Advanced PhYsical Layer Optimization Methods for energy-efficient wireless systems

Research Article

Robust Wireless Network Coding – An Overview

  • @INPROCEEDINGS{10.1007/978-3-642-16644-0_59,
        author={Marco Renzo and Lana Iwaza and Michel Kieffer and Pierre Duhamel and Khaldoun Agha},
        title={Robust Wireless Network Coding -- An Overview},
        proceedings={Advanced PhYsical Layer Optimization Methods for energy-efficient wireless systems},
        keywords={Network Information Flow Network Coding Error Control Coding over Networks Joint Network--Channel Decoding Reliable Communications Wireless Networks},
  • Marco Renzo
    Lana Iwaza
    Michel Kieffer
    Pierre Duhamel
    Khaldoun Agha
    Year: 2012
    Robust Wireless Network Coding – An Overview
    DOI: 10.1007/978-3-642-16644-0_59
Marco Renzo1, Lana Iwaza,*, Michel Kieffer1,*, Pierre Duhamel1,*, Khaldoun Agha2,*
  • 1: CNRS – SUPELEC – Univ. Paris–Sud 11
  • 2: CNRS – Univ. Paris–Sud 11
*Contact email:,,,


Network Coding (NC) has witnessed a tremendous upsurge in interest and activities in recent years, both in academia and industry. Indeed, since the pioneering publication of Ahlswede in 2000, NC has rapidly emerged as a major research area in information theory due to its wide applicability to communication through real networks. The many contributions available in the literature to date, ranging from purely theoretical studies on fundamental limits to practical experimentations in real–world environments, offer a clear evidence that the shift in paradigm envisaged by NC might revolutionize the way we manage, operate, and understand the organization of networks. However, the principle of NC is not without its limitations. Initial studies on NC were mainly focused on lossless channels, which, however, might have limited applicability to a wireless context. As a matter of fact, in practical wireless environments, NC might be very susceptible to transmission errors caused by noise, fading, or interference. In particular, the algebraic operations accomplished by the intermediate nodes of the network introduce some packet dependencies in a way that the injection of even a erroneous packet has the potential to corrupt packet received by the destination nodes. Motivated by this consideration, recent research efforts have been devoted to the design of NC, with the main goal to circumvent the critical limitations of the NC paradigm in practical operating environments. In this paper, we aim at providing an overview of the most important and notable research directions in this emerging field.