The Test of Practical Network Coding

2013 ◽  
Vol 380-384 ◽  
pp. 2585-2588
Author(s):  
Kun Wang ◽  
Yun Pan

Network Coding is used to increase network throughput. In the network coding, network data packets will be encoded by the sender and the encoded data packets can be used by different receivers to recovery the same original data packets. This increases the network transmission efficiency. Coding on data will consume the computing resources and this becomes the bottleneck of network codings practicability. In this paper, we assume that the coding happens at the end of the network and we conduct some tests on the pc and hand-devices. Our results show that network coding can work well on current PC, and we need a native device support to make the network coding working on the hand-devices.

2019 ◽  
Vol 2019 ◽  
pp. 1-25 ◽  
Author(s):  
Zhihua Li ◽  
Minda Xu ◽  
Tingxu Liu ◽  
Lei Yu

In wireless sensor networks (WSNs), energy efficiency can simultaneously guarantee robustness to link loss and node failure and is a key design goal of routing protocols because WSNs are strongly constrained in terms of transmission reliability, transmission delay, and energy consumption. Braided multipath routing has become a powerful tool for tolerating node failures and link losses, with high reliability and efficient data transmission rates. In this paper, we propose a novel network coding-based braided multipath routing called NC-BMR protocol. It integrates a data compression-based network coding method with the construction of hierarchical multiparent nodes (HMPNs) topology for the routing with coordinated data forwarding manner and a multipackets-based time scheduler strategy (MTSS). Its perfect transmission efficiency is achieved by only attaching a little control information with data packets. We validated NC-BMR based on the TOSSIM platform and compared it to several previous methods. Theoretical analysis and simulation results demonstrate its performance improvement in terms of the transmission reliability, delay, and overhead.


2013 ◽  
Vol 24 (06) ◽  
pp. 1350036 ◽  
Author(s):  
HAN-XIN YANG ◽  
WEN-XU WANG

Despite of intensive investigations on transportation dynamics taking place on complex networks with fixed structures, a deep understanding of networks consisting of mobile nodes is challenging yet, especially the lacking of insight into the effects of routing strategies on transmission efficiency. We introduce a distance-based routing strategy for networks of mobile agents toward enhancing the network throughput and the transmission efficiency. We study the transportation capacity and delivering time of data packets associated with mobility and communication ability. Interestingly, we find that the transportation capacity is optimized at moderate moving speed, which is quite different from random routing strategy. In addition, both continuous and discontinuous transitions from free flow to congestions are observed. Degree distributions are explored in order to explain the enhancement of network throughput and other observations. Our work is valuable toward understanding complex transportation dynamics and designing effective routing protocols.


Electronics ◽  
2019 ◽  
Vol 8 (6) ◽  
pp. 644 ◽  
Author(s):  
Fei Ding ◽  
Zitong Ma ◽  
Zhiliang Li ◽  
Ruoyu Su ◽  
Dengyin Zhang ◽  
...  

With the development and the characteristics of terminal services of the 5G (5th-Generation network) Internet of Vehicles (IoVs), this paper proposes a distributed splitting strategy for multi-type services of 5G V2X (Vehicle to X) networks. Based on a service-oriented adaptive splitting strategy in heterogeneous networks, combined with various service types such as communications between the networks, terminal, and base stations, and the value-added services of 5G IoVs, the proposed strategy jointly considers delay and cost as optimization goals. By analyzing the characteristics of the different services, the proposed traffic flow splitting strategy is modeled as an optimization problem to efficiently split services in 5G V2X networks. The simulation results show that by setting the traffic distribution policy for each service, the distributed traffic flow splitting strategy can significantly improve network transmission efficiency and reduce the service costs in a vehicle V2X network.


2013 ◽  
Vol 446-447 ◽  
pp. 1577-1580
Author(s):  
Li Feng Jiang ◽  
Liang Gou ◽  
Hong Peng Zhu ◽  
Geng Xin Zhang

Network coding has recently attracted attention as a substantial improvement to packet retransmission schemes in wireless multicast broadcast services (MBS). In this paper, we are interested in applying the maximum clique approach to the network coding based multicast retransmission problem in the MBS systems. Our figure of merit is the transmission efficiency which is an important design parameter for some MBS systems, such as the satellite broadcasting networks since it affects the energy efficiency and delay of the system directly. We show that introducing the idea from network coding allows us to realize significant benefits in terms of transmission efficiency for the problem of multicasting and broadcasting, and develop an algorithm that allow to realize these benefits in practice.


2014 ◽  
Vol 665 ◽  
pp. 733-738 ◽  
Author(s):  
Zheng Gang Liu ◽  
Hong Wei Ding ◽  
Jia Guo ◽  
Xiao Hui Ma ◽  
Jia Long Xiong

With the rapid development of WSN and the increasing of data speed, optimize of access technology becomes more and more realistic. This paper based on dual-polling protocol solves the QoS in WSN. On the basis of "Priority-based Polling Scheme for Traffic Differentiation", this paper conducted a dual-polling system based on FPGA design. By using the different network transmission priority setting, complete the optimization of network scheduling strategy. The control system has the advantages of high reliability, low delay, strong scalability, and high transmission efficiency.


2014 ◽  
Vol 631-632 ◽  
pp. 946-951 ◽  
Author(s):  
Guang Cai Cui ◽  
Bai Tong Liu

For traditional intrusion detection technology, the lack of intelligent and self-adaptive has become increasingly prominent when they cope with unknown attacks. A method based on genetic algorithm was presented for discovering and learning the intrusion detection rules. This algorithm uses the network data packet as an original data source, after pretreatment, initialized them to be the initial population of the genetic algorithm, then derive the classification rules. These rules were used to detect or classify network intrusions in a real-time network environment, selecting the intrusion packets. The experiment proves the efficiency of the presented method.


2014 ◽  
Vol 989-994 ◽  
pp. 4759-4762
Author(s):  
Zhong Sheng Wang ◽  
Dong Li Huang

ZigBee technology is mainly used in short distance, low power consumption, low rate, low complexity of equipments for data transmission. When image has a large amount of data, it should be processed firstly, and then transmitted. This essay makes a research on healthy care system, using CMOS camera to get image and compress image. Then, the compressed image is transferred to ARM processor, and divided into data packets according to the requirement of the ZigBee network transmission. Finally, the image is transferred to control center and displayed. After the final test, this system can get images to meet the requirements, which has some practical values.


2014 ◽  
Vol 543-547 ◽  
pp. 3173-3176 ◽  
Author(s):  
Dong Sheng Zhang

To date, network security analysts depend only on some network secure products to study large amounts of log information as to analyze and cope with network anomalies. With dramatic increase of network data volumes, diversities of attack types and more complexity, the traditional analytical means are no longer effective. How to enable those analysts to quickly figure out network status by advantage of cumbersome high-dimensional data information has become a critical concern in the field of network safety. Here it develops a visualized technique for detecting network safety information by port scanning. After the analysis of network data packets and the use of information visualization technique, the visualized port scanning and detection system ScanViewer is designed and developed. The experiment reveals that it can detect slow scan, distributed scan, various TCP stealth scan and so on. With the method, people have got out of helpless embarrassment by the weak scan.


Sign in / Sign up

Export Citation Format

Share Document