Content deleted Content added
Fixed punctuation. |
Duckmather (talk | contribs) copy-edit (rewrote lead), expanded references, added {{Confusing}} Tags: nowiki added Visual edit |
||
Line 1:
{{Copy edit|date=February 2022}}{{Confusing|date=March 2022}}
In [[computer networking]], '''linear network coding''' is a scheme in which intermediate nodes transmit data from source nodes to sink nodes by means of [[linear combinations]] of the source nodes' data over a [[Galois field|finite field]], which are them solved by sink nodes to yield the source data. It is a technique used in the broader field of '''network coding'''.
Network coding is a field of research that originally emerged in a series of papers from the late 1990s to the early 2000s. The concept of '''linear network coding''', however, predates this. In a 1978 paper,<ref> name="</ref> a scheme for improving the throughput of a two-way communication through a satellite was proposed. In this scheme, two communicating users would transmit their data streams to a satellite, combining the two streams by summing them modulo 2 and then broadcasting the combined stream. Each of the two users, upon receiving the broadcast stream, can decode the other stream by using the information of their own stream.▼
The 2000 paper <ref name="Ahlswede2000" /> gave the butterfly network example (discussed below), illustrating how linear network coding can outperform routing. This example is equivalent to the scheme for satellite communication described above. The same paper gives an optimal coding scheme for a network with one source node and three destination nodes. This represents the first example illustrating the optimality of convolutional network coding (a more general form of linear network coding) over a cyclic network.▼
Linear network coding may be used to improve a network's throughput, efficiency, and [[scalability]], as well as reducing attacks and eavesdropping. Instead of simply relaying the [[Packet (information technology)|packets]] of information they receive, the [[Node (networking)|nodes]] of a network take ''several'' packets and combine them together for transmission. This process may be used to attain the maximum possible [[information]] [[flow network|flow]] in a [[Network theory|network]].
Line 10 ⟶ 8:
== Encoding and decoding ==
In a linear network coding problem, a group of nodes <math>P</math> are involved in moving the data from <math>S</math> source nodes to <math>K</math> sink nodes. Each node generates new packets which are linear combinations of earlier received packets
:<math>X_k = \sum_{i=1}^S g_k^i\cdot M_i</math>
where the values <math>g_k^i</math> are the coefficients selected from <math>GF(2^s)</math>. Note that, since operations are computed in a finite field, the generated message is of the same length as the original messages. Each node forwards the computed value <math>X_k</math> along with the coefficients, <math>g_k^i</math>, used in the <math>k^\text{th}</math> level, <math>g_k^i</math>.
Line 26 ⟶ 24:
== A brief history ==
Network coding is a field of research that originally emerged in a series of papers from the late 1990s to the early 2000s. The concept of linear network coding, however, predates this.
▲
▲
== Background ==
A network is represented by a [[directed graph]] <math>\mathcal{G}=(V, E, C)</math>. <math>V</math> is the set of nodes or vertices, <math>E</math> is the set of directed links (or edges), and <math>C</math> gives the capacity of each link of <math>E</math>. Let <math>T(s, t)</math> be the maximum possible throughput from node <math>s</math> to node <math>t</math>. By the [[max-flow min-cut theorem]], <math>T(s, t)</math> is upper bounded by the minimum capacity of all [[Cut (graph theory)|cuts]], which is the sum of the capacities of the edges on a cut, between these two nodes.
[[Karl Menger]] proved that there is always a set of edge-disjoint paths achieving the upper bound in a [[unicast]] scenario, known as the [[max-flow min-cut theorem]]. Later, the [[Ford–Fulkerson algorithm]] was proposed to find such paths in polynomial time. Then, Edmonds proved in the paper "Edge-Disjoint Branchings"{{Which|date=March 2022}} the upper bound in the broadcast scenario is also achievable, and proposed a polynomial time algorithm.
However, the situation in the [[multicast]] scenario is more complicated, and in fact, such an upper bound can't be reached using traditional [[routing]] ideas. Ahlswede
== The butterfly network example ==
[[Image:Butterfly network.svg|thumb|Butterfly Network.]]
The butterfly network
If only routing were allowed, then the central link would be only able to carry A or B, but not both. Supposing we send A through the center; then the left destination would receive A twice and not know B at all. Sending B poses a similar problem for the right destination. We say that routing is insufficient because no routing scheme can transmit both A and B to both destinations simultanously. Meanwhile, it takes four time slots in total for both destination nodes to know A and B.
Line 40 ⟶ 45:
Using a simple code, as shown, A and B can be transmitted to both destinations simultaneously by sending the sum of the symbols through the two relay nodes – encoding A and B using the formula "A+B". The left destination receives A and A + B, and can calculate B by subtracting the two values. Similarly, the right destination will receive B and A + B, and will also be able to determine both A and B. Therefore, with network coding, it takes only three time slots and improves the throughput.
== Random
Random linear network coding
===
Linear network coding is still a relatively new subject. Based on previous studies{{Which|date=March 2022}}, there are three important
# High decoding computational complexity due to using the Gauss-Jordan elimination method
# High transmission overhead due to attaching large coefficients vectors to encoded blocks
# Linear dependency among coefficients vectors which can reduce the number of innovative encoded blocks
== Wireless
The broadcast nature of wireless (coupled with network topology) determines the nature of [[Interference (communication)|interference]]. Simultaneous transmissions in a wireless network typically result in all of the packets being lost (i.e., collision, see [[Multiple Access with Collision Avoidance for Wireless]]). A wireless network therefore requires a scheduler (as part of the [[Media access control|MAC]] functionality) to minimize such interference. Hence any gains from network coding are strongly impacted by the underlying scheduler and will deviate from the gains seen in wired networks. Further, wireless links are typically half-duplex due to hardware constraints; i.e., a node can not simultaneously transmit and receive due to the lack of sufficient isolation between the two paths.
Although, originally network coding was proposed to be used at Network layer (see [[OSI model]]), in wireless networks, network coding has been widely used in either MAC layer or [[Physical layer|PHY]] layer.<ref name="firooz2013">M.H.Firooz, Z. Chen, S. Roy and H. Liu, ([https://arxiv.org/abs/1210.1326 Wireless Network Coding via Modified 802.11 MAC/PHY: Design and Implementation on SDR]) in IEEE Journal on Selected Areas in Communications, 2013.</ref> It has been shown that network coding when used in wireless mesh networks need attentive design and thoughts to exploit the advantages of packet mixing, else advantages cannot be realized. There are also a variety of factors influencing throughput performance, such as media access layer protocol, congestion control algorithms, etc. It is not evident how network coding can co-exist and not jeopardize what existing congestion and flow control algorithms are doing for our Internet.<ref
== Applications ==
[[File:NC D2D.png|thumb|500px|A short illustration of
Since linear network coding is a relatively new subject, its adoption in industries is still pending. Unlike other coding, linear network coding is not entirely applicable in a system due to its narrow specific usage scenario. Theorists are trying to connect it to real world applications{{How|date=March 2022}}.<ref>{{cite journal|title=How Practical is Network Coding? by Mea Wang, Baochun Li|citeseerx = 10.1.1.77.6402}}</ref> It is envisaged that network coding may be useful in the following areas:
* Owing to multi-source, multicast content-delivery nature of [[
* Alternative to [[forward error correction]] and [[Automatic repeat request|
* Robust and resilient{{Weasel inline|date=March 2022}} to network attacks like snooping, eavesdropping, replay, or data corruption attacks.<ref>{{Cite web |title=Welcome to Network Coding Security - Secure Network Coding |url=http://securenetworkcoding.wikidot.com/ |
* Digital file distribution and P2P file sharing
* Distributed storage
▲* Owing to multi-source, multicast content-delivery nature of [[Information-centric networking]] in general and [[Named Data Networking]] in particular, the linear coding can improve over all network efficiency.<ref name="Bilal, Muhammad 2019 1376–1385">{{cite journal|author=Bilal, Muhammad|display-authors=etal|title=Network-Coding Approach for Information-Centric Networking|journal=IEEE Systems Journal |volume=13|issue=2|pages=1376–1385|arxiv=1808.00348|doi=10.1109/JSYST.2018.2862913|bibcode=2019ISysJ..13.1376B|year=2019}}</ref>
* Throughput increase in wireless mesh networks
▲* Alternative to [[forward error correction]] and [[Automatic repeat request|ARQ]] in traditional and wireless networks with packet loss. e.g.: [[Coded TCP]],<ref>{{Cite arXiv |eprint = 1212.2291|last1 = Kim|first1 = Minji|title = Network Coded TCP (CTCP)|class = cs.NI|year = 2012}}</ref> [[Multi-user ARQ]]<ref>{{cite web|url=http://www.ericsson.com/technology/research_papers/wireless_access/doc/Multi-User%20ARQ.pdf |title=Archived copy |accessdate=2007-06-16 |url-status=dead |archiveurl=https://web.archive.org/web/20071108173654/http://www.ericsson.com/technology/research_papers/wireless_access/doc/Multi-User%20ARQ.pdf |archivedate=2007-11-08 }}</ref>
* Buffer and delay reduction in spatial sensor networks: [[Spatial buffer multiplexing]]<ref>{{Cite journal |last=Bhadra |first=S. |last2=Shakkottai |first2=S. |date=April 2006 |title=Looking at Large Networks: Coding vs. Queueing |url=https://ieeexplore.ieee.org/document/4146919/;jsessionid=Vf_H7NM8pJZkcL5tUwrvGHQd45FXGbWGEGG9OyMg__IVxRlWxF8t!-1723551334 |journal=Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications |pages=1–12 |doi=10.1109/INFOCOM.2006.266}}</ref>
▲* Robust and resilient to network attacks like snooping, eavesdropping, replay or data corruption attacks.<ref>{{Cite web | url=http://securenetworkcoding.wikidot.com/ | title=Welcome to Network Coding Security - Secure Network Coding}}</ref><ref>http://home.eng.iastate.edu/~yuzhen/publications/ZhenYu_INFOCOM_2008.pdf{{dead link|date=December 2017 |bot=InternetArchiveBot |fix-attempted=yes }}</ref>
* Reduce the number of packet retransmission for a single-hop wireless multicast transmission, and hence improve network bandwidth
▲* Digital file distribution and P2P file sharing. e.g.: [[Avalanche filesystem|Avalanche]] from Microsoft
* Distributed file sharing<ref>{{Cite journal |last=Firooz |first=Mohammad Hamed |last2=Roy |first2=Sumit |date=24 March 2012 |title=Data Dissemination in Wireless Networks with Network Coding |url=http://arxiv.org/abs/1203.5395 |journal=IEEE Communications Letters |volume=17 |issue=5 |pages=944–947 |doi=10.1109/LCOMM.2013.031313.121994 |issn=1089-7798}}</ref>
▲* Distributed storage.<ref name="Bilal, Muhammad 2019 1376–1385"/><ref>{{Cite web |url=http://netcod.org/papers/11AcedanskiDMK-final.pdf |title=Archived copy |access-date=2013-04-18 |archive-url=https://web.archive.org/web/20130919032950/http://netcod.org/papers/11AcedanskiDMK-final.pdf |archive-date=2013-09-19 |url-status=dead }}</ref><ref>{{Cite arXiv |eprint = cs/0702015|last1 = Dimakis|first1 = Alexandros|title = Network Coding for Distributed Storage Systems|year = 2007}}</ref>
* Low-complexity video streaming to mobile device<ref>{{Cite journal |last=Fiandrotti |first=Attilio |last2=Bioglio |first2=Valerio |last3=Grangetto |first3=Marco |last4=Gaeta |first4=Rossano |last5=Magli |first5=Enrico |date=11 October 2013 |title=Band Codes for Energy-Efficient Network Coding With Application to P2P Mobile Streaming |url=https://ieeexplore.ieee.org/document/6630050/?tp=&arnumber=6630050 |journal=IEEE Transactions on Multimedia |volume=16 |issue=2 |pages=521–532 |doi=10.1109/TMM.2013.2285518 |issn=1941-0077}}</ref>
▲* Throughput increase in wireless mesh networks. e.g.: [[COPE (network coding)|COPE]],<ref>http://people.csail.mit.edu/rahul/papers/cope-ton2008.pdf {{Bare URL PDF|date=March 2022}}</ref> [[CORE (network coding)|CORE]],<ref>{{cite book | doi = 10.1109/VTCSpring.2013.6692495 | title=CORE: COPE with MORE in Wireless Meshed Networks | journal=2013 IEEE 77th Vehicular Technology Conference (VTC Spring)| pages=1–6 | year=2013 | last1=Krigslund | first1=Jeppe | last2=Hansen | first2=Jonas | last3=Hundeboll | first3=Martin | last4=Lucani | first4=Daniel E. | last5=Fitzek | first5=Frank H. P. | isbn=978-1-4673-6337-2 }}</ref> [[Coding-aware routing]],<ref>{{cite web |url=http://arena.cse.sc.edu/papers/rocx.secon06.pdf |title=Archived copy |accessdate=2007-05-10 |url-status=dead |archiveurl=https://web.archive.org/web/20081011124616/http://arena.cse.sc.edu/papers/rocx.secon06.pdf |archivedate=2008-10-11 }}</ref><ref>http://www.cs.wisc.edu/~shravan/infocom-07-2.pdf {{Bare URL PDF|date=March 2022}}</ref> [[B.A.T.M.A.N.]]<ref>{{Cite web|title = NetworkCoding - batman-adv - Open Mesh|url = http://www.open-mesh.org/projects/batman-adv/wiki/NetworkCoding|website = www.open-mesh.org|accessdate = 2015-10-28}}</ref>
* [[Device-to-device]] extensions<ref>{{Cite journal |last=Wu |first=Yue |last2=Liu |first2=Wuling |last3=Wang |first3=Siyi |last4=Guo |first4=Weisi |last5=Chu |first5=Xiaoli |date=June 2015 |title=Network coding in device-to-device (D2D) communications underlaying cellular networks |url=https://ieeexplore.ieee.org/abstract/document/7248631 |journal=2015 IEEE International Conference on Communications (ICC) |pages=2072–2077 |doi=10.1109/ICC.2015.7248631}}</ref><ref>{{Cite journal |last=Zhao |first=Yulei |last2=Li |first2=Yong |last3=Ge |first3=Ning |date=December 2015 |title=Physical Layer Network Coding Aided Two-Way Device-to-Device Communication Underlaying Cellular Networks |url=https://ieeexplore.ieee.org/abstract/document/7417590 |journal=2015 IEEE Global Communications Conference (GLOBECOM) |pages=1–6 |doi=10.1109/GLOCOM.2015.7417590}}</ref><ref>{{Cite journal |last=Abrardo |first=Andrea |last2=Fodor |first2=Gábor |last3=Tola |first3=Besmir |date=2015 |title=Network coding schemes for Device-to-Device communications based relaying for cellular coverage extension |url=http://www.diva-portal.org/smash/get/diva2:795210/FULLTEXT01.pdf |journal=2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) |pages=670–674 |doi=10.1109/SPAWC.2015.7227122}}</ref><ref>{{Cite journal |last=Gao |first=Chuhan |last2=Li |first2=Yong |last3=Zhao |first3=Yulei |last4=Chen |first4=Sheng |date=October 2017 |title=A Two-Level Game Theory Approach for Joint Relay Selection and Resource Allocation in Network Coding Assisted D2D Communications |url=https://eprints.soton.ac.uk/414039/1/NC_D2D.pdf |journal=IEEE Transactions on Mobile Computing |volume=16 |issue=10 |pages=2697–2711 |doi=10.1109/TMC.2016.2642190 |issn=1558-0660}}</ref><ref>{{Cite journal |last=Zhou |first=Ting |last2=Xu |first2=Bin |last3=Xu |first3=Tianheng |last4=Hu |first4=Honglin |last5=Xiong |first5=Lei |date=1 February 2015 |title=User‐specific link adaptation scheme for device‐to‐device network coding multicast |url=https://ietresearch.onlinelibrary.wiley.com/doi/full/10.1049/iet-com.2014.0323 |journal=IET Communications |volume=9 |issue=3 |pages=367–374 |doi=10.1049/iet-com.2014.0323 |issn=1751-8636}}</ref>
▲* Reduce the number of packet retransmission for a single-hop wireless multicast transmission, and hence improve network bandwidth.<ref>{{Cite journal | doi=10.1109/TVT.2008.927729| title=Wireless Broadcast Using Network Coding| journal=IEEE Transactions on Vehicular Technology| volume=58| issue=2| pages=914–925| year=2009| last1=Dong Nguyen| last2=Tuan Tran| last3=Thinh Nguyen| last4=Bose| first4=B.|citeseerx = 10.1.1.321.1962}}</ref>
There are new methods{{Which|date=March 2022}} emerging to use
== Maturity
Since this area is relatively new and the mathematical treatment of this subject is currently limited to a handful of people, network coding has yet found its way to commercialization in products and services. It is likely that this scheme will not prevail, but rather only be an interesting mathematical exercise.<ref>{{Cite journal |last=Wang |first=Mea |last2=Li |first2=Baochun |date=June 2006 |title=How Practical is Network Coding? |url=https://www.eecg.utoronto.ca/~bli/papers/mwang-iwqos06.pdf |journal=2006 14th IEEE International Workshop on Quality of Service |pages=274–278 |doi=10.1109/IWQOS.2006.250480}}</ref>
Researchers{{Who|date=March 2022}} have clearly pointed out that special care is needed to explore how network coding can co-exist with existing routing, media access, congestion, flow control algorithms, and the TCP protocol. If not, network coding may not offer any advantages and can increase computation complexity and memory requirements.<ref name=":0">{{
== See also ==
Line 94 ⟶ 92:
{{Reflist}}
* Fragouli, C.; Le Boudec, J. & Widmer, J. "Network coding: An instant primer" in ''Computer Communication Review'', 2006.
* Ali Farzamnia, Sharifah K. Syed-Yusof, Norsheila Fisa "Multicasting Multiple Description Coding Using p-Cycle Network Coding", KSII Transactions on Internet and Information Systems, Vol 7, No 12, 2013.▼
▲Ali Farzamnia, Sharifah K. Syed-Yusof, Norsheila Fisa "Multicasting Multiple Description Coding Using p-Cycle Network Coding", KSII Transactions on Internet and Information Systems, Vol 7, No 12, 2013.
== External links ==
{{External links|date=March 2022}}
* [https://web.archive.org/web/20070524100030/http://www.ifp.uiuc.edu/~koetter/NWC/index.html Network Coding Homepage]
* [https://web.archive.org/web/20110719100201/https://wiki.lnt.ei.tum.de/doku.php?id=network_coding:bibliography_for_network_coding A network coding bibliography]
|