Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis.

Slides:



Advertisements
Similar presentations
Vector Spaces A set V is called a vector space over a set K denoted V(K) if is an Abelian group, is a field, and For every element vV and K there exists.
Advertisements

1 A triple erasure Reed-Solomon code, and fast rebuilding Mark Manasse, Chandu Thekkath Microsoft Research - Silicon Valley Alice Silverberg Ohio State.
Applied Informatics Štefan BEREŽNÝ
Mathematics of Cryptography Part II: Algebraic Structures
1 Index Coding Part II of tutorial NetCod 2013 Michael Langberg Open University of Israel Caltech (sabbatical)
Cryptography and Network Security
Network coding techniques Elena Fasolo Network coding techniques Elena Fasolo PhD Student - SIGNET Group Wireless Systems - Lecture.
Network Coding in Peer-to-Peer Networks Presented by Chu Chun Ngai
Information Theoretical Security and Secure Network Coding NCIS11 Ning Cai May 14, 2011 Xidian University.
1.  Detailed Study of groups is a fundamental concept in the study of abstract algebra. To define the notion of groups,we require the concept of binary.
1 Crosslayer Design for Distributed MAC and Network Coding in Wireless Ad Hoc Networks Yalin E. Sagduyu Anthony Ephremides University of Maryland at College.
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
1 Complexity of Network Synchronization Raeda Naamnieh.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
Network Coding Theory: Consolidation and Extensions Raymond Yeung Joint work with Bob Li, Ning Cai and Zhen Zhan.
Scheduling Algorithms for Wireless Ad-Hoc Sensor Networks Department of Electrical Engineering California Institute of Technology. [Cedric Florens, Robert.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
Copyright © Cengage Learning. All rights reserved.
MOHAMMAD IMRAN DEPARTMENT OF APPLIED SCIENCES JAHANGIRABAD EDUCATIONAL GROUP OF INSTITUTES.
Optimal Multicast Algorithms Sidharth Jaggi Michelle Effros Philip A. Chou Kamal Jain.
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
Linear codes 1 CHAPTER 2: Linear codes ABSTRACT Most of the important codes are special types of so-called linear codes. Linear codes are of importance.
Network Coding vs. Erasure Coding: Reliable Multicast in MANETs Atsushi Fujimura*, Soon Y. Oh, and Mario Gerla *NEC Corporation University of California,
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
INFORMATION THEORY BYK.SWARAJA ASSOCIATE PROFESSOR MREC.
Networking Seminar Network Information Flow R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network Information Flow. IEEE Transactions on Information.
Signal-Space Analysis ENSC 428 – Spring 2008 Reference: Lecture 10 of Gallager.
FINITE FIELDS 7/30 陳柏誠.
Connections between Network Coding and Matroid Theory Qifu Sun Institute of Network Coding (Shenzhen), CUHK 30, Aug., 2013.
Linear Algebra Chapter 4 Vector Spaces.
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Great Theoretical Ideas in Computer Science.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
2 2.1 © 2016 Pearson Education, Inc. Matrix Algebra MATRIX OPERATIONS.
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
Chapter 3 Vector Spaces. The operations of addition and scalar multiplication are used in many contexts in mathematics. Regardless of the context, however,
4-2 binary fields and binary vector spaces Special Thanks to Dr. Samir Al-Ghadhban & EE430 Students.
Matrices CHAPTER 8.1 ~ 8.8. Ch _2 Contents  8.1 Matrix Algebra 8.1 Matrix Algebra  8.2 Systems of Linear Algebra Equations 8.2 Systems of Linear.
Monoids, Groups, Rings, Fields
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Session 1 Stream ciphers 1.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Great Theoretical Ideas in Computer Science.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
ADVANTAGE of GENERATOR MATRIX:
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
Network Information Flow Nikhil Bhargava (2004MCS2650) Under the guidance of Prof. S.N Maheshwari (Dept. of Computer Science and Engineering) IIT, Delhi.
Introduction to Real Analysis Dr. Weihu Hong Clayton State University 8/19/2008.
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
Great Theoretical Ideas in Computer Science.
International Iran conference on Quantum Information September 2007, Kish Island Evaluation of bounds of codes defined over hexagonal and honeycomb lattices.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Matrices and Vector Concepts
Linear Algebra Lecture 2.
Network coding techniques
Great Theoretical Ideas in Computer Science
Factor Graphs and the Sum-Product Algorithm
Optimal network coding & matroid
Great Theoretical Ideas in Computer Science
Copyright © Cengage Learning. All rights reserved.
S.-Y. Robert Li (Bob Li) CUHK
Mathematical Background: Extension Finite Fields
Presentation transcript:

Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis

Page 2 Page 2 11/26/2008 Outline Introduction Classifications Single-Source Network Coding –Global and Local Descriptions of a Network Code –Linear Multicast, Broadcast, and Dispersion –Static codes –Network Coding for Cyclic Networks

Page 3 Page 3 11/26/2008 Introduction DEFINITION: Network coding is a particular in-network data processing technique that exploits the characteristics of the broadcast communication channel in order to increase the capacity or the throughput of the network

Page 4 Page 4 11/26/2008 Communication networks TERMINOLOGY Communication network = finite directed graph Acyclic communication network = network without any directed cycle Source node = node without any incoming edges (square) Channel = noiseless communication link for the transmission of a data unit per unit time (edge) –WX has capacity equal to 2

Page 5 Page 5 11/26/2008 The canonical example (I) Without network coding –Simple store and forward –Multicast rate of 1.5 bits per time unit

Page 6 Page 6 11/26/2008 The canonical example (II) With network coding –X-OR  is one of the simplest form of data coding –Multicast rate of 2 bits per time unit

Page 7 Page 7 11/26/2008 NC and wireless communications b1b1 b2b2 b2b2 Problem: send b 1 from A to B and b 2 from B to A using node C as a relay A and B are not in communication range (r) Without network coding, 4 transmissions are required. With network coding, only 3 transmissions are needed A AB B C C b1b1 AB C r (a) (b)(c)

Page 8 Page 8 11/26/2008 Network Coding Classifications Based on Topology –Acyclic Network Coding –Cyclic Network Coding Based on number of nodes sourcing information –Single Source Network Coding: Simple Algebraic Notion –Multi Source Network Coding: Probabilistic Notion; the current understanding of multi-source network coding is quite far from being complete

Page 9 Page 9 11/26/2008 Single-Source Network Coding Network is acyclic. The message x, a  -dimensional row vector in a finite field F, is generated at the source node. A symbol in F can be sent on each channel.

Page 10 Page 10 11/26/2008 Definition of a Field A field is a set together with two operations, usually called addition (+) and multiplication (·), such that the following axioms hold: Closure of F under addition and multiplication –For all a, b in F, both a + b and a · b are in F (or more formally, + and · are binary operations on F). Associativity of addition and multiplication –For all a, b, and c in F, the following equalities hold: a + (b + c) = (a + b) + c and a · (b · c) = (a · b) · c. Commutativity of addition and multiplication –For all a and b in F, the following equalities hold: a + b = b + a and a · b = b · a.

Page 11 Page 11 11/26/2008 Definition of a Field Additive and multiplicative identity –There exists an element of F, called the additive identity element and denoted by 0, such that for all a in F, a + 0 = a. –Similarly, the multiplicative identity element denoted by 1, such that for all a in F, a · 1 = a. Additive and multiplicative inverses –For every a in F, there exists an element −a in F, such that a + (−a) = 0. –Similarly, for any a in F other than 0, there exists an element a−1 in F, such that a · a−1 = 1. Distributivity of multiplication over addition –For all a, b and c in F, the following equality holds: a · (b + c) = (a · b) + (a · c).

Page 12 Page 12 11/26/2008 Example: Binary Field A field with finite number of elements: finite field or Galois Field A binary field with elements 0 and 1 and operations XOR and AND is a GF(2) A message consisting of 1’s and 0’s and containing say, 3 bits is a 3-dimensional row vector in GF(2)

Page 13 Page 13 11/26/2008 Local Description of Network Code Let a pair of channels (d, e) be called an adjacent pair when there exists a node T with and Let F be a finite field and a positive integer. An - dimensional F-valued linear network code on an acyclic communication network consists of a scalar, called the local encoding kernel, for every adjacent pair (d, e) The local encoding kernel at the node T means the |In(T)| × |Out(T)| matrix

Page 14 Page 14 11/26/2008 Global Description of Network Code Let F be a finite field and a positive integer. An - dimensional F-valued linear network code on an acyclic communication network consists of a scalar for every adjacent pair (d, e) in the network as well as an -dimensional column vector for every channel e such that The vector is called the global encoding kernel for the channel e

Page 15 Page 15 11/26/2008 Local Description vs. Global Description Given the local encoding kernels for all channels in an acyclic network, the global encoding kernels can be calculated recursively in any upstream-to-downstream order by (1), while (2) provides the boundary conditions The global description and the local description are the two sides of a coin: –They are equivalent. –Both can describe the most general form of a (block) linear network code

Page 16 Page 16 11/26/2008 An Example

Page 17 Page 17 11/26/2008 T d e message x

Page 18 Page 18 11/26/2008 Desirable Properties of a Linear Network Code Law of information conservation: the content of information sent out from any group of non-source nodes must be derived from the accumulated information received by the group from outside maxflow(T): the maximum flow from S to a non- source node T maxflow( P ): the maximum flow from S to a collection P of non-source nodes Max-flow Min-cut Theorem: the information rate received by the node T cannot exceed maxflow(T)

Page 19 Page 19 11/26/2008 Desirable Properties of a Linear Network Code The network topology, the dimension, and the coding scheme determines achievability of the upper bound Three special classes of linear network codes are defined below by the achievement of this bound to three different extents –Linear Dispersion –Linear Broadcast –Linear Multicast Each notion is strictly weaker than the previous notion!

Page 20 Page 20 11/26/2008 Linear Multicast For each node v, if maxflow(v)  , then the message x can be recovered.

Page 21 Page 21 11/26/2008 Linear Broadcast For every node v, –If maxflow(v)  , the message x can be received. –If maxflow(v) < , maxflow(v) dimensions of the message x can be recovered. Linear Broadcast  Linear Multicast

Page 22 Page 22 11/26/2008 Linear Dispersion For every collection of nodes P, –If maxflow( P )  , the message x can be received. –If maxflow( P ) < , maxflow( P ) dimensions of the message x can be recovered. Linear Dispersion  Linear Broadcast  Linear Mulicast For a linear dispersion, a new comer who wants to receive the message x can do so by accessing a collection of nodes P such that maxflow( P )  , where each individual node u in P may have maxflow(u) < .

Page 23 Page 23 11/26/2008 Code Constructions Construction of multicast/broadcast/dispersion: consider a linear network code in which every collection of global encoding kernels that can possibly be linearly independent is linearly independent This motivates the following concept of a generic linear network code: A linear network code is said to be generic if: For every set of channels {e 1, e 2, …, e n }, where n   and e j  Out(v j ), the vectors f e1, f e2, …, f en are linearly independent provided that  {f d : d  In(v j )}    {f ek : k  j}  for 1  j  n

Page 24 Page 24 11/26/2008 Code Constructions A generic network code exists for all sufficiently large F and can be constructed by the Li-Yeung- Cai (LYC) algorithm. A linear dispersion, a linear broadcast, and a linear multicast can potentially be constructed with decreasing complexity since they satisfy a set of properties of decreasing strength. In particular, a polynomial time algorithm for constructing a linear multicast has been reported independently by Sanders et al. and Jaggi et al.

Page 25 Page 25 11/26/2008

Page 26 Page 26 11/26/2008

Page 27 Page 27 11/26/2008 Static Network Codes Convention: A configuration of a network is a mapping from the set of channels in the network to the set {0,1} =0 for any link e signifies that the link e is absent due to link failure

Page 28 Page 28 11/26/2008 Static Network Codes Let F be a finite field and a positive integer. An - dimensional F-valued linear network code on an acyclic communication network consists of a scalar for every adjacent pair (d, e) in the network. The -global encoding kernel for the channel e, denoted by is - dimensional column vector calculated recursively in an upstream-to-downstream order by

Page 29 Page 29 11/26/2008 Static Codes The adjective “static” in the terms above stresses the fact that, while the configuration varies, the local encoding kernels remain unchanged The advantage of using a static network code in case of link failure is that the local operation at any node in the network is affected only at the minimum level

Page 30 Page 30 11/26/2008 Example

Page 31 Page 31 11/26/2008 Cyclic Networks Networks with at least one directed cycle Acyclic: the network coding problem independent of the propagation delay, operation at all nodes synchronized Cyclic: the global encoding kernels simultaneously implemented under the ideal assumption of delay- free communications (unrealistic) The time dimension is an essential part of the consideration in network coding Non-equivalence between local and global descriptions

Page 32 Page 32 11/26/2008 Non-Equivalence Example The local encoding kernels doesn’t give an unique solution for the global encoding kernels

Page 33 Page 33 11/26/2008 Convolutional Codes for Cyclic Networks Corresponding to a physical node X, there is a sequence of nodes X(0), X(1), X(2),... in the trellis network A channel in the trellis network represents a physical channel e only for a particular time slot t > 0, and is thereby identified by the pair (e, t) When e is from the node X to the node Y, the channel (e, t) is then from the node X(t) to the node Y(t+1)

Page 34 Page 34 11/26/2008 Convolutional Codes for Cyclic Networks

Page 35 Page 35 11/26/2008 References R. W. Yeung, S. Y. R. Li, N. Cai and Z. Zhang, “Network Coding Theory,” Now Publishers Inc., Elena Fasolo, “Wireless Systems Lecture: Network Coding Techniques,” March 2004

Page 36 Page 36 11/26/2008 Thank You!