Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01-12-2010 | Research Article

Lower Bounds on the Maximum Energy Benefit of Network Coding for Wireless Multiple Unicast

Authors: Jasper Goseling, Ryutaroh Matsumoto, Tomohiko Uyematsu, Jos H. Weber

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2010

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We consider the energy savings that can be obtained by employing network coding instead of plain routing in wireless multiple unicast problems. We establish lower bounds on the benefit of network coding, defined as the maximum of the ratio of the minimum energy required by routing and network coding solutions, where the maximum is over all configurations. It is shown that if coding and routing solutions are using the same transmission range, the benefit in d-dimensional networks is at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq1_HTML.gif . Moreover, it is shown that if the transmission range can be optimized for routing and coding individually, the benefit in 2-dimensional networks is at least 3. Our results imply that codes following a decode-and-recombine strategy are not always optimal regarding energy efficiency.

1. Introduction

Emerging applications in wireless networks, like environment monitoring in rural areas by ad hoc networks, require more and more resources. One of the most important limitations is formed by battery life. Since battery technology is not keeping up with the increasing demand from resource-consuming applications, it is imperative that more efficient use is made of the available energy. There has been significant recent attention to the problem of minimizing energy consumption in networks. Some of the topics considered are minimum cost routing [13], power control algorithms [46], and cross-layer protocol design for energy minimization [7]. In this work, we are interested in the use of network coding [814] for reducing the energy consumption in wireless networks. We compare the reduction with traditional routing solutions. The contributions of this work are lower bounds on the energy reduction that can be achieved by using network coding for multiple unicast problems in wireless networks.
In recent years, there has been significant interest in network coding with the aim of reducing energy consumption in networks. More generally, network coding with a cost criterion has been considered. Much progress has been made in understanding the case of multicast traffic. In fact, it has been shown by Lun et al. that a minimum-cost network coding solution can be found in a distributed fashion in polynomial time [15]. The fact that the complexity of finding this solution is polynomial in time is surprising, since the corresponding routing problem is a Steiner tree problem that is known to be NP-complete [16].
Besides constructing minimum-cost coding solutions, it is also of interest to know what the benefits of network coding are compared to routing. In this work we, are interested in the energy benefit of network coding, which is the ratio of the minimum energy solution in a routing solution compared to the minimum energy network coding solution, maximized over all configurations. It has been shown by Goel and Khanna [17] that the energy benefit of network coding for multicast problems in wireless networks is upper bounded by a constant. The problem of reducing energy consumption for many-to-many broadcast traffic in wireless networks has been studied by Fragouli et al. in [18] and Widmer and Le Boudec in [19], providing lower bounds on the energy benefit of network coding for specific topologies. More importantly, algorithms have been presented in [18, 19] that allow to exploit these benefits in practical scenarios, that is, in a distributed fashion.
The above demonstrates that for multicast traffic and for many-to-many broadcast traffic, there is some understanding of the energy benefits of network coding and how to exploit them. In order to reduce energy consumption in practical networks, however, it is important to consider also multiple unicast traffic. Indeed, in practice a large part of the data will be generated by unicast sessions. For the case of multiple unicast traffic, contrary to multicast and broadcast, not much is known. This paper deals with the energy benefits of network coding for wireless multiple unicast. Remember from the above that for multicast, the problem of minimum-cost routing is hard, whereas minimum-cost network coding is easy. In stark contrast, the problem of minimum-cost multiple unicast routing is easy. One constructs the minimum-cost solution, that is, the shortest path, for each session individually. The minimum-cost multiple unicast network coding problem, however, seems hard and in general very little is known.
Network coding for the multiple unicast problem was first studied by Wu et al. in [20], in which it was shown that in the information exchange problem on the line network, the energy saving achieved by network coding is a factor two. The network codes that we construct in this work are in a sense a generalization of the results on one-dimensional networks [20], to higher-dimensional networks. The networks considered in this work are lattices. More specifically, the hexagonal lattice and the rectangular lattice. Effros et al. [21] and Kim et al. [22] have considered energy-efficient network codes on the hexagonal lattice. We improve the lower bounds on the energy savings of network on the hexagonal lattice given in [21]. More precisely, we improve the previously known bound of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq2_HTML.gif and obtain a new bound of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq3_HTML.gif .
Kramer and Savari have developed techniques that can be used to upper bound the achievable throughputs in a multiple unicast problem [23]. No methods are known, however, to lower bound the cost of network coding solutions for a configuration. A lower bound to the ratio of the minimum energy consumption of routing and coding solutions for a given multiple unicast configuration was provided by Keshavarz-Haddad and Riedi in [24]. For the type of configurations used in this paper, however, the results from [24] give the trivial lower bound of one. We will see, however, that network coding has large energy savings for these configurations.
An important class of network codes operates according to a principle that we will refer to in the remainder as decode-and-recombine. These codes satisfy the constraint that each symbol in each linear combination that is transmitted is explicitly known by the node transmitting that linear combination. Note, that this is a restriction from the general linear coding strategy, in which linear combinations of coded messages can be retransmitted. The motivation behind using decode-and-recombine codes is that it prevents information from spreading too much in the network, away from the path between source and destination, a heuristic introduced by Katti et al. [25]. The use of a decode-and-recombine strategy results in reduced complexity. However, an important question that has to be addressed is whether the use of decode-and-recombine codes leads to a higher energy consumption than is strictly necessary. We answer this question affirmatively. An upper bound of three on the energy benefit of decode-and-recombine codes has been given by Liu et al. [26]. One of the contributions of this work is to show that larger energy benefits can be obtained by considering also other types of codes.
This paper is organized as follows. In Section 2 we specify our model and problem statement more precisely. Our main results are presented in Section 3. Constructions of configurations that allow a large energy benefit for network coding and proofs of our results are given in Sections 4 and 5. In Section 6, finally, we discuss our work.

2. Model and Problem Statement

Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq4_HTML.gif be the nodes of a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq5_HTML.gif -dimensional wireless network. We consider a wireless network model with broadcast, where all nodes within range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq6_HTML.gif of a transmitting node can receive, and nodes outside this range cannot. More precisely, given a transmission range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq7_HTML.gif , a node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq8_HTML.gif is broadcasting to all nodes in the set
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq9_HTML.gif denotes the Euclidean norm of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq10_HTML.gif . The energy required to transmit one unit of information to all other nodes within range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq11_HTML.gif equals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq12_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq13_HTML.gif is the path loss exponent and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq14_HTML.gif is some constant. In analyzing the energy consumption of nodes, we will consider only the energy consumed by transmitting. Receiver energy consumption as well as energy consumed by processing are assumed to be negligible compared to transmitter energy consumption. In particular, note that little additional processing is required for network coding, compared to the processing that is performed in a traditional wireless protocol stack.
The traffic pattern that we consider is multiple unicast. All symbols are from the field https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq15_HTML.gif , that is, they are bits and addition corresponds to the xor operation. The source of each unicast session has a sequence of source symbols that need to be delivered to the corresponding destination. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq16_HTML.gif be the set of unicast sessions. We call https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq17_HTML.gif a wireless multiple unicast configuration.
We will compare energy consumption of routing and network coding. Our goal is to establish lower bounds on the maximum of the ratio of the minimum energy required by routing and network coding solutions, where the maximum is over all configurations. We will refer to this ratio as the energy benefit of network coding. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq18_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq19_HTML.gif be the minimum energy required for network coding and routing solutions, respectively, for a configuration https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq20_HTML.gif . The energy consumption of a coding or routing scheme is defined as the time-average of the total energy spent by all nodes in the network to deliver one symbol for each unicast session. In analyzing coding schemes, we will ignore the energy consumption in an initial startup phase and consider only steady-state behavior.
Note that since energy consumption per transmission equals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq21_HTML.gif , the transmission range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq22_HTML.gif is an important factor in the energy consumption. Therefore, it is of particular interest to optimize the transmission range such that energy consumption is minimized. In this work, we consider two different quantities: ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq23_HTML.gif ) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq24_HTML.gif , denoting the energy benefit that can be obtained if the transmission range is given and fixed and ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq25_HTML.gif ) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq26_HTML.gif , denoting the energy benefit that can be obtained if one is allowed to optimize the transmission range. Note that the transmission range can be individually optimized for the routing and network coding scenarios. More precisely, the goal of this work is to establish lower bounds on
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ2_HTML.gif
(2)
where the maximization is over all node locations https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq27_HTML.gif , multiple unicast sessions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq28_HTML.gif , and transmission ranges https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq29_HTML.gif , with the transmission range equal for the routing and network coding solutions, and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ3_HTML.gif
(3)
where the maximization is over all node locations https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq30_HTML.gif and multiple unicast sessions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq31_HTML.gif , with the transmission range being optimized individually for the routing and network coding solutions. If no confusion can arise, we will omit dependency on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq32_HTML.gif in the notation for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq33_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq34_HTML.gif .
Since in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq35_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq36_HTML.gif is equal for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq37_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq38_HTML.gif , the energy per transmission is equal in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq39_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq40_HTML.gif and the benefit is equal to the ratio of the number of transmissions required in routing and network coding solutions.
Since we are interested in energy consumption only, we can assume that all transmissions are scheduled sequentially and/or that there is no interference. All coding and routing schemes that we consider proceed in time slots or rounds. In each time slot, all nodes are allowed to transmit one or more messages. We assume that the length of the time slot is large enough to accommodate sequential transmission of all messages in that round. Coding operations will be based on messages received in previous time slots only. Finally, we assume that all nodes have complete knowledge of the network topology and the network code that is being used.
To conclude this section, we introduce here some of the notation that will be used in the remainder of the paper. The symbol transmitted by a node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq41_HTML.gif in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq42_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq43_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq44_HTML.gif transmits more than one symbol in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq45_HTML.gif , these will be distinguished by a superscript, giving, for instance, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq46_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq47_HTML.gif . Nodes are represented by vectors. Given vectors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq48_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq49_HTML.gif , let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq50_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq51_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq52_HTML.gif .
Unicast sessions are denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq53_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq54_HTML.gif being an integer and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq55_HTML.gif a vector. We will see in Sections 4 and 5 that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq56_HTML.gif defines the location of the source and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq57_HTML.gif the relative location of the destination, that is, the direction of the session. In some cases https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq58_HTML.gif will be denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq59_HTML.gif or similar forms. The https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq60_HTML.gif th source symbol of a session https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq61_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq62_HTML.gif . The source and destination of session https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq63_HTML.gif are denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq64_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq65_HTML.gif , respectively.

3. Results

We provide lower bounds on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq66_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq67_HTML.gif .
Theorem 1.
The ratio of the minimum energy consumption of routing solutions and the minimum energy consumption of network coding solutions, maximized over all node locations, multiple unicast sessions, and transmission ranges, with the transmission range equal for the routing and network coding solutions, is at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq68_HTML.gif , that is,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ4_HTML.gif
(4)
The result states that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq69_HTML.gif is at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq70_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq71_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq72_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq73_HTML.gif -, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq74_HTML.gif - and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq75_HTML.gif -dimensional networks, respectively. The result that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq76_HTML.gif is at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq77_HTML.gif in one-dimensional networks also follows from the results in [20]. The lower bound https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq78_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq79_HTML.gif -dimensional networks exceeds the previously known bound of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq80_HTML.gif [21]. This new lower bound is of particular interest, since it exceeds the upper bound of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq81_HTML.gif for decode-and-recombine type network codes [26]. Indeed, the code that we construct does not follow a decode-and-recombine strategy. This shows that energy can be saved by considering strategies other than decode-and-recombine. No lower bounds for three-dimensional networks have been previously established.
Before proving Theorem 1 in Section 5, we provide some intuition. The configuration used to proof Theorem 1 has nodes placed at a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq82_HTML.gif -dimensional rectangular lattice, connectivity https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq83_HTML.gif and is parameterized by an integer https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq84_HTML.gif controlling the size of the network. The network is given in Figure 1 for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq85_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq86_HTML.gif . For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq87_HTML.gif , the result of Theorem 1 is obtained as follows. First consider the case of routing. Note, that the minimum-energy solution is to route all packets along the shortest path between source and destination. Therefore, all nodes in the interior of the network will need to transmit four times. Now, for the case of network coding, we will show in Section 5 that it is possible to construct a network code in which each node in the interior of the network is transmitting only once in each time slot. Therefore, by considering large https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq88_HTML.gif and neglecting the energy consumption at the borders of the network, the obtained energy benefit is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq89_HTML.gif .
In Section 5 we will consider the general case of arbitrary https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq94_HTML.gif . Again, the network coding solution will be such that each of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq95_HTML.gif nodes in the interior of the network is transmitting only once in each time slot. In analyzing the routing solution, some care needs to the taken. Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq96_HTML.gif , the number of hops that need to be taken on the shortest path between source and destination equals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq97_HTML.gif . By noting that the number of sessions is roughly equal to the number of nodes at the border of the network, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq98_HTML.gif , and ignoring all transmission from nodes at the border of the network, we establish
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ5_HTML.gif
(5)
Details of the configuration and a proof of Theorem 1 are given in Section 5.
The configuration and network code construction used for Theorem 1 are not useful for obtaining bounds on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq99_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq100_HTML.gif , the cost per transmission in the network coding scheme is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq101_HTML.gif . One can verify, however, that the optimal transmission range under routing is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq102_HTML.gif . This requires https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq103_HTML.gif hops per session, with the cost per transmission being equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq104_HTML.gif . Using the network code described above and the optimal routing solution at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq105_HTML.gif gives
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ6_HTML.gif
(6)
which is at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq106_HTML.gif , since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq107_HTML.gif . Note that it was already shown in [20] that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq108_HTML.gif and in [21] that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq109_HTML.gif .
By considering a different configuration, we show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq110_HTML.gif .
Theorem 2.
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq111_HTML.gif -dimensional wireless networks, the ratio of the minimum energy consumption of routing solutions and the minimum energy consumption of network coding solutions, maximized over all node locations and multiple unicast sessions, with the transmission range optimized individually for the routing and network coding solutions, is at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq112_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq113_HTML.gif
Here we provide an intuitive explanation of this result; details of the configuration and a proof of Theorem 2 are provided in Section 4. The result is established using a multiple unicast configuration on a subset of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq114_HTML.gif -dimensional hexagonal lattice as depicted in Figure 2. The minimum cost routing solution on this network follows shortest paths for all sessions and will require all nodes in the interior of the network to transmit three times in order to deliver one symbol for each session. In Section 4, we construct a network code in which each node in the interior is only transmitting once per delivered symbol. By making the size of the network large, the influence of the borders becomes negligible. Hence, the energy benefit is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq115_HTML.gif .
Besides providing new lower bounds on the energy benefit of network, the network codes that are constructed in this paper are of interest by themselves. They might lead to insight in how to operate in networks with another structure. Finally, even though the case https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq117_HTML.gif is not of any practical relevance, the bounds as well as the code constructions might lead to a better insight for lower-dimensional networks.

4. An Efficient Code on the Hexagonal Lattice

In this section, we present a multiple unicast configuration in which the nodes form a subset of the hexagonal lattice. It will be shown that the energy benefit on this configuration is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq118_HTML.gif , proving Theorem 2. Since the code construction used here is less involved then the construction used to prove Theorem 1, we start with the proof of Theorem 2. This section is organized as follows. In Section 4.1 we present the configuration in more detail after which we give the construction of the network code in Section 4.2. Section 4.3 is used to prove that the code is valid. Finally, in Section 4.4 we analyze the energy consumption of the network code and prove Theorem 2.

4.1. Configuration

The size of the configuration is parameterized by a positive integer https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq119_HTML.gif . The nodes https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq120_HTML.gif form a subset of the hexagonal lattice. We index nodes with a tuple https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq121_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq122_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ7_HTML.gif
(7)
The location of node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq123_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq124_HTML.gif is given by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq125_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ8_HTML.gif
(8)
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq126_HTML.gif denote the interior of the network, that is,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ9_HTML.gif
(9)
The transmission range that we are interested in is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq127_HTML.gif . This leads to connectivity between the six nearest neighbours. Hence, the neighbours of a node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq128_HTML.gif are
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ10_HTML.gif
(10)
The nodes https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq129_HTML.gif and the connectivity are depicted in Figure 3.
There are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq133_HTML.gif unicast sessions, denoted by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq134_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq135_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq136_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq137_HTML.gif . Sources and destinations of the sessions are positioned as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ11_HTML.gif
(11)
as depicted in Figure 4. Remember from Section 2, that session https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq138_HTML.gif has the sequence of source symbols https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq139_HTML.gif to be transferred.

4.2. Network Code

The network code is such that in each time slot a new source symbol from each session is transmitted. Also, one symbol of each session is decoded by its destination in each time slot. After successfully decoding a symbol, it is retransmitted by the destination in the next time slot. Nodes at the border will, therefore, transmit twice in each time slot. Nodes in the interior of the network transmit only once. The symbol that they transmit is a linear combination of one symbol from each of the sessions for which the shortest path between source and destination includes that node.
The operation of the network code is demonstrated in Figure 5 in which the transmissions of all nodes in the first four time slots are depicted. Different transmissions by the same node are separated by a comma. Note, moreover, that there is a startup phase, time slots https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq140_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq141_HTML.gif , in which not all destinations are able to decode a symbol. From time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq142_HTML.gif onwards, all destinations decode one symbol in every time slot. In analyzing the energy consumption of the coding scheme, we will ignore the startup phase.
The symbol transmitted at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq150_HTML.gif by the node with the dotted border can be obtained by summing all transmissions from nodes with a dashed border in earlier time slots. Indeed
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ12_HTML.gif
(12)
This coding operation (i.e., in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq151_HTML.gif , a node transmits the sum of what was transmitted by its top-left neighbour in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq152_HTML.gif , by its top right-neighbour in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq153_HTML.gif , and so forth, as visualized in Figure 5) is performed by all nodes that are in the interior of the network. The idea behind the coding operation is to cancel, by means of the XOR operation, all symbols that should not be retransmitted. In (12), for instance, we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq154_HTML.gif . The exact operation of the network code is made more precise in the remainder of this subsection. The coding operation for interior nodes is given in exact form in (17).
Nodes at the border of the network operate as follows. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq155_HTML.gif . In time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq156_HTML.gif node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq157_HTML.gif transmits two symbols https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq158_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq159_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq161_HTML.gif Left border:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ13_HTML.gif
(13)
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq162_HTML.gif is the source of session https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq163_HTML.gif it has source symbol https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq164_HTML.gif , available. Also, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq165_HTML.gif is the destination for session https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq166_HTML.gif . It remains to be shown that symbol https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq167_HTML.gif can be decoded by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq168_HTML.gif using the information obtained from its neighbours up to time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq169_HTML.gif . For notational convenience, let
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq171_HTML.gif Left border:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ14_HTML.gif
(14)
In a similar fashion, we have the following transmissions at the right and bottom borders of the network.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq173_HTML.gif Right border:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ15_HTML.gif
(15)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq175_HTML.gif Bottom border:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ16_HTML.gif
(16)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq176_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq177_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq178_HTML.gif . Moreover, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq179_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq180_HTML.gif are not symbols that are transmitted, but only notational shortcuts.
Nodes in the interior of the network transmit once in each time slot. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq181_HTML.gif . The coding operation it performs is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ17_HTML.gif
(17)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq182_HTML.gif

4.3. Validity of the Network Code

We need to show that destinations can decode in time in order to retransmit the required symbols according to (13), (15), and (16). In order to do so we first analyze how data propagates through the network. If we look at the nodes in the network that transmit linear combinations that contain a certain source symbol, we see that symbols propagate exactly along the shortest paths between source and destination. This is made more precise in the following two lemmas.
Lemma 1.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq183_HTML.gif . Assume that the only nonzero source symbol transmitted in the network is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq184_HTML.gif by node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq185_HTML.gif in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq186_HTML.gif . Then, for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq187_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq188_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ18_HTML.gif
(18)
Proof.
We use induction over time. The base case is time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq189_HTML.gif , for which it is readily verified that the statement is true. Now, for the induction step, suppose that the lemma holds for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq190_HTML.gif smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq191_HTML.gif . This implies that for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq192_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq193_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ19_HTML.gif
(19)
Hence,
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ20_HTML.gif
(20)
which by the induction hypothesis is equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq194_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq195_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq196_HTML.gif and zero otherwise.
Lemma 2.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq197_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ21_HTML.gif
(21)
Proof.
From Lemma 1, the time-invariance of the system, and the symmetry of the coding operation (17) of the internal nodes.
We are now ready to prove that the destinations can correctly decode source symbols. We present the decoding procedure for nodes on the right border of the network. The decoding procedures at the other borders can be obtained by exploiting the symmetry of the system.
Lemma 3.
Consider https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq198_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq199_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq200_HTML.gif , that is, the destination of session https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq201_HTML.gif . It can decode symbol https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq202_HTML.gif at the end of time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq203_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ22_HTML.gif
(22)
Proof.
From Lemma 2, (15), it follows that (22) equals
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ23_HTML.gif
(23)

4.4. Energy Consumption

The energy consumption of the network coding scheme presented above is given in the following lemma.
Lemma 4.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq204_HTML.gif .
Proof.
From (13)–(17), we have that each of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq205_HTML.gif nodes at the border that are source or destination are transmitting twice in each time slot. Each of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq206_HTML.gif internal nodes is transmitting once in each time slot. Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq207_HTML.gif , the energy consumption per transmission is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq208_HTML.gif . This gives
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ24_HTML.gif
(24)
Next, we give the minimum energy required by a routing solution.
Lemma 5.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq209_HTML.gif .
Proof.
Since we consider routing, we need to take the shortest path for each session. Since the energy consumption per hop equals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq210_HTML.gif , the energy consumption under routing is minimized for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq211_HTML.gif . Now, we see that the number of transmissions required to deliver a symbol for the sessions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq212_HTML.gif equals https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq213_HTML.gif . Adding the transmissions for sessions of type https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq214_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq215_HTML.gif gives
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ25_HTML.gif
(25)
Using the above two lemmas, we are able to prove Theorem 2.
Proof of Theorem 2.
Remember that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq216_HTML.gif is defined as the maximum of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq217_HTML.gif over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq218_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq219_HTML.gif . Hence, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq220_HTML.gif for any specific https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq221_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq222_HTML.gif will provide a lower bound to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq223_HTML.gif . In addition, any upper bound to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq224_HTML.gif will result in a lower bound to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq225_HTML.gif . Hence, from Lemmas 4 and 5, we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ26_HTML.gif
(26)

5. An Efficient Code on the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq226_HTML.gif -Dimensional Rectangular Lattice

In this section, we present a multiple unicast configuration in which the nodes are placed at integer coordinates in a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq227_HTML.gif -dimensional space, that is, at the rectangular lattice.

5.1. Configuration

The size of the configuration is parameterized by a positive integer https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq228_HTML.gif . We have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ27_HTML.gif
(27)
The interior of the network is given by
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ28_HTML.gif
(28)
We will make use of
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ29_HTML.gif
(29)
which corresponds to those nodes that are part of exactly one face of the network.
The transmission range that will be used is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq229_HTML.gif . This transmission range induces a neighbourhood consisting of all neighbours within distance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq230_HTML.gif . The coding operation of our network code is based on only part of the neighbourhood, that is, it uses
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ30_HTML.gif
(30)
Note, that for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq231_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq232_HTML.gif corresponds to the complete neighbourhood of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq233_HTML.gif . We will be using https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq234_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq235_HTML.gif denotes the Manhattan distance from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq236_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq237_HTML.gif . The network and its connectivity are depicted for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq238_HTML.gif in Figure 6.
A source is located at each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq244_HTML.gif . Therefore, there are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq245_HTML.gif sessions. If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq246_HTML.gif , we denote the session corresponding to this source by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq247_HTML.gif . Recall from Section 2 that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq248_HTML.gif denotes the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq249_HTML.gif dimensional vector obtained by removing the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq250_HTML.gif th element from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq251_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq252_HTML.gif , we denote the session by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq253_HTML.gif . The destination of each session is located at the other side of the network, that is, we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq254_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq255_HTML.gif . The positions of sources and destinations are depicted for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq256_HTML.gif in Figure 7. It can be seen that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq257_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq258_HTML.gif form oppositely directed sessions.

5.2. Network Code

We introduce sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq259_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq260_HTML.gif , which are defined recursively as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ31_HTML.gif
(31)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq261_HTML.gif denotes symmetric difference and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq262_HTML.gif . Note that irrespective of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq263_HTML.gif we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq264_HTML.gif . As an example for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq265_HTML.gif we have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq266_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq267_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq268_HTML.gif .
The scheme is very similar in flavour to the scheme presented in Section 4; its operation is demonstrated in Figure 8 in which, for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq269_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq270_HTML.gif , the transmissions of all nodes in the first four time slots are depicted. The operation of the scheme is such that in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq271_HTML.gif sources transmit the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq272_HTML.gif th source symbol and destinations decode the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq273_HTML.gif th source symbol. Besides transmitting a new source symbol in each time slot, sources/destinations will also retransmit the symbol that has been decoded in that time slot, that is, they transmit two different symbols in each time slot. In the figure, different transmissions by the same node are separated by a comma. Nodes in the interior of the network transmit only once. The symbol that they transmit is a linear combination of one symbol from each of the sessions for which the shortest path between source and destination includes that node. The symbol transmitted at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq274_HTML.gif by the node with the dotted border can be obtained by summing all transmissions from nodes with a dashed border in earlier time slots. This coding operation is performed by all nodes that are in the interior of the network. The exact operation of the network code is made more precise in the remainder of this subsection. The coding operation for interior nodes is given in exact form in (34).
Let node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq282_HTML.gif . Remember that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq283_HTML.gif implies that there exists a unique https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq284_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq285_HTML.gif . Node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq286_HTML.gif transmits
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ32_HTML.gif
(32)
For notational convenience, let
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ33_HTML.gif
(33)
The coding operation performed by an internal node is as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ34_HTML.gif
(34)

5.3. Validity of the Network Code

The following result follows directly from the definition of the sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq287_HTML.gif , but is stated here as a lemma because of its importance in the remainder of the paper.
Lemma 6.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq288_HTML.gif be a sequence of symbols from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq289_HTML.gif and let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq290_HTML.gif . We have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ35_HTML.gif
(35)
Lemma 7.
Consider node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq291_HTML.gif . Assume that the only nonzero source symbol transmitted in the network is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq292_HTML.gif by node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq293_HTML.gif in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq294_HTML.gif . Then
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ36_HTML.gif
(36)
for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq295_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq296_HTML.gif .
Proof.
We use induction over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq297_HTML.gif . At time https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq298_HTML.gif the lemma holds, giving us our base case. Now suppose that the lemma holds for all time slots smaller than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq299_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq300_HTML.gif , the lemma follows directly from (32)–(33). In the remainder we consider https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq301_HTML.gif . From the induction hypothesis, it follows that for any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq302_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ37_HTML.gif
(37)
If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq303_HTML.gif , it follows from (32) and the induction hypothesis that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ38_HTML.gif
(38)
Now, at https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq304_HTML.gif the coding operation performed by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq305_HTML.gif can be decomposed as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ39_HTML.gif
(39)
where
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ40_HTML.gif
(40)
In the remainder, we show that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ41_HTML.gif
(41)
which proves the lemma, since by the induction hypothesis https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq306_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq307_HTML.gif and zero otherwise.
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq308_HTML.gif we, have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ42_HTML.gif
(42)
where the second equality follows from Lemma 6, the third equality follows from (37)-(38), and the last equality holds because we work over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq309_HTML.gif .
For https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq310_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ43_HTML.gif
(43)
Lemma 8.
Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq311_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ44_HTML.gif
(44)
Proof.
By linearity, time-invariance and symmetry of (34) together with Lemma 7.
We are now ready to prove that the destinations can correctly decode source symbols. We present the decoding procedure for nodes on the right border of the network, that is, for nodes of type https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq312_HTML.gif . The decoding procedures at the other borders can be obtained by exploiting the symmetry of the system.
Lemma 9.
Consider node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq313_HTML.gif . At the end of time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq314_HTML.gif , it can decode symbol https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq315_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ45_HTML.gif
(45)
Proof.
First note that all terms in (45) correspond to symbols that have been received by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq316_HTML.gif before or in time slot https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq317_HTML.gif .
Now, from Lemma 8, we have
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ46_HTML.gif
(46)
where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq318_HTML.gif holds, because for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq319_HTML.gif , Lemma 6 gives
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ47_HTML.gif
(47)
and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ48_HTML.gif
(48)
From (32) it follows that
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ49_HTML.gif
(49)
and
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ50_HTML.gif
(50)
The proof of the lemma follows by adding the final expressions from (46), (49) and (50) observing that the outcome is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq320_HTML.gif .

5.4. Energy Consumption

The energy consumption of the network coding scheme presented above provides an upper bound to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq321_HTML.gif .
Lemma 10.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq322_HTML.gif .
Proof.
All transmissions are over distance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq323_HTML.gif and cost https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq324_HTML.gif . The nodes in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq325_HTML.gif are transmitting twice. On each of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq326_HTML.gif sides of the network, there are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq327_HTML.gif nodes from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq328_HTML.gif ; hence https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq329_HTML.gif . This gives https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq330_HTML.gif transmissions. In addition, there are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq331_HTML.gif nodes in the interior, that are all transmitting once.
Next, we give the minimum energy required by a routing solution.
Lemma 11.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq332_HTML.gif .
Proof.
Since the transmission range is equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq333_HTML.gif , a routing solution requires https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq334_HTML.gif transmissions per session. Moreover, there are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_IEq335_HTML.gif sessions.
Using the above two lemmas, we are able to prove Theorem 1.
Proof of Theorem 1.
Lemmas 10 and 11 give
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F605421/MediaObjects/13638_2009_Article_1964_Equ51_HTML.gif
(51)

6. Discussion

We have given several constructions of energy-efficient network codes. These constructions serve to show that compared to plain routing, network coding has the potential of reducing energy consumption in wireless networks. Since we have provided only codes that are based on a centralized design, it remains to be shown in future work if and how this potential can be exploited using practical codes. Moreover, it would also be of interest to consider the energy-benefit in topologies in which the nodes are not positioned at a lattice, for instance, random networks.
In this work we have provided lower bounds on the energy benefit of network coding for wireless multiple unicast. Another open problem is to find upper bounds on the benefit.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Chen S, Nahrstedt K: An overview of quality of service routing for next-generation high-speed networks: problems and solutions. IEEE Network 1998, 12(6):64-79. 10.1109/65.752646CrossRef Chen S, Nahrstedt K: An overview of quality of service routing for next-generation high-speed networks: problems and solutions. IEEE Network 1998, 12(6):64-79. 10.1109/65.752646CrossRef
2.
go back to reference Tassiulas L, Chang J: Energy conserving routing in wireless ad hoc networks. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Network (MobiCom '98), August 1998, Dallas, Tex, USA Tassiulas L, Chang J: Energy conserving routing in wireless ad hoc networks. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Network (MobiCom '98), August 1998, Dallas, Tex, USA
3.
go back to reference Rodoplu V, Meng TH: Minimum energy mobile wireless networks. IEEE Journal on Selected Areas in Communications 1999, 17(8):1333-1344. 10.1109/49.779917CrossRef Rodoplu V, Meng TH: Minimum energy mobile wireless networks. IEEE Journal on Selected Areas in Communications 1999, 17(8):1333-1344. 10.1109/49.779917CrossRef
4.
go back to reference Ramanathan R, Rosales-Hain R: Topology control of multihop wireless networks using transmit power adjustment. Proceedings of the IEEE 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00), March 2000 404-413. Ramanathan R, Rosales-Hain R: Topology control of multihop wireless networks using transmit power adjustment. Proceedings of the IEEE 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '00), March 2000 404-413.
5.
go back to reference Jones CE, Sivalingam KM, Agrawal P, Chen JC: A survey of energy efficient network protocols for wireless networks. Wireless Networks 2001, 7(4):343-358. 10.1023/A:1016627727877MATHCrossRef Jones CE, Sivalingam KM, Agrawal P, Chen JC: A survey of energy efficient network protocols for wireless networks. Wireless Networks 2001, 7(4):343-358. 10.1023/A:1016627727877MATHCrossRef
6.
go back to reference Saraydar CU, Mandayam NB, Goodman DJ: Efficient power control via pricing in wireless data networks. IEEE Transactions on Communications 2002, 50(2):291-303. 10.1109/26.983324CrossRef Saraydar CU, Mandayam NB, Goodman DJ: Efficient power control via pricing in wireless data networks. IEEE Transactions on Communications 2002, 50(2):291-303. 10.1109/26.983324CrossRef
7.
go back to reference Goldsmith AJ, Wicker SB: Design challenges for energy-constrained ad hoc wireless networks. IEEE Wireless Communications 2002, 9(4):8-27. 10.1109/MWC.2002.1028874CrossRef Goldsmith AJ, Wicker SB: Design challenges for energy-constrained ad hoc wireless networks. IEEE Wireless Communications 2002, 9(4):8-27. 10.1109/MWC.2002.1028874CrossRef
8.
go back to reference Ahlswede R, Cai N, Li S-YR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MATHMathSciNetCrossRef Ahlswede R, Cai N, Li S-YR, Yeung RW: Network information flow. IEEE Transactions on Information Theory 2000, 46(4):1204-1216. 10.1109/18.850663MATHMathSciNetCrossRef
10.
go back to reference Koetter R, Médard M: An algebraic approach to network coding. IEEE/ACM Transactions on Networking 2003, 11(5):782-795. 10.1109/TNET.2003.818197CrossRef Koetter R, Médard M: An algebraic approach to network coding. IEEE/ACM Transactions on Networking 2003, 11(5):782-795. 10.1109/TNET.2003.818197CrossRef
11.
go back to reference Ho T, Médard M, Koetter R, Karger DR, Effros M, Shi J, Leong B: A random linear network coding approach to multicast. IEEE Transactions on Information Theory 2006, 52(10):4413-4430.CrossRef Ho T, Médard M, Koetter R, Karger DR, Effros M, Shi J, Leong B: A random linear network coding approach to multicast. IEEE Transactions on Information Theory 2006, 52(10):4413-4430.CrossRef
12.
go back to reference Yeung RW, Cai N: Network coding theory. Foundations and Trends in Communications and Information Theory 2006, 2(4):241-381.CrossRef Yeung RW, Cai N: Network coding theory. Foundations and Trends in Communications and Information Theory 2006, 2(4):241-381.CrossRef
13.
go back to reference Fragouli C, Soljanin E: Network coding fundamentals. Foundations and Trends in Networking 2007, 2(1):1-133. 10.1561/1700000004CrossRef Fragouli C, Soljanin E: Network coding fundamentals. Foundations and Trends in Networking 2007, 2(1):1-133. 10.1561/1700000004CrossRef
14.
go back to reference Fragouli C, Soljanin E: Network coding applications. Foundations and Trends in Networking 2007, 2(2):135-269. 10.1561/1300000013MATHCrossRef Fragouli C, Soljanin E: Network coding applications. Foundations and Trends in Networking 2007, 2(2):135-269. 10.1561/1300000013MATHCrossRef
15.
go back to reference Lun DS, Ratnakar N, Médard M, Koetter R, Karger DR, Ho T, Ahmed E, Zhao F: Minimum-cost multicast over coded packet networks. IEEE Transactions on Information Theory 2006, 52(6):2608-2623.MATHCrossRef Lun DS, Ratnakar N, Médard M, Koetter R, Karger DR, Ho T, Ahmed E, Zhao F: Minimum-cost multicast over coded packet networks. IEEE Transactions on Information Theory 2006, 52(6):2608-2623.MATHCrossRef
17.
go back to reference Goel A, Khanna S: On the network coding advantage for wireless multicast in Euclidean space. Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN '08), April 2008 64-69. Goel A, Khanna S: On the network coding advantage for wireless multicast in Euclidean space. Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN '08), April 2008 64-69.
18.
go back to reference Fragouli C, Widmer J, Le Boudec J-Y: Efficient broadcasting using network coding. IEEE/ACM Transactions on Networking 2008, 16(2):450-463.CrossRef Fragouli C, Widmer J, Le Boudec J-Y: Efficient broadcasting using network coding. IEEE/ACM Transactions on Networking 2008, 16(2):450-463.CrossRef
19.
go back to reference Widmer J, Le Boudec J-Y: Network coding for efficient communication in extreme networks. In Applications, Technologies, Architectures, and Protocols for Computer Communication. ACM Press, New York, NY, USA; 2005:284-291. Widmer J, Le Boudec J-Y: Network coding for efficient communication in extreme networks. In Applications, Technologies, Architectures, and Protocols for Computer Communication. ACM Press, New York, NY, USA; 2005:284-291.
20.
go back to reference Wu Y, Chou PA, Kung S-Y: Information exchange in wireless networks with network coding and physical-layer broadcast. Proceedings of the 39th Annual Conference on Information Sciences and Systems (CISS '05), 2005 Wu Y, Chou PA, Kung S-Y: Information exchange in wireless networks with network coding and physical-layer broadcast. Proceedings of the 39th Annual Conference on Information Sciences and Systems (CISS '05), 2005
21.
go back to reference Effros M, Ho T, Kim S: A tiling approach to network code design for wireless networks. In Proceedings of the IEEE Information Theory Workshop (ITW '06), March 2006, punta del Este, Uruguay. IEEE; 62-66. Effros M, Ho T, Kim S: A tiling approach to network code design for wireless networks. In Proceedings of the IEEE Information Theory Workshop (ITW '06), March 2006, punta del Este, Uruguay. IEEE; 62-66.
22.
go back to reference Kim S, Effros M, Ho T: On low-power multiple unicast network coding over a wireless triangular grid. Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, 2007 Kim S, Effros M, Ho T: On low-power multiple unicast network coding over a wireless triangular grid. Proceedings of the 45th Annual Allerton Conference on Communication, Control and Computing, 2007
23.
go back to reference Kramer G, Savari SA: Edge-cut bounds on network coding rates. Journal of Network and Systems Management 2006, 14(1):49-66. 10.1007/s10922-005-9019-0CrossRef Kramer G, Savari SA: Edge-cut bounds on network coding rates. Journal of Network and Systems Management 2006, 14(1):49-66. 10.1007/s10922-005-9019-0CrossRef
24.
go back to reference Keshavarz-Haddad A, Riedi R: Bounds on the benefit of network coding: throughput and energy saving in wireless networks. Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), April 2008 376-384. Keshavarz-Haddad A, Riedi R: Bounds on the benefit of network coding: throughput and energy saving in wireless networks. Proceedings of the 27th IEEE Communications Society Conference on Computer Communications (INFOCOM '08), April 2008 376-384.
25.
go back to reference Katti S, Rahul H, Hu W, Katabi D, Médard M, Crowcroft J: XORs in the air: practical wireless network coding. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM SIGCOMM '06) 243-254. Katti S, Rahul H, Hu W, Katabi D, Médard M, Crowcroft J: XORs in the air: practical wireless network coding. Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (ACM SIGCOMM '06) 243-254.
26.
go back to reference Liu J, Goeckelt D, Towsley D: Bounds on the gain of network coding and broadcasting in wireless networks. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007 6-12. Liu J, Goeckelt D, Towsley D: Bounds on the gain of network coding and broadcasting in wireless networks. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007 6-12.
Metadata
Title
Lower Bounds on the Maximum Energy Benefit of Network Coding for Wireless Multiple Unicast
Authors
Jasper Goseling
Ryutaroh Matsumoto
Tomohiko Uyematsu
Jos H. Weber
Publication date
01-12-2010
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2010/605421

Other articles of this Issue 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Go to the issue

Premium Partner