Next Article in Journal
Optical Fiber-Tip Sensors Based on In-Situ µ-Printed Polymer Suspended-Microbeams
Previous Article in Journal
Molecular Assembly of a Durable HRP-AuNPs/PEDOT:BSA/Pt Biosensor with Detailed Characterizations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Systematic Network Coding for Reliable Content Uploading in Wireless Multimedia Sensor Networks

1
School of Electronic and Electrical Engineering, Sungkyunkwan University, Suwon 16419, Korea
2
Department of Interaction Science, Sungkyunkwan University, Suwon 16419, Korea
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(6), 1824; https://doi.org/10.3390/s18061824
Submission received: 7 May 2018 / Revised: 1 June 2018 / Accepted: 3 June 2018 / Published: 5 June 2018
(This article belongs to the Section Sensor Networks)

Abstract

:
Recently, the wireless sensor network paradigm is shifting toward research aimed at enabling the robust delivery of multimedia content. A challenge is to deliver multimedia content with predefined levels of Quality of Service (QoS) under resource constraints such as bandwidth, energy, and delay. In this paper, we propose a distributed systematic network coding (DSNC) scheme for reliable multimedia content uploading over wireless multimedia sensor networks, in which a large number of multimedia sensor nodes upload their own content to a sink through a cluster head node. The design objective is to increase the reliability and bandwidth-efficient utilization in uploading with low decoding complexity. The proposed scheme consists of two phases: in the first phase, each sensor node distributedly encodes the content into systematic network coding packets and transmits them to the cluster head; then in the second phase, the cluster head encodes all successfully decoded incoming packets from multiple sensor nodes into innovative systematic network coding packets and transmits them to the sink. A bandwidth-efficient and channel-aware error control algorithm is proposed to enhance the bandwidth-efficient utilization by dynamically determining the optimal number of innovative coded packets. For performance analysis and evaluation, we firstly derive the closed-form equations of decoding probability to validate the effectiveness of the proposed uploading scheme. Furthermore, we perform various simulations along with a discussion in terms of three performance metrics: decoding probability, redundancy, and image quality measurement. The analytical and experimental results demonstrate that the performance of our proposed DSNC outperforms the existing uploading schemes.

1. Introduction

Wireless multimedia sensor networks (WMSNs) have attracted many researchers due to potential applications. Apart from environmental monitoring, WMSNs can enable some new applications such as object recognition, tracking, multimedia surveillance, automated assistance for elderly and family monitoring, and industrial process control, etc. [1]. As with sensor networks, WMSNs are composed of wirelessly connected devices that can collect information from environments at any time. However, the types of collected information are video, audio streams, images, and scalar sensor data. To enable the above practical applications, WMSNs require sensors to upload collected information to users or applications. In general, the multimedia sensors are densely distributed and divided into several clusters. Each of them consists of a single leader (i.e., cluster head (CH) node) and several ordinary nodes (ONs). A cluster head operates as a relay between its members (i.e., ONs) and base station (i.e., sink in WMSNs) [2]. The operation of data collection consists of two phases: first, each ON uploads its data packets to the corresponding CH, and second, the CH transmits the gathered data to the sink.
To enhance the efficient uploading in WMSNs, many works have paid attention to techniques such as data aggregation [2], compressive sensing [3], information fusion [4], network lifetime [5], and energy efficiency [6,7,8,9,10]. Instead of uploading raw data, CH tries to reduce the gathered information used for uploading along with guaranteeing quality of service (QoS). Those methods can increase the energy-efficient and bandwidth-efficient utilization. Nevertheless, a safe solution to satisfy all users is to upload all of the raw data regardless of whether or not the information is needed by the users. Hence, in this paper, we propose a distributed systematic network coding (DSNC) scheme for multimedia content uploading over WMSNs to increase the uploading efficiency in terms of reliability and bandwidth-efficient utilization with low decoding complexity. The uploading mechanism consists of two phases: (1) multiple ONs encode original packets into systematic network coding (SNC) packets, and transmit them to the dedicated CH using a proposed bandwidth-efficient and channel-aware error control algorithm in the first phase, where each node uses a different frequency [11]); (2) instead of conventionally forwarding all the received SNC packets from multiple senders to the sink, the CH decodes the SNC packets and encodes them into innovative SNC packets in the second phase. Particularly, our contributions are listed as follows:
  • The proposed DSNC enables to enhance the efficient multimedia content uploading and to solve the issue of heavy feedback signaling and retransmission caused by retransmission-based protocols in WMSNs.
  • We propose a bandwidth-efficient and channel-aware error control algorithm to enhance the bandwidth-efficient utilization. Our proposed DSNC can be simply embedded on application layer. In the practical point of view, DSNC can take a significant step towards realistic deployment integrated into WMSNs.
  • We derive the closed-form equations of decoding probability that are validated by various simulations. We evaluate the effectiveness in terms of three performance metrics: decoding probability, redundancy, and image quality measurement using peak signal-to-noise ratio (PSNR). The experimental results demonstrate that the performance of the proposed DSNC outperforms the existing uploading schemes.
The remainder of this paper is organized as follows. Related work is described in Section 2. In Section 3, we present our proposed DSNC. Furthermore, we derive the closed-form equations of decoding probability as well as performance evaluation regarding the reliability in terms of decoding probability, redundancy, and PSNR compared to random linear network coding (RLNC) and SNC in Section 4 and Section 5, respectively. Finally, in Section 6 we conclude this paper along with future work.

2. Related Work

Retransmission and redundancy are two typical techniques used in WMSNs to achieve reliability [12]. Most of existing works conventionally focus on retransmission-based reliability [13]. To recover the lost packets, the sender retransmits them by getting feedback from the receiver. This retransmission-based reliability mechanism causes additional transmission overhead that not only increases network congestion but also wastes energy resource. On the other hand, redundancy-based reliability mechanism has recently attracted attention in WMSNs [14]. Since the lost packets can be recovered by utilizing some forms of coding. Among the coding techniques, RLNC was proposed to increase the reliability in transmission and solve the issue of heavy feedback signaling and retransmission [15]. Figure 1 presents RLNC encoder and decoder that are integrated on application layers of sender and receiver, respectively. The sender divides each frame into K packets, which are encoded using a linear combination of K original packets into ( K + R ) RLNC packets. R is the number of redundant packets used to increase the capability of loss recovery. The receiver can reconstruct the original packets whether the number of received packets is equal to or greater than the number of original packets. The receiver receives the transmitted network-coded packets and starts decoding as receiving a sufficient number of coded packets. The advantage of RLNC is that decoding process can complete successfully right away if the coefficient matrix achieves full rank (i.e., the coding vectors are linearly independent). The sender keeps sending the coded packets until the receiver decodes them successfully and sends an accumulated feedback to the sender. The receiver does not need to send ACK/NACK feedback for each transmission. Hence, the reliability is increased and the issue of feedback storm can be solved.
The RLNC has been exploited efficiently in many applications, such as reliable point-to-point communication [16] and efficient multicast [17,18] to enhance reliability and bandwidth efficiency. Furthermore, performance could be significantly enhanced by combining resource allocation frameworks beside the ordinary advantages of RLNC [19]. Authors in [19] showed that RLNC improved communication reliability and derived accurate closed-form equations for the probability of recovering a predetermined set of consecutive message layers. Nevertheless, none of all the above aforementioned studies investigated application on multimedia content uploading. Recently, Moritz et al. addressed the upward trend on sharing multimedia content by proposing a linear network coding approach for uplink network-coded cooperative communication with downlink energy transfer [20]. The authors derived a closed-form approximation for the system outage probability. The deployment of RLNC for uplink distributed systems was also proposed in [21]. The authors provided the analysis on outage behavior and showed that the linear network coding approach can decrease the outage probability and frame error rate.
Although RLNC can increase the reliability without using feedback and retransmission but there are two significant drawbacks: rank deficiency and high decoding complexity that are not suitable for multimedia content because of strict time constraint. To tackle these drawbacks, SNC was proposed [22]. The transmission of SNC consists of two stages: a sender sends original packets in the first stage; upon sending out all original packets, the sender continues generating RLNC packets for transmission in the second stage. Obviously, the issue of rank deficiency can be solved since the receiver can still decode some original packets even though the receiver cannot receive a sufficient number of linearly independent packets. On the other hand, SNC can achieve the same performance as the receiver receives a sufficient number of transmitted packets [22,23]. In addition, the second drawback (i.e., high decoding complexity) can be solved by brief propagation (BP) and Gaussian Elimination (GE) algorithms that are used for decoding with low computational complexity compared to RLNC [24]. However, the mentioned studies only deployed the RLNC and SNC for one-hop data uploading. Our work is the first work investigating the DSNC to enhance the efficient multimedia content uploading over WMSNs. Furthermore, we derive a closed-form equation of decoding probability which provides a theoretical analysis for further understanding of the DSNC.

3. Proposed DSNC

In this section, we present our proposed DSNC performed at each cluster in WMSNs. Figure 2 presents the encoding/decoding operations at ON, CH, and sink in an uploading scenario with multiple ONs. The wireless link from an ON to a CH is a short-ranged contention-based wireless link (e.g., WiFi) and the wireless link from the CH to a sink is a long-ranged cellular link (e.g., 4G-LTE). U ONs upload their own multimedia content with strict time constraint and predefined level of QoS (i.e., the data received after time constraint is useless) to a sink through a CH. Since multiple ONs upload their own content to a sink through a CH and ON cannot transmit directly to the sink, the uploading mechanism consists of two phases: (1) multiple ONs encode original packets into innovative SNC packets and transmit them to the CH using different frequencies [11]; (2) instead of forwarding all the received SNC packets from multiple senders to the sink, the CH decodes the received SNC packets and then encodes them into innovative SNC packets in the second phase. The number of innovative SNC packets is selected using the proposed bandwidth-efficient and channel-aware error control algorithm. Suppose that received signal strength indicators (RSSIs) are exchanged among sink, CH, and ONs (i.e., end users). Based on the RSSI information, the sender can estimate a packet loss ratio (PLR) at each duration of a frame transmission [25]. For clarity, we list the commonly used notations in Table 1.

3.1. Multimedia Content Encoding at Multiple ONs in the First Phase

Figure 3 presents a proposed ON’s architecture that encodes multimedia content for uploading to CH in the first phase. Let f i l e u be the multimedia content (i.e., application data units (ADUs)) of the uth ON, where each file is partitioned into multiple packets and delivered to the SNC encoder. SNC integrates SNC encoder/decoder on application layer. Based on the transmission requirements corresponding to RSSI feedback from physical layer (PHY), the SNC encoder divides the ADU into K u equal-length source packets which can be presented as a vector of K u elements:
X u = [ x 1 x 2 x K u ] T ,
where ( · ) T denotes the transpose operation. N u is the number of packets used for transmission from the uth ON to CH and N u K u .
Encoding process: SNC encoder encodes the K u original source packets into N u SNC packets for transmission, which consist of K u original packets and R u RLNC packets (i.e., N u = K u + R u ). Let b r be an RLNC packet which is presented as follows:
b r = f r X u = k = 1 K u f r , k x k ,
where f r , k is a coefficient number of the kth packet of the rth coded packet. Each coefficient number is generated randomly over Galois Field F ( q ) of size q. We use random number generator (RNG) to generate these coefficients. Each RNG seed of the first encoded packet is transmitted in such a way that CH also can generate these same coefficients for decoding [17,22]. Lastly, N u SNC packets (i.e., K u original and R u = N u K u RLNC packets) are delivered to transport layer based on UDP protocol for transmission. The determination of N u is based on RSSI feedback along with physical transmission requirements. The simple existing method is to use Equation (3) that the determination of redundant packets is equal to the expected lost packets based on erasure probability, ϵ u , of the channel link [26], hence a receiver can expectedly achieve the full rank of a coefficient matrix and decode all original packets.
R u = ϵ u K u 1 ϵ u .
Nevertheless, this method cannot guarantee the predefined level of QoS in WMSNs as the channel condition is getting worse (i.e., proved in Section 5.2). To enhance bandwidth-efficient utilization under a predefined level of QoS, we propose a bandwidth-efficient and channel-aware error control algorithm presented in Algorithm 1 to select the optimal number of redundant packets. Our proposed Algorithm 1 is based on our analysis of decoding probability presented in Section 4. Firstly, we formulate the redundancy assignment problem as follows:
m i n i m i z e : R u
subject to:
ρ u ρ u , T H ,
R u R u , m a x ,
where ρ u , T H is a threshold of decoding probability, constraint (5) guarantees a predefined level of QoS; R u , m a x is the maximum number of redundant packets, constraint (6) guarantees the sender cannot exceed the maximum sending rate constraint. Secondly, to solve this problem with low complexity, we perform a proximity search of the given point determined by Equation (3). Algorithm 1 starts by the given point and determines the expected decoding probability using Equations (8) and (13) from our analysis (lines 2–3). There are two cases: constraint (5) is satisfied or unsatisfied. In the first case, if constraint (5) is satisfied, it means the given point of redundancy uses more resource than the predefined quality. Hence, the algorithm reduces the number of redundant packets by one and checks the constraint (5) again. The process keeps decreasing the redundancy while constraint (5) is satisfied. The optimal value is the latest proximity value (lines 7–14). In the second case, if constraint (5) is not satisfied, it means the given point of redundancy cannot satisfy the predefined level of QoS. Hence, the algorithm increases the number of redundant packets by one until constraint (5) is satisfied (lines 15–22). Now we discuss the complexity of our proposed algorithm. The time complexity of Algorithm 1 is O ( R u , m a x ) . However, the particular time complexity is either O ( R u ) (i.e., the first case) or O ( R u , m a x R u ) (i.e., the second case) that depends on the available bandwidth, channel condition and the number of original packets. To give the further estimation of complexity, suppose that the number of original packets is K u = 50 , error probability is ϵ u = 0.1 , and the available bandwidth of possibly transmitting redundant packets is R u , m a x = 10 . The given point of searching starts from R u = 6 . Hence the complexity of the Algorithm 1 is O ( 6 ) that is negligible. Hence, the propose algorithm is capable of implementing on practical sensor nodes.
Algorithm 1: Proposed bandwidth-efficient and channel-aware error control algorithm.
Input: Given K u , ϵ u , ρ u , T H , R u , m a x
Output: R u
 1:
procedure
 2:
    R u Equation (3)
 3:
    E ( ρ u ) Equations (8) and (13)
 4:
    if E ( ρ u ) = ρ u , T H then
 5:
       return R u
 6:
    end if
 7:
    if E ( ρ u ) > ρ u , T H then
 8:
        for R u 1 0 do
 9:
           E ( ρ u ) Equations (8) and (13)
10:
           if E ( ρ u ) < ρ u , T H then
11:
              return R u + 1
12:
           end if
13:
        end for
14:
    end if
15:
    if E ( ρ u ) < ρ u , T H then
16:
        for R u + 1 R u , m a x do
17:
           E ( ρ u ) Equations (8) and (13)
18:
           if E ( ρ u ) > ρ u , T H then
19:
              return R u
20:
           end if
21:
        end for
22:
    end if
23:
end procedure
Decoding process: the received packets can be presented as follows:
Y u = H u C u X u ,
where (i) H u is an N u × N u diagonal transfer matrix from the uth ON to CH, where the diagonal component is one with the probability of 1 ϵ u and zeros with the probability of ϵ u (i.e., erasure probability); (ii) C u = [ I K u ; F u ] is an N u × K u coefficient matrix over the Galois field F q N u × K u that is vertically concatenated from the identity matrix of size K u (i.e., transmission of original packets) and a coefficient matrix used to encode the RLNC packets (i.e., F u F q R u × K u ); (iii) X u is a matrix representing the original packets; (iv) Y u is a matrix representing the received packets. An example of coefficient matrix C u is shown in Figure 5a. The CH can decode successfully all K u source packets as the coefficient coding vectors of the received packets achieves the full rank of K u (i.e., r a n k ( H u C u ) = K u ). Otherwise, the CH can also decode a fraction of K u source packets if the uncoded packets are decoded successfully. The SNC decoder uses BP and GE algorithms for decoding with low computational complexity compared to RLNC presented in [24].

3.2. DSNC Execution at CH in the Second Phase

In this subsection, we present our proposed DSNC implemented at CH. Instead of forwarding all the received SNC packets from multiple senders to the sink, the CH performs DSNC in the second phase. Sink can simply use SNC decoder to decode all the original packets before the packet ordering for each individual ON.
DSNC at CH: Figure 4 presents our proposed DSNC implemented at CH. Our proposal is integrated on application layer with the existing PHY transmission procedure. The transport layer sends the received SNC packets of each ON to SNC decoder, which decodes all received SNC packets from multiple ONs. Please note that D C H , u and D S , u are the numbers of the successfully decoded SNC packets of the uth ON at CH and sink, respectively, and they meet the condition K u D C H , u D S , u . All these successfully decoded packets D C H = u = 1 U D C H , u at CH are encoded into N C H = D C H + R C H innovative SNC packets using SNC encoder, where D C H and R C H be the numbers of successfully decoded packets and RLNC packets, respectively. The R C H is determined using Algorithm 1 with a minor modification. We change the input information such as K u to D C H , ϵ u to ϵ , ρ u , T H to ρ C H , T H , and R u , m a x to R C H , m a x (i.e., the maximum number of RLNC packets that the CH can transmit in the second phase). Then all of those innovative SNC packets are used for transmission to the sink. The time complexity for multiple sources of our proposed scheme at CH will be O ( R C H , m a x ) . Since the complexity only depends on the maximum total number of redundant packets used at CH which is associated with the number of ONs. As the number of ONs increases, the more redundant packets are used leading to the time complexity also increases.
Decoding process at sink: Clearly, the encoded packet in the second phase is a linear combination of all successfully decoded packets from all ONs. Hence, the sink cannot decode each data flow separately. To decode each data flow from each ON, the sink simply uses the BP and GE algorithms [24] similar to SNC to decode all data from ONs, and then performing the packet reordering to separate each data flow.
The DSNC can increase efficiently the multimedia uploading because of two advantages: (1) in the access link side (i.e., in the first phase from multiple ONs to CH): ON can upload a fraction of data even if the measured RSSI used for physical uplink scheduling is not accurate. This issue causes transmission error and often happens in practical wireless networks due to measurement error and the mobility of ONs [25]. On the other hand, ON can upload all data easily without using feedback and retransmission since CH can decode all transmitted packets as receiving a sufficient number of SNC packets; (2) in the backhaul link side (i.e., in the second phase from CH to sink): the reliability performance can be achieved by the substantial improvement since the generation size used for RLNC encoding increases leading to the increase in reliability [15]. As seen, the reliability improvement comes from the cost of computational complexity. However, this issue can be easily solved by the powerful computational capability of the current smart sink [27].

4. Performance Analysis

In this section, we derive the closed-form equations for decoding probability of our proposed DSNC. This performance metric is widely used to evaluate the reliability in transmission. The decoding probability ρ S , u of each ON at sink is defined as the ratio of the number of the successfully decoded packets D S , u at destination (i.e., sink) over K u source packets. The expected value of decoding probability is defined as follows:
E ( ρ S , u ) = E ( D S , u ) K u = d S , u = 1 K u d S , u Pr ( D S , u = d S , u ) K u .
Our objective is to derive the probability Pr ( D S , u = d S , u ) of the uth ON at sink, note that D S , u K u because of erasure channel and d S , u is a sliding variable of the successfully decoded number of packets. Performance analysis of SNC can be treated as the uploading scenario with a single ON since CH treats each data flow individually. For simplicity, we start the analysis with a single ON over one-hop transmission, two-hop transmission, and extending to multiple ONs of our proposed DSNC.

4.1. A Single ON over One-Hop Transmission

First, we describe the decoding probability of SNC over one-hop transmission with a single ON u and CH in the first phase derived in [28]. Sender encodes K u original packets into N u SNC packets for transmission. Please note that N u = K u + R u consists of K u uncoded packets and R u RLNC packets. The probability Pr ( M C H , u , N u ) that the CH receives M C H , u (i.e., the number of received packets) over N u transmissions that follows a binomial distribution [15] with the erasure probability ϵ u of the access link.
Pr ( M C H , u , N u ) = N u M C H , u ( 1 ϵ u ) M C H , u ϵ u ( N u M C H , u ) .
The decoding capability at CH can be classified into two cases: decoding a fraction of source data if D C H , u < K u and decoding all K u original packets if D C H , u = K u , note that D C H , u is the number of the successfully decoded packets at CH and K u is the number of the original packets used for transmission in the first phase. Let k C H , u and r C H , u be the numbers of uncoded (i.e., original) packets, and encoded packets (i.e., RLNC packets) of ON u that are received at the CH, respectively. The random variables of k C H , u and r C H , u also follow the binomial distributions Pr ( k C H , u , K u ) and Pr ( r C H , u , R u ) independently since the channel is memoryless.
Figure 5 presents an illustration of two possible decoding cases by a coefficient coding matrix. Assume that the number of original packets (i.e., uncoded packets) is K u = 4 and the number of RLNC packets is R u = 2 (i.e., Figure 5a). In the case of D C H , u < K u shown in Figure 5b, the CH receives three packets but only decodes successfully two decoded original packets. Since the coefficient coding matrix needs to achieve the rank of 4 but the rank is only 3. Hence, one successfully received RLNC packet becomes useless. In the case of D C H , u = K u shown in Figure 5c, the CH can decode successfully all 4 packets since the coefficient coding matrix achieves the rank of 4. Now we describe the analysis of two cases in detail:
  • In the case of D C H , u < K u (i.e., example shown in Figure 5b): CH only can decode successfully k C H , u uncoded packets (i.e., D C H , u = k C H , u ) and the coefficient coding vectors of all the received packets cannot achieve the rank of K u .
    Pr ( D C H , u = k C H , u ) = Pr ( k C H , u , K u ) 1 r C H , u = K u k C H , u R u Pr ( r C H , u , R u ) f K u ( K u k C H , u , r C H , u ) ,
    where R u = N u K u is the number of RLNC packets used for transmission, in which K u and R u represent the ranks of coefficient matrix and redundant packets, respectively; f K u ( K u k C H , u , r C H , u ) is the probability that the r C H , u × K u coefficient coding matrix achieves the rank of ( K u k C H , u ) derived in [22].
    f K u ( K u k C H , u , r C H , u ) = j = 0 K u k C H , u 1 1 1 q r C H , u j .
  • In the case of D C H , u = K u (i.e., example shown in Figure 5c): obviously, CH can decode all K u source packets as the matrix of received coefficient coding vectors achieves the rank of K u . The Pr ( D C H , u = K u ) can be simply expressed as follows:
    Pr ( D C H , u = K u ) = k C H , u = 0 K u Pr ( k C H , u , K u ) r C H , u = K u k C H , u R u Pr ( r C H , u , R u ) f K u ( K u k C H , u , r C H , u ) .
    Finally, the Pr ( D C H , u = d C H , u ) for a single-hop wireless transmission can be derived as follows:
    Pr ( D C H , u = d C H , u ) = Equation ( 10 ) if d C H , u < K u Equation ( 12 ) if d C H , u = K u .

4.2. A Single ON over Two-Hop Transmission

Now, we extend our analysis for the second transmission from CH to sink. The closed-form expectation of decoding probability of ON u is presented as follows:
E ( ρ S , u ) = d S , u = 1 K u d S , u d C H , u = d S , u K u Pr ( D C H , u = d C H , u ) Pr ( D S , u = d S , u | D C H , u ) K u ,
Since the Pr ( D S , u = d S , u ) at the sink is the marginal distribution computed from the joint distribution Pr ( D C H , u , D S , u ) . Hence, the Pr ( D S , u = d S , u ) is expressed as follows:
Pr ( D S , u = d S , u ) = d C H , u = d S , u K u Pr ( D C H , u = d C H , u ) Pr ( D S , u = d S , u | D C H , u ) ,
where Pr ( D C H , u = d C H , u ) is the probability of decoding successfully d C H , u at the CH in the first phase, which is determined using Equation (13). Please note that the sink only uses D C H , u decoded packets for encoding into N C H , u SNC packets. The conditional probability Pr ( D S , u = d S , u | D C H , u ) is the decoding probability that the sink can decode d S , u packets given D C H , u . The complete closed-form equation can be defined as follows:
Pr ( D S , u = d S , u | D C H , u ) = Pr ( d S , u , D C H , u ) 1 r S , u = D C H , u d S , u R C H , u Pr ( r S , u , R C H , u ) f D C H , u ( D C H , u d S , u , r S , u ) if d S , u < D C H , u k S , u = 0 D C H , u Pr ( k S , u , D C H , u ) r S , u = D C H , u k S , u R C H , u Pr ( r S , u , R C H , u ) f D C H , u ( D C H , u k S , u , r S , u ) if d S , u = D C H , u ,
where R C H , u = N C H , u D C H , u is the number of RLNC packets due to a single ON only; k S , u and r S , u be the numbers of uncoded packets and encoded packets received at the sink from the CH, respectively.

4.3. Analysis of DSNC with Multiple Source Senders

Based on the above analysis, we extent to the case of our proposed DSNC with multiple source senders. Instead of simply treating each data flow individually, CH encodes all successfully decoded packets from source senders (i.e., all ONs) in the first phase into innovative SNC packets and transmits them to the sink in the second phase.
We firstly extend the analysis to the case of two ONs. Please note that CH uses all successfully decoded packets from both source senders for encoding. Hence, the total number of SNC packets used for transmission from the CH to sink is determined as N C H = D C H , 1 + D C H , 2 + R C H . Figure 6a,b present the coefficient coding matrices at CH performed SNC individually and DSNCs, respectively. For simplicity, assuming that CH can decode successfully all four transmitted packets from both ONs in the illustration. Obviously, each data flow can be decoded as the coefficient coding matrix achieves the rank of D C H = u = 1 2 D C H , u . On the other words, sink needs to receive at least D C H packets.
Now, we perform the derivation for ON 1 , because the case of ON 2 can easily been analyzed in the same way. The decoding probability of ON 1 can be derived as follows:
Pr ( D S , 1 = d S , 1 ) = d C H , 1 = d S , 1 K 1 Pr ( D C H , 1 = d C H , 1 ) d C H , 2 = 0 K 2 Pr ( D C H , 2 = d C H , 2 ) Pr ( D S , 1 = d S , 1 | D C H ) .
The terms of Pr ( D C H , 1 = d C H , 1 ) and Pr ( D C H , 2 = d C H , 2 ) can be determined using in such a similar way of Equation (13). The last term is conditional probability Pr ( D S , 1 = d S , 1 | D C H = u = 1 2 D C H , u ) that the sink can decode the data flow of ON u depending on two cases: decoding a fraction of source data if D S , 1 < D C H , 1 and decoding all D C H , 1 if D S , 1 = D C H , 1 or corresponding to M S = D C H . Let k S , u and r S be the numbers of received uncoded packets of the uth ON and received RLNC packets at sink, respectively. M S = u = 1 2 k S , u + r S is the number of received packets at sink.
  • The case of D S , 1 D C H , 1 (i.e., example shown in Figure 6c): sink only can decode successfully k S , 1 uncoded packets (i.e., D S , u = k S , 1 ) and the coefficient coding vectors of k S , 2 uncoded and r S RLNC packets are not linearly independent.
    Pr ( D S , 1 = d S , 1 | D C H ) = Pr ( d S , 1 , D C H , 1 ) 1 r e 1 = D C H , 1 d S , 1 R E 1 Pr ( r e 1 , R E 1 ) f D C H , 1 ( D C H , 1 d S , 1 , r e 1 ) ,
    where R E 1 = D C H , 2 + R C H is treated as the number of redundant packets of the 1st ON. Each ON treats the received packets of other ONs as redundancy. Examples of the R E 1 and R C H are presented in Figure 6b.
  • The case of D S , 1 = D C H , 1 (i.e., example shown in Figure 6d): obviously, CH can decode all D C H , u source packets as the matrix of received coefficient coding vectors achieves the rank of D C H , u .
    Pr ( D S , 1 = D C H , 1 | D C H ) = d S , 1 = 0 D C H , 1 Pr ( d S , 1 , D C H , 1 ) r e 1 = D C H , 1 d S , 1 R E 1 Pr ( r e 1 , R E 1 ) f D C H , 1 ( D C H , 1 d S , 1 , r e 1 )
Hence, the final closed-form equation of decoding probability of the uth ON at sink can be derived as follows:
Pr ( D S , u = d S , u ) = d C H , u = d S , u K u Pr ( D C H , u = d C H , u ) j u U d C H , j = 0 K j Pr ( D C H , j = d C H , j ) Pr ( D S , u = d S , u | D C H ) ,
with Pr ( D C H , u = d C H , u ) can be determined using in the similar way of Equation (13), and the conditional probability Pr ( D S , u = d S , u | D C H = u = 1 U D C H , u ) is presented as follows:
Pr ( D S , u = d S , u | D C H ) = Pr ( d S , u , D C H , u ) 1 r e u = D C H , u d S , u R E u Pr ( r e u , R E u ) f D C H , u ( D C H , u d S , u , r e u ) if d S , u < D C H , u d S , u = 0 D C H , u Pr ( d S , u , D C H , u ) r e u = D C H , u d S , u R E u Pr ( r e u , R E u ) f D C H , u ( D C H , u d S , u , r e u ) if d S , u = D C H , u ,
where R E u = j u U D C H , j + R C H .

5. Performance Evaluation

For performance evaluation, we performed various simulations that firstly validate our theoretical analysis. The analytical and simulation results matched well with a difference of 0.05%. Secondly, we present the comparative performance analysis with the existing uploading schemes. Each simulation was run 100,000 times in the Matlab environment with a confidence interval of at least 95%. Galois field size of 8 is selected to guarantee linear independence with a very high probability at application layer [29]. There is no standard method for selecting a field size, but there are majority of works that consider the Galois field size of 8 [19,30]. Table 2 describes the main simulation parameters.

5.1. Validation of Theoretical Analysis

Firstly, we validated the theoretical analysis presented in Section 4.2. In addition, we proved that the performance of decoding probability that depended on the selection of redundancy. In this evaluation, suppose that a single ON 1 encoded K 1 = 30 original packets for uploading to sink through CH. Figure 7a showed the decoding probability versus erasure probability with various redundancies. We assume that two links have the same erasure probability that is widely used for two-hop communication [31]. Redundancies at ON 1 and CH are similar. As seen, when the overhead was zero, the decoding probability was similar to that of the transmission scheme without coding. The increase in redundancy leaded to the increase in the decoding probability. When the sender increased the sufficient number of redundant packets, the receiver could achieve the maximum decoding probability.
Secondly, we validated the theoretical analysis for our proposed DSNC presented in Section 4.3. Furthermore, we evaluated the impact of the number of ONs on the performance. Figure 7b showed the decoding probability versus erasure probability with various numbers of ONs. The results were decoding probabilities of the 1st ON, where channel conditions of access link (i.e., between ON 1 and CH) and backhaul link (i.e., between CH and sink) have the similar erasure probability. Other access links had erasure probability of zero, which means no error over other access links. We considered this configuration since we mainly focused on the performance of our proposed DSNC implemented as CH in the second phase. Each ON encoded K u = 30 original packets for uploading and used redundancy of R u = R C H = 4 for transmission. The results demonstrated that the increase in the number of ONs leaded to the increase in performance of decoding probability.
Thirdly, we evaluated the impact of erasure probabilities of the other adjacent access links. We performed simulation with two ONs, and various erasure probabilities of the access link between ON 2 and CH (i.e., ϵ 2 ). Figure 8 showed the decoding probability of ON 1 . The simulation results also matched well with our theoretical analysis. Figure 8a,b are results of decoding probability corresponding to R 1 = R 2 = 2 and R 1 = R 2 = 4 , respectively. Figure 8a showed that given the channel condition of access link 1 and the number of predefined redundant packets, the performance of decoding probability increases as the channel condition of the 2nd access link increases. In addition, Figure 8b demonstrated that if the number of predefined redundant packets is assigned sufficient enough. The impact of erasure probability of the ϵ 2 is trivial.

5.2. Comparative Performance Analysis

In this subsection, we compared the performance of our scheme to two other baseline schemes that were RLNC [16] and SNC [23]. This is because both of them employed redundancy-based reliability mechanism to use the advantage of coding for providing the capability of error correction over lossy wireless channel like our proposal scheme. We performed simulations with two ONs uploading to sink through CH. Each ON also encoded K u = 30 original packets for uploading. Each packet was 1500 bytes and transmission rate for each ON’s link was 480 Kbps (i.e., maximum sending rate was 40 packets per second). We evaluate the performance of the 1st ON. Performance metrics used for comparative analysis were decoding probability, redundancy, and PSNR for image quality measurement. Channel conditions of access link (i.e., between ON 1 and CH) and backhaul link (i.e., between CH and sink) have the similar erasure probability. Other access link (i.e., between ON 2 and CH) has erasure probability of zero, which means no error over this access link.
Figure 9 presented the performance of decoding probability of the 1st ON versus erasure probability with various redundancies compared to RLNC and SNC. We did not apply the method to dynamically determine redundancy according to channel condition, since we focused on the evaluation of the general impact of redundancy to all schemes. Given channel condition and predetermined redundancy, the DSNC showed better performance than SNC and RLNC. We selected the same numbers of redundant packets as 4 and 6, leading to the results shown in Figure 9a,b, respectively. As channel condition was getting worse, the DSNC showed better performance since the RLNC had rank deficiency disadvantage. Please note that we performed simulation with two ONs, but as shown in Figure 7b, our proposed scheme could achieve better performance as the number of ONs increases.
Lastly, we used Lena image for transmission and evaluated with the adaptive method to dynamically determine redundancy according to channel condition. The image file is still large for WMSNs. We divided the file into multiple segments of 100 packets. The predefined level of QoS was the decoding probability threshold of 0.99. Figure 10a–c presented the performance of decoding probability, PSNR, and redundancy, respectively. This simulation differs from the results in Figure 9, because we applied the adaptive method to dynamically determine redundancy according to channel condition in order to show the advantage of the proposed bandwidth-efficient and channel-aware error control algorithm. Other schemes use the existing method shown in Equation (3). As shown in Figure 10a,b, the DSNC could still satisfy the predefined level of QoS even the channel condition getting worse. Especially, the performance gap increases as the channel condition is getting worse. Accordingly, Figure 10c shows that the DSNC could adaptively determine the redundancy better than the other schemes to achieve the decoding probability threshold.

6. Conclusions

We proposed a distributed systematic network coding called DSNC for multimedia content uploading over WMSNs. In addition, we derived the closed-form equation for decoding probability analysis. Based on the analysis, we proposed a bandwidth-efficient and channel-aware error control algorithm to enhance the bandwidth-efficient utilization by dynamically determining the optimal number of innovative coded packets. The experiment results verified our mathematical equations and demonstrated that the proposed distributed systematic network coding outperformed the random linear network coding-based scheme and systematic network coding-based scheme in terms of decoding probability, redundancy, and image quality measurement. For future research, we extend our work to the vehicular sensor networks for multimedia collection and dissemination, in which the mobility challenge is taken under consideration.

Author Contributions

P.C. proposed the DSNC scheme, mainly wrote the manuscript, and implemented the proposed scheme along with the compared schemes and ran the simulations. J.S. designed the performance evaluation method and improved the manuscript with performance analysis. J.(P.)J. verified the correctness of the proposed DSNC scheme and improved the manuscript technically. All the authors have spent so much effort on the improvement of the manuscript. They have reviewed with many good advices and approved the final manuscript.

Funding

This research received no external funding.

Acknowledgments

This work was partly supported by Institute for Information & Communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2013-0-00409, Research and Development of 5G Mobile Communications Technologies using CCN based Multi-dimensional Scalability). This work was partly supported by the National Research Foundation of Korea (NRF) funded by the MSIT (No. 2013K1A1A2A02078326, Global Research Laboratory Program).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ADUsApplication data units
BPBrief propagation
CHCluster head
DSNCDistributed systematic network coding
GEGaussian Elimination
ONOrdinary node
PHYPhysical layer
PLRPacket loss ratio
QoSQuality of service
RLNCRandom linear network coding
RSSIReceived Signal Strength Indicator
SNCSystematic network coding
WMSNsWireless multimedia sensor networks

References

  1. Akyildiz, I.F.; Melodia, T.; Chowdury, K.R. Wireless multimedia sensor networks: A survey. IEEE Wirel. Commun. 2007, 14. [Google Scholar] [CrossRef]
  2. Rezvani, M.; Ignjatovic, A.; Bertino, E.; Jha, S. Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Trans. Dependable Secure Comput. 2015, 12, 98–110. [Google Scholar] [CrossRef]
  3. Zhang, P.; Wang, S.; Guo, K.; Wang, J. A secure data collection scheme based on compressive sensing in wireless sensor networks. Ad Hoc Netw. 2018, 70, 73–84. [Google Scholar] [CrossRef]
  4. Zhang, Z.J.; Lai, C.F.; Chao, H.C. A green data transmission mechanism for wireless multimedia sensor networks using information fusion. IEEE Wirel. Commun. 2014, 21, 14–19. [Google Scholar] [CrossRef]
  5. Mostafaei, H.; Shojafar, M. A new meta-heuristic algorithm for maximizing lifetime of wireless sensor networks. Wirel. Pers. Commun. 2015, 82, 723–742. [Google Scholar] [CrossRef]
  6. Shojafar, M.; Canali, C.; Lancellotti, R.; Abawajy, J. Adaptive computing-plus-communication optimization framework for multimedia processing in cloud systems. IEEE Trans. Cloud Comput. 2016. [Google Scholar] [CrossRef]
  7. Zhang, J.; Liu, S.J.; Tsai, P.W.; Zou, F.M.; Ji, X.R. Directional virtual backbone based data aggregation scheme for Wireless Visual Sensor Networks. PLoS ONE 2018, 13, 0196705. [Google Scholar] [CrossRef] [PubMed]
  8. Duan, H.; Zhou, Y.; Liu, M. Fault tolerant scheduling algorithm in distributed sensor networks. J. Inf. Hiding Multimed. Signal Process. 2017, 8, 127–137. [Google Scholar]
  9. Kong, L.; Pan, J.S.; Sung, T.W.; Tsai, P.W.; Snášel, V. An energy balancing strategy based on Hilbert curve and genetic algorithm for wireless sensor networks. Wirel. Commun. Mob. Comput. 2017, 2017. [Google Scholar] [CrossRef]
  10. Mekonnen, T.; Porambage, P.; Harjula, E.; Ylianttila, M. Energy consumption analysis of high quality multi-tier wireless multimedia sensor network. IEEE Access 2017, 5, 15848–15858. [Google Scholar] [CrossRef]
  11. Abu-Ali, N.; Taha, A.E.M.; Salah, M.; Hassanein, H. Uplink scheduling in LTE and LTE-advanced: Tutorial, survey and evaluation framework. IEEE Commun. Surv. Tutor. 2014, 16, 1239–1265. [Google Scholar] [CrossRef]
  12. Sarvi, B.; Rabiee, H.R.; Mizanian, K. An adaptive cross-layer error control protocol for wireless multimedia sensor networks. Ad Hoc Netw. 2017, 56, 173–185. [Google Scholar] [CrossRef]
  13. Mahmood, M.A.; Seah, W.K.; Welch, I. Reliability in wireless sensor networks: A survey and challenges ahead. Comput. Netw. 2015, 79, 166–187. [Google Scholar] [CrossRef]
  14. Naderi, M.Y.; Rabiee, H.R.; Khansari, M.; Salehi, M. Error control for multimedia communications in wireless sensor networks: A comparative performance analysis. Ad Hoc Netw. 2012, 10, 1028–1042. [Google Scholar] [CrossRef]
  15. Khirallah, C.; Vukobratovic, D.; Thompson, J. Performance analysis and energy efficiency of random network coding in LTE-advanced. IEEE Trans. Wirel. Commun. 2012, 11, 4275–4285. [Google Scholar] [CrossRef]
  16. Rezende, C.; Boukerche, A.; Almulla, M.; Loureiro, A.A. The selective use of redundancy for video streaming over Vehicular Ad Hoc Networks. Comput. Netw. 2015, 81, 43–62. [Google Scholar] [CrossRef]
  17. Tassi, A.; Khirallah, C.; Vukobratović, D.; Chiti, F.; Thompson, J.S.; Fantacci, R. Resource allocation strategies for network-coded video broadcasting services over LTE-advanced. IEEE Trans. Veh. Technol. 2015, 64, 2186–2192. [Google Scholar] [CrossRef]
  18. Chau, P.; Shin, J.; Jeong, J.P. Efficient scalable video multicast based on network-coded communication. Wirel. Netw. 2016, 1–14. [Google Scholar] [CrossRef]
  19. Tassi, A.; Chatzigeorgiou, I.; Vukobratović, D. Resource-allocation frameworks for network-coded layered multimedia multicast services. IEEE J. Sel. Areas Commun. 2015, 33, 141–155. [Google Scholar] [CrossRef]
  20. Moritz, G.L.; Rebelatto, J.L.; Souza, R.D.; Uchôa-Filho, B.F.; Li, Y. Time-switching uplink network-coded cooperative communication with downlink energy transfer. IEEE Trans. Signal Process. 2014, 62, 5009–5019. [Google Scholar] [CrossRef]
  21. Yang, T.; Sun, Q.T.; Zhang, J.A.; Yuan, J. A linear network coding approach for uplink distributed MIMO systems: Protocol and outage behavior. IEEE J. Sel. Areas Commun. 2015, 33, 250–263. [Google Scholar] [CrossRef]
  22. Shrader, B.; Jones, N.M. Systematic wireless network coding. In Proceedings of the 2009 IEEE Military Communications, Boston, MA, USA, 18–21 October 2009; pp. 1–7. [Google Scholar]
  23. Li, Y.; Blostein, S.; Chan, W.Y. Systematic network coding for two-hop lossy transmissions. EURASIP J. Adv. Signal Process. 2015, 2015, 93. [Google Scholar] [CrossRef]
  24. Jones, A.L.; Chatzigeorgiou, I.; Tassi, A. Binary systematic network coding for progressive packet decoding. In Proceedings of the IEEE International Conference on Communications (ICC), London, UK, 8–12 June 2015; pp. 4499–4504. [Google Scholar]
  25. Park, S.; Daniels, R.C.; Heath, R.W. Optimizing the target error rate for link adaptation. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  26. Nafaa, A.; Taleb, T.; Murphy, L. Forward error correction strategies for media streaming over wireless networks. IEEE Commun. Mag. 2008, 46. [Google Scholar] [CrossRef]
  27. Agrawal, D.P.; Zeng, Q.A. Introduction to Wireless and Mobile Systems; Cengage Learning: Boston, MA, USA, 2015. [Google Scholar]
  28. Chau, P.; Lee, Y.; Bui, T.; Shin, J. Analysis of decoding probability for systematic wireless network coding. Electron. Lett. 2017, 53, 964–966. [Google Scholar] [CrossRef]
  29. Chou, P.A.; Wu, Y. Network coding for the internet and wireless networks. IEEE Signal Process. Mag. 2007, 24, 77–85. [Google Scholar] [CrossRef]
  30. Zhang, X.; Jing, C.; Tang, F.; Fowler, S.; Cui, H.; Dong, X. Joint redundant and random network coding for robust video transmission over lossy networks. Mob. Inf. Syst. 2012, 8, 213–230. [Google Scholar] [CrossRef]
  31. Ji, X.; Zheng, B.; Cai, Y.; Zou, L. On the study of half-duplex asymmetric two-way relay transmission using an amplify-and-forward relay. IEEE Trans. Veh. Technol. 2012, 61, 1649–1664. [Google Scholar] [CrossRef]
Figure 1. Redundancy mechanism using RLNC.
Figure 1. Redundancy mechanism using RLNC.
Sensors 18 01824 g001
Figure 2. Encoding and decoding operations at ON, CH, and sink.
Figure 2. Encoding and decoding operations at ON, CH, and sink.
Sensors 18 01824 g002
Figure 3. A proposed uth ON’s architecture.
Figure 3. A proposed uth ON’s architecture.
Sensors 18 01824 g003
Figure 4. Proposed DSNC solution for multimedia uploading.
Figure 4. Proposed DSNC solution for multimedia uploading.
Sensors 18 01824 g004
Figure 5. Representative matrix of coefficient coding information at ON and CH; (a) ON u ; (b) case of D C H , u = 2 < K u = 4 ; (c) case of D C H , u = K u = 4 .
Figure 5. Representative matrix of coefficient coding information at ON and CH; (a) ON u ; (b) case of D C H , u = 2 < K u = 4 ; (c) case of D C H , u = K u = 4 .
Sensors 18 01824 g005
Figure 6. Representative matrix of coefficient coding information at CH and sink; (a) SNC; (b) DSNC; (c) case of D S , 1 = 3 D C H , 1 ; (d) case of D S , 1 = D C H , 1 = 4 or M S = 8 .
Figure 6. Representative matrix of coefficient coding information at CH and sink; (a) SNC; (b) DSNC; (c) case of D S , 1 = 3 D C H , 1 ; (d) case of D S , 1 = D C H , 1 = 4 or M S = 8 .
Sensors 18 01824 g006
Figure 7. (a) Decoding probability versus erasure probability with various redundancies and a single ON; (b) Decoding probability versus erasure probability with various numbers of ONs and redundant packets of 4; K = 30 , and q = 256 .
Figure 7. (a) Decoding probability versus erasure probability with various redundancies and a single ON; (b) Decoding probability versus erasure probability with various numbers of ONs and redundant packets of 4; K = 30 , and q = 256 .
Sensors 18 01824 g007
Figure 8. Decoding probability versus erasure probability with various erasure probabilities of the access link between ON 2 and CH; 2 ONs, K u = 30 , and q = 256 ; (a) R 1 = R 2 = 2 , R C H = 4 ; (b) R 1 = R 2 = 4 , R C H = 8 .
Figure 8. Decoding probability versus erasure probability with various erasure probabilities of the access link between ON 2 and CH; 2 ONs, K u = 30 , and q = 256 ; (a) R 1 = R 2 = 2 , R C H = 4 ; (b) R 1 = R 2 = 4 , R C H = 8 .
Sensors 18 01824 g008
Figure 9. Performance comparison of decoding probability versus erasure probability with predefined redundancies; 2 ONs, K u = 30 , and q = 256 ; (a) the number of redundant packets is 4; (b) the number of redundant packets is 6.
Figure 9. Performance comparison of decoding probability versus erasure probability with predefined redundancies; 2 ONs, K u = 30 , and q = 256 ; (a) the number of redundant packets is 4; (b) the number of redundant packets is 6.
Sensors 18 01824 g009
Figure 10. Performance comparison with adaptive method for redundancy with Lena image and size of 501 KB; (a) decoding probability; (b) PSNR; (c) number of redundant packet; generation size of 100, q = 256 .
Figure 10. Performance comparison with adaptive method for redundancy with Lena image and size of 501 KB; (a) decoding probability; (b) PSNR; (c) number of redundant packet; generation size of 100, q = 256 .
Sensors 18 01824 g010
Table 1. Commonly used notation.
Table 1. Commonly used notation.
NotationDefinition
UThe number of ONs
K u The number of original packets used for a frame transmission of the uth ON
R u The number of RLNC packets of the uth ON used for a frame transmission
R u , m a x The maximum number of RLNC packets of the uth ON used for transmission
N u The total number of SNC packets used for transmission of the uth ON, note that N u = K u + R u
M C H , u The total number of received SNC packets of the uth ON at CH, note that M C H , u = k C H , u + r C H , u
k C H , u The number of received uncoded packets of the uth ON at CH
r C H , u The number of received RLNC packets of the uth ON at CH
D C H , u The number of successfully decoded packets of the uth ON at CH
D C H The total number of successfully decoded packets at CH, note that D C H = u = 1 U D C H , u
R C H , u The number of RLNC packets used for transmission of the uth ON from CH to sink
R C H The total number of RLNC packets used for transmission from CH to sink, note that R C H = u = 1 U R C H , u
N C H , u The number of SNC packets used for transmission of the uth ON from CH to sink, note that N C H , u = D C H , u + R C H , u
N C H The total number of SNC packets used for transmission from CH to sink, note that N C H = u = 1 U N C H , u
M S The total number of received packets at sink
D S , u The number of successfully decoded packets of the uth ON at sink
k S , u The number of received uncoded packets of the uth ON at sink
r S The total number of received RLNC packets at sink
ρ S , u Decoding probability of the uth ON at sink
ρ u , T H Decoding probability threshold of the uth ON
E ( ρ S , u ) Expected decoding probability of the uth ON at sink
ϵ u Erasure probability of access link from the uth ON to CH
ϵ Erasure probability of the backhaul link from CH to sink
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParameterValue
Galois Field size q256
Generation size K u 30
Packet size1500 bytes
Transmission rate480 Kbps
Image used for transmissionLena
Size of Lena Image501 KB
Generation size for image transmission100

Share and Cite

MDPI and ACS Style

Chau, P.; Shin, J.; Jeong, J. Distributed Systematic Network Coding for Reliable Content Uploading in Wireless Multimedia Sensor Networks. Sensors 2018, 18, 1824. https://doi.org/10.3390/s18061824

AMA Style

Chau P, Shin J, Jeong J. Distributed Systematic Network Coding for Reliable Content Uploading in Wireless Multimedia Sensor Networks. Sensors. 2018; 18(6):1824. https://doi.org/10.3390/s18061824

Chicago/Turabian Style

Chau, Phuc, Jitae Shin, and Jaehoon (Paul) Jeong. 2018. "Distributed Systematic Network Coding for Reliable Content Uploading in Wireless Multimedia Sensor Networks" Sensors 18, no. 6: 1824. https://doi.org/10.3390/s18061824

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop