapter 3: Introduction to Graphs a
- Page 32 and 33: Chapter 3: Introduction to Graphs a
- Page 34 and 35: Chapter 3: Introduction to Graphs a
- Page 36 and 37: Chapter 3: Introduction to Graphs a
- Page 38 and 39: Chapter 3: Introduction to Graphs a
- Page 40 and 41: Chapter 3: Introduction to Graphs a
- Page 42 and 43: Chapter 3: Introduction to Graphs a
- Page 44 and 45: Chapter 3: Introduction to Graphs a
- Page 46 and 47: 33 The emergence of scalable video
- Page 48 and 49: Chapter 4: Unequal Erasure Protecti
- Page 50 and 51: Chapter 4: Unequal Erasure Protecti
- Page 52 and 53: Chapter 4: Unequal Erasure Protecti
- Page 54 and 55: Chapter 4: Unequal Erasure Protecti
- Page 56 and 57: Chapter 4: Unequal Erasure Protecti
- Page 58 and 59: Chapter 4: Unequal Erasure Protecti
- Page 62 and 63: Chapter 4: Unequal Erasure Protecti
- Page 64 and 65: Chapter 4: Unequal Erasure Protecti
- Page 66 and 67: Chapter 4: Unequal Erasure Protecti
- Page 68 and 69: Chapter 4: Unequal Erasure Protecti
- Page 70 and 71: Chapter 4: Unequal Erasure Protecti
- Page 72 and 73: Chapter 5: Network Coding with LT C
- Page 74 and 75: Chapter 5: Network Coding with LT C
- Page 76 and 77: Chapter 5: Network Coding with LT C
- Page 78 and 79: Chapter 5: Network Coding with LT C
- Page 80 and 81: Chapter 5: Network Coding with LT C
- Page 82 and 83: Chapter 5: Network Coding with LT C
- Page 84 and 85: Chapter 5: Network Coding with LT C
- Page 86 and 87: Chapter 5: Network Coding with LT C
- Page 88 and 89: Part III Wireless Physical-layer Se
- Page 90 and 91: Chapter 6 Wireless Physical-layer S
- Page 92 and 93: Chapter 6: Wireless Physical-layer
- Page 94 and 95: Chapter 6: Wireless Physical-layer
- Page 96 and 97: Chapter 6: Wireless Physical-layer
- Page 98 and 99: Chapter 6: Wireless Physical-layer
- Page 100 and 101: Chapter 6: Wireless Physical-layer
- Page 102 and 103: Chapter 6: Wireless Physical-layer
- Page 104 and 105: Chapter 7 Physical-layer Key Encodi
- Page 106 and 107: Chapter 7: Physical-layer Key Encod
- Page 108 and 109: Chapter 7: Physical-layer Key Encod
- Page 110 and 111:
Chapter 7: Physical-layer Key Encod
- Page 112 and 113:
Chapter 7: Physical-layer Key Encod
- Page 114 and 115:
Chapter 7: Physical-layer Key Encod
- Page 116 and 117:
Chapter 7: Physical-layer Key Encod
- Page 118 and 119:
Chapter 7: Physical-layer Key Encod
- Page 120 and 121:
Chapter 7: Physical-layer Key Encod
- Page 122 and 123:
Chapter 7: Physical-layer Key Encod
- Page 124 and 125:
Chapter 8: Summary, Conclusion, and
- Page 126 and 127:
Chapter 8: Summary, Conclusion, and
- Page 128 and 129:
Chapter 8: Summary, Conclusion, and
- Page 130 and 131:
Chapter 8: Summary, Conclusion, and
- Page 132 and 133:
Bibliography [1] 3GPP, “3GPP; Tec
- Page 134 and 135:
BIBLIOGRAPHY 121 [21] F.A. Hayek,
- Page 136 and 137:
BIBLIOGRAPHY 123 [43] M. Friedman a
- Page 138 and 139:
BIBLIOGRAPHY 125 [63] S. Jaggi, P.
- Page 140:
BIBLIOGRAPHY 127 [81] X. Sun, X. Wu