SlideShare a Scribd company logo
1 of 4
Collaborative Data Collection with Opportunistic
                    Network Erasure Coding
Abstract—

      Disruptive network communication entails transient network connectivity,
asymmetric links and unstable nodes, which pose severe challenges to data
collection in sensor networks. Erasure coding can be applied to mitigate the
dependency of feedback in such a disruptive network condition, improving data
collection. However, the collaborative data collection through an in-network
erasure coding approach has been underexplored. In this paper, we present ONEC,
Opportunistic Network Erasure Coding protocol, to collaboratively collect data in
dynamic disruptive networks. ONEC derives the probability distribution of coding
degree in each node and enable opportunistic in-network recoding, and guarantee
the recovery of original sensor data can be achieved with high probability upon
receiving any sufficient amount of encoded packets. First, it develops a recursive
decomposition structure to conduct probability distribution deconvolution,
supporting heterogeneous data rates. Second, every node conducts selective in
network recoding of its own sensing data and received packets, including those
opportunistic overheard packets. Last, ONEC can efficiently recover raw data from
received encoded packets, taking advantages of low decoding complexity of
erasure codes. We evaluate and show that our ONEC can achieve efficient data
collection in various disruptive network settings. Moreover, ONEC outperforms
other epidemic network coding approaches in terms of network goodput,
communication cost and energy consumption.
Existing System:

      The erasure codes were initially proposed to enable reliable broadcast over
“one-to-many” communication conditions, where feedback is very expensive or
even infeasible, such as satellite broadcast or Internet video broadcast applications.
LT (Luby Transform) code [2] is the first effective implementation of erasure
codes with low encoding and decoding complexity. Due to its low complexity in
both encoding and decoding sides, it is appropriate to be utilized in wireless sensor
nodes where the computing capability is limited. However, the redundant coding
overhead introduced can compromise its efficiency, if LT code applies without
alteration to the network where multiple data sources exist. The core of LT code is
the RSD (Robust Soliton Distribution), which is a probability distribution of
encoding degree for each packet. The data recovery can be proved as high
probability, providing that each degree in encoding packet is independently drawn
from RSD, and sufficient amount of packets arrive at decoder, e.g. K+c ・ √ K・
ln2(K δ ), and K is the symbol size. As each node encodes its own k symbols using
individual RSD, the overhead for successfully decoding, N ・ c ・ √ k ・ ln2( k δ
), scales with the network size N. In the other hand, if we view all the source
symbols as originating from single “super node”, allowing recoding in the
forwarding nodes, the message overhead will be significantly reduced to c ・ √ N
・ k ・ ln2(N·k δ ) for large network size N. For example, in Figure 1, every node
has different symbol sizes to send, e.g. 50 or 100 respectively, totaling 400 in the
network. In the first case shown in the upper graph of Figure 1, individual RSD is
applied to generate encoded packets, and no recoding occurs in the forwarding
nodes. The total amount 650Moreover, intermediate recoding takes advantage of
opportunistic overhearing in wireless broadcasting to combat communication loss.
Those two reasons motivate the design of ONEC for a collaborative data
collection.
Proposed System:

       In this paper, we present the design, implementation, and evaluation of
ONEC, an Opportunistic Network Erasure Coding protocol for reliable data
delivery over disruptive sensor networks. ONEC is designed to transform the “end
to-end” paradigm of LT codes to “manyto- one” network LT codes. Firstly, it
adopts recursive decomposition structure to conduct probability distribution
deconvolution, supporting heterogeneous symbol sizes in each source nodes.
Secondly, it allows every node to carry out selective recoding from its own sensing
data and received packets. Thirdly, it enables opportunistic recoding on the
overheard packets, based on relay hop distance. It can compensate the information
deficit due to lossy transceiving between neighbor nodes. Lastly, ONEC make
packet degree distribution closely approximate the RSD, which enables high
probability decoding with low computation complexity. The preliminary work is
published in [3], and we provide comprehensive design and theoretic analysis
details in this articleLow coding overhead: ONEC utilizes the intermediate
recoding to reduce the redundant encoding overhead. The recursive deconvolution
only takes place during network initialization and the time when network dynamics
happen. The control message cost for relaying decomposed degree distribution
message is minimized.
   •   Disruption tolerance: By enabling opportunistic encoding in the
       intermediate nodes on the forwarding paths, ONEC becomes resilient to
       disruptive networks. Opportunistic overhearing of symbols are incorporated
into the encoded packets to make the upstream nodes sustainable in presence
    of some failure in downstream nodes.
•   Low latency and buffer space: In ONEC, the intermediate nodes recode
    packets but not decode them. Hence, little buffer space is required to store
    and conduct XOR on received encoded packets.
•   Performance with low coding complexity: Extensive performance analysis
    reveals the advantages of ONEC over existing methods, in terms of network
    goodput, message complexity and buffer space. The rest of the paper is
    organized as follows.
In section 2, we summarize the related works. Then we presents the designs of
ONEC protocol in section 3. In the following section 4, we report our
simulation results in different network configurations.

More Related Content

What's hot

Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
ashrawi92
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
asguna
 
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINEnergy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPIN
Prajwal Panchmahalkar
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی
morteza zilaie bouri
 

What's hot (18)

Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINEnergy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPIN
 
Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Class note
Class noteClass note
Class note
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی
 
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSEFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
 
Universal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastUniversal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicast
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 

Viewers also liked

Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
jpstudcorner
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
Editor IJMTER
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Editor IJMTER
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Editor IJMTER
 

Viewers also liked (20)

SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
 
Ijnsa050202
Ijnsa050202Ijnsa050202
Ijnsa050202
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...
Paper Review : Measurement and Modeling of the Origins of Starvation of Conge...
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION PRIVACY PRESERVING DATA MINING BASED  ON VECTOR QUANTIZATION
PRIVACY PRESERVING DATA MINING BASED ON VECTOR QUANTIZATION
 
Real-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering
Real-Time Top-R Topic Detection on Twitter with Topic Hijack FilteringReal-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering
Real-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering
 
Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...Additive gaussian noise based data perturbation in multi level trust privacy ...
Additive gaussian noise based data perturbation in multi level trust privacy ...
 
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
JPJ1415 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for ...
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
 
Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...Accuracy constrained privacy-preserving access control mechanism for relation...
Accuracy constrained privacy-preserving access control mechanism for relation...
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
SECURED FREQUENT ITEMSET DISCOVERY IN MULTI PARTY DATA ENVIRONMENT FREQUENT I...
 
Privacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sitesPrivacy policy inference of user uploaded images on content sharing sites
Privacy policy inference of user uploaded images on content sharing sites
 
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MININGA SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
A SURVEY ON PRIVACY PRESERVING ASSOCIATION RULE MINING
 
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...
 
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing SchemePrivacy Preserved Distributed Data Sharing with Load Balancing Scheme
Privacy Preserved Distributed Data Sharing with Load Balancing Scheme
 

Similar to Collaborative data collection with opportunistic

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
IJCNCJournal
 

Similar to Collaborative data collection with opportunistic (20)

SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc Model
 
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer NetworkAn Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network
 
Address Interleaving in NoCs
Address Interleaving in NoCsAddress Interleaving in NoCs
Address Interleaving in NoCs
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
3
33
3
 
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMOPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEM
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
 
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes NetworkA Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
A Novel Path Tracing Scheme In All-Optical Networks Using Benes Network
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...
 
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSEFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
 
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...Minimizing mobiles communication time using modified binary exponential backo...
Minimizing mobiles communication time using modified binary exponential backo...
 

More from IMPULSE_TECHNOLOGY

More from IMPULSE_TECHNOLOGY (20)

17
1717
17
 
16
1616
16
 
15
1515
15
 
25
2525
25
 
24
2424
24
 
23
2323
23
 
22
2222
22
 
21
2121
21
 
20
2020
20
 
19
1919
19
 
18
1818
18
 
16
1616
16
 
15
1515
15
 
14
1414
14
 
13
1313
13
 
12
1212
12
 
11
1111
11
 
10
1010
10
 
9
99
9
 
8
88
8
 

Recently uploaded

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Collaborative data collection with opportunistic

  • 1. Collaborative Data Collection with Opportunistic Network Erasure Coding Abstract— Disruptive network communication entails transient network connectivity, asymmetric links and unstable nodes, which pose severe challenges to data collection in sensor networks. Erasure coding can be applied to mitigate the dependency of feedback in such a disruptive network condition, improving data collection. However, the collaborative data collection through an in-network erasure coding approach has been underexplored. In this paper, we present ONEC, Opportunistic Network Erasure Coding protocol, to collaboratively collect data in dynamic disruptive networks. ONEC derives the probability distribution of coding degree in each node and enable opportunistic in-network recoding, and guarantee the recovery of original sensor data can be achieved with high probability upon receiving any sufficient amount of encoded packets. First, it develops a recursive decomposition structure to conduct probability distribution deconvolution, supporting heterogeneous data rates. Second, every node conducts selective in network recoding of its own sensing data and received packets, including those opportunistic overheard packets. Last, ONEC can efficiently recover raw data from received encoded packets, taking advantages of low decoding complexity of erasure codes. We evaluate and show that our ONEC can achieve efficient data collection in various disruptive network settings. Moreover, ONEC outperforms other epidemic network coding approaches in terms of network goodput, communication cost and energy consumption.
  • 2. Existing System: The erasure codes were initially proposed to enable reliable broadcast over “one-to-many” communication conditions, where feedback is very expensive or even infeasible, such as satellite broadcast or Internet video broadcast applications. LT (Luby Transform) code [2] is the first effective implementation of erasure codes with low encoding and decoding complexity. Due to its low complexity in both encoding and decoding sides, it is appropriate to be utilized in wireless sensor nodes where the computing capability is limited. However, the redundant coding overhead introduced can compromise its efficiency, if LT code applies without alteration to the network where multiple data sources exist. The core of LT code is the RSD (Robust Soliton Distribution), which is a probability distribution of encoding degree for each packet. The data recovery can be proved as high probability, providing that each degree in encoding packet is independently drawn from RSD, and sufficient amount of packets arrive at decoder, e.g. K+c ・ √ K・ ln2(K δ ), and K is the symbol size. As each node encodes its own k symbols using individual RSD, the overhead for successfully decoding, N ・ c ・ √ k ・ ln2( k δ ), scales with the network size N. In the other hand, if we view all the source symbols as originating from single “super node”, allowing recoding in the forwarding nodes, the message overhead will be significantly reduced to c ・ √ N ・ k ・ ln2(N·k δ ) for large network size N. For example, in Figure 1, every node has different symbol sizes to send, e.g. 50 or 100 respectively, totaling 400 in the network. In the first case shown in the upper graph of Figure 1, individual RSD is applied to generate encoded packets, and no recoding occurs in the forwarding nodes. The total amount 650Moreover, intermediate recoding takes advantage of
  • 3. opportunistic overhearing in wireless broadcasting to combat communication loss. Those two reasons motivate the design of ONEC for a collaborative data collection. Proposed System: In this paper, we present the design, implementation, and evaluation of ONEC, an Opportunistic Network Erasure Coding protocol for reliable data delivery over disruptive sensor networks. ONEC is designed to transform the “end to-end” paradigm of LT codes to “manyto- one” network LT codes. Firstly, it adopts recursive decomposition structure to conduct probability distribution deconvolution, supporting heterogeneous symbol sizes in each source nodes. Secondly, it allows every node to carry out selective recoding from its own sensing data and received packets. Thirdly, it enables opportunistic recoding on the overheard packets, based on relay hop distance. It can compensate the information deficit due to lossy transceiving between neighbor nodes. Lastly, ONEC make packet degree distribution closely approximate the RSD, which enables high probability decoding with low computation complexity. The preliminary work is published in [3], and we provide comprehensive design and theoretic analysis details in this articleLow coding overhead: ONEC utilizes the intermediate recoding to reduce the redundant encoding overhead. The recursive deconvolution only takes place during network initialization and the time when network dynamics happen. The control message cost for relaying decomposed degree distribution message is minimized. • Disruption tolerance: By enabling opportunistic encoding in the intermediate nodes on the forwarding paths, ONEC becomes resilient to disruptive networks. Opportunistic overhearing of symbols are incorporated
  • 4. into the encoded packets to make the upstream nodes sustainable in presence of some failure in downstream nodes. • Low latency and buffer space: In ONEC, the intermediate nodes recode packets but not decode them. Hence, little buffer space is required to store and conduct XOR on received encoded packets. • Performance with low coding complexity: Extensive performance analysis reveals the advantages of ONEC over existing methods, in terms of network goodput, message complexity and buffer space. The rest of the paper is organized as follows. In section 2, we summarize the related works. Then we presents the designs of ONEC protocol in section 3. In the following section 4, we report our simulation results in different network configurations.