Personal tools

An introduction to network coding


Jump to: navigation, search

Title An introduction to network coding
Speaker Rui Costa
Institution Universidade do Porto
Date 2008/06/23
Time 10:30
Location Anfiteatro do IEETA
Country Portugal


Traditionally, information flows in networks are treated as water flows in pipes, with different information flows being treated separately. In this approach to the distribution of information in communication networks, usually called routing, intermediate nodes in the network - routers - simply forward the received packets, which means that a packet has information about only one flow. This is sufficient to achieve the capacity of the network in the case of a unicast session. However, in the case of a multicast session, i.e. one source and multiple destinations, it is proven that routing cannot always achieve capacity. In the case of Network Coding, intermediate nodes are allowed to combine different flows in a single packet and, as proved by Ahlswede et al., there is always a network coding scheme that achieves the multicast capacity. In this talk, the basic ideas of network coding will be analyzed and some applications to wireless networks will be presented.

About the speaker

Rui Costa received his undergraduate education in Mathematics from the School of Sciences of the University of Porto, Portugal, in 2006, and the Masters degree in Informatics from the same institution, in 2007. From September to December 2007, he was also a Working Student at DoCoMo Communications Laboratories Europe GmbH in Munich, working under the supervision of Dr. Joerg Widmer in the area of wireless network coding. He is currently a 1st year Phd student at the Department of Computer Science of the School of Sciences of the University of Porto, working under the supervision of Prof. João Barros. He is also a member of the research group NIP - Networking and Information Processing Group, which is part of the Instituto de Telecomunicações. His research interests are in the area of network information theory and information-theoretic security.