2008
DOI: 10.1109/tit.2008.2006454
|View full text |Cite
|
Sign up to set email alerts
|

On the Delay and Throughput Gains of Coding in Unreliable Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
147
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 139 publications
(149 citation statements)
references
References 14 publications
2
147
0
Order By: Relevance
“…Hence, RLNC is able to offer the smallest block completion time among all NC techniques. It has also been shown in [6,36,37] that the block completion time of RLNC scales as O(ln(N)) when K is a constant. Consequently, the throughput of RLNC vanishes with increasing number of receivers N. To prevent zero throughput, it has been proved in [38] that K should scale faster than ln(N).…”
Section: Property 1 Removing Any Vertex From the S-idnc Graph Does Nmentioning
confidence: 96%
See 1 more Smart Citation
“…Hence, RLNC is able to offer the smallest block completion time among all NC techniques. It has also been shown in [6,36,37] that the block completion time of RLNC scales as O(ln(N)) when K is a constant. Consequently, the throughput of RLNC vanishes with increasing number of receivers N. To prevent zero throughput, it has been proved in [38] that K should scale faster than ln(N).…”
Section: Property 1 Removing Any Vertex From the S-idnc Graph Does Nmentioning
confidence: 96%
“…The advent of network coding (NC) [2] starts a new era for high-throughput network coded wireless communications [3][4][5][6][7][8][9][10][11][12][13][14][15][16][17]. By linearly adding all data packets *Correspondence: ming.yu@anu.edu.au Research School of Engineering, Australian National University, Canberra, Australia together with randomly chosen coefficients from a sufficiently large finite field, random linear network coding (RLNC) can almost surely achieve the minimum block completion time [9][10][11]18], which is defined as the number of transmissions it takes to complete the broadcast.…”
Section: Introductionmentioning
confidence: 99%
“…[17], [19], [22]) and cross-layer designs that exploit coding [18]. In our case, it is the interference that creates the code, similarly to [21].…”
Section: Related Workmentioning
confidence: 99%
“…These results show that the completion time grows with the number of files which is consistent with the fact that files need to be retransmitted when erasures occur and delay other file transfers. The green dotted line is based on a heuristic where erasures are known a-priori allowing to compensate for them [2].…”
Section: A Downloadsmentioning
confidence: 99%