{"title":"在带中继的自组网中分发源编码文件的两种方法的比较","authors":"Siddhartha S. Borkotoky, M. Pursley","doi":"10.1109/ITA.2017.8023464","DOIUrl":null,"url":null,"abstract":"We investigate two approaches to fountain-coded broadcast file distribution in an ad hoc packet radio network. In the first method, all destinations receive fountain-coded packets directly from the source. In the second method, after one destination obtains the file, it acts as a relay node by applying continued fountain coding to the file and sending the encoded packets to other destinations. The other destinations combine the fountain-coded packets they received from the source with those they obtain from the relay node. We compare the performance of the two methods when they are employed in a network whose links have Rayleigh fading. As performance benchmarks, we also examine two conventional broadcast techniques that use automatic repeat request (ARQ) for retransmission of erased packets.","PeriodicalId":305510,"journal":{"name":"2017 Information Theory and Applications Workshop (ITA)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A comparison of two methods for fountain-coded file distribution in an ad hoc network with relays\",\"authors\":\"Siddhartha S. Borkotoky, M. Pursley\",\"doi\":\"10.1109/ITA.2017.8023464\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We investigate two approaches to fountain-coded broadcast file distribution in an ad hoc packet radio network. In the first method, all destinations receive fountain-coded packets directly from the source. In the second method, after one destination obtains the file, it acts as a relay node by applying continued fountain coding to the file and sending the encoded packets to other destinations. The other destinations combine the fountain-coded packets they received from the source with those they obtain from the relay node. We compare the performance of the two methods when they are employed in a network whose links have Rayleigh fading. As performance benchmarks, we also examine two conventional broadcast techniques that use automatic repeat request (ARQ) for retransmission of erased packets.\",\"PeriodicalId\":305510,\"journal\":{\"name\":\"2017 Information Theory and Applications Workshop (ITA)\",\"volume\":\"163 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Information Theory and Applications Workshop (ITA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITA.2017.8023464\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Information Theory and Applications Workshop (ITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITA.2017.8023464","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A comparison of two methods for fountain-coded file distribution in an ad hoc network with relays
We investigate two approaches to fountain-coded broadcast file distribution in an ad hoc packet radio network. In the first method, all destinations receive fountain-coded packets directly from the source. In the second method, after one destination obtains the file, it acts as a relay node by applying continued fountain coding to the file and sending the encoded packets to other destinations. The other destinations combine the fountain-coded packets they received from the source with those they obtain from the relay node. We compare the performance of the two methods when they are employed in a network whose links have Rayleigh fading. As performance benchmarks, we also examine two conventional broadcast techniques that use automatic repeat request (ARQ) for retransmission of erased packets.