SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Novel Performance Analysis of 

Network Coded Communications in 

Single-Relay Networks
Evgeny Tsimbalo, Andrea Tassi, Robert Piechocki

Communications Systems & Networks
University of Bristol, UK
IEEE GLOBECOM 2016, Washington DC
5th December 2016
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
Outline
1. Introduction
2. Proposed theoretical framework
3. Numerical results
4. Conclusions
2
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
1. Introduction
3
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
Random Linear Network Coding (RLNC)
• Simple and efficient technique to improve communication reliability.
• Encoding: K source packets -> N coded packets, N > K.
• Each coded packet is a linear combination of source packets.
• Random coefficients can be binary or not.
• Aim: packet loss mitigation.
4
2. The probability of successful decoding for a two-destination mul-
work defined by parameters N, K and p is given by
PM (N, K, p) =
X
M
B⇤
(M, N, p)P⇤
(M, K), (7)
B⇤
(M, N, p) =
✓
N
M12
◆✓
N M12
M1 M12
◆✓
N M1
M2 M12
◆
·(1 p1)M1
pN M1
1
·(1 p2)M2
pN M2
2 (8)
mmation is performed over the following values:
M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (9)
y = C · x
r = ˜C · x
1
c0
c1
cN-1
...
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
RLNC: point-to-point link
• Matrix should be invertible, i.e., full rank.
• What is the probability of successful decoding, given N, K and p?
5
c0
c1
cN-1
...
S D
p
latter are stacked together
ding matrix CR at the relay
atrix CD at the destination
the same packets from S,
ows. Let MRD denote the
t this point, the destination
to make its coding matrix
ecode the original message
d if the relay coding matrix
the original K packets and
erated random coefficients
d transmits them to D. In
case the active relay mode.
e source packets, it simply
he destination node, which
mode. In either mode, we
ng vectors reached D from
+ M0
D ⇥ K coding matrix
is different from the one
in the latter the relay node
ckets from the source node.
hould improve the decoding
fails to decode. In addition,
sis can be straightforwardly
ple sources, in which each
P(m, k) =
k 1Y
i=0
(1 qi m
). (5)
Furthermore, following the same train of thought used to
obtain (2) in the binary case, the probability (4) can be
generalized to the non-binary case as follows:
Pr(m, k) = q mk
G(m, k, r) (6)
=
1
q(m r)(k r)
r 1Y
i=0
(1 qi m
)(1 qi k
)
1 qi r
.
Consider now the application of RLNC to a point-to-
point link, with a source node encoding K source packets
and transmitting N coded packets to the destination. The
probability of successful decoding for such link characterized
by the PEP p can be given by [11]
Pptp(N, K, p) =
NX
M=K
B(M, N, p)P(M, K), (7)
where B(M, N, p) is the probability mass function (PMF) of
the binomial distribution:
B(M, N, p) =
✓
N
M
◆
(1 p)M
pN M
. (8)
In addition to the binomial distribution, we will also need
its generalized version - the multinomial distribution [14].
The PMF of such distribution describes the probability of
P(M, K) =
K 1Y
i=0
(1 qi M
).
Pr(M, K) = q MK
G(M, K, r)
=
1
q(M r)(K r)
r 1Y
i=0
(1 qi M
)(1 qi K
)
1 qi r
.
Pptp(N, K, p) =
NX
B(M, N, p)P(M, K),
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
B⇤
(M, N, p) =
N
M12
N M12
M1 M12
N M1
M2 M12
·(1 p1)M1
pN M1
1
·(1 p2)M2
pN M2
2 (8)
and the summation is performed over the following values:
{ M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (9)
y = C · x
r = ˜C · x
1
Small letters in some equations were replaced with capitals, to make them
consistent and more understandable on the slides.
P(M, K) =
K 1Y
i=0
(1 qi M
). (1)
Pr(M, K) = q MK
G(M, K, r) (2)
=
1
q(M r)(K r)
r 1Y
i=0
(1 qi M
)(1 qi K
)
1 qi r
.
Pptp(N, K, p) =
NX
M=K
B(M, N, p)P(M, K) (3)
B(M, N, p) =
✓
N
M
◆
(1 p)M
pN M
. (4)
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
all letters in some equations were replaced with capitals, to make them consistent and more understandable o
Pr[˜C is f.r.] =
X
M
Pr[M pkts rxd] Pr[˜C is f.r. | M pkts rxd]
P(M, K) =
K 1Y
i=0
(1 qi M
).
Pr(M, K) = q MK
G(M, K, r)
=
1
q(M r)(K r)
r 1Y
i=0
(1 qi M
)(1 qi K
)
1 qi r
.
NX
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
2. From link to networks:

proposed framework
6
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
Preliminaries: multicast network
7
......
......
M12
M1
M2
D1
S
D2
p1 p2
P(M, K) =
K 1Y
i=0
(1 qi M
).
Pr(M, K) = q MK
G(M, K, r)
=
1
q(M r)(K r)
r 1Y
i=0
(1 qi M
)(1 qi K
)
1 qi r
.
Pptp(N, K, p) =
NX
M=K
B(M, N, p)P(M, K),
B(M, N, p) =
✓
N
M
◆
(1 p)M
pN M
.
X1 X2
GF(q) M1 ⇥ k M2 ⇥ K M1, M2 k M12
P⇤
(M, K) =
X
i
Pi(M12, k)P(M1 M12, K i)
· P(M2 M12, k i),
M = (M1, M2, M12)
i max(0, K M1 + M12, K M2 + M12) min(M12, K)
N, K p
PM (N, K, p) =
X
M
B⇤
(M, N, p)P⇤
(M, K),
B⇤
(M, N, p) =
✓
N
◆✓
N M12
◆✓
N M1
◆
Small letters in some equations were replaced with capitals, to make them
consistent and more understandable on the slides.
P(M, K) =
K 1Y
i=0
(1 qi M
). (1)
Pr(M, K) = q MK
G(M, K, r) (2)
=
1
q(M r)(K r)
r 1Y
i=0
(1 qi M
)(1 qi K
)
1 qi r
.
Pptp(N, K, p) =
NX
M=K
B(M, N, p)P(M, K) (3)
B(M, N, p) =
✓
N
M
◆
(1 p)M
pN M
. (4)
Theorem 1. The probability of two random matrices X1 and X2 generated over
GF(q) with dimensions M1 ⇥ k and M2 ⇥ K, M1, M2 k, and M12 common
rows being simultaneously full rank is given by
P⇤
(M, K) =
X
i
Pi(M12, K)P(M1 M12, K i)P(M2 M12, K i) (5)
where M = (M1, M2, M12) and the summation is performed over the values of
i from max(0, K M1 + M12, K M2 + M12) to min(M12, K).
Theorem 2. The probability of successful decoding for a two-destination mul-
ticast network defined by parameters N, K and p is given by
PM (N, K, p) =
X
M
B⇤
(M, N, p)P⇤
(M, K), (6)
where
✓ ◆✓ ◆✓ ◆
Pr(M, K) = q G(M, K, r) (2)
=
1
q(M r)(K r)
r 1Y
i=0
(1 qi M
)(1 qi K
)
1 qi r
.
Pptp(N, K, p) =
NX
M=K
B(M, N, p)P(M, K) (3)
B(M, N, p) =
✓
N
M
◆
(1 p)M
pN M
. (4)
Theorem 1. The probability of two random matrices X1 and X2 generated over
GF(q) with dimensions M1 ⇥ k and M2 ⇥ K, M1, M2 k, and M12 common
rows being simultaneously full rank is given by
P⇤
(M, K) =
X
i
Pi(M12, K)P(M1 M12, K i)P(M2 M12, K i) (5)
where M = (M1, M2, M12) and the summation is performed over the values of
i from max(0, K M1 + M12, K M2 + M12) to min(M12, K).
Theorem 2. The probability of successful decoding for a two-destination mul-
ticast network defined by parameters N, K and p is given by
PM (N, K, p) =
X
M
B⇤
(M, N, p)P⇤
(M, K), (6)
where
B⇤
(M, N, p) =
✓
N
M12
◆✓
N M12
M1 M12
◆✓
N M1
M2 M12
◆
(1 p1)M1
pN M1
1 (1 p2)M2
pN M2
2
and the summation is performed over the following values:
{ M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (7)
y = C · x
What is the
probability of
successful
decoding?
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
⌦
NS, K, pSD) =
NX
M=K
B(M, NS, pSD)P(M, K) (8)
, p)
NRX
M0
D=1
B(M0
D, NR, pRD) [P⇤
(M0
, K) P⇤
(M, K)]
M0
R, pRD)[P(MD + M0
D, K) P(MD, K) P⇤
(M00
, K) + P⇤
(M, K)]
PR = PR,1 + PR,2 + PR,3 (9)
Pr[˜C1, ˜C2 are f.r. | M] :
Pr[M] :
1
1 2 1 2
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
⌦
SD) =
NX
M=K
B(M, NS, pSD)P(M, K) (8)
X
=1
B(M0
D, NR, pRD) [P⇤
(M0
, K) P⇤
(M, K)]
RD)[P(MD + M0
D, K) P(MD, K) P⇤
(M00
, K) + P⇤
(M, K)]
PR,1 + PR,2 + PR,3 (9)
˜C1, ˜C2 are f.r. | M] :
Pr[M] :
1
PR,1 = Pptp(NS, K, pSD) =
NX
M=K
B(M, NS, pSD)P(M, K)
PR,2 =
X
M
B⇤
(M, NS, p)
NRX
M0
D=1
B(M0
D, NR, pRD) [P⇤
(M0
, K) P⇤
(M, K)]
M, NS, p)
M0
RX
M0
D=1
B(M0
D, M0
R, pRD)[P(MD + M0
D, K) P(MD, K) P⇤
(M00
, K) + P⇤
(M, K)]
PR = PR,1 + PR,2 + PR,3
Pr[˜C1, ˜C2 are f.r. | M] :
Pr[M] :
1
PR,1 = Pptp(NS, K, pSD) =
NX
M=K
B(M, NS, pSD)P(M, K
PR,2 =
X
M
B⇤
(M, NS, p)
NRX
M0
D=1
B(M0
D, NR, pRD) [P⇤
(M0
, K) P
PR,3 =
X
M
B⇤
(M, NS, p)
M0
RX
M0
D=1
B(M0
D, M0
R, pRD)[P(MD + M0
D, K) P(MD, K)
PR = PR,1 + PR,2 + PR,3
Pr[˜C1, ˜C2 are f.r. | M] :
Pr[M] :
1
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
Relay network
• Stage 1: S transmits, R & D receive.
• If D can decode, success!
• If not:
• Stage 2: R attempts decoding and transmits to D.
• If R can decode, it re-encodes prior to
transmission;
• If R can’t decode, it just relays packets to D.
• Previous work [1]: active relay only.
8
pSD
S
R
D
pSR pRD
active relay
passive relay
What is the probability of
successful decoding at D?
[1] A. S. Khan and I. Chatzigeorgiou, “Performance Analysis of Random Linear Network Coding in Two-Source
Single-Relay Networks,” in Proc. of IEEE ICC 2015, (London, United Kingdom, UK), pp. 991–996, June 2015.
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
Relay network
9
D decodes
directly from S
Active relay
Passive relay
pSD
S
R
D
pSR pRD
:
M
B⇤
(M, N, p) =
✓
N
M12
◆✓
N M12
M1 M12
◆✓
N M1
M2 M12
◆
(1 p1)M1
pN M1
1 (1 p2)M2
pN M2
2
ation is performed over the following values:
{ M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (7)
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
PR,1 = Pptp(NS, K, pSD) =
NX
M=K
B(M, NS, pSD)P(M, K) (8)
PR,2 =
X
M
B⇤
(M, NS, p)
NRX
M0
D=1
B(M0
D, NR, pRD) [P⇤
(M0
, K) P⇤
(M, K)]
3 =
X
M
B⇤
(M, NS, p)
M0
RX
M0
D=1
B(M0
D, M0
R, pRD)[P(MD + M0
D, K) P(MD, K) P⇤
(M00
, K) + P⇤
(M, K)]
PR = PR,1 + PR,2 + PR,3 (9)
:
M
M
e
B⇤
(M, N, p) =
✓
N
M12
◆✓
N M12
M1 M12
◆✓
N M1
M2 M12
◆
(1 p1)M1
pN M1
1 (1 p2)M2
pN M2
2
he summation is performed over the following values:
{ M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (7)
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
PR,1 = Pptp(NS, K, pSD) =
NX
M=K
B(M, NS, pSD)P(M, K) (8)
PR,2 =
X
M
B⇤
(M, NS, p)
NRX
M0
D=1
B(M0
D, NR, pRD) [P⇤
(M0
, K) P⇤
(M, K)]
PR,3 =
X
M
B⇤
(M, NS, p)
M0
RX
M0
D=1
B(M0
D, M0
R, pRD)[P(MD + M0
D, K) P(MD, K) P⇤
(M00
, K) + P⇤
(M, K)]
PR = PR,1 + PR,2 + PR,3 (9)
:
M
where
B⇤
(M, N, p) =
✓
N
M12
◆✓
N M12
M1 M12
◆✓
N M1
M2 M12
◆
(1 p1)M1
pN M1
1 (1 p2)M2
pN M2
2
and the summation is performed over the following values:
{ M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2).
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
PR,1 = Pptp(NS, K, pSD) =
NX
M=K
B(M, NS, pSD)P(M, K)
PR,2 =
X
M
B⇤
(M, NS, p)
NRX
M0
D=1
B(M0
D, NR, pRD) [P⇤
(M0
, K) P⇤
(M, K)]
PR,3 =
X
M
B⇤
(M, NS, p)
M0
RX
M0
D=1
B(M0
D, M0
R, pRD)[P(MD + M0
D, K) P(MD, K) P⇤
(M00
, K) + P⇤
(M, K)]
PR = PR,1 + PR,2 + PR,3
1
{ M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2).
y = C · x
r = ˜C · x
) x = ˜C 1
· r
C =
PR,1 = Pptp(NS, K, pSD) =
NX
M=K
B(M, NS, pSD)P(M, K)
PR,2 =
X
M
B⇤
(M, NS, p)
NRX
M0
D=1
B(M0
D, NR, pRD) [P⇤
(M0
, K) P⇤
(M, K)]
X
M
B⇤
(M, NS, p)
M0
RX
M0
D=1
B(M0
D, M0
R, pRD)[P(MD + M0
D, K) P(MD, K) P⇤
(M00
, K) + P⇤
(M, K
PR = PR,1 + PR,2 + PR,3
Relay can decode
D
R
R
R
M12 = max(0, M1 + M2 N),
y = C · x
r = ˜C · x
) x = ˜C 1
·
C =
⌦
PR,1 = Pptp(NS, K, pSD) =
NX
M=K
B
PR,2 =
X
M
B⇤
(M, NS, p)
NRX
M0
D=1
B(M0
D, NR,
X M0
RX
All possible
outcomes
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
3. Numerical results
10
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
Simulation vs theory, binary code
11
Number of encoded packets NS
10 12 14 16 18 20 22 24 26 28 30
DecodingprobabilityPR
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
K = 10 K = 15 K = 20
Sim.
Theory
Sim., active R only
Theory, active R only
pSD
S
R
D
pSR pRD
0.3
0.20.1
Perfect match between theory and simulation
Performance improvement over previously proposed relay network
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
Simulation vs theory, non-binary codes
12
Number of encoded packets NS
10 11 12 13 14 15 16 17 18 19 20
DecodingprobabilityPR
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
q = 2
q = 28
Sim.
Theory
Sim., active R only
Theory, active R only
pSD
S
R
D
pSR pRD
0.5
0.40.3
Proposed theory is valid for non-binary codes too
Performance improvement over previously proposed relay network
Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk
Conclusions
• RLNC for relay networks is investigated.
• Active and passive relay modes proposed.
• Exact expressions for decoding probability are
derived.
• Theory matches simulations for various scenarios.
• Performance improvement over previously
proposed relay network.
13
Evgeny Tsimbalo

e.tsimbalo@bristol.ac.uk
Thanks!
14

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (19)

Numerical analysis m2 l4slides
Numerical analysis  m2 l4slidesNumerical analysis  m2 l4slides
Numerical analysis m2 l4slides
 
A T(1)-type theorem for entangled multilinear Calderon-Zygmund operators
A T(1)-type theorem for entangled multilinear Calderon-Zygmund operatorsA T(1)-type theorem for entangled multilinear Calderon-Zygmund operators
A T(1)-type theorem for entangled multilinear Calderon-Zygmund operators
 
Kumegawa russia
Kumegawa russiaKumegawa russia
Kumegawa russia
 
Fractional programming (A tool for optimization)
Fractional programming (A tool for optimization)Fractional programming (A tool for optimization)
Fractional programming (A tool for optimization)
 
A Note on TopicRNN
A Note on TopicRNNA Note on TopicRNN
A Note on TopicRNN
 
Density theorems for Euclidean point configurations
Density theorems for Euclidean point configurationsDensity theorems for Euclidean point configurations
Density theorems for Euclidean point configurations
 
線形回帰モデル
線形回帰モデル線形回帰モデル
線形回帰モデル
 
Text s1 21
Text s1 21Text s1 21
Text s1 21
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
Digital signal processing
Digital signal processingDigital signal processing
Digital signal processing
 
A Note on Latent LSTM Allocation
A Note on Latent LSTM AllocationA Note on Latent LSTM Allocation
A Note on Latent LSTM Allocation
 
Estimates for a class of non-standard bilinear multipliers
Estimates for a class of non-standard bilinear multipliersEstimates for a class of non-standard bilinear multipliers
Estimates for a class of non-standard bilinear multipliers
 
Some Examples of Scaling Sets
Some Examples of Scaling SetsSome Examples of Scaling Sets
Some Examples of Scaling Sets
 
Muchtadi
MuchtadiMuchtadi
Muchtadi
 
Multi nomial pdf
Multi nomial pdfMulti nomial pdf
Multi nomial pdf
 
Overlap Add, Overlap Save(digital signal processing)
Overlap Add, Overlap Save(digital signal processing)Overlap Add, Overlap Save(digital signal processing)
Overlap Add, Overlap Save(digital signal processing)
 
On maximal and variational Fourier restriction
On maximal and variational Fourier restrictionOn maximal and variational Fourier restriction
On maximal and variational Fourier restriction
 
Low-rank matrix approximations in Python by Christian Thurau PyData 2014
Low-rank matrix approximations in Python by Christian Thurau PyData 2014Low-rank matrix approximations in Python by Christian Thurau PyData 2014
Low-rank matrix approximations in Python by Christian Thurau PyData 2014
 
Variants of the Christ-Kiselev lemma and an application to the maximal Fourie...
Variants of the Christ-Kiselev lemma and an application to the maximal Fourie...Variants of the Christ-Kiselev lemma and an application to the maximal Fourie...
Variants of the Christ-Kiselev lemma and an application to the maximal Fourie...
 

Ähnlich wie Novel Performance Analysis of Network Coded Communications in Single-Relay Networks

New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...
Alexander Litvinenko
 
machinelearning project
machinelearning projectmachinelearning project
machinelearning project
Lianli Liu
 

Ähnlich wie Novel Performance Analysis of Network Coded Communications in Single-Relay Networks (20)

Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
 
Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics Tucker tensor analysis of Matern functions in spatial statistics
Tucker tensor analysis of Matern functions in spatial statistics
 
New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...New data structures and algorithms for \\post-processing large data sets and ...
New data structures and algorithms for \\post-processing large data sets and ...
 
machinelearning project
machinelearning projectmachinelearning project
machinelearning project
 
Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法Linear Cryptanalysis Lecture 線形解読法
Linear Cryptanalysis Lecture 線形解読法
 
Heuristics for counterexamples to the Agrawal Conjecture
Heuristics for counterexamples to the Agrawal ConjectureHeuristics for counterexamples to the Agrawal Conjecture
Heuristics for counterexamples to the Agrawal Conjecture
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
 
E33018021
E33018021E33018021
E33018021
 
Ece414 chapter3 w12
Ece414 chapter3 w12Ece414 chapter3 w12
Ece414 chapter3 w12
 
Graph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answersGraph Analytics and Complexity Questions and answers
Graph Analytics and Complexity Questions and answers
 
smile project
smile projectsmile project
smile project
 
Ijmet 10 01_046
Ijmet 10 01_046Ijmet 10 01_046
Ijmet 10 01_046
 
Response Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty QuantificationResponse Surface in Tensor Train format for Uncertainty Quantification
Response Surface in Tensor Train format for Uncertainty Quantification
 
Metodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang LandauMetodo Monte Carlo -Wang Landau
Metodo Monte Carlo -Wang Landau
 
SPDE presentation 2012
SPDE presentation 2012SPDE presentation 2012
SPDE presentation 2012
 
A Common Fixed Point Theorem on Fuzzy Metric Space Using Weakly Compatible an...
A Common Fixed Point Theorem on Fuzzy Metric Space Using Weakly Compatible an...A Common Fixed Point Theorem on Fuzzy Metric Space Using Weakly Compatible an...
A Common Fixed Point Theorem on Fuzzy Metric Space Using Weakly Compatible an...
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
A Proof of Twin primes and Golbach's Conjecture
A Proof of Twin primes and Golbach's ConjectureA Proof of Twin primes and Golbach's Conjecture
A Proof of Twin primes and Golbach's Conjecture
 
E041046051
E041046051E041046051
E041046051
 
lecture6.ppt
lecture6.pptlecture6.ppt
lecture6.ppt
 

Mehr von Communication Systems & Networks

Mehr von Communication Systems & Networks (19)

In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
In-band Full-Duplex in Hand-held Applications: Analysis of canceller tuning r...
 
Performance Evaluation of Multicast Video Distribution with User Cooperation ...
Performance Evaluation of Multicast Video Distribution with User Cooperation ...Performance Evaluation of Multicast Video Distribution with User Cooperation ...
Performance Evaluation of Multicast Video Distribution with User Cooperation ...
 
Measurements and Characterization of Surface Scattering at 60GHz
Measurements and Characterization of Surface Scattering at 60GHzMeasurements and Characterization of Surface Scattering at 60GHz
Measurements and Characterization of Surface Scattering at 60GHz
 
Millimetre Wave Channel Measurements in a Railway Depot
Millimetre Wave Channel Measurements in a Railway DepotMillimetre Wave Channel Measurements in a Railway Depot
Millimetre Wave Channel Measurements in a Railway Depot
 
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam SteeringMmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
MmWave System for Future ITS: A MAC-layer Approach for V2X Beam Steering
 
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering TechnologyFeasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
Feasibility Study of OFDM-MFSK Modulation Scheme for Smart Metering Technology
 
LTE-A Virtual Drive Testing for Vehicular Environments
LTE-A Virtual Drive Testing for Vehicular Environments LTE-A Virtual Drive Testing for Vehicular Environments
LTE-A Virtual Drive Testing for Vehicular Environments
 
Analysis of Measured LOS Massive MIMO Channels with Mobility
Analysis of Measured LOS Massive MIMO Channels with Mobility Analysis of Measured LOS Massive MIMO Channels with Mobility
Analysis of Measured LOS Massive MIMO Channels with Mobility
 
Bristol Uni posters Brooklyn 5G Summit April 2017
Bristol Uni posters Brooklyn 5G Summit April 2017Bristol Uni posters Brooklyn 5G Summit April 2017
Bristol Uni posters Brooklyn 5G Summit April 2017
 
Wireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
Wireless Vehicular Networks in Emergencies: A Single Frequency Network ApproachWireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
Wireless Vehicular Networks in Emergencies: A Single Frequency Network Approach
 
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
Smart Attacks on the integrity of the Internet of Things Avoiding detection b...
 
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO TestbedLOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
LOS Throughput Measurements in Real-Time with a 128-Antenna Massive MIMO Testbed
 
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO TestbedServing 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
Serving 22 Users in Real-Time with a 128-Antenna Massive MIMO Testbed
 
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
A Study on MPTCP for Tolerating Packet Reordering and Path Heterogeneity in W...
 
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
Massive MIMO: Bristol - Lund Joint Field Trial Experiments and Record Breakin...
 
System Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
System Level 5G Evaluation of GFDM Waveforms in an LTE-A PlatformSystem Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
System Level 5G Evaluation of GFDM Waveforms in an LTE-A Platform
 
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentPacket Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
 
Perfomance Evaluation of FBMC for an Underwater Acoustic Channel
Perfomance Evaluation of FBMC for an Underwater Acoustic ChannelPerfomance Evaluation of FBMC for an Underwater Acoustic Channel
Perfomance Evaluation of FBMC for an Underwater Acoustic Channel
 
Performance evaluation of multicast video distribution using lte a in vehicul...
Performance evaluation of multicast video distribution using lte a in vehicul...Performance evaluation of multicast video distribution using lte a in vehicul...
Performance evaluation of multicast video distribution using lte a in vehicul...
 

Kürzlich hochgeladen

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Kürzlich hochgeladen (20)

Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 

Novel Performance Analysis of Network Coded Communications in Single-Relay Networks

  • 1. Novel Performance Analysis of 
 Network Coded Communications in 
 Single-Relay Networks Evgeny Tsimbalo, Andrea Tassi, Robert Piechocki
 Communications Systems & Networks University of Bristol, UK IEEE GLOBECOM 2016, Washington DC 5th December 2016
  • 2. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk Outline 1. Introduction 2. Proposed theoretical framework 3. Numerical results 4. Conclusions 2
  • 3. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk 1. Introduction 3
  • 4. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk Random Linear Network Coding (RLNC) • Simple and efficient technique to improve communication reliability. • Encoding: K source packets -> N coded packets, N > K. • Each coded packet is a linear combination of source packets. • Random coefficients can be binary or not. • Aim: packet loss mitigation. 4 2. The probability of successful decoding for a two-destination mul- work defined by parameters N, K and p is given by PM (N, K, p) = X M B⇤ (M, N, p)P⇤ (M, K), (7) B⇤ (M, N, p) = ✓ N M12 ◆✓ N M12 M1 M12 ◆✓ N M1 M2 M12 ◆ ·(1 p1)M1 pN M1 1 ·(1 p2)M2 pN M2 2 (8) mmation is performed over the following values: M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (9) y = C · x r = ˜C · x 1 c0 c1 cN-1 ... y = C · x r = ˜C · x ) x = ˜C 1 · r C =
  • 5. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk RLNC: point-to-point link • Matrix should be invertible, i.e., full rank. • What is the probability of successful decoding, given N, K and p? 5 c0 c1 cN-1 ... S D p latter are stacked together ding matrix CR at the relay atrix CD at the destination the same packets from S, ows. Let MRD denote the t this point, the destination to make its coding matrix ecode the original message d if the relay coding matrix the original K packets and erated random coefficients d transmits them to D. In case the active relay mode. e source packets, it simply he destination node, which mode. In either mode, we ng vectors reached D from + M0 D ⇥ K coding matrix is different from the one in the latter the relay node ckets from the source node. hould improve the decoding fails to decode. In addition, sis can be straightforwardly ple sources, in which each P(m, k) = k 1Y i=0 (1 qi m ). (5) Furthermore, following the same train of thought used to obtain (2) in the binary case, the probability (4) can be generalized to the non-binary case as follows: Pr(m, k) = q mk G(m, k, r) (6) = 1 q(m r)(k r) r 1Y i=0 (1 qi m )(1 qi k ) 1 qi r . Consider now the application of RLNC to a point-to- point link, with a source node encoding K source packets and transmitting N coded packets to the destination. The probability of successful decoding for such link characterized by the PEP p can be given by [11] Pptp(N, K, p) = NX M=K B(M, N, p)P(M, K), (7) where B(M, N, p) is the probability mass function (PMF) of the binomial distribution: B(M, N, p) = ✓ N M ◆ (1 p)M pN M . (8) In addition to the binomial distribution, we will also need its generalized version - the multinomial distribution [14]. The PMF of such distribution describes the probability of P(M, K) = K 1Y i=0 (1 qi M ). Pr(M, K) = q MK G(M, K, r) = 1 q(M r)(K r) r 1Y i=0 (1 qi M )(1 qi K ) 1 qi r . Pptp(N, K, p) = NX B(M, N, p)P(M, K), y = C · x r = ˜C · x ) x = ˜C 1 · r C = y = C · x r = ˜C · x ) x = ˜C 1 · r C = y = C · x r = ˜C · x ) x = ˜C 1 · r C = B⇤ (M, N, p) = N M12 N M12 M1 M12 N M1 M2 M12 ·(1 p1)M1 pN M1 1 ·(1 p2)M2 pN M2 2 (8) and the summation is performed over the following values: { M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (9) y = C · x r = ˜C · x 1 Small letters in some equations were replaced with capitals, to make them consistent and more understandable on the slides. P(M, K) = K 1Y i=0 (1 qi M ). (1) Pr(M, K) = q MK G(M, K, r) (2) = 1 q(M r)(K r) r 1Y i=0 (1 qi M )(1 qi K ) 1 qi r . Pptp(N, K, p) = NX M=K B(M, N, p)P(M, K) (3) B(M, N, p) = ✓ N M ◆ (1 p)M pN M . (4) y = C · x r = ˜C · x ) x = ˜C 1 · r C = all letters in some equations were replaced with capitals, to make them consistent and more understandable o Pr[˜C is f.r.] = X M Pr[M pkts rxd] Pr[˜C is f.r. | M pkts rxd] P(M, K) = K 1Y i=0 (1 qi M ). Pr(M, K) = q MK G(M, K, r) = 1 q(M r)(K r) r 1Y i=0 (1 qi M )(1 qi K ) 1 qi r . NX
  • 6. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk 2. From link to networks:
 proposed framework 6
  • 7. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk Preliminaries: multicast network 7 ...... ...... M12 M1 M2 D1 S D2 p1 p2 P(M, K) = K 1Y i=0 (1 qi M ). Pr(M, K) = q MK G(M, K, r) = 1 q(M r)(K r) r 1Y i=0 (1 qi M )(1 qi K ) 1 qi r . Pptp(N, K, p) = NX M=K B(M, N, p)P(M, K), B(M, N, p) = ✓ N M ◆ (1 p)M pN M . X1 X2 GF(q) M1 ⇥ k M2 ⇥ K M1, M2 k M12 P⇤ (M, K) = X i Pi(M12, k)P(M1 M12, K i) · P(M2 M12, k i), M = (M1, M2, M12) i max(0, K M1 + M12, K M2 + M12) min(M12, K) N, K p PM (N, K, p) = X M B⇤ (M, N, p)P⇤ (M, K), B⇤ (M, N, p) = ✓ N ◆✓ N M12 ◆✓ N M1 ◆ Small letters in some equations were replaced with capitals, to make them consistent and more understandable on the slides. P(M, K) = K 1Y i=0 (1 qi M ). (1) Pr(M, K) = q MK G(M, K, r) (2) = 1 q(M r)(K r) r 1Y i=0 (1 qi M )(1 qi K ) 1 qi r . Pptp(N, K, p) = NX M=K B(M, N, p)P(M, K) (3) B(M, N, p) = ✓ N M ◆ (1 p)M pN M . (4) Theorem 1. The probability of two random matrices X1 and X2 generated over GF(q) with dimensions M1 ⇥ k and M2 ⇥ K, M1, M2 k, and M12 common rows being simultaneously full rank is given by P⇤ (M, K) = X i Pi(M12, K)P(M1 M12, K i)P(M2 M12, K i) (5) where M = (M1, M2, M12) and the summation is performed over the values of i from max(0, K M1 + M12, K M2 + M12) to min(M12, K). Theorem 2. The probability of successful decoding for a two-destination mul- ticast network defined by parameters N, K and p is given by PM (N, K, p) = X M B⇤ (M, N, p)P⇤ (M, K), (6) where ✓ ◆✓ ◆✓ ◆ Pr(M, K) = q G(M, K, r) (2) = 1 q(M r)(K r) r 1Y i=0 (1 qi M )(1 qi K ) 1 qi r . Pptp(N, K, p) = NX M=K B(M, N, p)P(M, K) (3) B(M, N, p) = ✓ N M ◆ (1 p)M pN M . (4) Theorem 1. The probability of two random matrices X1 and X2 generated over GF(q) with dimensions M1 ⇥ k and M2 ⇥ K, M1, M2 k, and M12 common rows being simultaneously full rank is given by P⇤ (M, K) = X i Pi(M12, K)P(M1 M12, K i)P(M2 M12, K i) (5) where M = (M1, M2, M12) and the summation is performed over the values of i from max(0, K M1 + M12, K M2 + M12) to min(M12, K). Theorem 2. The probability of successful decoding for a two-destination mul- ticast network defined by parameters N, K and p is given by PM (N, K, p) = X M B⇤ (M, N, p)P⇤ (M, K), (6) where B⇤ (M, N, p) = ✓ N M12 ◆✓ N M12 M1 M12 ◆✓ N M1 M2 M12 ◆ (1 p1)M1 pN M1 1 (1 p2)M2 pN M2 2 and the summation is performed over the following values: { M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (7) y = C · x What is the probability of successful decoding? y = C · x r = ˜C · x ) x = ˜C 1 · r C = ⌦ NS, K, pSD) = NX M=K B(M, NS, pSD)P(M, K) (8) , p) NRX M0 D=1 B(M0 D, NR, pRD) [P⇤ (M0 , K) P⇤ (M, K)] M0 R, pRD)[P(MD + M0 D, K) P(MD, K) P⇤ (M00 , K) + P⇤ (M, K)] PR = PR,1 + PR,2 + PR,3 (9) Pr[˜C1, ˜C2 are f.r. | M] : Pr[M] : 1 1 2 1 2 y = C · x r = ˜C · x ) x = ˜C 1 · r C = ⌦ SD) = NX M=K B(M, NS, pSD)P(M, K) (8) X =1 B(M0 D, NR, pRD) [P⇤ (M0 , K) P⇤ (M, K)] RD)[P(MD + M0 D, K) P(MD, K) P⇤ (M00 , K) + P⇤ (M, K)] PR,1 + PR,2 + PR,3 (9) ˜C1, ˜C2 are f.r. | M] : Pr[M] : 1 PR,1 = Pptp(NS, K, pSD) = NX M=K B(M, NS, pSD)P(M, K) PR,2 = X M B⇤ (M, NS, p) NRX M0 D=1 B(M0 D, NR, pRD) [P⇤ (M0 , K) P⇤ (M, K)] M, NS, p) M0 RX M0 D=1 B(M0 D, M0 R, pRD)[P(MD + M0 D, K) P(MD, K) P⇤ (M00 , K) + P⇤ (M, K)] PR = PR,1 + PR,2 + PR,3 Pr[˜C1, ˜C2 are f.r. | M] : Pr[M] : 1 PR,1 = Pptp(NS, K, pSD) = NX M=K B(M, NS, pSD)P(M, K PR,2 = X M B⇤ (M, NS, p) NRX M0 D=1 B(M0 D, NR, pRD) [P⇤ (M0 , K) P PR,3 = X M B⇤ (M, NS, p) M0 RX M0 D=1 B(M0 D, M0 R, pRD)[P(MD + M0 D, K) P(MD, K) PR = PR,1 + PR,2 + PR,3 Pr[˜C1, ˜C2 are f.r. | M] : Pr[M] : 1
  • 8. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk Relay network • Stage 1: S transmits, R & D receive. • If D can decode, success! • If not: • Stage 2: R attempts decoding and transmits to D. • If R can decode, it re-encodes prior to transmission; • If R can’t decode, it just relays packets to D. • Previous work [1]: active relay only. 8 pSD S R D pSR pRD active relay passive relay What is the probability of successful decoding at D? [1] A. S. Khan and I. Chatzigeorgiou, “Performance Analysis of Random Linear Network Coding in Two-Source Single-Relay Networks,” in Proc. of IEEE ICC 2015, (London, United Kingdom, UK), pp. 991–996, June 2015.
  • 9. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk Relay network 9 D decodes directly from S Active relay Passive relay pSD S R D pSR pRD : M B⇤ (M, N, p) = ✓ N M12 ◆✓ N M12 M1 M12 ◆✓ N M1 M2 M12 ◆ (1 p1)M1 pN M1 1 (1 p2)M2 pN M2 2 ation is performed over the following values: { M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (7) y = C · x r = ˜C · x ) x = ˜C 1 · r C = PR,1 = Pptp(NS, K, pSD) = NX M=K B(M, NS, pSD)P(M, K) (8) PR,2 = X M B⇤ (M, NS, p) NRX M0 D=1 B(M0 D, NR, pRD) [P⇤ (M0 , K) P⇤ (M, K)] 3 = X M B⇤ (M, NS, p) M0 RX M0 D=1 B(M0 D, M0 R, pRD)[P(MD + M0 D, K) P(MD, K) P⇤ (M00 , K) + P⇤ (M, K)] PR = PR,1 + PR,2 + PR,3 (9) : M M e B⇤ (M, N, p) = ✓ N M12 ◆✓ N M12 M1 M12 ◆✓ N M1 M2 M12 ◆ (1 p1)M1 pN M1 1 (1 p2)M2 pN M2 2 he summation is performed over the following values: { M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). (7) y = C · x r = ˜C · x ) x = ˜C 1 · r C = PR,1 = Pptp(NS, K, pSD) = NX M=K B(M, NS, pSD)P(M, K) (8) PR,2 = X M B⇤ (M, NS, p) NRX M0 D=1 B(M0 D, NR, pRD) [P⇤ (M0 , K) P⇤ (M, K)] PR,3 = X M B⇤ (M, NS, p) M0 RX M0 D=1 B(M0 D, M0 R, pRD)[P(MD + M0 D, K) P(MD, K) P⇤ (M00 , K) + P⇤ (M, K)] PR = PR,1 + PR,2 + PR,3 (9) : M where B⇤ (M, N, p) = ✓ N M12 ◆✓ N M12 M1 M12 ◆✓ N M1 M2 M12 ◆ (1 p1)M1 pN M1 1 (1 p2)M2 pN M2 2 and the summation is performed over the following values: { M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). y = C · x r = ˜C · x ) x = ˜C 1 · r C = PR,1 = Pptp(NS, K, pSD) = NX M=K B(M, NS, pSD)P(M, K) PR,2 = X M B⇤ (M, NS, p) NRX M0 D=1 B(M0 D, NR, pRD) [P⇤ (M0 , K) P⇤ (M, K)] PR,3 = X M B⇤ (M, NS, p) M0 RX M0 D=1 B(M0 D, M0 R, pRD)[P(MD + M0 D, K) P(MD, K) P⇤ (M00 , K) + P⇤ (M, K)] PR = PR,1 + PR,2 + PR,3 1 { M 1 , M2 = K, . . . , N; M12 = max(0, M1 + M2 N), . . . , min(M1, M2). y = C · x r = ˜C · x ) x = ˜C 1 · r C = PR,1 = Pptp(NS, K, pSD) = NX M=K B(M, NS, pSD)P(M, K) PR,2 = X M B⇤ (M, NS, p) NRX M0 D=1 B(M0 D, NR, pRD) [P⇤ (M0 , K) P⇤ (M, K)] X M B⇤ (M, NS, p) M0 RX M0 D=1 B(M0 D, M0 R, pRD)[P(MD + M0 D, K) P(MD, K) P⇤ (M00 , K) + P⇤ (M, K PR = PR,1 + PR,2 + PR,3 Relay can decode D R R R M12 = max(0, M1 + M2 N), y = C · x r = ˜C · x ) x = ˜C 1 · C = ⌦ PR,1 = Pptp(NS, K, pSD) = NX M=K B PR,2 = X M B⇤ (M, NS, p) NRX M0 D=1 B(M0 D, NR, X M0 RX All possible outcomes
  • 10. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk 3. Numerical results 10
  • 11. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk Simulation vs theory, binary code 11 Number of encoded packets NS 10 12 14 16 18 20 22 24 26 28 30 DecodingprobabilityPR 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 K = 10 K = 15 K = 20 Sim. Theory Sim., active R only Theory, active R only pSD S R D pSR pRD 0.3 0.20.1 Perfect match between theory and simulation Performance improvement over previously proposed relay network
  • 12. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk Simulation vs theory, non-binary codes 12 Number of encoded packets NS 10 11 12 13 14 15 16 17 18 19 20 DecodingprobabilityPR 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 q = 2 q = 28 Sim. Theory Sim., active R only Theory, active R only pSD S R D pSR pRD 0.5 0.40.3 Proposed theory is valid for non-binary codes too Performance improvement over previously proposed relay network
  • 13. Evgeny Tsimbalo - e.tsimbalo@bristol.ac.uk Conclusions • RLNC for relay networks is investigated. • Active and passive relay modes proposed. • Exact expressions for decoding probability are derived. • Theory matches simulations for various scenarios. • Performance improvement over previously proposed relay network. 13