A proposed P2P Kurdistan Academic Network Backbone (KANB), Based on Random Linear Network Coding
https://doi.org/10.24017/science.2017.3.19
Abstract views: 1070 / PDF downloads: 823Abstract
The current rate of growth in computer network usage is a problematic issue motivates the inspiration to investigate less conventional solutions, similar to Network Coding (NC) which has attracted a lot of attention lately, to improve the bandwidth utilization and latency in computer networks. The objective of this paper is to show that the usage of Network coding is possible on enhancing the execution of Kurdistan Academic Network Backbone (KANB) to associate the primary ten urban communities in Kurdistan Region that almost contains a greater part of academic institutions. The proposed model applies peer to peer (P2P) multicasting on KANB, which does not require any centralized knowledge about the topology of the network. The Random Linear Network Coding (RLNC) has been utilized for its superior properties to address the problems of delay, throughput and lake of security associated with store-and-forward based classical networks. Simulation results point out the advantages of using network coding over the classical (store and forward) technique in term of improving the throughput gain and latency reduction. Hawler city the capital and greatest city in Kurdistan Region have been chosen as a source node while Slemani city has been elected as a sink, node. Thus, Network coding is applied at intermediate nodes.
Keywords:
References
[2] Medrad,network coding Fundamentals and Applications, Elsevier Inc press, 1st ed,2013.
[3] R. W. Yeung, "Information Theory and Network Coding," Springer, New York, NY, USA, 1st Edition, 2008.
[4] Ho, T. and Lun, D. S, Network Coding: An Introduction, Cambridge University Press, Cambridge, UK, 2008.
https://doi.org/10.1017/CBO9780511754623
[5] M.V. Pedersen, J. Heide, F.H.P.Fitzek & T. Larsen. "Picture Viewer - A Mobile Application using Network Coding".In proceeding of European Wireless Conference Aalborg, Denmark ,pp.267-273, 2009.
https://doi.org/10.1109/EW.2009.5357968
[6] S. V. Solms, Sune & Helberg "The Implementation of Avalanche Decoding in Random Network Coding Networks". In the proceeding of (SATNAC) Conference, At Spier Estate.South Africa. Sep. 2010.[online]Available:http://www.satnac.org.za/proceedings/2010/papers/management/von%20Solms%20FP%20379.pdf[Accepted:Sep2010]
[7] R. Ahlswede, N. Cai, S.-Y. R. Li, R. W. Yeung. "Network information Flow," IEEE Trans. on Information Theory, vol. 46, pp. 1204-1216. 2000.
https://doi.org/10.1109/18.850663
[8] S. Y. R. Li, R. W. Yeung, N. Cai. "Linear Network Coding", IEEE Transactions on Information Theory, Vol. 49, No. 2, pp. 371-381, 2003.
https://doi.org/10.1109/TIT.2002.807285
[9] T. Ho, M. Médard, R. Koetter et al., "A random linear network coding approach to multicast," IEEE Transactions on Information Theory, vol. 52, no. 10, pp. 4413-4430, 2006.
https://doi.org/10.1109/TIT.2006.881746
[10] A.Ramamoorthy and R. D. Wesel, "The single source two terminal network with network coding,"[online] ArXiv e-prints, 2009, available: on http://arxiv.org/abs/0908.2847.
[11] B.Li, D. Niu, "Random network coding in peer-to-peer networks: from theory to practice," in Proceedings of the IEEE, vol. 99(3), pp. 513-523, March 2011.
https://doi.org/10.1109/JPROC.2010.2091930
[12] M. Hay, B. Saeed, C. H. Lung, T. Kunz and A. Srinivasan, "Network Coding and Quality of Service metrics for Mobile Ad-hoc Networks," 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, , pp. 521-526, 2013.
https://doi.org/10.1109/IWCMC.2013.6583612
[13] T.Manoranjitham,V.Nagarajan,"Performance Enhancement Using Network Coding in Dynamic Source Routing", 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015), vol. 57, pp. 896-906, 2015
https://doi.org/10.1016/j.procs.2015.07.506
[14] C. Fragouli, E. Soljanin. "Network coding fundamentals," Foundations and Trends in Networking, vol. 2, no. 1, pp. 1-133, 2007.
https://doi.org/10.1561/1300000003
[15] Salah A. Aly, Ahmed E. Kamal," Encoding of Network Protection Codes Against Link and Node Failures Over Finite Field," Journal arXiv preprint arXiv:0905.1778, may. 12 ,2009. [Online].Available:https://arxiv.org/pdf/0905.1778.pdf.
[16] S.-Y. R. Li, N. Cai, and R. W. Yeung, "On Theory of Linear Network Coding," Proceeding of the 2005 IEEE International Symposium on Information Theory (ISIT.05), pp. 273-277, Sep. 2005.
[17] R. Koetter and M. Médard, "An algebraic approach to network coding," IEEE/ACM Transactions on Networking, vol. 11, no. 5, pp. 782-795, 2003.
https://doi.org/10.1109/TNET.2003.818197
[18] A.T. Campo and A. Grant. Robustness of random network coding to interfering sources. In Proc. 7th Australian Communications Theory Workshop, pages (120-124), Feb. 2006.