Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY 2014 2014/5/221.

Slides:



Advertisements
Similar presentations
Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes Kenji Obata.
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
Digital Fountains: Applications and Related Issues Michael Mitzenmacher.
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Performance analysis of LT codes with different degree distribution
Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Yuchong Hu, Patrick P. C. Lee, Kenneth.
current hadoop architecture
An Easy-to-Decode Network Coding Scheme for Wireless Broadcasting
Alex Dimakis based on collaborations with Dimitris Papailiopoulos Arash Saber Tehrani USC Network Coding for Distributed Storage.
Digital Fountain Codes V. S
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
B IPARTITE I NDEX C ODING Arash Saber Tehrani Alexandros G. Dimakis Michael J. Neely Department of Electrical Engineering University of Southern California.
Locally Decodable Codes
Beyond the MDS Bound in Distributed Cloud Storage
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Threshold Phenomena and Fountain Codes
A Hybrid Approach of Failed Disk Recovery Using RAID-6 Codes: Algorithms and Performance Evaluation Yinlong Xu University of Science and Technology of.
Erasure Correcting Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Mario Vodisek 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Erasure Codes for Reading and Writing Mario Vodisek ( joint work.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
Network Coding for Distributed Storage Systems IEEE TRANSACTIONS ON INFORMATION THEORY, SEPTEMBER 2010 Alexandros G. Dimakis Brighten Godfrey Yunnan Wu.
Feng Lu Chuan Heng Foh, Jianfei Cai and Liang- Tien Chia Information Theory, ISIT IEEE International Symposium on LT Codes Decoding: Design.
1 A fast algorithm for Maximum Subset Matching Noga Alon & Raphael Yuster.
Block-LDPC: A Practical LDPC Coding System Design Approach
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
Yaomin Jin Design of Experiments Morris Method.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
DIGITAL COMMUNICATIONS Linear Block Codes
15-853:Algorithms in the Real World
Layer-aligned Multi-priority Rateless Codes for Layered Video Streaming IEEE Transactions on Circuits and Systems for Video Technology, 2014 Hsu-Feng Hsiao.
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
1 Raptor codes for reliable multicast object delivery Michael Luby Digital Fountain.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Exact Regenerating Codes on Hierarchical Codes Ernst Biersack Eurecom France Joint work and Zhen Huang.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Hongjie Zhu,Chao Zhang,Jianhua Lu Designing of Fountain Codes with Short Code-Length International Workshop on Signal Design and Its Applications in Communications,
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
INRIA Rhône-Alpes - Planète project 1 Design and evaluation of a Low Density Generator Matrix (LDGM) large block FEC codec Vincent Roca, Zainab Khallouf,
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
Double Regenerating Codes for Hierarchical Data Centers
IERG6120 Lecture 22 Kenneth Shum Dec 2016.
Maximally Recoverable Local Reconstruction Codes
Xiaoyang Zhang1, Yuchong Hu1, Patrick P. C. Lee2, Pan Zhou1
Sudocodes Fast measurement and reconstruction of sparse signals
Presentation transcript:

Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221

Outline Introduction Problem Description Prior Work Repairable Fountain Codes A Graph Perspective Simulations Conclusion 2014/5/222

Introduction Fountain codes [2], [3], [4] form a new family of linear erasure codes with several attractive properties. For a given set of k input symbols, produces a potentially limitless stream of output symbols. Randomly selected subset of (1+ ɛ)k encoded symbols, a decoder should be able to recover the original k input symbols with high probability (w.h.p.) for some small overhead ɛ. 2014/5/223 [2] J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege, “A digital fountain approach to reliable distribution of bulk data,” [3] M. Luby, “LT codes,” [4] A. Shokrollahi, “Raptor codes,”

Introduction This paper design a new family of Fountain codes that combine multiple properties appealing to distributed storage. – systematic form – efficient repair – locality 2014/5/224

Introduction A key observation is that in a systematic linear code, locality is strongly connected to the sparsity of parity symbols [11] – i.e., the maximum number of input symbols combined in a parity symbol. A parity symbol along with the systematic symbols covered by it form a local group. – The smaller the size of the local group, the lower the locality of the symbols in it. 2014/5/225 [11] P. Gopalan, C. Huang, H. Simitci, and S. Yekhanin, “On the locality of codeword symbols,”

Introduction The availability of a systematic symbol naturally extends the notion of locality, measuring the number of disjoint local groups the symbol belongs to. – define the availability of a systematic symbol as the number of disjoint sets of encoded symbols which can be used to reconstruct that particular symbol. 2014/5/226

Outline Introduction Problem Description Prior Work Repairable Fountain Codes A Graph Perspective Simulations Conclusion 2014/5/227

Problem Description 2014/5/228

Problem Description G to have the following properties: – Systematic form – Rateless property – MDS property – Low locality – High Availability 2014/5/229

Problem Description For any code, any sufficiently large subset of encoded symbols should allow recovery of the original data. – In the case of MDS codes, an information theoretically minimum subset of k encoded symbols suffices to decode. – When equipped with systematic form, the generator matrix of an MDS code affords no zero coefficient in the parity generating columns. 2014/5/2210

Problem Description This paper require that for ɛ > 0, a set of k’= (1+ ɛ)k randomly selected encoded symbols suffice to decode with high probability. – This property called as near-MDS. It is impossible to recover the original message with high probability if the parities are linear combinations of fewer than Ω(log k) input symbols. 2014/5/2211

Outline Introduction Problem Description Prior Work Repairable Fountain Codes A Graph Perspective Simulations Conclusion 2014/5/2212

Prior Work In LT codes, the average degree of the output symbols, i.e., the number of input symbols combined into an output symbol, is O (log k). However, that sparsity in this case does not imply good locality, since LT codes lack systematic form. 2014/5/2213

Prior Work Raptor codes, a different class of Fountain codes. – The core idea is to precode the input symbols prior to the application of an appropriate LT code. – The k input symbols can be retrieved in linear time by a set of (1 + ɛ)k encoded symbols However, the original Raptor design does not feature the highly desirable systematic form. – does not imply good locality. 2014/5/2214

Prior Work 2014/5/2215 [4] A. Shokrollahi, “Raptor codes,”

Prior Work [16], Gummadi proposes systematic variants of LT and Raptor codes that feature low (even constant) expected repair complexity. – However, the overhead ɛ required for decoding is suboptimal: it cannot be made arbitrarily small. 2014/5/2216 [16] R. Gummadi, “Coding and scheduling in networks for erasures and broadcast,”

Outline Introduction Problem Description Prior Work Repairable Fountain Codes A Graph Perspective Simulations Conclusion 2014/5/2217

Repairable Fountain Codes A new family of Fountain codes that are systematic and also have sparse parities. – Each parity symbol is a random linear combination of up to d = Ω(logk) randomly chosen input symbols. – Require that a set of k’= (1+ ɛ)k randomly selected encoded symbols – with probability of failure vanishing like 1/poly(k). 2014/5/2218

Repairable Fountain Codes 2014/5/2219

Repairable Fountain Codes 2014/5/2220

Repairable Fountain Codes 2014/5/2221 U is the set of k input symbols V is the set of n encoded symbols.

Repairable Fountain Codes 2014/5/2222

Repairable Fountain Codes In summary, decreasing d(k) improves the locality of the code – How small d(k) can be to ensure that randomly selected set of k’= (1+ɛ)k symbols is decodable. 2014/5/2223

Repairable Fountain Codes 2014/5/2224

Repairable Fountain Codes 2014/5/2225

Repairable Fountain Codes Theorem 3. Let rk be the total number of parities generated, with each parity symbol constructed as a linear combination of d(k) = c log(k) independently selected symbols uniformly at random with replacement. The expected number of parities covering a systematic symbol u is 2014/5/2226

Repairable Fountain Codes 2014/5/2227 Availability

Outline Introduction Problem Description Prior Work Repairable Fountain Codes A Graph Perspective Simulations Conclusion 2014/5/2228

A Graph Perspective First, consider a balanced random bipartite graph where |U| = |V | = k and each vertex of V is randomly connected to d(k) = c log k nodes in U. A classical result by Erd˝os and Renyi [14] shows that these graphs will have perfect matchings with high probability. 2014/5/2229 [14] P. Erd˝os and A. R´enyi, “On random matrices,”

A Graph Perspective However, the graphs are unbalanced – |U| = k and |V | = k’ = (1+ ɛ)k vertices, for ɛ ≥ /5/2230

A Graph Perspective 2014/5/2231

Outline Introduction Problem Description Prior Work Repairable Fountain Codes A Graph Perspective Simulations Conclusion 2014/5/2232

Simulations This paper experimentally evaluate the probability that decoding fails when a randomly selected subset of encoded symbols is available at the decoder. – set the rate equal to ½. – the generator matrix comprises the k columns of the identity matrix and k parity generating columns. – d(k) = c log(k). 2014/5/2233

Simulations 2014/5/2234 d(k) = c log(k), with c = 6. Expected decoding overhead ɛ = 1− 2Pe. k = 100,300,500.

Simulations 2014/5/2235 d(k) = c log(k), with c = 4. k = 100,300,500.

Outline Introduction Problem Description Prior Work Repairable Fountain Codes A Graph Perspective Simulations Conclusion 2014/5/2236

Conclusion This paper introduce a new family of Fountain codes that are systematic and also have parity symbols with logarithmic sparsity. 2014/5/2237

Conclusion Main technical contribution is a novel random matrix result: a family of random matrices with non independent entries have full rank with high probability. – The analysis builds on the connections of matrix determinants to flows on random bipartite graphs, using techniques from [14], [15]. 2014/5/2238 [14] P. Erd˝os and A. R´enyi, “On random matrices,” [15] A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, “Decentralized erasure codes for distributed networked storage,”

Conclusion 2014/5/2239 [13] D. Wiedemann, “Solving sparse linear equations over finite fields,”