Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
50 Chapter 4: Unequal Erasure Protection (UEP) in <strong>Network</strong> <strong>Coding</strong><br />
The temporary expected utility E t [U i ] of the i th sink at the t th iteration is given by<br />
E t [U i ] =<br />
ω∑<br />
φ t,i,j · ∆ j , (4.14)<br />
j=1<br />
where φ t,i,j represents the probability that the prefix P j can be recovered at the sink i<br />
after the GEK assignment at the iteration t. φ t,i,j equals ρ i,j in Eq. (4.8) if P j can be<br />
recovered by the GEKs assigned so far up to the iteration t. Otherwise, it equals zero.<br />
∆ j denotes the incremental utility if P j is recovered [5].<br />
We suggest that the number n(t 1 ) of GEKs assigned at the iteration t 1 should be<br />
greater than or equal to the number n(t 2 ) at the iteration t 2 if t 1 < t 2 , i.e., it is better<br />
to take larger search spaces into consideration during some first iterations, after which<br />
things do not improve much.<br />
In our network example, we assume that every edge-disjoint path has an erasure<br />
probability of 0.1 <strong>and</strong> the utility vector ∆U k = [∆ 1 , ∆ 2 , ∆ 3 ] = [1, 0.5, 0.25] for every sink<br />
node R k . If we let n(1) = 3 <strong>and</strong> n(2) = n(3) = 1, then the minimum temporary expected<br />
data quality in the first iteration is maximized by allocating the GEKs [1 0 0] T to T 3 ,<br />
[0 1 0] T to T 1 , <strong>and</strong> [1 1 0] T to T 5 . The sink R 1 now has the temporary expected utility<br />
of E 1 [U 1 ] = (0.9)(1) + (0.81)(0.5) = 1.305, since, by receiving [1 0 0] T<br />
from T 3 with the<br />
probability of 0.9, R 1 can recover the first prefix, <strong>and</strong> by receiving both [1 0 0] T from T 3<br />
<strong>and</strong> [0 1 0] T from T 1 with the probability of 0.81, it can recover the second prefix.<br />
In the same manner, the temporary expected data qualities E 1 [U 2 ], E 1 [U 3 ], <strong>and</strong> E 1 [U 4 ]<br />
of R 2 , R 3 , <strong>and</strong> R 4 become 1.305, 1.305, <strong>and</strong> 1.215, respectively. This gives the minimum<br />
temporary expected data quality, min E 1 [U i ], of 1.215 at the sink R 4 , which is the maximum<br />
that one can find at this iteration.<br />
Table 4.2 shows the resulting expected data qualities at all sink nodes <strong>and</strong> the minimum<br />
one, after the third iteration finishes <strong>and</strong> all subtrees have obtained their GEKs.<br />
Table 4.3 shows that, in our network example, the suggested strategy achieves the<br />
global optimum. In addition, on average, a r<strong>and</strong>om GEK assignment results in the minimum<br />
expected quality that is closer to that of the worst case than the best one. Thus,