11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

48 Chapter 4: Unequal Erasure Protection (UEP) in <strong>Network</strong> <strong>Coding</strong><br />

Fragouli, Soljanin, <strong>and</strong> Shokrollahi’s approach [14]. Figure 4.4 is first transformed into a<br />

line graph shown in Fig. 4.5, where each node represents an edge from Fig. 4.4. Any two<br />

nodes in Fig. 4.5 are connected if the corresponding edges in Fig. 4.4 are adjacent.<br />

The nodes in Fig. 4.5 are grouped into five subtrees, each of which is bounded by<br />

dashed lines, such that the members in each subtree are forced by the topology to have<br />

the same GEK. For example, in the subtree T 1 , SA <strong>and</strong> AD must have the same GEK,<br />

since, according to Fig. 4.4, the node A has only one incoming edge SA <strong>and</strong> thus can do<br />

nothing but copy the received symbols <strong>and</strong> forward the copies to all outgoing edges AR 1 ,<br />

AR 2 , AR 3 , <strong>and</strong> AD, hence the same GEK among them.<br />

Accordingly, our problem of assigning GEKs to twenty-one edges is reduced to that<br />

of assigning GEKs to five subtrees. The minimum subtree graph is shown in Fig. 4.6.<br />

T 1<br />

T 4<br />

T 2<br />

T 3<br />

T 5<br />

Figure 4.6: The minimum subtree graph derived from Fig. 4.5<br />

In this case, the subtrees T 1 = {SA, AD, AR 1 , AR 2 , AR 3 }, T 2 = {SB, BD, BE, BR 2 },<br />

T 3 = {SC, CE, CR 1 , CR 3 , CR 4 }, T 4 = {DF, F R 1 , F R 3 , F R 4 }, T 5 = {EG, GR 2 , GR 4 }.<br />

The edges connecting T 1 <strong>and</strong> T 2 to T 4 , as well as T 2 <strong>and</strong> T 3 to T 5 in Fig. 4.6 imply<br />

that the GEK of T 4 must be derived from those of T 1 <strong>and</strong> T 2 whereas that of T 5 must be<br />

derived from those of T 2 <strong>and</strong> T 3 , i.e., the sets of vectors {f T1 , f T2 , f T4 } <strong>and</strong> {f T2 , f T3 , f T5 },<br />

where f Tx<br />

denotes the GEK of the subtree T x , must be linearly dependent.<br />

In a similar manner, linear independence constraints can be represented by the sets<br />

{f T1 , f T2 , f T3 }, {f T1 , f T3 , f T4 }, {f T1 , f T2 , f T5 }, <strong>and</strong> {f T3 , f T4 , f T5 }. The three GEKs in each set<br />

must be linearly independent in order to ensure a full-rank system of linear equations<br />

at each of the source <strong>and</strong> the sinks, when there is no erasure. For example, the source<br />

S is connected to the subtrees T 1 , T 2 , <strong>and</strong> T 3 , hence the linearly independent constraint<br />

{f T1 , f T2 , f T3 }.<br />

The next two sections show how to solve the problem under these constraints with<br />

different optimization objectives. In Section 4.9, the objective is equity of received data

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!