Proceedings. International Symposium on Information Theory, 2005. ISIT 2005. 2005
DOI: 10.1109/isit.2005.1523693
|View full text |Cite
|
Sign up to set email alerts
|

The encoding complexity of network coding

Abstract: Abstract-In the multicast network coding problem, a source needs to deliver packets to a set of terminals over an underlying communication network . The nodes of the multicast network can be broadly categorized into two groups. The first group incudes encoding nodes, i.e., nodes that generate new packets by combining data received from two or more incoming links. The second group includes forwarding nodes that can only duplicate and forward the incoming packets. Encoding nodes are, in general, more expensive d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
112
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 62 publications
(112 citation statements)
references
References 9 publications
0
112
0
Order By: Relevance
“…We refer to such graphs as structured graphs. Our efficient reduction follows that appearing in [4], and has the additional following properties: (a)Ĝ is acyclic. (b) For every source (terminal) in G there is a corresponding source (terminal) inĜ.…”
Section: Example Of Three Sources and Three Terminals With Indepmentioning
confidence: 99%
See 1 more Smart Citation
“…We refer to such graphs as structured graphs. Our efficient reduction follows that appearing in [4], and has the additional following properties: (a)Ĝ is acyclic. (b) For every source (terminal) in G there is a corresponding source (terminal) inĜ.…”
Section: Example Of Three Sources and Three Terminals With Indepmentioning
confidence: 99%
“…(c) For any two edge disjoint paths P 1 and P 2 connecting a source terminal pair in G, there exists two vertex disjoint paths inĜ connecting the corresponding source terminal pair. (d) Any feasible network coding solution inĜ can be efficiently turned into a feasible network coding solution in G. Our reduction follows that appearing in [4] and is given here for completeness.…”
Section: A the Reductionmentioning
confidence: 99%
“…2 in an acyclic multicast network [9], we can show that the number of relay nodes is upper bounded in such networks in a similar way: in an h-minimal network, any relay node with in-degree larger than 1 must be a coding node and thus the total number of relays is bounded by h 3 (n − 1) 2 ; for the relay nodes with in-degree 1, they appear exactly once in each coding subtree. The number of coding forests, each of which is composed of coding subtrees of the same coding vector, is no more than n h , since a finite field of size n is sufficient and the number of different coding vectors is no more than n h .…”
Section: Upper-bounds On the Number Of Relay Nodesmentioning
confidence: 76%
“…While searching for the optimal solution, it is reasonable to consider only the h-minimal networks [9], where deleting any link will cause λ D (s, t) < h for some receiver t. According to Li, et al [5], for any h-minimal network, there is a linear network code where each link is assigned a global coding vector from the h dimension linear space F h . Therefore in a h-minimal network, each node has in-degree at most h, since the coding vector on an extra link would be linearly dependent with the other h coding vectors and thus redundant.…”
Section: Upper-bounds On the Number Of Relay Nodesmentioning
confidence: 99%
“…Only merging nodes are possible to become coding nodes. The number of coding links is used to estimate the amount of coding operations performed during the data transmission (Langberg et al, 2006). More descriptions can be found in Xing and Qu (2012 the data rate between s and t k in the NCM subgraph…”
Section: Problem Formulationmentioning
confidence: 99%