• No results found

Network Coding Opportunity of the Encyclopaedia Discovery Scheme in Wireless Networks

N/A
N/A
Protected

Academic year: 2020

Share "Network Coding Opportunity of the Encyclopaedia Discovery Scheme in Wireless Networks"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

P a g e | 985 Network Coding Opportunity of the Encyclopaedia Discovery Scheme in Wireless

Networks

1

G.Mounika, 2B.Sravan Kumar

1

PG Scholar, Department of CSE, Vaagdevi College of Engineering, Bollikunta, Warangal.

2

Assistant Professor in Department of CSE, Vaagdevi College of Engineering, Bollikunta, Warangal.

ABSTRACT:

Opportunistic orientation has emerged on the basis of smart coding network to improve the

ability of wireless multi-hop network loss by reducing the amount of messages required

reactions. Most business coding in network-based opportunistic routing in the literature assumes

that independent links. This hypothesis has been invalidated by recent empirical studies have

shown that the relationship between the links may be arbitrary. In this paper, we show that

opportunistic routing performance based on the coding of the network and greatly affected the

relationship between the links. We formulate the problem of productivity maximization while

achieving justice under arbitrary channel conditions, and determine the structure of the optimal

solution. As is the case in the literature, and the optimal solution requires a lot of instant

information messages, which is unrealistic. We propose the idea of network message coding

performance reactions, which shows that if the intermediate node waits to receive only one

message the votes of each next hip node, we can calculate the optimum level of network

redundancy coding form Distributed. Encrypted messages require reaction to a small amount of

overhead as it can be integrated with packets. Our approach is also oblivious to losses and

mutual relationships between links, but also improves performance without a clear knowledge of

these two factors

INTRODUCTION:

Network coding for the first time by

Ahlswede and others.[1], in which the skills

of multi-contact Networks. Later, Li et al.

[2] showed that Written symbols sufficient

to achieve multiple traffic Maximum

capacity and borders. At the same time,

Koetter Medard and [3] proposed algebraic

approach It turns out that encoding and

decoding can be done in Polynomial time.

He and others. [4.5] introduced the concept

of Random linear network, making the

(2)

distributed networks Such as wireless

networks. In recent years, many researchers

Efforts to develop a viable network coding

techniques Wireless networks [6-8]. It has

paid too muchFocus on addressing practical

issues and develop The implementation of

an encrypted network protocols [9-13]. In

general, network coding techniques

Networks can be divided into two

categories: the flow Coding and network

flow within the network coding. In the

previous, It is run coding in packages of

different flows; While in the past, the

encoding is performed on the packets

Belong to the same flow. These encodings

Network Can increase the overall

performance of the techniques Different

aspects of networks, as shown below.COPE

[9] is the first wireless network coding

process Designed to deal with the flow of

traffic between Networks. Listening with

opportunism and opportunism Coding,

COPE intends to exploit Wireless medium.

By combining what he wants one of the

neighbors With the other neighbors have a

router with COPE canSend multiple packets

to different neighbors on one transmission.

Experiments have shown that it can COPE

Significantly improve network performance

[9].Unfortunately, COPE does not take into

account Nature is reliable and unexpected

from the wireless medium. Compared to

wired connections, wireless connections

have a much poorerDETAILS due to fading

channel interference. COPE Confessions

uses hip-hop-b (confirm access) and

retransmission messages To make sure that

the entire next hop node can receive

Encrypted packets. However, when the rate

of loss is high, Relay these packets and

letters confirm access to lose much Of the

bandwidth, especially when the network is

very scale Great. In addition, the high loss

rate can cause damage Impact on

opportunistic coding process, as will be

explained In the community. resulting in a

decrease in COPE performance. A) Yes

COPE leaves open the problem: how to deal

with a The loss of the environment

effectively? Network within the encoding

stream [14] is the network encoding Plan to

deal with the flow of traffic in the interior,

which can be effectively Address the issue

of reliability. In this scheme, after the

coding, each A packet containing some

information about all originals was received

Packages are not limited to the package

either the issuer orAddressee. Therefore, the

issuer does not need to knowThe loss of any

specific packet during the transmission

process. East You only need to get the ACK

from the destination node when Have

enough information to decode and retrieve

(3)

P a g e | 987

network within the stream can This results

in increased productivity using advanced

control error Coding technology to address

the issue of reliability, which is different

Network coding between the flow. Others

[15] exploit Network coding within the flow

and direction of opportunism, Another

method that achieves a high productivity in

the face Loss of wireless connections. It

seems that the idea of the network within the

flow can be codified We are accustomed to

address the problem discussed at COPE

Before, which leads to the proposal of our

plan. Prior to transmission, Kobe's first use

to code things will flow knot Packages in

batches, followed by the encoding of the

network within the stream For the formation

of a new set of packets for the end of the

transmission. East On the issue of the

reliability of COPE can be effective

Addressed. He referred to the scheme that

resulted in C & M, for A new network

coding system that takes advantage of both

COPE and the network within the coding

technique such as flow More. As a result, it

can dramatically increase Performance of

wireless networks. As Kobe, C & M sits

Between MAC and IP layer, which keeps

the architecture clearAbstraction and can be

implemented easily. to the As we know, on

paper they only refer to the idea of We

present here are [16], which is a

combination of intraregional The flow and

scanning network between coding systems

flow throughSimulation. However, there are

significant differences. Chuan and others.

[16] intends to show the trait The mixed use

of a network to improve network coding can

lead to Performance by using information

only listen, Although our paper actively

designs the transmitter system To take full

advantage of network side-by-side benefits

Coding approach. Chuan and others. [16]

lies schemeRelying primarily on simulation,

while the evolution of our role The

analytical results to describe the

performance of ourscheme

EXISTING SYSTEM:

 Most of the previous works on

opportunistic routing with

intrasession network coding either

assume that the links are independent

and design the protocol based on

that, or use the forwarding rule that

says the total number of received

linearly independent packets should

equal the number of linearly

independent packets received by

next-hop nodes.

 In a general network, the links will

have different correlations, and these

correlations change over time. This

(4)

measurements about the correlation,

as to decide whether to use network

coding or not. Therefore, it is crucial

to design a strategy that guarantees a

good performance in all cases and

can adapt to the changes in the link

qualities and the correlation among

the links.

DISADVANTAGES OF EXISTING SYSTEM:

 The main challenge that faces the

deployment of opportunistic routing

is dealing with the case of when two

relay nodes overhear the same

packet.

 The works that design the rate

control according to the rule that

says the total number of received

linearly independent packets should

be the same as the ones received by

next-hop nodes result in throughput

reduction.

 In a general network, the links will

have different correlations, and these

correlations change over time, as is

noted in. This makes it difficult to

perform measurements about the

correlation, as to decide whether to

use network coding or not.

PROPOSED SYSTEM:

 In this paper, we formulate the

problem of utility maximization for

multiple unicast sessions that use

network coding based opportunistic

routing on an arbitrary wireless

multi-hop network, and use the

duality approach to come up with the

optimal distributed solution.

 We identify the challenges of

implementing the optimal distributed

algorithm to come up with a more

practical algorithm. The practical

algorithm works in a batch-by-batch

manner and performs network

coding on the feedback messages to

exploit the broadcast nature of

wireless links in the reverse

direction. This reduces the number of

feedback messages and eliminates

the need for immediate feedback

information.

 The algorithm is universal, as it takes

into account the loss rates and the

correlations among the links without

the need to explicitly measure them.

We prove that the batch-by-batch

algorithm converges to the optimal

solution.

 We present simulation results for our

algorithm under different wireless

settings, and show its superiority

regardless of the channel’s

characteristics.

(5)

P a g e | 989

 Since we are using intra-session

network coding, one important factor

to decide is the rate of linearly

independent packets that a node has

to successfully deliver to next-hop

nodes.

 Our algorithm adapts to changes in

the channel loss rates and the

correlations among the links.

CONCLUSION:

Excode Proposed In this document,

encoding an extensive network of casual

discovery Scheme. The discovery area of n

coding jumps can be effectively extended,

and it can explode More coding

opportunities. Through the comparison and

analysis between Excode and COPE,

Excode can already be discovered more

possibilities of coding of the COPE, and can

be applied in any type of Wireless routing

protocols to enhance awareness-coding

function. The future of our business is about

to Excode practice on a real network to test

their performance, such as wireless sensor

networks Built by sunspot sensors.

REFERENCES

[1] R. Ahlswede, N. Cai, S.-Y. R. Li, and R.

W. Yeung, “Network information flow,”

IEEE Trans. Inf. Theory , vol. 46, no. 4, pp.

1204–1216,Jul. 2000.

[2] Sachin Katti, Hariharan Rahul, Wenjun

Hu_Dina Katabi,Muriel M′edard,Jon

Crowcroft. XORs in The Air :Practical

Wireless Network Coding. SIGCOMM,

2006

[3] B. Ni, N. Santhapuri, Z. Zhong, and S.

Nelakuditi, “Routing with Opportunistically

Coded Exchanges in Wireless Mesh

Networks,” Proc. Poster Session Conf.

Sensor, Mesh, and Ad Hoc Comm. And

Networks (SECON), 2006.

[4] S. Sengupta, S. Rayanchu, and S.

Banerjee, “An Analysis of Wireless

Network Coding for Unicast Sessions: The

Case for Coding-Aware Routing,”Proc.

IEEE INFOCOM, pp. 1028-1036, 2007.

[5] Y. Yan, B. Zhang, H. T. Mouftah, and J.

Ma, “Practical coding-aware mechanism for

opportunistic routing in wireless mesh

networks ,” in Proc. IEEE ICC, 2008, pp.

2871–2876.

[6] B. Guo, H. Li, C. Zhou, and Y. Cheng,

“General network coding con-ditions in multihop wireless networks,” in Proc. IEEE

ICC, 2010, pp. 1–5.

[7] B. Guo, H. Li, C. Zhou, Y. Cheng.

“Analysis of General Network Coding

Conditions and Design of a

Free-Ride-Oriented Routing Metric,” IEEE

Transactions on Vehicular Technology, May

(6)

[8] Jilin Le, John C.S. Lui, Dah Ming Chiu.

DCAR: Distributed Coding-Aware Routing

in Wireless Networks. IEEE Transantion on

Mobile Computing, vol. 9, no. 4, pp.

463-469, Apr. 2008.

[9] S. Sengupta, S. Rayanchu, and S.

Banerjee, “Network Coding-Aware Routing in Wireless Networks”, IEEE/ACM

Transactions on Networking, 2010, 1158 -

1170

[10] Chao Dong,Guihai Chen,Weibo Yu.

How to discover the coding opportunity for

practical wireless network coding? WCSP

2009.

[11] P. Chaporkar, A. Proutiere. Adaptive

Network Coding and Scheduling for

Maximizing Throughput in Wireless

Networks. Proceedings of ACM

MOBICOM 2007.

[12] J. Le, JCS Lui, DM Chiu. How Many

Packets CanWe Encode? - An Analysis of

Practical Wireless Network Coding.

Proceedings of IEEE INFOCOM 2008, Apr.

2008.

[13] Hui Guo, Yi Qian, Kejie Lu,

Moayeri.N, “Backbone Routing over

Multihop Wireless Networks: Increased

Network Coding Opportunity” in Proc.

IEEE International Conference on

Communications, pp:1-5, May 2010.

[14] Rui Zhang ; Quan Qian ; “Probabilistic

Network Coding with Priority over Wireless

Networks,” 2011 Third International

Conference on Measuring Technology and

Mechatronics Automation (ICMTMA) , pp:

918-921, February 2011.

[15] Y. Zhao, Z. Dong, Masayuki Iwai. A

Real-Time and High Coding Opportunity

Discovery Scheme In Multi-hop Wireless

Network. ICICS, Dec. 2011 Singapore

AUTHORS

G.MOUNIKA PGSCHOLAR,

DEPARTMENT OF CSE, VAAGDEVI

COLLEGE OF ENGINEERING, BOLLIKUNTA,

WARANGAL.

B.SRAVAN KUMAR

ASSISTANT PROFESSOR

DEPARTMENT OF CSE, VAAGDEVI

COLLEGE OF ENGINEERING,

References

Related documents

The small premature infant who has undergone a sur gical procedure and would have to be fed by gavage is much more easily and safely fed through a gastrostomy tube (Fig. 2)..

19% serve a county. Fourteen per cent of the centers provide service for adjoining states in addition to the states in which they are located; usually these adjoining states have

Criteria classified as “ need to have ” were sharpness of glandular tissue, absence of artefacts with a degree of consensus of 80%; spread of breast tissue to differentiate adipose

The present study indicated that laboratory personnel who engaged in a designed environment with natural elements and based on environmental psychology principles are

It was decided that with the presence of such significant red flag signs that she should undergo advanced imaging, in this case an MRI, that revealed an underlying malignancy, which

The farmers in the state are using natural manure in place of chemical fertilizer, pesticide or insecticides over the past 12 year around 75000 hectares of land has been converted

In response to the identified need, this study investigated the SME ERP business case development practice and the ERP cost elements considerations for

An energy transition or radical innovation in a facility area occurs when the consumption and/or the production of renewable energy rises strongly as a result of the local re-