Compute-and-forward on a line network with random access

Zhijie Ren, Jasper Goseling, Jos Weber, Michael Gastpar

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

9 Downloads (Pure)


Signal superposition and broadcast are important features of the wireless medium. Compute-and-Forward, also known as Physical Layer Network Coding (PLNC), is a technique exploiting these features in order to improve performance of wireless networks. More precisely, it allows wireless terminals to reliably de- code a linear combination of all messages, when a superposition of the messages is received through the physical medium. In this paper, we propose a random PLNC scheme for a local interference line network in which nodes perform random access scheduling. We prove that our PLNC scheme is capacity achieving in the case of one symmetric bi-directional session with terminals on both ends of this line network model. We demonstrate that our scheme significantly outperforms any other scheme. In particular, by eligibly choosing the access rate of the random access scheduling mechanism for the network, the throughput of our PLNC scheme is at least 3.4 and 1.7 times better than traditional routing and plain network coding, respectively.
Original languageEnglish
Title of host publicationProceedings of the 34th Symposium on Information Theory in the Benelux and the 3rd Joint WIC/IEEE Symposium on Information Theory and Signal Processing in the Benelux
Subtitle of host publicationLeuven, Belgium, 30-31 May 2013
PublisherWerkgemeenschap voor Informatie- en Communicatietheorie (WIC)
Number of pages8
ISBN (Print)978-90-365-0000-5, 9781627487375
Publication statusPublished - May 2013
Event34th WIC Symposium on Information Theory in the Benelux 2013 - Leuven, Belgium
Duration: 30 May 201331 May 2013
Conference number: 34


Conference34th WIC Symposium on Information Theory in the Benelux 2013


  • EWI-24100
  • IR-88277
  • METIS-300219

Fingerprint Dive into the research topics of 'Compute-and-forward on a line network with random access'. Together they form a unique fingerprint.

Cite this