Network coding: an instant primer

Network coding is a new research area that may have interesting applications in practical networking systems. With network coding, intermediate nodes may send out packets that are linear combinations of previously received information. There are two main benefits of this approach: potential throughput improvements and a high degree of robustness. Robustness translates into loss resilience and facilitates the design of simple distributed algorithms that perform well, even if decisions are based only on partial information. This paper is an instant primer on network coding: we explain what network coding does and how it does it. We also discuss the implications of theoretical results on network coding for realistic settings and show how network coding can be used in practice

[1]  Chae Hoon Lim,et al.  More Flexible Exponentiation with Precomputation , 1994, CRYPTO.

[2]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[3]  Shuo-Yen Robert Li,et al.  Linear network coding , 2003, IEEE Trans. Inf. Theory.

[4]  Christina Fragouli,et al.  On average throughput and alphabet size in network coding , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[5]  Yonggang Wen,et al.  Network monitoring in multicast networks using network coding , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[6]  Mischa Schwartz,et al.  ACM SIGCOMM computer communication review , 2001, CCRV.

[7]  Peter Sanders,et al.  Polynomial time algorithms for network information flow , 2003, SPAA '03.

[8]  Philip A. Chou,et al.  A comparison of network coding and tree packing , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[9]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[10]  Neal R. Wagner,et al.  The Laws of Cryptography with Java Code , 2003 .

[11]  Jan M. Rabaey,et al.  Overcoming untuned radios in wireless networks with network coding , 2006, IEEE Transactions on Information Theory.

[12]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[13]  Vinod M. Prabhakaran,et al.  Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[14]  Christos Gkantsidis,et al.  Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[15]  Baochun Li,et al.  How Practical is Network Coding? , 2006, 200614th IEEE International Workshop on Quality of Service.

[16]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[17]  Sachin Katti,et al.  The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments , 2005 .

[18]  Muriel Médard,et al.  Algebraic gossip: a network coding approach to optimal multiple rumor mongering , 2006, IEEE Transactions on Information Theory.

[19]  Jörg Widmer,et al.  A Network Coding Approach to Energy Efficient Broadcasting: From Theory to Practice , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[20]  Zongpeng Li,et al.  Network Coding in Undirected Networks , 2004 .

[21]  Christina Fragouli,et al.  Decentralized network coding , 2004, Information Theory Workshop.

[22]  K. Jain,et al.  Practical Network Coding , 2003 .

[23]  Yunnan Wu,et al.  Information Exchange in Wireless Networks with Network Coding and Physical-layer Broadcast , 2004 .

[24]  Christos Gkantsidis,et al.  Cooperative Security for Network Coding File Distribution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[25]  C. Fragouli,et al.  A Network Coding Approach to Network Monitoring (Invited Paper) , 2005 .

[26]  Christina Fragouli,et al.  A Network Coding Approach to Overlay Network Monitoring , 2005 .

[27]  R. Koetter,et al.  The benefits of coding over routing in a randomized setting , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..

[28]  Jörg Widmer,et al.  Network coding for efficient communication in extreme networks , 2005, WDTN '05.