ARTICLE
TITLE

Network and Traffic Design Aspects in Network-Coding-Enabled Wireless Networks

SUMMARY

Practical experience of using opportunistic network coding has already been gained in several real network deployments, indicating the influence of some of the fundamental characteristics of the network and the traffic load. However, these aspects have not been systematically investigated in the scope of the construction of efficient and robust large-scale network-coding-enabled wireless mesh networks. In this paper we focus on these aspects using an example of two opportunistic networkcoding procedures: the well-known COPE and the Bearing Opportunistic Network coding (BON). In addition, the design aspects for network-coding-enabled wireless mesh networks and applications are discussed. We have shown that opportunistic network coding can improve the performance of different networks and supported applications in terms of throughput, delay and jitter, although the benefits are not significant in all the cases. Thus, the use of opportunistic network coding should be considered upfront during the wireless network design phase in order to obtain the greatest benefits.

 Articles related

Jing Yuan,Ruixi Yuan,Xi Chen    

This paper proposes a novel detection engine, called the Wavelet-Recurrence-Clustering (WRC) detection model, to study the network anomaly detection problem that is widely attractive in Internet security area. The WRC model firstapplies the wavelet ... see more


Raman Singh,Harish Kumar,R.K. Singla    

The network traffic dataset is a crucial part of anomaly based intrusion detection systems (IDSs). These IDSs train themselves to learn normal and anomalous activities. Properly labeled dataset is used for the training purpose. For the activities based I... see more


Robert Luca,Petrica Ciotirnae,Florin Popescu    

The paper revolves around the subject regarding quality of service (QoS) n a telecommunication network. The chosen scenario is based on the transmission of ata and voice packets using a WAN connection, which has a limited bandwidth and mphasize the need ... see more


Haipeng Yao,Yiqing Liu,Chao Fang    

Anomaly network detection is a very important way to analyze and detect malicious behavior in network. How to effectively detect anomaly network flow under the pressure of big data is a very important area, which has attracted more and more researchers’ ... see more


Sebastián Vallejos, Brian Caimmi, Diego Gabriel Alonso, Luis Sebastián Berdun, Álvaro Soria    

Nowadays, social networks have become  in a  communication  medium widely  used to disseminate any type  of  information. In  particular,  the  shared  information  in  social  networks&nbs... see more