Show simple item record

dc.contributor.authorbin Abbas, Waqas
dc.contributor.authorCasari, Paolo 
dc.contributor.authorZorzi, Michele
dc.date.accessioned2021-07-13T09:29:22Z
dc.date.available2021-07-13T09:29:22Z
dc.date.issued2017-07
dc.identifier.issn1536-1276
dc.identifier.urihttp://hdl.handle.net/20.500.12761/372
dc.description.abstractWe consider a multihop network where a source node must reliably deliver a set of data packets to a given destination node. To do so, the source applies a fountain code and floods the encoded packets through the network, until they reach their destination or are lost in the process. We model the probability that the destination can recover the original transmissions from the received coded packets as a function of the network topology and of the code redundancy, and show that our analytical results predict the outcome of simulations very well. These results are employed to design distributed forwarding policies that achieve a good tradeoff between the success probability and the total number of transmissions required to advance a packet towards the destination. We finally develop in detail the case where intermediate relays can inject additional redundancy in the network, provided that they have successfully decoded the source packets.
dc.language.isoeng
dc.publisherIEEE
dc.titleControlled Flooding of Fountain Codesen
dc.typejournal article
dc.journal.titleIEEE Transactions on Wireless Communications
dc.type.hasVersionAM
dc.rights.accessRightsopen access
dc.volume.number16
dc.issue.number7
dc.identifier.doiDOI: 10.1109/TWC.2017.2701822
dc.page.final4710
dc.page.initial4698
dc.subject.keywordFountain codes
dc.subject.keywordflooding
dc.subject.keywordrestricted flooding
dc.subject.keywordheuristic policies
dc.subject.keywordanalysis
dc.subject.keywordsimulation
dc.description.statuspub
dc.eprint.idhttp://eprints.networks.imdea.org/id/eprint/1585


Files in this item

This item appears in the following Collection(s)

Show simple item record