Sei sulla pagina 1di 6

Random Linear Coding Based Anti-Jamming

Coding Techniques for Cognitive Radio Systems


Swanand Kadhe, M. Girish Chandra, and Balaji Janakiram
Innovation Labs, TATA Consultancy Services, Bangalore, INDIA.
Email: {swanand.kadhe, m.gchandra, balaji.janakiram}@tcs.com

Abstract—Cognitive radio is an emerging technology that are also very strong candidates for anti-jamming codes [4],
allows secondary communication in a frequency band originally [5]. The comparison of various erasure correcting schemes
allocated to one or more primary users (PUs). Secondary user in the context of cognitive radio has been discussed in [3].
(SU) usually operates in a low power profile to avoid interference
with the PU and sudden appearance of a PU causes loss of data It shows that, among different erasure correcting schemes,
of the SU. Appropriate erasure correction coding (also called as rateless coding and piecewise linear coding are the two high
anti-jamming coding) is, thus, required to maintain the reliability performing anti-jamming coding schemes in cognitive radio
of the link. In this paper, we propose the random linear coding systems. Piecewise linear coding, proposed in [5], involves
(RLC), which is commonly used in network coding, to be used arranging the packets as columns of a matrix and applying
as an anti-jamming scheme. We also propose a variant of RLC
anti-jamming scheme that requires reduced complexity decoding. the linear block code on each row to generate parity packets
The throughput of both the proposed schemes is analyzed and (encoded columns).
it is shown that high throughput can be obtained at the expense In the emerging area of network coding, the random linear
of very small redundancy by carefully selecting the Galois field coding (RLC) is becoming increasingly popular tool to achieve
size.
multicast capacity [6], [7]. We propose to use RLC as an anti-
jamming technique motivated by the following observations:
I. I NTRODUCTION
• Cognitive radio system with spectrum pooling model
The concept of cognitive radio is based on the notion of [8] used for secondary usage behaves similar to the
secondary spectrum access to improve spectrum utilization. distributed storage system; and jamming behaves similar
This allows a non-primary or unlicensed user, called as a to the storage device failure [3].
secondary user (SU), to dynamically access the unused parts • RLC based schemes perform well in case of uncoordi-
of the spectrum owned by the primary license holder, called a nated distributed storage systems [9], [10].
primary user (PU), temporarily [1]. Unused licensed spectrum
Since decoding in case of RLC requires inversion of a dense
can be detected and allocated to SUs in an opportunistic way
matrix over a finite field, which is computationally complex;
[2]. Though SU can sense the presence of a PU, the PU is
hence we propose reduced complexity RLC (RC-RLC) scheme
not equipped with the sensing capability and is not aware of
for which computationally efficient decoding is possible. The
the existence of the SUs. Thus, if a PU suddenly becomes
throughput performance of the RLC scheme is analyzed for
active in a particular band currently used by SU, it will cause
the cognitive radio set up. Also, performance lower bounds are
collision with the SU and the packets transmitted by the SU
developed for both RLC and RC-RLC schemes by utilizing the
through this primary band may get corrupted due to strong
mathematical tools presented in [9] and [10].
interference from the PU. Such a collision is referred to as
The remainder of the paper is organized as follows. Sec-
jamming. Since SU usually operates in a lower power profile
tion II gives system model along with RLC based anti-
in order to avoid interfering with the PU, the entire packet
jamming coding schemes. Performance analysis is carried out
could get corrupted. The channel coding may not be able to
in Sections III and IV, and numerical results are presented in
recover the data associated with this packet and the packet
Section V. Finally, Section VI concludes the paper.
is considered to be lost. Therefore, anti-jamming coding is
required to recover such a corrupted packet. II. S YSTEM M ODEL
The packet affected by jamming is either received correctly
or completely lost. Thus, jamming can be considered to First, the concept of spectrum pooling is introduced, which
be equivalent to the erasure event. This makes conventional forms the basis for secondary usage model. Then, RLC and
erasure codes like Reed-Solomon (RS) codes and Low-Density RC-RLC based anti-jamming schemes are explained.
Parity-Check (LDPC) codes to be natural candidates as anti-
jamming codes. However, these codes have highly structured A. Spectrum Pooling
construction and hence are less flexible on the number of As discussed in [8], the spectrum pool is formed by dividing
redundant packets and the number of encoded packets. This the whole spectrum where secondary use is permitted, into
makes their direct application unsuitable in cognitive radio [3]. number of subchannels. The SU is assigned a set of subchan-
Fountain codes, which are from the class of rateless codes, nels on which PUs are not active. The subchannel selection

978-1-4244-6826-3/10/$26.00 ©2010 IEEE


is made in such a way that the collision due to PU affects to the receiver and are stored in the packet header. Although
minimum number of subchannels. it requires additional space of k log2 (q) per packet to store the
We consider the interweave model (similar to [3]) for code weights, percentage overhead for large packet lengths is
secondary usage adopting the opportunistic approach to utilize very small.
the white space of the spectrum. This is more practical than the The generator matrix in case of RLC is usually dense and
overlay approach, in which concurrent PU and SU transmis- its inversion over a finite field is computationally complex.
sions are allowed. In interweave approach, the SU must vacate This is the main disadvantage of the RLC scheme. Decoding
the subchannel as soon as the corresponding PU becomes complexity can be reduced if the generator matrix can be
active on that subchannel, to avoid interference with the PU. made sparse. But the sparsity is limited by the requirement
Also, SU usually operates at low power profile and this forces that the square submatrices of the generator matrix should
the SU to lose the packet on that subchannel. To compensate be invertible in order to recover the data. Reference [10]
for the loss caused by the PU appearance, anti-jamming coding presents RLC based construction of decentralized erasure
is incorporated. It is assumed that the SU message consists codes having sparse generator matrices for distributed storage.
of k packets. Anti-jamming coding, then, introduces some The matrices are made as sparse as possible keeping the
redundancy (say h), which depends on PU arrival probability. probability of decoding success very high. The same concepts
Assuming that one data packet is transmitted per subchannel can be extended to obtain reduced complexity anti-jamming
as in [5], total n = k + h subchannels are assigned to the SU. codes with sparse generator matrices as discussed in the next
Since other channel impairments like deep fading can also subsection.
cause the loss of a packet, we include these effects in jamming.
C. Reduced Complexity Random Linear Coding
Thus, jamming probability can be given as
In this scheme, a sparse generator matrix is constructed
p = pI + pL , (1) to reduce the complexity associated with decoding. The pro-
cedure to construct the sparse generator matrix is given as
where pI is the jamming probability due to PU interference
follows:
and pL is the probability of packet loss due to other channel
For each column j = {1, 2, . . . , k},
impairments. For simplicity, jamming probability on each
subchannel is assumed to be the same. 1) Choose a row i = {1, 2, . . . , n} uniformly and indepen-
dently with replacement.
B. Random Linear Coding 2) For the location (i, j), select a random coefficient gi,j
It is well known that the idea of RLC is to form the linear uniformly and independently from GF (q).
combinations of the data packets to generate the coded packets, Repeat the two steps for c ln k times, where c > 5n/k.1 It
the weights used for which are chosen randomly from a finite can be found out that, with above mentioned construction,
field. Mathematically, for an RLC over Galois Field of size q, the average number of non-zero entries in each row are
i.e. GF (q), data packets are considered as vectors containing O(log k) [10] and decoding can be performed with complexity
the elements in GF (q). If mi , i = 1, 2, . . . , k, denote the k O(k 2 log k) by exploiting the sparsity [11].
data packets and ci , i = 1, 2, . . . , n, denote n coded packets
III. T HROUGHPUT A NALYSIS
(n = k + h), then we have
When SU has a message of k packets to transmit, it is

k
encoded to produce n = k + h packets out of which some are
ci = gi,j mj , i = 1, 2, . . . , n, (2) lost due to jamming. The set of n encoded packets is referred
j=1
to as a transmit frame. If the receiving SU can not decode
where gi,j are the coefficients selected uniformly and inde- original k data packets from the received encoded packets, the
pendently over GF (q). In matrix form, we have C = GM, frame is said to be in error and the probability of the same is
where matrices M and C consist of the data and coded called as frame error probability. Since the n coded packets
packets respectively as rows. The matrix G contains the weight contain the information worth k packets only, the throughput
coefficients for all the coded packets and is referred to as can be obtained by
generator matrix. The generator matrix characterizes the code. k
Note that such an encoding process essentially constructs η= (1 − Pf e ) , (3)
n
a system of linear equations for coded packets, where the
unknown variables are the data packets, given that the coding where Pf e is the overall frame error probability.
The frame error probability depends on the probability of
coefficients gi,j and the coded packets ci are known.
decoding failure given that some l packets are lost. It can
After any r of the n coded packets are received, the
be noted that the decoding fails certainly when less than k
decoding process of RLC consists of solving the r linear
packets are received, since in this case, the receiving SU can
equations constructed by the encoding process, where r ≥ k.
form less than k linear equations which can not be solved for
This involves inversion of relevant submatrix of the generator
matrix. The decoding process demands that for each coded 1 The choice of c is lower bounded so that probability of decoding failure
packet i, the weights gi,1 , gi,2 , . . . , gi,k need to be conveyed is limited to k/q + o(1) [10].
k unknowns, i.e., original data packets. When more than k To characterize the reduced complexity RLC scheme, it is
packets are received, decoding failure probability is less than possible to find the lower bound on throughput based on the
unity and it depends on the number of received packets as approach taken in [10]. Similar attempt is also made for RLC
well as the adopted anti-jamming scheme. scheme which might help to gain some additional insight.
Now, let us analytically characterize the frame error proba-
bility for general anti-jamming scenario. For jamming rate p, IV. P ERFORMANCE L OWER B OUNDS
the probability of losing l packets, Pl , is given by In this section, we consider the throughput performance
  lower bound for both the proposed schemes and further
n l
Pl = p (1 − p)n−l , l = 1, 2, . . . , n. (4) characterize the RLC scheme by finding the lower bounds on
l
the overhead factor and give the decoding success probability.
Let E denote the event of decoding failure. If the conditional
probability of this event is denoted by Pr{E|l} given that A. Throughput Lower Bounds
l packets are lost, then, with the help of total probability The following theorems lower bound the throughput for
theorem, the frame error probability can be expressed as both RLC and reduced complexity RLC schemes.
Pf e = Pr {E|(l ≤ h)} Pr {l ≤ h} Theorem 2: In a cognitive radio system having jamming
probability of p, the throughput of an (n, k) RLC over GF (q)
+ Pr {E|(l > h)} Pr {l > h} used as an anti-jamming code is lower bounded by
h n
n−k n−l    
= Pl Pr{E|l} + Pl , (5) k  n l n−l j
l=0 l=h+1 η RLC > p (1 − p)n−l p̃ (1 − p̃)n−l−j ,
n l j
l=0 j=k
where the second equality is due to the fact that, for l > h = (7)
n − k, the decoding failure probability is 1. where p̃ = 1 − 1/q.
Note that even for a given jamming rate, the performance Proof: See Appendix B.
of the different anti-jamming schemes will vary, since the Theorem 3: The throughput of an (n, k) RC-RLC anti-
conditional decoding failure probability varies from scheme to jamming scheme is lower bounded by
scheme. Also, unlike the deterministic coding cases like RS
n−k  

 n−l−k+1
codes in which receiving any k coded packets assures decoding k  n l k
η RC−RLC
> p (1 − p) n−l
1− ,
success, for random coding schemes like RLC and RC-RLC, n l q
l=0
receiving more than k coded packets does not guarantee the (8)
successful decoding due to randomness involved in the code where p and q denote the jamming rate and the Galois field
construction. size, respectively.
In the following theorem, the throughput of the RLC anti- Proof: See Appendix C.
jamming scheme is found out. From (8), one can easily verify that the lower bound for RC-
Theorem 1: For a cognitive radio system having jamming RLC increases with q. To prove the same
n−l in case of RLC, we
rate p and using RLC over GF (q) as an anti-jamming tech- can see that RHS of (7) contains j=k n−l p̃ j
(1 − p̃)n−l−j ,
nique that produces n coded packets from k data packets, the     j

throughput is given as i.e., Pr Binom n − l, 1 − 1q ≥ k , which increases with


k−1 n−l q. Also, it is to be be noted that as q increases, throughput
n−k  
k  n l i=0 (q − qi ) lower bound converges to the ideal value of k/n times the
η RLC
= p (1 − p)n−l
. (6) probability of loosing less than h packets.
n l q k(n−l)
l=0
     
II B. Overhead Factor and Success Probability
I

Proof: See Appendix A. This subsection further characterizes the RLC scheme by
Theorem 1 helps us to see the effect of field size on finding the lower bounds on the important parameters: over-
the throughput. It is easy to observe that the throughput head factor and decoding success probability.
is an increasing function of q. Also, for asymptotic field The overhead factor is a commonly used parameter in
size (q → ∞), term II tends to unity and the throughput erasure coding to indicate the quality of the code. It is ratio
is code rate times the term I, which is nothing but the of overhead by number of data packets where the overhead is
probability of loosing ≤ (h = n − k) packets. In other the average number packets that must be received to recover
words, we can say that for very large field sizes, RLC has all the data packets [12].
a perfect decoding threshold on number of lost packets, i.e., Let rmin denote the minimum number of packets that
the decoding failure probability behaves as a step function: should be received for successful decoding. Then, the overhead
P r {E|(l > h)} = 0 and P r {E|(l ≤ h)} = 1. Note that this can be obtained as E {rmin }; the expectation enters into
is the ideal performance that can be achieved using any coding the scenario as the coding framework is probabilistic. For
scheme; for example, RS codes, which have the optimum decoding to be successful, the rank of the r×k matrix obtained
erasure correction capability. by stacking the weight vectors associated with the r received
1 1
RLC
0.9 RLC (LB) 0.9
RC−RLC (LB)
0.8 No Coding
0.8

0.7 0.7

Throughput (η)
Throughput (η)

0.6 h = {1, 3, 5}
0.6

0.5 0.5

0.4 0.4
RLC, p = 0.01
0.3 0.3 RC−RLC, p = 0.01
RLC, p = 0.05
0.2 0.2 RC−RLC, p = 0.05
RLC, p = 0.1
0.1 0.1
RC−RLC, p = 0.1
0 −3 −2 −1 0
0
10 10 10 10 0 2 4 6 8 10 12 14 16 18 20
Jaming Rate (p) Redundancy (h)

Fig. 1. Analytical results for throughput η versus jamming rate p for k = 40 Fig. 2. Analytical results for throughput η versus redundancy h = n − k
and q = 27 . for k = 40 and q = 27 .

0.7
packets should be k. Then, using proposition 5.1 in [9], it is
straightforward to obtain 0.6
h=5

E {rmin } q 0.5

Throughput (η)
. (9)
k q−1 0.4

Also, probabilistic guarantee on the decoding success can 0.3


h=3

be obtained as 0.2
RLC
1 RLC (LB)
(1 − Pr {E|r}) ≥ 1 − ,
0.1
(10) RC−RLC (LB)
Ideal
k 0
1 2 3
10 10 10
provided Field Size (q)

r 2 logq (k)
≥1+ , (11) Fig. 3. Analytical results for η versus field size q for k = 40, p = 0.1, and
k k various h.
by using proposition 5.2 in [9].
From the above results it is possible to make following
remarks. clearly outperform the no coding case except when jamming
• By choosing a field size large enough, overhead ratio can rate is very small. Also, one can observe that larger amount
be made arbitrarily close to one, which is the optimum of redundancy must be introduced if the jamming rate is high
case. to obtain better performance.
• It is sufficient to receive just over k coded packets to To better understand the effect of redundancy h on the
recover all the data packets almost certainly (assuming k throughput, Figure 2 is presented for different jamming rates.
to be sufficiently large). It shows that, for a given p, an optimal value of h exists
At this juncture, it is important to highlight the trade- giving the highest throughput and the optimal h increases with
off between field size and complexity: a large field size the jamming rate. Also, it can be seen that both the schemes
achieves minimally additional overhead at the expense of large require just the marginal amount of redundancy.
complexity associated with the inversion of a matrix over a In Figure 3, we analyze the effect of the field size q on the
larger field size. throughput. The binary extension field GF (2l ) is considered
for l = {1, 2, . . . , 10}. We also present the performance of the
V. S IMULATION R ESULTS ideal scheme which can recover the original data packets from
In this section, we evaluate the performance of both the any k received packets with certainty. It can be seen that the
proposed schemes numerically. It is assumed that the message performance of both the schemes approaches the ideal case
to be transmitted consists of 40 packets which are encoded as field size increases. The gap between the lower bound and
into n = k + h packets using RLC or RC-RLC anti-jamming the actual throughput for RLC reduces with the field size.
scheme. We consider the binary extension field GF (2l ), where It is interesting to note that the effect of q follows the law
l is an integer. of diminishing returns; saying that beyond certain value of q
Figure 1 shows the throughput of the RLC scheme and lower the gain in throughput will not be significant. Also, it can be
bound (LB) on the throughput for both RLC and RC-RLC observed that the throughput is close to the ideal for reasonably
schemes as a function of jamming rate p for a field size of small field sizes, making the proposed schemes elegant from
q = 27 and various redundancy (h) values. The throughput the implementation perspective.
of the simple transmission scheme without any anti-jamming Figures 4, 5, and 6 illustrate the simulation results. We have
is also plotted for comparison. We can see that both schemes chosen c = 5n/k + 1 to implement RC-RLC scheme. All the
1 0.8

0.9 RLC
RC−RLC 0.7
0.8
h=5
0.7 0.6

Throughput (η)
Througput (η)

0.6
0.5
0.5
h=1,3,5
0.4
0.4

0.3 0.3 h=3

0.2
0.2 RLC
0.1
RC−RLC
0 0.1
−3 −2 −1 0 0 1 2 3
10 10 10 10 10 10 10 10
Jamming Rate (p) Field Size (q)

Fig. 4. Simulation results for throughput η versus jamming rate p for k = 40 Fig. 6. Simulation results for throughput η versus field size q for k = 40,
and q = 27 . p = 0.1, and various h.

gives η = 0.338 and RC-RLC gives η ≥ 0.274 at q = 27


1

as opposed to η = 0.16 and η = 0.29 given by rateless and


0.9

0.8
piecewise linear coding, respectively.
0.7
Throughput (η)

0.6
VI. C ONCLUSION
0.5

0.4 The proposed random linear coding based schemes provide


RLC, p = 0.01
0.3
RC−RLC, p = 0.01 very powerful and configurable anti-jamming capability in the
RLC, p = 0.05
0.2
RC−RLC, p = 0.05 cognitive radio set up. The paper presented rigorous analysis
RLC, p = 0.1
0.1
RC−RLC, p = 0.1 of the throughput and other parameters like overhead factor
0
0 2 4 6 8 10 12 14 and decoding success probability.
Redundancy (h)
We would like to mention that the performance analysis of
RLC not only demonstrates its superiority as an anti-jamming
Fig. 5. Simulation results for throughput η versus redundancy h = n − k
for k = 40 and q = 27 . scheme, but also makes us believe that RLC provides an
elegant framework to design generalized graph based erasure
codes which may find diverse applications. By assuring certain
other parameters are same as in case of analytical results. It required throughput, it would help to reduce the search space
is observable that the simulation performances for both RLC while finding the optimum or near optimum graph for an
and RC-RLC are the same except for some minute deviation erasure code. However, further exploration is required in this
when q is small. This is expected because, even though RC- direction.
RLC uses sparse generator matrix, the way it is constructed In a nutshell, as far as cognitive radio systems are con-
assures very high probability of decoding success. cerned, the capability of random linear coding to provide high
throughput for very small redundancy along with the flexibility
The close agreement between the analytical and simulation
in terms of the number of data packets and the amount of
results is explicitly brought out in figures 7 and 8, with
redundancy makes it very strong candidate as an anti-jamming
simulation results depicted for some candidate values of p
scheme.
and h. In fact, it can be noted that the points corresponding
to analytical and simulation results are almost overlapping.
Furthermore, even for the moderate field sizes (like 27 ), it can A PPENDIX A
be seen that the lower bound derived for RC-RLC scheme P ROOF OF T HEOREM 1
is very close to the throughput obtained through simulations. The important step in finding the throughput is to find the
Hence, the lower bound of (8) can be used to characterize the frame error probability (Pf e ) which, in turn, requires finding
RC-RLC scheme for all practical purposes. the decoding failure probability conditioned on the number of
The performance curves clearly suggest that designing an lost packets l, i.e., Pr{E|l}. To find Pr{E|l}, let ρ(n−l) denote
intelligent system that adaptively chooses the amount of the rank of the (n − l) × k matrix containing weight vectors of
redundancy and field size taking into account the jamming the received code packets as rows. Then, if ρ(n−l) < k, it is
statistics and complexity issues is an interesting problem. Also, not possible to find any k × k submatrix from received weight
it is noteworthy that both the RLC and RC-RLC schemes vectors and decoding can not be successful. Thus,
outperform the rateless and piecewise linear coding schemes    
proposed in [5]. For example, for p = 0.1 and h = 3, RLC Pr{E|l} = Pr ρ(n−l) < k = 1 − Pr ρ(n−l) = k . (12)
1 1

0.9
p = 0.01
0.8 0.8
h=5
0.7

Throughput (η)
p = 0.1
Throughput (η)

h=3 0.6
0.6

0.5
0.4
0.4

0.3 RLC (Simulation)


RLC (Simulation) 0.2 RC−RLC (Simulation)
0.2 RC−RLC (Simulation) RLC (Analytical)
RLC (Analytical) RC−RLC LB (Analytical)
0.1 RC−RLC LB (Analytical)
0
0 −3 0 5 10 15
10 10
−2 −1
10 10
0 Redndancy (h)
Jamming Rate (p)

Fig. 8. Simulation and analytical results for throughput η versus redundancy


Fig. 7. Simulation and analytical results for throughput η versus jamming h = n − k for k = 40 and q = 27 .
rate p for k = 40 and q = 27 .

Now, if l packets are lost, (n − l) × k matrix consisting


Now, for a random matrix over finite field of size q, it is of received weight vectors as rows contains (n − l − k + 1)
possible to show that [9] number of k × k submatrices. As the decoding fails when all
  1 
d−1
(q n−l − q j )(q k − q j ) these matrices have the rank less than k, we have
Pr ρ(n−l) = d = . (13)  n−l−k+1
q k(n−l) (q d − q j ) k
j=0 Pr{E|l} ≤ , (17)
q
Then, by substituting (13) in (12) and, then, substituting the
result in (5), Pf e can be computed. The throughput can then where we neglect the order constant in (16) assuming that the
be obtained using (3). field size is not very large2 . Equation (17) gives upper bound
on Pf e using which the lower bound can be easily obtained.
A PPENDIX B
P ROOF OF T HEOREM 2 R EFERENCES
To prove the theorem, we find the upper bound on the [1] S. Haykin, “Cognitive Radio: Brain-empowered Wireless Communica-
frame error probability for both schemes. For RLC, it has tions,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220, Feb.
2005.
been proved that [9] [2] H. Zheng and C. Peng, “Collaboration and Fairness in Opportunistic
  Spectrum Access,” in Proc. of Int. Conf. Commun. (ICC), May 2005,
Pr ρ(n−l) > d > pp. 3132–3136.
    
1 [3] G. Yoo, “Anti-Jamming Coding Techniques,” IEEE Signal Process.
Pr min k, Binom n − l, 1 − > d , (14) Mag., vol. 25, no. 8, pp. 35–45, Nov. 2008.
q [4] H. Kushwaha, Y. Xing, and R. C. H. Heffes, “Reliable Multimedia
Transmission Over Cognitive Radio Networks Using Fountain Codes,”
where ρ(n−l) is the rank of the (n − l) × k matrix containing Proc. IEEE, vol. 96, no. 1, pp. 155–165, Jan. 2008.
the received weight vectors. Thus, we can write [5] G. Yue., X. Wang, and M. Madihian, “Design of Anti-Jamming Coding
  for Cognitive Radio,” in Proc. IEEE GLOBECOMM, Nov. 2007, pp.
Pr ρ(n−l) < k 4190–4194.
     [6] T. Ho, M. Medard, M. Effros, and D. Karger, “The Benefits of Coding
1 Over Routing in A Randomized Setting,” in Proc. IEEE Symposium on
< Pr min k, Binom n − l, 1 − <k Information Theory, July 2003.
q
    [7] ——, “On Randomized Network Coding,” in Proc. 41st Allerton Annual
1 Conference on Communication, Control and Computing, Oct. 2003.
= Pr Binom n − l, 1 − <k . (15) [8] J. Mitola, “Cognitive Radio for Flexible Mobile Multimedia Communi-
q
cations,” in Proc. IEEE Int. Workshop Mobile Multimedia Communica-
Since the decoding fails when ρn−l < k, (15) gives upper tions (MoMuC), Nov. 1999, pp. 3–10.
bound on Pr {E|l}. Substituting this upper bound and (4) in [9] S. Acedanski, S. Deb, M. Medard, and R. Koetter, “How Good is
Random Linear Coding Based Distributed Networked Storage?” in
(5), and using (3), the theorem can be easily proved. NetCod, Apr. 2005.
[10] A. Dimakis, V. Prabhakaran, and K. Ramchandran, “Ubiquitous Acess
A PPENDIX C to Distributed Data in Large-Scale Sensor Networks through Decen-
P ROOF OF T HEOREM 3 tralized Erasure Codes,” in IEEE/ACM Int. Symposium on Information
Processing in Sensor Networks (IPSN), Apr. 2005.
To prove the theorem, we exploit the construction of the [11] D. H. Wiedemann, “Solving Sparse Linear Equations over Finite Fields,”
generator matrix G used in RC-RRC case. On the similar IEEE Trans. Inf. Theory, vol. 32, no. 1, pp. 54–64, Jan. 1986.
lines of the proof of Theorem 1 in [10], it is possible to show [12] J. S. Plank, A. L. Buchsbaum, R. L. Collins, and M. G. Thomason,
“Small Parity-Check Erasure Codes - Exploration and Observations,”
that when G is constructed as stated in Subsection II-C, in Proc. IEEE Int. Conf. Dependable Syst. and Networks (DSN), June
k 2005, pp. 326–335.
Pr {rank(G ) < k} ≤ + o(1), (16)
q 2 Simulations show that throughput is high for reasonably small q, support-
where G is a random k × k submatrix of G. ing the assumption

Potrebbero piacerti anche