11.03.2014 Views

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

Network Coding and Wireless Physical-layer ... - Jacobs University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

50 Chapter 4: Unequal Erasure Protection (UEP) in <strong>Network</strong> <strong>Coding</strong><br />

The temporary expected utility E t [U i ] of the i th sink at the t th iteration is given by<br />

E t [U i ] =<br />

ω∑<br />

φ t,i,j · ∆ j , (4.14)<br />

j=1<br />

where φ t,i,j represents the probability that the prefix P j can be recovered at the sink i<br />

after the GEK assignment at the iteration t. φ t,i,j equals ρ i,j in Eq. (4.8) if P j can be<br />

recovered by the GEKs assigned so far up to the iteration t. Otherwise, it equals zero.<br />

∆ j denotes the incremental utility if P j is recovered [5].<br />

We suggest that the number n(t 1 ) of GEKs assigned at the iteration t 1 should be<br />

greater than or equal to the number n(t 2 ) at the iteration t 2 if t 1 < t 2 , i.e., it is better<br />

to take larger search spaces into consideration during some first iterations, after which<br />

things do not improve much.<br />

In our network example, we assume that every edge-disjoint path has an erasure<br />

probability of 0.1 <strong>and</strong> the utility vector ∆U k = [∆ 1 , ∆ 2 , ∆ 3 ] = [1, 0.5, 0.25] for every sink<br />

node R k . If we let n(1) = 3 <strong>and</strong> n(2) = n(3) = 1, then the minimum temporary expected<br />

data quality in the first iteration is maximized by allocating the GEKs [1 0 0] T to T 3 ,<br />

[0 1 0] T to T 1 , <strong>and</strong> [1 1 0] T to T 5 . The sink R 1 now has the temporary expected utility<br />

of E 1 [U 1 ] = (0.9)(1) + (0.81)(0.5) = 1.305, since, by receiving [1 0 0] T<br />

from T 3 with the<br />

probability of 0.9, R 1 can recover the first prefix, <strong>and</strong> by receiving both [1 0 0] T from T 3<br />

<strong>and</strong> [0 1 0] T from T 1 with the probability of 0.81, it can recover the second prefix.<br />

In the same manner, the temporary expected data qualities E 1 [U 2 ], E 1 [U 3 ], <strong>and</strong> E 1 [U 4 ]<br />

of R 2 , R 3 , <strong>and</strong> R 4 become 1.305, 1.305, <strong>and</strong> 1.215, respectively. This gives the minimum<br />

temporary expected data quality, min E 1 [U i ], of 1.215 at the sink R 4 , which is the maximum<br />

that one can find at this iteration.<br />

Table 4.2 shows the resulting expected data qualities at all sink nodes <strong>and</strong> the minimum<br />

one, after the third iteration finishes <strong>and</strong> all subtrees have obtained their GEKs.<br />

Table 4.3 shows that, in our network example, the suggested strategy achieves the<br />

global optimum. In addition, on average, a r<strong>and</strong>om GEK assignment results in the minimum<br />

expected quality that is closer to that of the worst case than the best one. Thus,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!