Network coding with remix qualification for multicasting in delay-tolerant networks

Yu Feng Hsu, Chih Lin Hu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and mobile ad-hoc networks. However, multicasting with replication-based methodologies can induce considerable message traffic and longer delivery delay time, thereby being vulnerable upon system performance. This paper exploits the potential of network coding to design an efficient network-coding multicast mechanism in delay-tolerant networks. In this design, intermediate nodes in a network can perform a specific remix qualification approach which can not only alleviate the dependency problem among coded blocks but also generate more innovative coded blocks for restoring the original message by destination nodes. Simulation results show that the proposed mechanism is able to achieve cost-effective performance as compared with the naive network-coding and the replication-based delivery mechanisms for message multicasting in delay-tolerant networks.

Original languageEnglish
Title of host publication2013 IEEE Wireless Communications and Networking Conference, WCNC 2013
Pages1534-1539
Number of pages6
DOIs
StatePublished - 2013
Event2013 IEEE Wireless Communications and Networking Conference, WCNC 2013 - Shanghai, China
Duration: 7 Apr 201310 Apr 2013

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Conference

Conference2013 IEEE Wireless Communications and Networking Conference, WCNC 2013
Country/TerritoryChina
CityShanghai
Period7/04/1310/04/13

Fingerprint

Dive into the research topics of 'Network coding with remix qualification for multicasting in delay-tolerant networks'. Together they form a unique fingerprint.

Cite this