期刊文献+

无线网络中优化TCP性能的网络编码方法研究 被引量:2

Research on Network Coding to Optimize Performance of TCP in Wireless Networks
下载PDF
导出
摘要 网络编码的出现为改进网络的传输性能提供了新的方法。J.K.Sundararajan等人将网络编码技术与传输控制协议相结合,提出了基于网络编码的TCP/NC协议,其在改进无线网络中传统TCP的性能方面取得了明显效果。但该协议及其改进协议存在的数据传输和解码操作同步性问题会严重影响TCP/NC性能。提出的改进协议TCP/NCW根据解码时间调节解码窗口,以确保数据传输和解码操作同步,从而获得更好性能。运用排队论分析了TCP/NCW最优解码窗口的存在性。在NS2中的仿真结果表明,在静态场景和动态场景下TCP/NCW的吞吐率比TCP/Vegas和TCP/NC有显著提高,同时也具有较好的公平性。 The emergence of network coding provides a new method for improving TCP performance in wireless net- work. J. K. Sundararajan et al. proposed a new protocol called TCP/NC based on network coding combining the network coding and transmission control protocol, which achieves remarkable results in improving the performance of TCP in wireless network. But the synchronism problem in data transmission and decoding operation may seriously affect the performance of TCP/NC and its modified protocol is not considered. To address this issue, a revised protocol TCP/ NCW was proposed in this paper. We introduced the decoding window adjustment scheme based on TCP/NC. In TCP/ NCW, the decoding window is adjusted according to the decoding time and will finally reach an optimal window size. This scheme can ensure the synchronization of data transfer and decoding operation. Therefore, this scheme can achieve better performance. We used the queuing theory to analyze the existence of the optimal decoding window of TCP/NCW. The simulation results with NS2 show that TCP/NCW achieves significant improvement in throughput compared with both TCP/Vegas and TCP/NC in different scenarios, without prejudice of fairness.
出处 《计算机科学》 CSCD 北大核心 2015年第6期125-130,共6页 Computer Science
基金 天津市软件产业发展基金项目:公交车辆嵌入式3G视频监控系统(2011E6-0009)资助
关键词 无线AD HOC网络 网络编码 TCP/NC 最优窗口 Wireless ad hoc network Network coding TCP/NC Optimal window
  • 相关文献

参考文献15

  • 1Hanbali A A, Altman E, Nain P. A survey of TCP over ad hoc networks[J]. IEEE Communications Surveys Tutorials, 2005,7 (3) : 22-36.
  • 2Ahlswede R, Cai N, Li S-Y R, et al. Network information flow [J]. IEEE Trans. Inform. Theory, 2000,46, (4):1204-1216.
  • 3Yeung R W, Li S-Y, Cai N, et al. Theory of network coding Foundations and Trends[M]. Now Publishers, 2006 : 241-381.
  • 4蒲保兴,杨路明,王伟平.线性网络编码的导出与扩展[J].软件学报,2011,22(3):558-571. 被引量:10
  • 5郝琨,金志刚.一种最小化编码节点的网络编码优化算法[J].电子与信息学报,2011,33(2):260-265. 被引量:17
  • 6俞立峰,杨琼,于娟,沈才樑.防窃听攻击的安全网络编码[J].计算机应用研究,2012,29(3):813-818. 被引量:10
  • 7Fragouli C, Le Boudec J Y, et al. Network coding: an instant primer[J]. ACM SIGCOMM Computer Communications Re- view, 2006,36 ( 1 ) : 63-68.
  • 8Sundararajan J K, Shah D, Medard M, et al. Network coding meets TCP I-OLd. http://adsabs, harvard, edu/ahs/2009 arxiv0908. 1564s.
  • 9Sundararajan J K,Jakubczak S, Medard M, et al. Interfacing net- work coding with TCP: an implementation [OL]. http:// adsabs, harvard, edu/abs/2009arxiv0908. 1564s.
  • 10Sundararajan J K, Kim M, M' edard M, et al. Modeling Network Conded TCP Throughput A simple Model and its Validation [OL]. http://arxiv, org/pdf/1008/0420, pdf.

二级参考文献80

  • 1罗明星,杨义先,王励成,钮心忻.抗窃听的安全网络编码[J].中国科学:信息科学,2010,40(2):371-380. 被引量:10
  • 2Yeung R W, Li S-Y R, and Cai N, et al.. Network Coding Theory [M]. Hanover: NOW Publishers Inc, 2006: 12-18.
  • 3Ahlswede R, Cai N, Li S-Y R, and Yeung R W. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46(4): 1204-1216.
  • 4Kim M, Lima L, Zhao F, Barros J, and Medard M, et al.. On counteracting Byzantine attacks in network coded peer-to-peer networks[J]. IEEE Journal on Selected Areas in Communications: Special Issue on Mission- Critical Infrastructure, 2010, 28(5): 692-702.
  • 5Fragouli C and Soljanin E. Information flow decomposition for network coding [J]. IEEE Transactions on Information Theory, 2006, 52(3): 829-848.
  • 6Langberg M, Sprintson A, and Bruck J. The encoding complexity of network coding[J]. IEEE Transactions on Information Theory, 2006, 52(6): 2386-2397.
  • 7Bhattad K, Ratnakar N, and Koetter R. Minimal network coding for multicast[C]. IEEE International Symposium on Information Theory. Melbourne Australia: IEEE Communication Society, 2005: 1730-1734.
  • 8Kim M, Medard M, and O'Reilly V. Evolutionary approaches to minimizing network coding resources[C]. Proc. of the IEEE INFOCOM 2007. Anchorage, 2007:1991 1999.
  • 9M Kim, Medard M, and O'Reilly U-M. An evolutionary approach to inter-session network coding[C]. Proc. of the IEEE INFOCOM 2009. Rio de Janeiro, 2009: 450-458.
  • 10Koetter R and Medard M. An algebraic approach to network coding[J]. IEEE/ A CM Transactions on Networking, 2003, 11(5): 782-795.

共引文献31

同被引文献10

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部