2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications 2011
DOI: 10.1109/pimrc.2011.6140119
|View full text |Cite
|
Sign up to set email alerts
|

Overflow of fountain codes in multi-hop wireless sensor networks

Abstract: Abstract-This paper concentrates on the proper use of fountain codes for the transmission of sporadic data in a wireless sensor network (WSN). Fountain codes offer great perspectives for the self-organization of WSNs: they self adapt to the channel error rate without control packets. Deploying fountain codes in a WSN raises two problems. First, the size of the data transmitted by a sensor is small in comparison to the size usually considered with fountain codes. Second, WSNs mostly rely on multi-hop transmissi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…In this context, Fig. 5 shows a set of curves that plot the interplay between T res avg and 1 − P fail (q res r ) for several values of N res and E, and for Note that because the priority is to minimize T res avg , increasing θ leads to an increase of E rather than N res , because the latter typically leads to a much larger number of transmissions for fixed E. In fact, we have c 0.94 = (3, 7), c 0.96 = (3,8), and c 0.98 = (3,9), and only for θ = 0.99 does c 0.99 = (4,9) involve the increase of N res . This conclusion suggests that, in the presence of a performance threshold corresponding to reasonable reliability (e.g., θ ≥ 0.9), incrementally better improvements are achieved by simply increasing the amount of redundancy (which requires only the source to act), without involving extra nodes in the flooding process (which would instead require extra coordination among the nodes).…”
Section: Resultsmentioning
confidence: 98%
See 2 more Smart Citations
“…In this context, Fig. 5 shows a set of curves that plot the interplay between T res avg and 1 − P fail (q res r ) for several values of N res and E, and for Note that because the priority is to minimize T res avg , increasing θ leads to an increase of E rather than N res , because the latter typically leads to a much larger number of transmissions for fixed E. In fact, we have c 0.94 = (3, 7), c 0.96 = (3,8), and c 0.98 = (3,9), and only for θ = 0.99 does c 0.99 = (4,9) involve the increase of N res . This conclusion suggests that, in the presence of a performance threshold corresponding to reasonable reliability (e.g., θ ≥ 0.9), incrementally better improvements are achieved by simply increasing the amount of redundancy (which requires only the source to act), without involving extra nodes in the flooding process (which would instead require extra coordination among the nodes).…”
Section: Resultsmentioning
confidence: 98%
“…For example, the SYNAPSE++ protocol [3] employs a fountain code to reliably disseminate firmware to a wireless sensor network. Fountain codes have also been shown to improve the performance of unicast communications, provided that early acknowledgment packets are sent in order to prevent the generation of useless redundancy [8]. In [6], the introduction of fountain codes in vehicular networks leads to a significant performance improvement compared to a simpler data carousel dissemination approach.…”
Section: Introduction and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The global acknowledgement is the second most important feature of fountain code in comparison with other protocols such as Automatic Repeat reQuest (ARQ) where each data packets needs an acknowledgement (Ack) packet. In the case of error retransmission is made only for the last sent packet, thus, greatly minimizes the number of transmissions, the use of the feedback channel and subsequently the energy consumption [5]. A reliable decoding algorithm for a fountain code is one which can recover the original K input symbols from any set of m output symbols.…”
Section: Fountain Codesmentioning
confidence: 99%
“…For example, the SYNAPSE++ protocol [3] employs a fountain code to reliably disseminate firmware over a wireless sensor network. Fountain codes have also been shown to improve the performance of unicast communications, provided that early acknowledgment packets are sent in order to prevent the generation of useless redundancy [8]. In [6], the introduction of fountain codes in vehicular networks leads to a significant performance improvement compared to a simpler approach where data packets are periodically retransmitted.…”
Section: Introductionmentioning
confidence: 99%