首页> 外文会议>International Conference on Algorithms and Architectures for Parallel Processing >A Group XOR-ing Coding Strategy Based on Wireless Network Overhearing
【24h】

A Group XOR-ing Coding Strategy Based on Wireless Network Overhearing

机译:基于无线网络过度插入的基础XOR-ing编码策略

获取原文

摘要

In the overhearing research of wireless network, the network coding theory is attracted by more and more scholars. However, the existing research based on wireless network coding, either designate a certain network topology or network scenarios, or are based on pair XOR-ing coding, which are lack of network structure adaptability and security. In two-hop wireless network, an overhearing management strategy based on group XOR-ing is proposed in this paper. Firstly, coding node receives packets from different source nodes, and encodes the packets in coding queue by the way of group XOR-ing according to the packets' information in overhearing buffer. Secondly, the sink nodes decode the received packets by using these packets in overhearing buffer, so that, sink nodes get the intended packets that are sent from corresponding source node. Finally, sink nodes delete these packets, which have been used for decoding, to hold newly overheard ones. We first make research on two-flow wireless network, when the network topology changes dynamically, we make further research on the applicability and scalability on our proposed scheme in case of single-flow and multi-flow network topology. What's more, we analyze the security of this strategy. Based on experiment and theory analysis, it is demonstrated that our scheme has higher throughput gains and lower delay than traditional schemes. Moreover, the scheme in this paper is well scalable, adaptable and secure.
机译:在无线网络的过化研究中,网络编码理论被越来越多的学者吸引。然而,基于无线网络编码的现有研究,或者指定某个网络拓扑或网络场景,或者基于对XOR-ing编码,这缺乏网络结构适应性和安全性。在两跳无线网络中,本文提出了一种基于综合杂志的过度管理策略。首先,编码节点接收来自不同源节点的分组,并根据在曝光缓冲器中的分组信息,通过组XOR-ing的方式对分组进行编码队列的方式。其次,沉没节点通过在曝光缓冲器中使用这些分组来解码接收的分组,因此,沉积节点获取从相应的源节点发送的预期分组。最后,沉积节点删除了已用于解码的这些数据包,以保持新的过热。我们首先对双流无线网络进行研究,当网络拓扑动态变化时,我们进一步研究了在单流动和多流量网络拓扑的情况下我们所提出的方案的适用性和可扩展性。更重要的是,我们分析了这一战略的安全性。基于实验和理论分析,证明我们的计划具有较高的吞吐量和低于传统方案的延迟。此外,本文的方案是可扩展的,适应性和安全性良好的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号