1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.

Slides:



Advertisements
Similar presentations
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Opportunistic Routing Is Missing Its Opportunities! Sachin Katti & Dina Katabi.
1 IK1500 Communication Systems IK1330 Lecture 3: Networking Anders Västberg
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Multicast and Unicast Real-Time Video Streaming Over Wireless LANs Abhik Majumdar, Daniel Grobe Sachs, Igor V. Kozintsev, Kannan Ramchandran, and Minerva.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
Enhancing Secrecy With Channel Knowledge
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
1 Crosslayer Design for Distributed MAC and Network Coding in Wireless Ad Hoc Networks Yalin E. Sagduyu Anthony Ephremides University of Maryland at College.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Informed Content Delivery Across Adaptive Overlay Networks J. Byers, J. Considine, M. Mitzenmacher and S. Rost Presented by Ananth Rajagopala-Rao.
Threshold Phenomena and Fountain Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
Information Theory Eighteenth Meeting. A Communication Model Messages are produced by a source transmitted over a channel to the destination. encoded.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Gursharan Singh Tatla Transport Layer 16-May
Data Communications and Networking
Can Network Coding Help in P2P Networks? Dah Ming Chiu, Raymond W Yeung, Jiaqing Huang and Bin Fan Chinese University of Hong Kong Presented by Arjumand.
Communication Networks
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Review of Networking Concepts Part 1: Switching Networks
DISPERSITY ROUTING: PAST and PRESENT Seungmin Kang.
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
ECE 466 Switching Networks. ECE 466 A communication network provides a scalable solution to connect a large number of end systems Communication Networks.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Cyclic Code. Linear Block Code Hamming Code is a Linear Block Code. Linear Block Code means that the codeword is generated by multiplying the message.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Multicast and Unicast Real-Time Video Streaming Over Wireless LANS April. 27 th, 2005 Presented by, Kang Eui Lee.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
Novel network coding strategy for TDD Use of feedback (ACK) improves delay/energy/ throughput performance, especially for high latency- high errors scenarios.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
1 Raptor codes for reliable multicast object delivery Michael Luby Digital Fountain.
Computer Science Division
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Error Detection and Correction – Hamming Code
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Explicit and Implicit Pipelining in Wireless MAC Nitin Vaidya University of Illinois at Urbana-Champaign Joint work with Xue Yang, UIUC.
Throughput-Smoothness Trade-offs in Streaming Communication Gauri Joshi (MIT) Yuval Kochman (HUJI) Gregory Wornell (MIT) 1 13 th Oct 2015 Banff Workshop.
Network Coding and Reliable Communications Group Modeling Network Coded TCP Throughput: A Simple Model and its Validation MinJi Kim*, Muriel Médard*, João.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
March 18, 2005 Network Coding in Interference Networks Brian Smith and Sriram Vishwanath University of Texas at Austin March 18 th, 2005 Conference on.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Communication Networks: Technology & Protocols
Data Communication Networks
EE 122: Lecture 7 Ion Stoica September 18, 2001.
Javad Ghaderi, Tianxiong Ji and R. Srikant
Presentation transcript:

1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota

2 THE CURRENT PARADIGM D S “store and forward” bit-stream packets T = duration N = # of bits A “packet” is a “monolith.” packet “length” = N or T

3 WHAT IS WRONG WITH IT? “ORIGINAL SIN” of networking : Layering Physical layer was forgotten (or “Separated”) Recall: packets consist of bits (a simple and obvious truth) Bits can be operated upon (i) (ii) Why may this be good? Because it permits the output to be a function of the input! A B A + B: same “length” (X-OR or mod 2 add) node ABA + B: similarly node

4 THE “BUTTERFLY” EXAMPLE (~1999) –S 1 wants to deliver packet A to both D 1 and D 2 –S 2 wants to deliver packet B to both D 1 and D 2 –Each link can carry one packet in each slot (capacity of each link = 1) Q: How many slots are needed to complete this delivery under “store-and-forward”? 1: - S 1 sends A to C and D 1 (over S 1 C and S 1 D 1 respectively) - S 2 sends B to C and D 2 (over S 2 C and S 2 D 2 respectively) 2: - C sends A to E 3: - C sends B to E - E sends A to D 2 4: - E sends B to D 1 D1D1 D2D2 S1S1 S2S2 E C Answer: FOUR (4) SLOTS

5 ALTERNATIVE 1. - S 1 sends A to C and D 1 (over S 1 C and S 1 D 1, respectively) - S 2 sends B to C and D 2 (over S 2 C and S 2 D 2, respectively) 2. - C sends A + B to E 3. - E sends A + B to D 1 and D 2 (over ED 1, and ED 2, respectively) (D1 and D2 recover the missing packet by “X-OR” ing A + B with the one they already have) Q: How many slots are needed to complete the same delivery under, so called, “NETWORK CODING”? Answer: THREE (3) SLOTS Savings: 25% Note: THIS WAS “MULTICASTING” (i.e., each packet had multiple destinations) D1D1 D2D2 S1S1 S2S2 E C (A) (B)

6 SUSTAINED OPERATION (“Capacity”-Achieving) D1D1 D2D2 S1S1 S2S “cut” capacity of 4 ( packets /slot ) In steady-state, in each slot there are two packets received by each destination, e.g. Slot 3: D 1 receives A 3 and B 1 D 2 receives B 3 and A 1 Slot 4: D 1 receives A 4 and B 2 D 2 receives B 4 and A 2 i.e. 4 packets/slot.... SLOTS S1S1 (A 1 ) D1D1 C S1S1 (A 2 ) D1D1 C S1S1 (A 3 ) D1D1 C S2S2 (B 3 ) D2D2 C S2S2 (B 1 ) D2D2 C S2S2 (B 2 ) D2D2 C A 1 + B 1 C E A 2 + B 2 C E A 3 + B 3 C E E D 1, D 2 A 2 + B 2 S2S2 (B 4 ) D2D2 C S1S1 (A 4 ) D1D1 C E D 1, D 2 A 1 + B 1 C E

7 THIS IS NOT ALL THERE IS Max-flow Limit can be achieved by network coding in “arbitrary” multicast networks “ALPHABET” size: each symbol in the packet need not be a single bit, but, rather, one of Q different values (strings of bits) REMARKABLE RESULT: It is sufficient to combine packets linearly with randomly chosen co- efficients to achieve this capacity result AB A = B = a A + b B where a, b = 0 or 1 (X-OR uses a=b=1)

8 WHAT ABOUT UNICAST? Now - S 1 wants to deliver A to D 2 only - S 2 wants to deliver B to D 1 only D1D1 D2D2 S1S1 S2S2 E C (A) (B) A B 1. S 1 C, S 2 C A 2.C E B A 3. C E, E D 2 B 4. E D 1 A B 1.S 1 C,D 1, S 2 C, D 2 A + B 2. C E A + B 3. E D 1, D 2 Store-and-Forward Network Coding But not capacity achieving (i.e. only 2 packets/slot) (Back-Pressure algorithm)

9 AND NOW WIRELESS What is different? X Node cannot receive simultaneously two different messages (actually……it can, but…..) X Node cannot send simultaneously two different messages (it can certainly send the same message to multiple receivers) (actually…….. it can, but……) X Node cannot send and receive simultaneously (no ifs and buts!) A A A

10 THEREFORE Store and Forward: D1D1 D2D2 S1S1 S2S2 C (A) (B) Network Coding: first: about the shown links * * Here only one node can transmit at a time * * S1S1 A A C D1D1 S2S2 B B C D2D2 S2S2 B C D2D2 C (A) D1D1 D2D2 A C B D1D1 D2D2 (B) B S1S1 A C D1D1 A C A + B D1D1 D2D2

11 AND HENCE Limited pipelining (in this case none) 2 packets delivered to 2 destinations (total of 4) over 3 slots Cut capacity ? NOT 4 / slot Needs to be redefined (“degree” of node and time division effect) Then random linear coding again achieves max-flow/min-cut limit D1D1 D2D2 S1S1 S2S2 C cut 1 23 …… repeat

12 HOWEVER: IS IT ALL GAINS? Feasible simultaneous activations: D1D1 D2D2 E F C S A 1 A 2 … B 1 B 2 … E D1D1 D2D2 F S AKAK B K-1 E D1D1 D2D2 F S BKBK CAKAK E D1D1 D2D2 F S C A K + B K-1, (1) (2) (3) Time division over them Throughput: 4 packets per 3 slots = 1.33 …… A K needs 3 slots for D 2 and 2 slots for D 1 B K-1 needs 5 slots for D 1 and 3 slots for D 2 ….average = 3.25 slots

13 WHILE Store and Forward D1D1 D2D2 E F C S A 1 A 2 … B 1 B 2 … B1B1 D1D1 D2D2 S B1B1 C A1A1 E D1D1 D2D2 F S C A1A1 (1) (2) (3) Throughput: 4 packets over 4 slots = 1 Delay: 2 slots (or even 3 slots) CONCLUSION: FOR WIRELESS: INTIMATE CONNECTION TO MEDIUM ACCES (MAC) E D1D1 D2D2 F S A1A1 A1A1 C E D1D1 D2D2 F S B1B1 B1B1 C

14 FOCUS ON ONE LINK D CBA A + B + C (or aA + bB + cC) Hence “PAYLOAD” n bits Header Transmitted Packet OVERHEAD: K · log Q bits *independent of length n * HENCE: OH 0 AS n ∞ Receiver needs to know the values of the coefficients Alphabet size: Q : a 1 A 1, + a 2 A 2 +….+ a k A K Block of K packets (each consisting of n bits) gets squeezed into n bits

15 FOCUS ON ONE LINK (con’t.) Need K linearly independent combinations of A 1 …….,A K to decode Coefficients are chosen randomly Typically N>K packets need to be sent So why do it this way? (if Q: LARGE, N K; but even then delay is K rather than K/2) A: - Fountain coding for content distribution - Multicasting over independent channels

16 FOUNTAIN CODING (content distribution) Large file (K = large) Keep sending random linear combinations of the K packets “Rateless” property Different users get sufficient numbers of packets to decode the file at different times Microsoft “AVALANCHE” (somewhat like “Bit-Torrent”) destination set

17 WIRELESS MULTICASTING Channel to each D i is subject to failures (fades, buffer overflow, etc.) Model: Packet erasure probability P i : probability a packet fails (is erased) on i th channel Independence from channel-to- channel and from packet-to- packet D1D1 D2D2 D3D3 DMDM PMPM P1P1 S

18 WIRELESS MULTICASTING (con’t.) Alternatives: ARQ or NETWORKING CODING ARQ: Repeat each packet transmission until all users receive it correctly (limited by worse channel) Network coding: Keep sending random linear combinations of ALL (i.e. K) packets - every user gets new information in each transmission - good-channel users receive all K packets early - poor-channel users receive all K packets with delay - on average: network coding does better BUT: OH (K log Q) ; need n ∞

19 NEW PROBLEM Q: can P i stay fixed as n ∞ ? A: in real channels: NO Recent “Results”: Network coding achieves “Capacity” in general packet erasure networks as n ∞ and the P i ’s stay fixed BUT: As n ∞ : δ<<Δ or T ′ >>T Δ T PiPi Model breaks down 1

20 NEW PROBLEM Actually we can determine how P i depends on n P i (n log Q) increasing in n and Q and approaches 1 as n or Q go to infinity Can determine (in principle) optimal value of alphabet size and length Leads to the ultimate question of combining information and communication theory with networking