Other available formats:
Looking for an examination copy?
If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact firstname.lastname@example.org providing details of the course you are teaching.
Network coding promises to significantly impact the way communications networks are designed, operated, and understood. The first book to present a unified and intuitive overview of the theory, applications, challenges, and future directions of this emerging field, this is a must-have resource for those working in wireline or wireless networking. *Uses an engineering approach – explains the ideas and practical techniques *Covers mathematical underpinnings, practical algorithms, code selection, security, and network management *Discusses key topics of inter-session (non-multicast) network coding, lossy networks, lossless networks, and subgraph-selection algorithms Starting with basic concepts, models, and theory, then covering a core subset of results with full proofs, Ho and Lun provide an authoritative introduction to network coding that supplies both the background to support research and the practical considerations for designing coded networks. This is an essential resource for graduate students and researchers in electronic and computer engineering and for practitioners in the communications industry.Read more
- First unified overview of the theory and applications of this emerging field
- Addresses practical engineering considerations
- Presents more than mathematical proofs by explaining the ideas and practical techniques
Not yet reviewed
Be the first to review
Review was not posted due to profanity×
- Date Published: April 2008
- format: Hardback
- isbn: 9780521873109
- length: 184 pages
- dimensions: 254 x 178 x 18 mm
- weight: 0.54kg
- contains: 47 b/w illus.
- availability: Available
Table of Contents
2. Lossless multicast network coding
3. Inter-session network coding
4. Network coding in lossy networks
5. Subgraph selection
6. Security against adversarial errors.
Sorry, this resource is locked
Please register or sign in to request access. If you are having problems accessing these resources please email email@example.comRegister Sign in
You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.Continue ×