1 Nick Harvey (MIT) Kamal Jain (MSR) Lap Chi Lau (U. Toronto) Chandra Nair (MSR) Yunnan Wu (MSR) Conservative Network Coding.

Slides:



Advertisements
Similar presentations
Iterative Rounding and Iterative Relaxation
Advertisements

CS 336 March 19, 2012 Tandy Warnow.
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Introduction to Graph Theory Lecture 11: Eulerian and Hamiltonian Graphs.
Multicut Lower Bounds via Network Coding Anna Blasiak Cornell University.
Lectures on Network Flows
Approximating Maximum Edge Coloring in Multigraphs
Dynamic Index Coding Broadcast Station N N Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University of Southern California Paper available.
CSE 421 Algorithms Richard Anderson Lecture 22 Network Flow.
What is the next line of the proof? a). Let G be a graph with k vertices. b). Assume the theorem holds for all graphs with k+1 vertices. c). Let G be a.
On the Capacity of Information Networks Nick Harvey Collaborators: Micah Adler (UMass), Kamal Jain (Microsoft), Bobby Kleinberg (MIT/Berkeley/Cornell),
Graphs and Trees This handout: Trees Minimum Spanning Tree Problem.
Is the following graph Hamiltonian- connected from vertex v? a). Yes b). No c). I have absolutely no idea v.
1 Brief Announcement: Distributed Broadcasting and Mapping Protocols in Directed Anonymous Networks Michael Langberg: Open University of Israel Moshe Schwartz:
Randomness in Computation and Communication Part 1: Randomized algorithms Lap Chi Lau CSE CUHK.
CSE 421 Algorithms Richard Anderson Lecture 22 Network Flow.
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
Packing Element-Disjoint Steiner Trees Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint with Joseph Cheriyan Department.
V. V. Vazirani. Approximation Algorithms Chapters 3 & 22
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
Approximation and Hardness Results for Packing Cycles Mohammad R. Salavatipour Department of Computing Science University of Alberta Joint work with M.
CSE 421 Algorithms Richard Anderson Lecture 24 Network Flow Applications.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
 Rooted tree and binary tree  Theorem 5.19: A full binary tree with t leaves contains i=t-1 internal vertices.
5.5.2 M inimum spanning trees  Definition 24: A minimum spanning tree in a connected weighted graph is a spanning tree that has the smallest possible.
5.5.3 Rooted tree and binary tree  Definition 25: A directed graph is a directed tree if the graph is a tree in the underlying undirected graph.  Definition.
Max Flow – Min Cut Problem. Directed Graph Applications Shortest Path Problem (Shortest path from one point to another) Max Flow problems (Maximum material.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
CSCI-256 Data Structures & Algorithm Analysis Lecture Note: Some slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved. 25.
Introduction to Graph Theory Lecture 13: Graph Coloring: Edge Coloring.
CSE 421 Algorithms Richard Anderson Winter 2009 Lecture 5.
Iterative Rounding in Graph Connectivity Problems Kamal Jain ex- Georgia Techie Microsoft Research Some slides borrowed from Lap Chi Lau.
CSEP 521 Applied Algorithms Richard Anderson Lecture 8 Network Flow.
CSE 421 Algorithms Richard Anderson Lecture 22 Network Flow.
Graph Concepts Elif Tosun 252a-aa (All graphics created by using demo/graphwin/gw*)
1 CPSC 320: Intermediate Algorithm Design and Analysis July 14, 2014.
CSE 421 Algorithms Richard Anderson Autumn 2015 Lecture 5.
1)Effect of Network Coding in Graphs Undirecting the edges is roughly as strong as allowing network coding simplicity is the main benefit 2)Effect of Network.
5.6 Prefix codes and optimal tree Definition 31: Codes with this property which the bit string for a letter never occurs as the first part of the bit string.
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
Proof technique (pigeonhole principle)
Michael Langberg: Open University of Israel
CS4234 Optimiz(s)ation Algorithms
Graph theory Definitions Trees, cycles, directed graphs.
Graph Theory and Algorithm 02
Graph Theory and Algorithm 01
Lecture 12 Graph Algorithms
Richard Anderson Lecture 23 Network Flow
Lecture 22 Network Flow, Part 2
What is the next line of the proof?
Special Graphs: Modeling and Algorithms
Bipartite Matching and Other Graph Algorithms
Unit 3 (Part-I): Greedy Algorithms
Instructor: Shengyu Zhang
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
Coping With NP-Completeness
Vertex Covers, Matchings, and Independent Sets
Richard Anderson Lecture 21 Network Flow
Richard Anderson Autumn 2016 Lecture 5
Richard Anderson Winter 2009 Lecture 6
Maximum Flow c v 3/3 4/6 1/1 4/7 t s 3/3 w 1/9 3/5 1/1 3/5 u z 2/2
Lecture 21 Network Flow, Part 1
Lecture 21 Network Flow, Part 1
Richard Anderson Lecture 5 Graph Theory
Coping With NP-Completeness
Lecture 22 Network Flow, Part 2
Special Graphs: Modeling and Algorithms
Richard Anderson Winter 2019 Lecture 5
Richard Anderson Lecture 22 Network Flow
Presentation transcript:

1 Nick Harvey (MIT) Kamal Jain (MSR) Lap Chi Lau (U. Toronto) Chandra Nair (MSR) Yunnan Wu (MSR) Conservative Network Coding

2 Outline Motivation Acyclic networks Cyclic networks Conclusion

3 The General Multi-Session Network Coding Problem Given a network coding problem: Directed graph G = (V,E) k “commodities” (streams of information) Sources: s 1, …, s k Receiver set for each source T 1, …, T k At what rate can the sources transmit? This is very general and very hard…

4 “Conservative Network Coding” Given a network coding problem: Directed graph G = (V,E) k “commodities” (streams of information) Sources: s 1, …, s k Receiver set for each source T 1, …, T k At what rate can the sources transmit? Consider solutions where intermediate nodes are conservative i.e., a node rejects anything it does not want. i.e., commodity i is not allowed to leave the set T i  {s i }

5 Motivations Practical motivation In peer-to-peer networks, a node may not have incentive to relay traffic for others a node may be concerned about security troubles Theoretical motivation In the special case when there is a single commodity, there are elegant results.

6 Single Session Conservative Networking (Broadcasting) Integer Routing Rate Fractional Routing Rate Network Coding Rate = = = Cut Bound Edmonds’ Theorem (1972): Given a directed graph and a source node s, the maximum number of edge disjoint spanning trees rooted at s is equal to the minimum s- cut capacity.

7 Example t3t3 t1t1 t2t2 s t4t4 “As long as we can route information to each node individually at rate C, we can route information simultaneously to all destinations at rate C.”

8 Generalization? For conservative networking, Integer Routing Rate Fractional Routing Rate Network Coding Rate ? ?

9 Outline Motivation Acyclic networks Cyclic networks Conclusion Integer Routing Rate Fractional Routing Rate Network Coding Rate = =

10 Colored Cut Condition srsr sbsb

11 Colored Cut Condition Colors on nodes  colors on edges srsr sbsb

12 Colored Cut Condition Blue and Red need to cross the cut We have a {red, blue} edge, a red edge and a blue edge So okay! srsr sbsb

13 Colored Cut Condition Blue and Red need to cross the cut We have a {red, blue} edge and a blue edge So okay! srsr sbsb

14 Colored Cut Condition Generally, for each node-set cut, the set of edges across the cut must enable that the colors that need to cross the cut indeed can cross. A bi-partite matching condition srsr sbsb trtr tbtb

15 Proof that Colored Cut Bound is Achievable by Routing Visit the nodes in the topological order, v 1,…,v n By inductive hypothesis, the previous nodes v 1,…,v k can indeed recover the messages they want. Consider node v k+1 Colored cut condition must hold; Conversely, if it holds, there exists an integer routing solution. t r,g t g,b t r,b

16 Outline Motivation Acyclic networks Cyclic networks Conclusion Integer Routing Rate Fractional Routing Rate Network Coding Rate = = Integer Routing Rate Fractional Routing Rate Network Coding Rate ? ?

17 Outline Motivation Acyclic networks Cyclic networks Conclusion Integer Routing Rate Fractional Routing Rate Network Coding Rate = = Integer Routing Rate Fractional Routing Rate Network Coding Rate < <

18 Proof by Reduction A k-pairs problem G  A conservative network problem G’ Find k-pairs problems such that

19 Therefore

20 Reduction k-pairs  conservative networking s1s2 t1t2 s1 s2 t1t2 v1 v2 T1 T2 Vertex Set V Sources s 1,s 2 Sinks t 1,t 2 Add vertices v 1, v 2 Add edges t i -v i Add edges v i -u ∀ u ∈ V – t i Set T i = V + v i G G’

21 Step 1: s1 s2 t1t2 v1 v2 T1 T2 Easy

22 Step 2: s1 s2 t1t2 v1 v2 T1 T2 Disjoint trees  Disjoint paths

23 Reduction does not preserve rates for coding A k-pairs problem G  A conservative network problem G’ “three butterflies flying together”

24 Proof by Reduction A k-pairs problem G  A conservative network problem G’ Find k-pairs problems such that

25 s1s1 s2s2 c u t2t2 t1t1

26 s1 t1 s2 t2

27 Results for Cyclic Networks Integer Routing Rate Fractional Routing Rate Network Coding Rate << “Buy one get one free”: Integer Routing Solution is NP-hard

28 A Simpler Example

29 A Simpler Example

30 Conclusion Conservative networking model, motivated by practice and theory Neat result for acyclic networks that generalize Edmonds’ Theorem Counter examples for cyclic networks Even if nodes are conservative, network coding can help “Cycles are tricky!” Bound obtained by examining nodes in isolation is loose Bound obtained by examining node-set cuts in isolation is loose Generally require entropy arguments