Instantly Decodable Network Codes for Real-Time Applications Anh Le, Arash Tehrani, Alex Dimakis, Athina Markopoulou UC Irvine, USC, UT Austin Presented.

Slides:



Advertisements
Similar presentations
Copyright © Cengage Learning. All rights reserved.
Advertisements

Chapter 0 Review of Algebra.
The Rational Zero Theorem
1/15 Agnostically learning halfspaces FOCS /15 Set X, F class of functions f: X! {0,1}. Efficient Agnostic Learner w.h.p. h: X! {0,1} poly(1/ )
Constraint Satisfaction Problems
Combinatorial Auction
Lower Bounds for Local Search by Quantum Arguments Scott Aaronson.
1 A Statistical Analysis of the Precision-Recall Graph Ralf Herbrich Microsoft Research UK Joint work with Hugo Zaragoza and Simon Hill.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 38.
Enabling Inter-domain DTN Communications by Networked Static Gateways Ting He*, Nikoletta Sofra, Kang-Won Lee*, and Kin K Leung * IBM Imperial College.
Analysis of Algorithms
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
Introduction to Algorithms 6.046J/18.401J/SMA5503
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Chapter R: Reference: Basic Algebraic Concepts
0 - 0.
ALGEBRAIC EXPRESSIONS
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 LP, extended maxflow, TRW OR: How to understand Vladimirs most recent work Ramin Zabih Cornell University.
Reductions Complexity ©D.Moshkovitz.
Linear network code for erasure broadcast channel with feedback Presented by Kenneth Shum Joint work with Linyu Huang, Ho Yuet Kwan and Albert Sung 1Mar.
1 Outline relationship among topics secrets LP with upper bounds by Simplex method basic feasible solution (BFS) by Simplex method for bounded variables.
1 Haitao Zheng and Jill Boyce IEEE Transaction on Multimedia Leif 9/10/01 An Improved UDP Protocol for Video Transmission Over Internet-to-Wireless Networks.
MIMO Broadcast Scheduling with Limited Feedback Student: ( ) Director: 2008/10/2 1 Communication Signal Processing Lab.
1 Bart Jansen Polynomial Kernels for Hard Problems on Disk Graphs Accepted for presentation at SWAT 2010.
1 Column Generation. 2 Outline trim loss problem different formulations column generation the trim loss problem master problem and subproblem in column.
Compressing Forwarding Tables Ori Rottenstreich (Technion, Israel) Joint work with Marat Radan, Yuval Cassuto, Isaac Keslassy (Technion, Israel) Carmi.
Randomized Distributed Decision David Peleg Joint work with: Pierre Fraigniaud Amos Korman Merav Parter.
© S Haughton more than 3?
Polynomial Factor Theorem Polynomial Factor Theorem
Three Special Functions
Load Balancing Parallel Applications on Heterogeneous Platforms.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Past Tense Probe. Past Tense Probe Past Tense Probe – Practice 1.
Chapter 5 Test Review Sections 5-1 through 5-4.
Addition 1’s to 20.
25 seconds left…...
The Fundamental Theorem of Algebra
Test B, 100 Subtraction Facts
Complexity ©D.Moshkovits 1 Where Can We Draw The Line? On the Hardness of Satisfiability Problems.
2 4 Theorem:Proof: What shall we do for an undirected graph?
Week 1.
Bottoms Up Factoring. Start with the X-box 3-9 Product Sum
1 Unit 1 Kinematics Chapter 1 Day
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Copyright © Cengage Learning. All rights reserved.
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
The Fundamental Theorem of Algebra The Fundamental Theorem of Algebra
1 A Graph-Theoretic Network Security Game M. Mavronicolas , V. Papadopoulou , A. Philippou  and P. Spirakis § University of Cyprus, Cyprus  University.
Dana Moshkovitz MIT Joint work with Subhash Khot, NYU 1.
1 Graphs with Maximal Induced Matchings of the Same Size Ph. Baptiste 1, M. Kovalyov 2, Yu. Orlovich 3, F. Werner 4, I. Zverovich 3 1 Ecole Polytechnique,
1 Almost all cop-win graphs contain a universal vertex Anthony Bonato Ryerson University CanaDAM 2011.
Approximation Algorithms
B IPARTITE I NDEX C ODING Arash Saber Tehrani Alexandros G. Dimakis Michael J. Neely Department of Electrical Engineering University of Southern California.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
Dynamic Index Coding Broadcast Station N N Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University of Southern California Paper available.
Dynamic Index Coding User set N Packet set P Broadcast Station N N p p p Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University.
Data Broadcast in Asymmetric Wireless Environments Nitin H. Vaidya Sohail Hameed.
1 TDMA Scheduling in Competitive Wireless Networks Mario CagaljHai Zhan EPFL - I&C - LCA February 9, 2005.
NP-Complete Problems. Running Time v.s. Input Size Concern with problems whose complexity may be described by exponential functions. Tractable problems.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 30, 2014.
NP-completeness NP-complete problems. Homework Vertex Cover Instance. A graph G and an integer k. Question. Is there a vertex cover of cardinality k?
Computability and Complexity
A Few Sample Reductions
Presentation transcript:

Instantly Decodable Network Codes for Real-Time Applications Anh Le, Arash Tehrani, Alex Dimakis, Athina Markopoulou UC Irvine, USC, UT Austin Presented by Marios Gatzianas

Real-time applications that use wireless broadcast: Live video streaming Multiplayer games Unique characteristics: Strict deadlines Loss tolerant 2 Problem: Retransmissions in the presence of loss Real-Time Applications with Wireless Broadcast

Broadcast Loss Recovery for Real-Time Applications Strict deadlines: Instantly decodable network codes (IDNC) Loss tolerant: We formulate Real-Time IDNC 3 What is a coded packet that is instantly decodable and innovative to the maximum number of users?

Related Work Instantly decodable, opportunistic codes [Katti 08] [Keller 08] [Sadeghi 09] [Athanasiadou 12] IDNC focuses on minimizing the completion delay [Sorour 10, 11, 12] Index coding and data exchange problems [Birk 06] [El Rouayheb 10] 4

Our Contributions 5 We show Real-Time IDNC is NP-Hard Equivalent to finding a Max Clique in an IDNC graph Provide a reduction from Exact Cover by 3-Sets Analysis of instances with random loss probabilities Provide a polynomial time solution for Random Max Clique and Random Real-Time IDNC

Outline 6 1.Real-Time IDNC Equivalence to Max Clique NP-Hardness 2.Random Real-Time IDNC Optimal coded packet (clique number) Coding algorithm

Real-Time IDNC: Problem Formulation -A set of m packets, broadcast by a source -n users, interested in all packets -Each user received only a subset of packets -To recover loss: What is a coded packet that is instantly decodable and innovative to the maximum number of users? 7

Real-Time IDNC: Example -6 packets: p 1, …, p 6 -3 users: u 1, u 2, u 3 p 1 p 2 p 3 p 4 p 5 p 6 u 1 has p 1, p u 2 has p 3, p u 3 has p 3, p p 5 + p 6 is instantly decodable and innovative to u 2 and u 3 p 2 + p 3 is instantly decodable and innovative to all users 8

Mapping: Real-Time IDNC to Max Clique 9 Real-Time IDNC Max Clique in IDNC graph

Real-Time IDNC is NP-Hard 10 Real-Time IDNC Max Clique IQP NP-Hard IQP is NP-Hard: reduction from Exact Cover by 3-Sets Real-Time IDNC Integer Quadratic Programming (IQP)

Outline 11 1.Real-Time IDNC Equivalence to Max Clique NP-Hardness 2.Random Real-Time IDNC Optimal coded packet (clique number) Coding algorithm

Random Real-Time IDNC 12 Setup: iid loss probability p a ij = 1 with probability p Analysis sketch: Fix a set of j columns Define a good row as having one 1 among these j columns o A row is good with probability f(j) = j p (1-p) j-1 o Number of good rows has Binomial distribution: Bin(n, f(j))

Analysis of Random Real-Time IDNC 13 Lemma 5 (sketch): The size of the maximum clique that touches j columns is close to the number of good rows w.r.t. these j columns Lemma 6 (sketch): The size of the maximum clique that touches j columns concentrates around n f(j) Theorem 7 (sketch): Maximum clique, that touches any j columns, has size concentrating around n f(j)

Analysis of Random Real-Time IDNC (cont.) 14 Corollary 8: The maximum clique touches j* columns, where j* = argmax f(j) Observations: j* is a constant for a fixed loss rate p j* increases as loss rate p decreases (more packets should be coded together)

Max-Clique Algorithm 15 Observations: The maximum clique concentrates around n f(j*) j* is a constant for a fixed loss rate p Polynomial-time algorithm to find the maximum clique and optimal coded packet: Examine all cliques that touch j columns for all j δ-close to j* Complexity: O (n m j* + δ )

Evaluation Results 16 Simulation with random loss rate (20 users, 20 packets) Max-Clique outperforms all other algorithms at any loss rate

Conclusion 17 We formulate Real-Time IDNC Equivalent to Max Clique in IDNC graph NP-Hard proof Analysis of Random Real-Time IDNC Polynomial time solution to find max clique and optimal coded packet