您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2018, Vol. 53 ›› Issue (1): 75-82.doi: 10.6040/j.issn.1671-9352.2.2017.325

• • 上一篇    下一篇

最大距离可分码在网络编码纠错中的应用

章广志1,2,蔡绍斌1*,马春华2,张东秋2   

  1. 1.哈尔滨工程大学计算机学院, 黑龙江 哈尔滨 150001;2.绥化学院信息工程学院, 黑龙江 绥化 152000
  • 收稿日期:2017-08-28 出版日期:2018-01-20 发布日期:2018-01-19
  • 通讯作者: 蔡绍滨(1973— ),男,博士,教授,研究方向为传感器网络. E-mail:caishaobin@hrbeu.edu.cn E-mail:409951652@qq.com
  • 作者简介:章广志(1981— ),男,硕士研究生,讲师,研究方向为网络编码. E-mail:409951652@qq.com
  • 基金资助:
    绥化市科技局项目(SHKJ2015-015,SHKJ2015-014);黑龙江省教育厅科技项目(2016-KYYWF-0937)

Application of maximum distance separable codes in the error correction of the network coding

ZHANG Guang-zhi1,2, CAI Shao-bin1*, MA Chun-hua2, ZHANG Dong-qiu2   

  1. 1. College of Computer, Harbin Engineering University, Harbin 150001, Heilongjiang, China;
    2. Department of Information Engineering, Suihua University, Suihua 152000, Heilongjiang, China
  • Received:2017-08-28 Online:2018-01-20 Published:2018-01-19

摘要: 在网络编码中,由于网络的所有中间节点都会对上游消息进行重新组合,所以很少的错误也有可能扩散至整个网络而造成信宿节点译码失败。针对该问题,提出一种简单的网络编码纠错方案。该方案在信源处利用一个已有的最大距离可分码的生成矩阵G将k个消息编码成n个消息(k

关键词: 网络纠错码, 网络编码, 错误扩散

Abstract: In network coding, for the intermediate nodes will combine the received messages, it is potential that a small number of errors will be spread over all the network. This will make the sinks fail to decode the original messages. Aiming at this problem, a simple scheme for network error-correction codes(NEC)is proposed. In the source, the generating matrix G of a known MDS(maximum distance separable)code is adopted to code k messages to n messages. The n messages will be transmitted through the network with network coding scheme. We can simply take a common network coding algorithm, which is determined or random, to construct this NEC. It is no need to consider the error spread issue. The coding finite field for all the nodes is Q, while the coefficients of local coding kernel in network coding are selected from the finite filed q. The simulation shows that, even if Q is not bigger than q, it is also a high probability that NEC will maintain its MDS characteristics.

Key words: network error-correction codes, network coding, error spread

中图分类号: 

  • TP393
[1] ZHANG Z. Linear network error correction codes in packet networks[J]. IEEE Transactions on Information Theory, 2008, 54(1):209-218.
[2] YANG S, YEUNG R W, CHI K N. Refined coding bounds and code constructions for coherent network error correction[J]. IEEE Transactions on Information Theory, 2009, 57(3):1409-1424.
[3] XUAN G, FU F W, ZHANG Z. Construction of network error correction codes in packet networks[C] // International Symposium on NETWORKING Coding. Chamonix: IEEE, 2011:1-6.
[4] MATSUMOTO R. Construction algorithm for network error-correcting codes attaining the Singleton bound[J]. Ieice Transactions on Fundamentals of Electronics Communications & Computer Sciences, 2007, 90(9):1729-1735.
[5] BAHRAMGIRI H, LAHOUTI F. Robust network coding against path failures[J]. Communications Iet, 2010, 4(3):272-284.
[6] KOETTER R, KSCHISCHANG F R. Coding for errors and erasures in random network coding[J]. IEEE Transactions on Information Theory, 2008, 54(8):3579-3591.
[7] SILVA D, KSCHISCHANG F R. Using rank-metric codes for error correction in random network coding[C] // IEEE International Symposium on Information Theory. Nice: IEEE, 2007:796-800.
[8] SILVA D, KSCHISCHANG F R, KOETTER R. A rank-metric approach to error control in random network coding[J]. IEEE Transactions on Information Theory, 2008, 54(9):3951-3967.
[9] GABIDULIN È M. Theory of codes with maximum rank distance[J]. Problems of Information Transmission, 1985, 21(1):3-16.
[1] 李艳平,齐艳姣,张凯,魏旭光. 支持用户撤销的多授权机构的属性加密方案[J]. 山东大学学报(理学版), 2018, 53(7): 75-84.
[2] 李阳,程雄,童言,陈伟,秦涛,张剑,徐明迪. 基于流量统计特征的潜在威胁用户挖掘方法[J]. 山东大学学报(理学版), 2018, 53(1): 83-88.
[3] 赵光远,秦丰林,郭晓东. 基于P2P的网络测量云平台的设计与实现[J]. 山东大学学报(理学版), 2017, 52(12): 104-110.
[4] 黄淑芹,徐勇,王平水. 基于概率矩阵分解的用户相似度计算方法及推荐应用[J]. 山东大学学报(理学版), 2017, 52(11): 37-43.
[5] 王亚奇,王静. 考虑好奇心理机制的动态复杂网络谣言传播研究[J]. 山东大学学报(理学版), 2017, 52(6): 99-104.
[6] 陈广瑞,陈兴蜀,王毅桐,葛龙. 一种IaaS多租户环境下虚拟机软件更新服务机制[J]. 山东大学学报(理学版), 2017, 52(3): 60-67.
[7] 庄政茂,陈兴蜀,邵国林,叶晓鸣. 一种时间相关性的异常流量检测模型[J]. 山东大学学报(理学版), 2017, 52(3): 68-73.
[8] 宋元章,李洪雨,陈媛,王俊杰. 基于分形与自适应数据融合的P2P botnet检测方法[J]. 山东大学学报(理学版), 2017, 52(3): 74-81.
[9] 祝升,周斌,朱湘. 综合用户相似性与话题时效性的影响力用户发现算法[J]. 山东大学学报(理学版), 2016, 51(9): 113-120.
[10] 岳猛,吴志军,姜军. 云计算中基于可用带宽欧氏距离的LDoS攻击检测方法[J]. 山东大学学报(理学版), 2016, 51(9): 92-100.
[11] 李宇溪,王恺璇,林慕清,周福才. 基于匿名广播加密的P2P社交网络隐私保护系统[J]. 山东大学学报(理学版), 2016, 51(9): 84-91.
[12] 苏彬庭,许力,方禾,王峰. 基于Diffie-Hellman的无线Mesh网络快速认证机制[J]. 山东大学学报(理学版), 2016, 51(9): 101-105.
[13] 林丽. 基于核心依存图的新闻事件抽取[J]. 山东大学学报(理学版), 2016, 51(9): 121-126.
[14] 高盛祥,余正涛,秦雨,程韵如,庙介璞. 基于随机游走策略的专家关系网络构建[J]. 山东大学学报(理学版), 2016, 51(7): 30-34.
[15] 张文雅,宋大为,张鹏. 面向垂直搜索基于本体的可读性计算模型[J]. 山东大学学报(理学版), 2016, 51(7): 23-29.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!