Header-size lower bounds for end-to-end communication in memoryless networks
نویسندگان
چکیده
The end-to-end communication problem is a protocol design problem, for sending a packet from a specified sourcenode s to a specified target-node t, through an unreliable asynchronous memoryless communication network. The protocol must insure reception and termination. In this paper, we measure the complexity of the protocol in term of header size, i.e., the quantity of information that must be attached to the packets to insure their delivery. We show that headers of Xðlog log sÞ bits are required in every network, where s denotes the treewidth of the network. In planar networks, Xðlog sÞ bits are required. 2005 Elsevier B.V. All rights reserved.
منابع مشابه
Bounds for Multiple-Access Relay Channels with Feedback via Two-way Relay Channel
In this study, we introduce a new two-way relay channel and obtain an inner bound and an outer bound for the discrete and memoryless multiple access relay channels with receiver-source feedback via two-way relay channel in which end nodes exchange signals by a relay node. And we extend these results to the Gaussian case. By numerical computing, we show that our inner bound is the same with o...
متن کاملOptimal Transmission of Data Over Multi-Hop Networks
We study the end-to-end delay performance when transmitting data traac over multi-hop networks. Data is normally carried in transmission units (e.g., packet, frame, cell). The performance is strongly aaected by several factors, including header and payload sizes of the transmission units, and the eeect of pipelining these units over the multiple links. We determine the optimal payload size as a...
متن کاملReliability Bounds for Delay-Constrained Multi-hop Networks
We consider a linear multi-hop network composed of multi-state discrete-time memoryless channels over each hop, with orthogonal time-sharing across hops under a half-duplex relaying protocol. We analyze the probability of error and associated reliability function [1] over the multi-hop network; with emphasis on random coding and sphere packing bounds, under the assumption of point-to-point codi...
متن کاملSecuring Internet of Things with Lightweight IPsec
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. In some cases it may also be necessary to encrypt sensor data in transit. Recently, WSNs and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Available IPv6 protocol stacks can use IP...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Networks
دوره 50 شماره
صفحات -
تاریخ انتشار 2006