Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
48 Chapter 4: Unequal Erasure Protection (UEP) in <strong>Network</strong> <strong>Coding</strong><br />
Fragouli, Soljanin, <strong>and</strong> Shokrollahi’s approach [14]. Figure 4.4 is first transformed into a<br />
line graph shown in Fig. 4.5, where each node represents an edge from Fig. 4.4. Any two<br />
nodes in Fig. 4.5 are connected if the corresponding edges in Fig. 4.4 are adjacent.<br />
The nodes in Fig. 4.5 are grouped into five subtrees, each of which is bounded by<br />
dashed lines, such that the members in each subtree are forced by the topology to have<br />
the same GEK. For example, in the subtree T 1 , SA <strong>and</strong> AD must have the same GEK,<br />
since, according to Fig. 4.4, the node A has only one incoming edge SA <strong>and</strong> thus can do<br />
nothing but copy the received symbols <strong>and</strong> forward the copies to all outgoing edges AR 1 ,<br />
AR 2 , AR 3 , <strong>and</strong> AD, hence the same GEK among them.<br />
Accordingly, our problem of assigning GEKs to twenty-one edges is reduced to that<br />
of assigning GEKs to five subtrees. The minimum subtree graph is shown in Fig. 4.6.<br />
T 1<br />
T 4<br />
T 2<br />
T 3<br />
T 5<br />
Figure 4.6: The minimum subtree graph derived from Fig. 4.5<br />
In this case, the subtrees T 1 = {SA, AD, AR 1 , AR 2 , AR 3 }, T 2 = {SB, BD, BE, BR 2 },<br />
T 3 = {SC, CE, CR 1 , CR 3 , CR 4 }, T 4 = {DF, F R 1 , F R 3 , F R 4 }, T 5 = {EG, GR 2 , GR 4 }.<br />
The edges connecting T 1 <strong>and</strong> T 2 to T 4 , as well as T 2 <strong>and</strong> T 3 to T 5 in Fig. 4.6 imply<br />
that the GEK of T 4 must be derived from those of T 1 <strong>and</strong> T 2 whereas that of T 5 must be<br />
derived from those of T 2 <strong>and</strong> T 3 , i.e., the sets of vectors {f T1 , f T2 , f T4 } <strong>and</strong> {f T2 , f T3 , f T5 },<br />
where f Tx<br />
denotes the GEK of the subtree T x , must be linearly dependent.<br />
In a similar manner, linear independence constraints can be represented by the sets<br />
{f T1 , f T2 , f T3 }, {f T1 , f T3 , f T4 }, {f T1 , f T2 , f T5 }, <strong>and</strong> {f T3 , f T4 , f T5 }. The three GEKs in each set<br />
must be linearly independent in order to ensure a full-rank system of linear equations<br />
at each of the source <strong>and</strong> the sinks, when there is no erasure. For example, the source<br />
S is connected to the subtrees T 1 , T 2 , <strong>and</strong> T 3 , hence the linearly independent constraint<br />
{f T1 , f T2 , f T3 }.<br />
The next two sections show how to solve the problem under these constraints with<br />
different optimization objectives. In Section 4.9, the objective is equity of received data