Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications

Ahmed Douik, Sameh Sorour, Tareq Y. Al-Naffouri, Mohamed-Slim Alouini

Research output: Contribution to journalArticlepeer-review

47 Scopus citations


From its introduction to its quindecennial, network coding has built a strong reputation for enhancing packet recovery and achieving maximum information flow in both wired and wireless networks. Traditional studies focused on optimizing the throughput of the system by proposing elaborate schemes able to reach the network capacity. With the shift toward distributed computing on mobile devices, performance and complexity become both critical factors that affect the efficiency of a coding strategy. Instantly decodable network coding presents itself as a new paradigm in network coding that trades off these two aspects. This paper review instantly decodable network coding schemes by identifying, categorizing, and evaluating various algorithms proposed in the literature. The first part of the manuscript investigates the conventional centralized systems, in which all decisions are carried out by a central unit, e.g., a base-station. In particular, two successful approaches known as the strict and generalized instantly decodable network are compared in terms of reliability, performance, complexity, and packet selection methodology. The second part considers the use of instantly decodable codes in a device-to-device communication network, in which devices speed up the recovery of the missing packets by exchanging network coded packets. Although the performance improvements are directly proportional to the computational complexity increases, numerous successful schemes from both the performance and complexity viewpoints are identified.
Original languageEnglish (US)
Pages (from-to)1201-1224
Number of pages24
JournalIEEE Communications Surveys & Tutorials
Issue number2
StatePublished - Feb 7 2017


Dive into the research topics of 'Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications'. Together they form a unique fingerprint.

Cite this