Robust network codes for unicast connections: A case study

Salim Rouayheb, Alex Sprintson, Costas Georghiades

Research output: Contribution to journalArticlepeer-review

29 Scopus citations

Abstract

We consider the problem of establishing reliable unicast connections across a communication network with nonuniform edge capacities. Our goal is to provide instantaneous recovery from single edge failures. With instantaneous recovery, the destination node can decode the packets sent by the source node even if one of the network edges fails, without the need of retransmission or rerouting. It has been recognized that the network coding technique offers significant advantages for this problem over standard solutions such as disjoint path routing and diversity coding. We focus on two cases of practical interest: 1) backup protection of a single flow that can be split into two subflows; and 2) shared backup protection of two unicast flows. We present an efficient network coding algorithm that operates over a small finite field (GF(2)). The small size of the underlying field results in a significant reduction in the computational and communication overhead associated with the practical implementation of the network coding technique. Our algorithm exploits the unique structure of minimum coding networks, i.e., networks that do not contain redundant edges. We also consider the related capacity reservation problem and present an approximation algorithm that finds a solution whose cost is at most two times more than the optimum.

Original languageEnglish (US)
Article number5648398
Pages (from-to)644-656
Number of pages13
JournalIEEE/ACM Transactions on Networking
Volume19
Issue number3
DOIs
StatePublished - Jun 2011
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Keywords

  • Instantaneous recovery
  • network coding
  • reliable communication
  • unicast

Fingerprint

Dive into the research topics of 'Robust network codes for unicast connections: A case study'. Together they form a unique fingerprint.

Cite this