|
马上注册,结交更多好友,享用更多功能,让你轻松玩转社区。
您需要 登录 才可以下载或查看,没有账号?注册
x
2008新书《Network Coding: An Introduction》【原书作者】:Tracey Ho(California Institute of Technology), Desmond S. Lun (Broad Institute of MIT and Harvard)
【ISBN 】: ISBN-10: 052187310X / ISBN-13: 978-0521873109
【页数 】:184
【开本 】 :
【出版社】 :Cambridge University Press
【出版日期】:April 14, 2008
【文件格式】:PDF
【摘要或目录】:
Book Description
Network coding promises to significantly impact the way communications networks are designed, operated, and understood. The first book to present a unified and intuitive overview of the theory, applications, challenges, and future directions of this emerging field, this is a must-have resource for those working in wireline or wireless networking. *Uses an engineering approach - explains the ideas and practical techniques *Covers mathematical underpinnings, practical algorithms, code selection, security, and network management *Discusses key topics of inter-session (non-multicast) network coding, lossy networks, lossless networks, and subgraph-selection algorithms Starting with basic concepts, models, and theory, then covering a core subset of results with full proofs, Ho and Lun provide an authoritative introduction to network coding that supplies both the background to support research and the practical considerations for designing coded networks. This is an essential resource for graduate students and researchers in electronic and computer engineering and for practitioners in the communications industry.
Unified overview of the theory, applications, challenges and future directions of network coding. Starts with basic concepts, models and theory then covers a core subset of results with full proofs. Uses an engineering approach. For graduate students and researchers in electronic and computer engineering, and practitioners in the communications industry.
目录
Contents
Preface page ix
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 What is network coding? 1
1.2 What is network coding good for? 2
1.2.1 Throughput 2
1.2.2 Robustness 5
1.2.3 Complexity 7
1.2.4 Security 8
1.3 Network model 8
1.4 Outline of book 11
1.5 Notes and further reading 12
2 Lossless Multicast Network Coding . . . . . . . . . . . . . . . . . . . . 13
2.0 Notational conventions 13
2.1 Basic network model and multicast network coding problem formulation 13
2.2 Delay-free scalar linear network coding 14
2.3 Solvability and throughput 17
2.3.1 The unicast case 17
2.3.2 The multicast case 18
2.3.3 Multicasting from multiple source nodes 19
2.3.4 Maximum throughput advantage 19
2.4 Multicast network code construction 21
2.4.1 Centralized polynomial-time construction 21
2.4.2 Random linear network coding 23
2.5 Packet networks 27
2.5.1 Distributed random linear coding for packet networks 28
2.6 Networks with cycles and convolutional network coding 30
2.6.1 Algebraic representation of convolutional network coding 31
2.7 Correlated source processes 34
2.7.1 Joint source-network coding 35
2.7.2 Separation of source coding and network coding 37
2.8 Notes and further reading 37
2.A Appendix: Random network coding 39
3 Inter-Session Network Coding . . . . . . . . . . . . . . . . . . . . . . . . 49
3.1 Scalar and vector linear network coding 50
3.2 Fractional coding problem formulation 51
3.3 Insufficiency of linear network coding 52
3.4 Information theoretic approaches 54
3.4.1 Multiple unicast networks 58
3.5 Constructive approaches 58
3.5.1 Pairwise XOR coding in wireline networks 59
3.5.2 XOR coding in wireless networks 60
3.6 Notes and further reading 63
4 Network Coding in Lossy Networks . . . . . . . . . . . . . . . . . . . . 65
4.1 Random linear network coding 67
4.2 Coding theorems 68
4.2.1 Unicast connections 68
4.2.2 Multicast connections 82
4.3 Error exponents for Poisson traffic with i.i.d. losses 83
4.4 Notes and further reading 85
5 Subgraph Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.1 Flow-based approaches 87
5.1.1 Intra-session coding 87
5.1.2 Computation-constrained coding 110
5.1.3 Inter-session coding 111
5.2 Queue-length-based approaches 114
5.2.1 Intra-session network coding for multiple multicast sessions 115
5.2.2 Inter-session coding 128
5.3 Notes and further reading 129
6 Security Against Adversarial Errors . . . . . . . . . . . . . . . . . . . . 130
6.0 Notational conventions 130
6.1 Error correction 131
6.1.1 Error correction bounds for centralized network coding 131
6.1.2 Distributed random network coding and polynomial-complexity error correction 142
6.2 Detection of adversarial errors 147
6.2.1 Model and problem formulation 148
6.2.2 Detection probability 150
6.3 Notes and further reading 151
6.A Appendix: Proof of results for adversarial error detection 152
Bibliography 157
Index 169 |
|