SlideShare a Scribd company logo
1 of 4
Collaborative Data Collection with Opportunistic
                    Network Erasure Coding
Abstract—

      Disruptive network communication entails transient network connectivity,
asymmetric links and unstable nodes, which pose severe challenges to data
collection in sensor networks. Erasure coding can be applied to mitigate the
dependency of feedback in such a disruptive network condition, improving data
collection. However, the collaborative data collection through an in-network
erasure coding approach has been underexplored. In this paper, we present ONEC,
Opportunistic Network Erasure Coding protocol, to collaboratively collect data in
dynamic disruptive networks. ONEC derives the probability distribution of coding
degree in each node and enable opportunistic in-network recoding, and guarantee
the recovery of original sensor data can be achieved with high probability upon
receiving any sufficient amount of encoded packets. First, it develops a recursive
decomposition structure to conduct probability distribution deconvolution,
supporting heterogeneous data rates. Second, every node conducts selective in
network recoding of its own sensing data and received packets, including those
opportunistic overheard packets. Last, ONEC can efficiently recover raw data from
received encoded packets, taking advantages of low decoding complexity of
erasure codes. We evaluate and show that our ONEC can achieve efficient data
collection in various disruptive network settings. Moreover, ONEC outperforms
other epidemic network coding approaches in terms of network goodput,
communication cost and energy consumption.
Existing System:

      The erasure codes were initially proposed to enable reliable broadcast over
“one-to-many” communication conditions, where feedback is very expensive or
even infeasible, such as satellite broadcast or Internet video broadcast applications.
LT (Luby Transform) code [2] is the first effective implementation of erasure
codes with low encoding and decoding complexity. Due to its low complexity in
both encoding and decoding sides, it is appropriate to be utilized in wireless sensor
nodes where the computing capability is limited. However, the redundant coding
overhead introduced can compromise its efficiency, if LT code applies without
alteration to the network where multiple data sources exist. The core of LT code is
the RSD (Robust Soliton Distribution), which is a probability distribution of
encoding degree for each packet. The data recovery can be proved as high
probability, providing that each degree in encoding packet is independently drawn
from RSD, and sufficient amount of packets arrive at decoder, e.g. K+c ・ √ K・
ln2(K δ ), and K is the symbol size. As each node encodes its own k symbols using
individual RSD, the overhead for successfully decoding, N ・ c ・ √ k ・ ln2( k δ
), scales with the network size N. In the other hand, if we view all the source
symbols as originating from single “super node”, allowing recoding in the
forwarding nodes, the message overhead will be significantly reduced to c ・ √ N
・ k ・ ln2(N·k δ ) for large network size N. For example, in Figure 1, every node
has different symbol sizes to send, e.g. 50 or 100 respectively, totaling 400 in the
network. In the first case shown in the upper graph of Figure 1, individual RSD is
applied to generate encoded packets, and no recoding occurs in the forwarding
nodes. The total amount 650Moreover, intermediate recoding takes advantage of
opportunistic overhearing in wireless broadcasting to combat communication loss.
Those two reasons motivate the design of ONEC for a collaborative data
collection.
Proposed System:

       In this paper, we present the design, implementation, and evaluation of
ONEC, an Opportunistic Network Erasure Coding protocol for reliable data
delivery over disruptive sensor networks. ONEC is designed to transform the “end
to-end” paradigm of LT codes to “manyto- one” network LT codes. Firstly, it
adopts recursive decomposition structure to conduct probability distribution
deconvolution, supporting heterogeneous symbol sizes in each source nodes.
Secondly, it allows every node to carry out selective recoding from its own sensing
data and received packets. Thirdly, it enables opportunistic recoding on the
overheard packets, based on relay hop distance. It can compensate the information
deficit due to lossy transceiving between neighbor nodes. Lastly, ONEC make
packet degree distribution closely approximate the RSD, which enables high
probability decoding with low computation complexity. The preliminary work is
published in [3], and we provide comprehensive design and theoretic analysis
details in this articleLow coding overhead: ONEC utilizes the intermediate
recoding to reduce the redundant encoding overhead. The recursive deconvolution
only takes place during network initialization and the time when network dynamics
happen. The control message cost for relaying decomposed degree distribution
message is minimized.
   •   Disruption tolerance: By enabling opportunistic encoding in the
       intermediate nodes on the forwarding paths, ONEC becomes resilient to
       disruptive networks. Opportunistic overhearing of symbols are incorporated
into the encoded packets to make the upstream nodes sustainable in presence
    of some failure in downstream nodes.
•   Low latency and buffer space: In ONEC, the intermediate nodes recode
    packets but not decode them. Hence, little buffer space is required to store
    and conduct XOR on received encoded packets.
•   Performance with low coding complexity: Extensive performance analysis
    reveals the advantages of ONEC over existing methods, in terms of network
    goodput, message complexity and buffer space. The rest of the paper is
    organized as follows.
In section 2, we summarize the related works. Then we presents the designs of
ONEC protocol in section 3. In the following section 4, we report our
simulation results in different network configurations.

More Related Content

What's hot

Network fundamental
Network fundamentalNetwork fundamental
Network fundamentalashrawi92
 
Chapter 4
Chapter 4Chapter 4
Chapter 4asguna
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINEnergy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINPrajwal Panchmahalkar
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - PresentationLaili Aidi
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacherySenthilvel S
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلاییmorteza zilaie bouri
 
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSEFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
 
Universal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastUniversal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastPvrtechnologies Nellore
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Haya Saani
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - JournalLaili Aidi
 

What's hot (18)

Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINEnergy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPIN
 
Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Class note
Class noteClass note
Class note
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی
 
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSEFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
 
Universal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastUniversal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicast
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 

Similar to Collaborative data collection with opportunistic

SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)Prof Ansari
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelIJMER
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkIJCNCJournal
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyIJRES Journal
 
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkA Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkCSCJournals
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
 
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSEFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingDr. Amarjeet Singh
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...IJCNCJournal
 

Similar to Collaborative data collection with opportunistic (20)

SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc Model
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
 
Address Interleaving in NoCs
Address Interleaving in NoCsAddress Interleaving in NoCs
Address Interleaving in NoCs
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
3
33
3
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
 
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkA Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
 
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSEFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 

More from IMPULSE_TECHNOLOGY (20)

17
1717
17
 
16
1616
16
 
15
1515
15
 
25
2525
25
 
24
2424
24
 
23
2323
23
 
22
2222
22
 
21
2121
21
 
20
2020
20
 
19
1919
19
 
18
1818
18
 
16
1616
16
 
15
1515
15
 
14
1414
14
 
13
1313
13
 
12
1212
12
 
11
1111
11
 
10
1010
10
 
9
99
9
 
8
88
8
 

Collaborative data collection with opportunistic

  • 1. Collaborative Data Collection with Opportunistic Network Erasure Coding Abstract— Disruptive network communication entails transient network connectivity, asymmetric links and unstable nodes, which pose severe challenges to data collection in sensor networks. Erasure coding can be applied to mitigate the dependency of feedback in such a disruptive network condition, improving data collection. However, the collaborative data collection through an in-network erasure coding approach has been underexplored. In this paper, we present ONEC, Opportunistic Network Erasure Coding protocol, to collaboratively collect data in dynamic disruptive networks. ONEC derives the probability distribution of coding degree in each node and enable opportunistic in-network recoding, and guarantee the recovery of original sensor data can be achieved with high probability upon receiving any sufficient amount of encoded packets. First, it develops a recursive decomposition structure to conduct probability distribution deconvolution, supporting heterogeneous data rates. Second, every node conducts selective in network recoding of its own sensing data and received packets, including those opportunistic overheard packets. Last, ONEC can efficiently recover raw data from received encoded packets, taking advantages of low decoding complexity of erasure codes. We evaluate and show that our ONEC can achieve efficient data collection in various disruptive network settings. Moreover, ONEC outperforms other epidemic network coding approaches in terms of network goodput, communication cost and energy consumption.
  • 2. Existing System: The erasure codes were initially proposed to enable reliable broadcast over “one-to-many” communication conditions, where feedback is very expensive or even infeasible, such as satellite broadcast or Internet video broadcast applications. LT (Luby Transform) code [2] is the first effective implementation of erasure codes with low encoding and decoding complexity. Due to its low complexity in both encoding and decoding sides, it is appropriate to be utilized in wireless sensor nodes where the computing capability is limited. However, the redundant coding overhead introduced can compromise its efficiency, if LT code applies without alteration to the network where multiple data sources exist. The core of LT code is the RSD (Robust Soliton Distribution), which is a probability distribution of encoding degree for each packet. The data recovery can be proved as high probability, providing that each degree in encoding packet is independently drawn from RSD, and sufficient amount of packets arrive at decoder, e.g. K+c ・ √ K・ ln2(K δ ), and K is the symbol size. As each node encodes its own k symbols using individual RSD, the overhead for successfully decoding, N ・ c ・ √ k ・ ln2( k δ ), scales with the network size N. In the other hand, if we view all the source symbols as originating from single “super node”, allowing recoding in the forwarding nodes, the message overhead will be significantly reduced to c ・ √ N ・ k ・ ln2(N·k δ ) for large network size N. For example, in Figure 1, every node has different symbol sizes to send, e.g. 50 or 100 respectively, totaling 400 in the network. In the first case shown in the upper graph of Figure 1, individual RSD is applied to generate encoded packets, and no recoding occurs in the forwarding nodes. The total amount 650Moreover, intermediate recoding takes advantage of
  • 3. opportunistic overhearing in wireless broadcasting to combat communication loss. Those two reasons motivate the design of ONEC for a collaborative data collection. Proposed System: In this paper, we present the design, implementation, and evaluation of ONEC, an Opportunistic Network Erasure Coding protocol for reliable data delivery over disruptive sensor networks. ONEC is designed to transform the “end to-end” paradigm of LT codes to “manyto- one” network LT codes. Firstly, it adopts recursive decomposition structure to conduct probability distribution deconvolution, supporting heterogeneous symbol sizes in each source nodes. Secondly, it allows every node to carry out selective recoding from its own sensing data and received packets. Thirdly, it enables opportunistic recoding on the overheard packets, based on relay hop distance. It can compensate the information deficit due to lossy transceiving between neighbor nodes. Lastly, ONEC make packet degree distribution closely approximate the RSD, which enables high probability decoding with low computation complexity. The preliminary work is published in [3], and we provide comprehensive design and theoretic analysis details in this articleLow coding overhead: ONEC utilizes the intermediate recoding to reduce the redundant encoding overhead. The recursive deconvolution only takes place during network initialization and the time when network dynamics happen. The control message cost for relaying decomposed degree distribution message is minimized. • Disruption tolerance: By enabling opportunistic encoding in the intermediate nodes on the forwarding paths, ONEC becomes resilient to disruptive networks. Opportunistic overhearing of symbols are incorporated
  • 4. into the encoded packets to make the upstream nodes sustainable in presence of some failure in downstream nodes. • Low latency and buffer space: In ONEC, the intermediate nodes recode packets but not decode them. Hence, little buffer space is required to store and conduct XOR on received encoded packets. • Performance with low coding complexity: Extensive performance analysis reveals the advantages of ONEC over existing methods, in terms of network goodput, message complexity and buffer space. The rest of the paper is organized as follows. In section 2, we summarize the related works. Then we presents the designs of ONEC protocol in section 3. In the following section 4, we report our simulation results in different network configurations.