Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
Network Coding and Wireless Physical-layer ... - Jacobs University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
68 Chapter 5: <strong>Network</strong> <strong>Coding</strong> with LT Codes as Erasure Codes<br />
A<br />
b 2<br />
B<br />
C<br />
b 1 ⊕ b 2<br />
b 2<br />
b 2<br />
b 1 ⊕ b 2<br />
F<br />
b 1<br />
b 1 ⊕ b 2 b 1<br />
b 1<br />
G<br />
D<br />
E<br />
Figure 5.8: <strong>Network</strong> coding in a butterfly network when only BD is erasure-prone<br />
This solution can be performed by the source alone. When the source A is informed<br />
by B that there are severe erasures at BD, it simply transmits b 1 + b 2 instead of b 1 to B<br />
while other nodes just work as usual. In general, this solution is applicable when erasures<br />
occur along a single edge, with the transmission pattern depending on which edge is<br />
erasure-prone, as shown in Table 5.1.<br />
Table 5.1: Recommended Transmission When An Edge is Erasure-prone<br />
.<br />
Erasure-prone edge<br />
Choices of<br />
recommended transmission to (AB, AC)<br />
AB or BF or GE (b 1 , b 2 ), (b 2 , b 1 ), (b 1 + b 2 , b 1 ), (b 1 + b 2 , b 2 )<br />
AC or CF or GD (b 1 , b 2 ), (b 2 , b 1 ), (b 1 , b 1 + b 2 ), (b 2 , b 1 + b 2 )<br />
BD (b 1 + b 2 , b 1 ), (b 1 + b 2 , b 2 )<br />
CE (b 1 , b 1 + b 2 ), (b 2 , b 1 + b 2 )<br />
F G (b 1 , b 2 ), (b 2 , b 1 )<br />
The next section deals with a more general case in which more than one edge is<br />
erasure-prone.