Network Coding for Engineers
Home > Computing and Information Technology > Computer networking and communications > Network Coding for Engineers
Network Coding for Engineers

Network Coding for Engineers

|
     0     
5
4
3
2
1




International Edition


About the Book

Understand the fundamentals of network coding from an engineering perspective with this accessible guide Network Coding is a method of increasing network throughput and efficiency by encoding and decoding transmitted data packets instead of simply forwarding them. It was mainly a body of information theory until the rise of random linear networking coding (RLNC), a method ideally suited to wireless networks and other cooperative environments. The ease of introducing network coding to legacy systems and the resulting gains in efficiency have made this a widely applied technology with the potential to revolutionize networked communications. Network Coding for Engineers introduces the fundamentals of this exciting subject from an engineering perspective. Beginning with the basics, including step-by-step details for implementing network coding and current applications, it also highlights potential uses of network coding in the communications technologies of the future. The result is an innovative and accessible introduction to a subject quickly becoming indispensable. Network Coding for Engineers readers will also find: A structure that facilitates gradual deepening of knowledge, ideal for students and new readers Follows a semester-long course curriculum structure, making it suitable for direct adaptation for academic purposes Detailed discussion of future applications in technology areas including post-quantum cryptography, 6G, and more Design principles for different network models, such as multi-path and mesh networks Network Coding for Engineers is ideal for electrical engineering and computer science students, particularly those studying advanced networking and communications and related subjects.

Table of Contents:
List of Figures xiii List of Tables xvii About The Authors xix Preface xxiii Acknowledgments xxv Acronyms xxvii 1 Introduction 1 1.1 Vision and Outline 2 1.2 Coding 5 1.3 Data as Mutable – A Relaxation 6 1.3.1 Immutable Data 7 1.3.2 Mutable Data 8 1.4 Network Coding – Data as Equations 9 1.5 Use Cases and Examples 9 1.5.1 Addressing Bottlenecks 10 1.5.2 Addressing Packet Drops in a Point-to-Point Communication 11 1.5.3 Multiple Receivers – Reliable Broadcast 14 1.5.4 Recoding and Multi-hop Networks 15 1.5.5 Distributed Storage – Incast 16 1.5.6 Security 16 1.6 A Toolbox for Implementing Network Coding 17 1.6.1 Tool 1: The Python Programming Language 17 1.6.2 Getting Python (Step-by-Step)* 18 1.6.3 Tool 2: PyErasure – Erasure Correcting Algorithms in Python 19 1.7 Summary 22 Additional Reading Materials 22 References 22 2 Finite Field Arithmetic for Network Coding 25 2.1 (Not So) Brute Force Determination of Inverses 27 2.2 Division in the Integers and Greatest Common Divisors 28 2.3 Division with Modulo in the Integers – Why Primes 32 2.3.1 Existence of Multiplicative Inverses** 34 2.4 Prime Fields 37 2.5 Mathematical Aside: Beyond Linear Equations** 38 2.6 Extension Fields 40 2.6.1 Suitability for Binary Data 41 2.6.2 Basics of Extension Fields 43 2.6.3 Binary Extension Field 44 2.7 Polynomial Multiplication/Division 46 2.7.1 Binary Extension Field Multiplication 46 2.7.2 Binary Extension Field Division 48 2.8 Primitive Polynomials 48 2.9 Polynomials in Delay – Data Streams 50 2.10 Solutions 52 2.11 Summary 52 Additional Reading Materials 53 References 53 3 Finite Field Implementations for Network Coding* 55 3.1 Binary Field Implementations 57 3.2 Binary Extension Field Implementations 58 3.2.1 Runtime Addition and Subtraction 59 3.2.2 Runtime Multiplication and Division 59 3.2.3 Runtime Division Algorithm 63 3.2.4 Full Multiplication Table 66 3.2.5 Log and AntiLog Table 68 3.2.6 Extended Log and AntiLog Table 71 3.3 Extended Euclidean Algorithm** 76 3.3.1 Find Degree Function 82 3.4 Summary 83 Additional Reading Materials 83 References 83 4 Coding for Erasures 85 4.1 From Chunks to Packets 86 4.2 Erasure Resilience 89 4.3 Gauss–Jordan Elimination 89 4.4 Code Construction 92 4.4.1 Proportion of Non-invertible Matrices 92 4.4.2 Non-RLNC Erasure Codes 94 4.4.3 Simple Scenario to Evaluate Potential Gain 94 4.5 Innovative Packet and Acknowledgment 96 4.5.1 Innovative Packet 96 4.5.2 Role of Acknowledgments 98 4.6 Network Coding for Losses 100 4.6.1 Coding Until Completion 102 4.6.2 Coding Until Completion – Sliding Window 104 4.6.3 Semi-systematic Code with Feedback 107 4.7 Queueing and Network Coding 109 4.7.1 Managing Queue Size at the Sender 109 4.7.2 Feedback for Network Coding and Its Implications 109 4.7.3 A Quick Primer on Queueing Theory 111 4.7.4 The Magic of Independent Exponentials 114 4.7.5 Relating Average Queue Length to Average Waiting Time 117 4.7.6 Drop When Seen 119 4.7.7 Drop When Decoded 119 4.8 Summary 122 Additional Reading Materials 122 References 122 5 Designing of Protocols with Network Coding 125 5.1 TCP Variants 128 5.2 Logical Description of TCP/NC 129 5.3 Seen Packets and Congestion Control 130 5.4 Mechanisms of Use of Seen Packets 131 5.4.1 Source Side 134 5.4.2 Receiver Side 134 5.4.3 Soundness of the Protocol 135 5.5 Queueing Analysis for an Idealized Case of TCP/NC 136 5.5.1 System Model 136 5.5.2 Queue Update Mechanism 137 5.5.3 Queueing Analysis 138 5.6 Performance Analysis 141 5.6.1 A Model for Congestion Control 142 5.6.2 Intuition 144 5.6.3 Throughput Analysis for TCP* 145 5.6.4 Throughput Analysis for TCP/NC 148 5.6.5 TCP/NC Average Throughput 151 5.7 Summary 152 Additional Reading Materials 152 References 153 6 Implementation of Network Coding Protocols 155 6.1 A Real-World Implementation of TCP/NC 155 6.1.1 Sender-Side Module 155 6.1.2 Receiver-Side Module 160 6.1.3 Discussion of Implementation Parameters 162 6.1.4 Recoding Process 168 6.1.5 Feedback Mechanism 168 6.1.6 Implementation Strategies 169 6.2 Adaptive Sliding Window 172 6.2.1 Adaptive Coding Algorithm 173 6.3 Network Coding and QUIC 181 6.3.1 Flexible Erasure Correction (FlEC) 183 6.3.2 Bulk File Transfers 186 6.3.3 Buffer-limited File Transfers 187 6.3.4 Delay-constrained Messaging 189 6.4 Summary 193 Additional Reading Materials 194 References 194 7 Network as a Matrix 197 7.1 Mathematical Model 197 7.2 Routing 198 7.3 Algebraic Network Coding 199 7.3.1 Formulation 199 7.3.2 The Network as a Matrix 203 7.3.3 Multicast 207 7.3.4 Multiple Sources and Multiple Sinks** 209 7.4 Erasures 214 7.5 An Aside on Misapplication 215 7.6 Summary 216 Additional Reading Materials 217 References 217 8 Security and Network Coding 219 8.1 Information Theoretic Security – Quick Primer 220 8.2 Data Hiding 224 8.2.1 Hiding Equations 224 8.2.2 Hiding Coefficients 227 8.3 Pollution Attacks 228 8.3.1 Detection of Pollution After Decoding 228 8.3.2 Detection of Pollution Without Decoding** 230 8.4 Summary 232 Additional Reading Materials 232 References 232 Concluding Remarks 235 Appendix Sample List of Patents 237 Index 241


Best Sellers


Product Details
  • ISBN-13: 9781394217274
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-IEEE Press
  • Height: 241 mm
  • No of Pages: 272
  • Returnable: Y
  • Spine Width: 36 mm
  • Width: 165 mm
  • ISBN-10: 1394217277
  • Publisher Date: 04 Feb 2025
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Returnable: Y
  • Weight: 499 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Network Coding for Engineers
John Wiley & Sons Inc -
Network Coding for Engineers
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Network Coding for Engineers

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!