{"title":"A comparison of two methods for fountain-coded file distribution in an ad hoc network with relays","authors":"Siddhartha S. Borkotoky, M. Pursley","doi":"10.1109/ITA.2017.8023464","DOIUrl":null,"url":null,"abstract":"We investigate two approaches to fountain-coded broadcast file distribution in an ad hoc packet radio network. In the first method, all destinations receive fountain-coded packets directly from the source. In the second method, after one destination obtains the file, it acts as a relay node by applying continued fountain coding to the file and sending the encoded packets to other destinations. The other destinations combine the fountain-coded packets they received from the source with those they obtain from the relay node. We compare the performance of the two methods when they are employed in a network whose links have Rayleigh fading. As performance benchmarks, we also examine two conventional broadcast techniques that use automatic repeat request (ARQ) for retransmission of erased packets.","PeriodicalId":305510,"journal":{"name":"2017 Information Theory and Applications Workshop (ITA)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Information Theory and Applications Workshop (ITA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITA.2017.8023464","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
We investigate two approaches to fountain-coded broadcast file distribution in an ad hoc packet radio network. In the first method, all destinations receive fountain-coded packets directly from the source. In the second method, after one destination obtains the file, it acts as a relay node by applying continued fountain coding to the file and sending the encoded packets to other destinations. The other destinations combine the fountain-coded packets they received from the source with those they obtain from the relay node. We compare the performance of the two methods when they are employed in a network whose links have Rayleigh fading. As performance benchmarks, we also examine two conventional broadcast techniques that use automatic repeat request (ARQ) for retransmission of erased packets.