NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.

Slides:



Advertisements
Similar presentations
Vector Spaces A set V is called a vector space over a set K denoted V(K) if is an Abelian group, is a field, and For every element vV and K there exists.
Advertisements

5.4 Basis And Dimension.
Introduction to Algorithms
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
Multicut Lower Bounds via Network Coding Anna Blasiak Cornell University.
Global Flow Optimization (GFO) in Automatic Logic Design “ TCAD91 ” by C. Leonard Berman & Louise H. Trevillyan CAD Group Meeting Prepared by Ray Cheung.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Basic Feasible Solutions: Recap MS&E 211. WILL FOLLOW A CELEBRATED INTELLECTUAL TEACHING TRADITION.
MAXIMUM FLOW Max-Flow Min-Cut Theorem (Ford Fukerson’s Algorithm)
Chapter 7 Maximum Flows: Polynomial Algorithms
Entropy Rates of a Stochastic Process
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
Totally Unimodular Matrices Lecture 11: Feb 23 Simplex Algorithm Elliposid Algorithm.
Chapter 2 Basic Linear Algebra
Network Coding Theory: Consolidation and Extensions Raymond Yeung Joint work with Bob Li, Ning Cai and Zhen Zhan.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Theory of Data Flow and Random Placement.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis.
Data Flow Analysis Compiler Design Nov. 8, 2005.
Distributed Combinatorial Optimization
Randomness in Computation and Communication Part 1: Randomized algorithms Lap Chi Lau CSE CUHK.
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
Matrices and Determinants
Max-flow/min-cut theorem Theorem: For each network with one source and one sink, the maximum flow from the source to the destination is equal to the minimal.
5  Systems of Linear Equations: ✦ An Introduction ✦ Unique Solutions ✦ Underdetermined and Overdetermined Systems  Matrices  Multiplication of Matrices.
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Linear Algebra Chapter 4 Vector Spaces.
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Analysis of Precoding-based Intersession Network Coding and The Corresponding 3-Unicast Interference Alignment Scheme Jaemin Han, Chih-Chun Wang * Center.
Linear Programming Data Structures and Algorithms A.G. Malamos References: Algorithms, 2006, S. Dasgupta, C. H. Papadimitriou, and U. V. Vazirani Introduction.
Matrices CHAPTER 8.1 ~ 8.8. Ch _2 Contents  8.1 Matrix Algebra 8.1 Matrix Algebra  8.2 Systems of Linear Algebra Equations 8.2 Systems of Linear.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Maximization of Network Survivability against Intelligent and Malicious Attacks (Cont’d) Presented by Erion Lin.
C&O 355 Mathematical Programming Fall 2010 Lecture 18 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A A A A A A A Image:
Great Theoretical Ideas in Computer Science.
1 Multicasting in a Class of Multicast-Capable WDM Networks From: Y. Wang and Y. Yang, Journal of Lightwave Technology, vol. 20, No. 3, Mar From:
Chapter 3 Determinants Linear Algebra. Ch03_2 3.1 Introduction to Determinants Definition The determinant of a 2  2 matrix A is denoted |A| and is given.
10. Lecture WS 2006/07Bioinformatics III1 V10: Network Flows V10 follows closely chapter 12.1 in on „Flows and Cuts in Networks and Chapter 12.2 on “Solving.
Maximum Flow Problem (Thanks to Jim Orlin & MIT OCW)
Network Information Flow Nikhil Bhargava (2004MCS2650) Under the guidance of Prof. S.N Maheshwari (Dept. of Computer Science and Engineering) IIT, Delhi.
Solving Network Coding Problems with Genetic Algorithmic Methods Anthony Kim Advisers: Muriel Medard and Una-May O’Reilly.
15.082J and 6.855J March 4, 2003 Introduction to Maximum Flows.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
and 6.855J March 6, 2003 Maximum Flows 2. 2 Network Reliability u Communication Network u What is the maximum number of arc disjoint paths from.
1 EE5900 Advanced Embedded System For Smart Infrastructure Static Scheduling.
TH EDITION LIAL HORNSBY SCHNEIDER COLLEGE ALGEBRA.
Theory of Computing Lecture 12 MAS 714 Hartmut Klauck.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
Iterative Improvement for Domain-Specific Problems Lecturer: Jing Liu Homepage:
Approximation Algorithms Duality My T. UF.
1 Chapter 7 Network Flow Slides by Kevin Wayne. Copyright © 2005 Pearson-Addison Wesley. All rights reserved.
Approximation Algorithms based on linear programming.
Matrices, Vectors, Determinants.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
Lap Chi Lau we will only use slides 4 to 19
Topics in Algorithms Lap Chi Lau.
5 Systems of Linear Equations and Matrices
Network Coding and its Applications in Communication Networks
3.3 Applications of Maximum Flow and Minimum Cut
RS – Reed Solomon List Decoding.
§1-3 Solution of a Dynamical Equation
Algorithms (2IL15) – Lecture 7
Maximum Flow Problems in 2005.
Presentation transcript:

NETWORK CODING

Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a given route acts as a switch.

Coding at node is called network coding. Does network coding improve the throughput of the network?

Theorem 1:Min-Cut Max-Flow The maximum amount of flow is equal to the capacity of a minimum cut.

Network coding increases throughput

Theoretically it was proved by Ahlswede et.al. that there exists a network code which achieves the rate region as given by max-flow min-cut. What is the structure of the code that achieves this optimality? Why linear network coding? Under what conditions is a linear network coding problem solvable?

Linear Network coding was studied using block codes by Li and Yeung. Conditions for the solvability of a multi-cast network and framework for solving the linear- network problem are addressed by Koetter and Medard.

Problem Formulation:

Definitions: Let χ(v) = {X(v,1),X(v,2),…..X(v,n(v)} Connection: c is a triple (v,v’,χ(v,v’)) є V X V X P χ(v) Rate: Rate of the connection c is defined as R(c) = where H(X) is the entropy rate of random process X

ALGEBRAIC FORMULATION Definition: Let G = (V,E) be a delay-free communication network. We say that G is a - linear network, if for all links, the random processes Y(e) and Z(v,j) are given

An Example :

Solving for relation between x and z, we get z = xM where x is the vector of input processes, z is the vector of output processes. and M is the transfer matrix which can be split as follows, M = AГB T

where

What do we have to guarantee for the given network connections to be feasible? Ans: det(M) 0,so that x=z*inv(M),which in turn requires det(Г) 0. One possible solution to the example is,choose and all other β’s as 0.

Lemma 1 :Let Ғ [X1,X2,..., Xn] be the ring of polynomials over an infinite field in variables X1,X2,..., Xn. For any non-zero element f ∈ Ғ [X1,X2,..., Xn] there exists an infinite set of n-tuples (x1, x2,..., xn) ∈ Ғ n such that f(x1, x2,..., xn) 0. Hence for each assignment to the parameters β e’,e which leads to det(M) 0,gives a solution to the problem and thus infinite number of solutions are possible.

Theorem 2 :Let a linear network be given. The following three statements are equivalent: 1) A point-to-point connection c = (v, v’,χ(v, v’)) is possible. 2) The MIN-CUT MAX-FLOW bound is satisfied for a rate R(c). 3) The determinant of the R(c)×R(c) transfer matrix M is nonzero over the ring Ғ 2 [..., α e,l,..., β e’,e,..., ε e’,j,...].

Proof: Equivalence between 1 and 3 The Ford-Fulkerson algorithm implies that a solution to the linear network coding problem exists. Choosing this solution for the parameters of the linear network coding problem yields a solution such that M is the identity matrix and hence the determinant of M over Ғ [..., α e,l,..., β e’,e..., ε e’,j,...] does not vanish identically.

Conversely, if the determinant of M is nonzero over Ғ 2 [..., α e,l,..., β e’,e,..., ε e’,j,...] we can invert matrix M by choosing parameters ε e,l accordingly. From Lemma 1 we know that we can choose the parameters as to make this determinant non-zero. Conclusion :Studying the feasibility of connections in a linear network scenario is equivalent to studying the properties of solutions to polynomial equations over the field, called algebraic varieties.

Directed labeled line graph (DLLG):

Adjacency Matrix: F = Definition:

Lemma 2: Let F be the adjacency matrix of the labeled line graph of a cycle-free network G. The matrix I − F has a polynomial inverse in Ғ 2 [..., β e’,e,...]. Proof: F is a strict upper-triangular matrix provided original graph is acyclic and the vertices in DLLG are arranged according to ancestral ordering.

Theorem 3 :Let a network be given with matrices A, B and F. The transfer matrix of the network is M = A(I − F) −1 B T where I is the |E| × |E| identity matrix. Proof: The impulse response between an input random process x and an output random process z is obtained by adding all gains along all paths that the x can take to contribute to z which is given by I+F+F 2 +…+F N = (I-F) -1

Multicast Networks Theorem 4: Let a delay-free network G and a set of desired connections С = {(v,u 1,χ(v)) …, (v,u N,χ(v))} be given. The network problem (G,C) is solvable if and only if the MIN-CUT MAX-FLOW bound is satisfied for all connections in C.

Proof: o Transfer matrix M with dimension |χ(v)| x N|χ(v)| o Each submatrix |χ(v)| x |χ(v)| has non-zero determinant over Ғ 2 [ξ] o Product of N determinant is non-zero polynomial in Ғ 2 [ξ] o Lemma 1 We can find assignment for ξ all N determinant are non-zero in o Choose B so that M is the N-fold multiplication of |χ(v)| x |χ(v)| matrix.

Thus we must find a point that does not lie on the algebraic variety cut out by this polynomial in ξ Algorithm to find a such that F(a) ≠ 0 1.Find the maximal degree δ of F in any variable ξ j and let i be the smallest number such that 2 i > δ. 2.Find an element a t in Ғ 2 i such that F(ξ)| ξt=at ≠ 0 and let F ← F(ξ)| ξt=at 3.If t = n then halt, else t ← t + 1, goto 2. Output: (a 1, a 2, …, a n )

What should be the upper bound on the degree of extension field ? Corollary 1: –Let a delay-free communication network G and a solvable multicast network problem be given with one source and N receivers. Let R be the rate at which the source generates information. There exists a solution to the network coding problem in a finite field F 2 m with m ≤ log 2 (NR + 1)

Why Algorithm 1 will work and is sufficient ? Theorem 5: Let F be the product of the determinants of the transfer matrices for the individual connections and let δ be the maximal degree of F with respect to any variable ξ i. There exists a solution to the multicast network problem in F 2 i, where i is the smallest number such that 2 i > δ. Algorithm 1 finds such a solution.

Proof: Consider F as a polynomial in ξ 2,ξ 3 …ξ n such as, F = ξ 1 ξ 2 ξ 6 … ξ n + … +ξ ξ 1 ξ n +ξ 1 with coefficients from Ғ 2 [ξ 1 ]. Consider polynomial in ξ 1,F l = (ξ 2i 1 - ξ 1 ) Then all the non-zero roots of F l forms the field elements of Ғ 2 i Since δ < 2 i polynomial from ring Ғ 2 [ξ 1 ] are not divisible by F l Hence there exist a 1 ∈ Ғ 2 i atleast one of the coefficient evaluates to nonzero element of Ғ 2 i

General Network We have to ensure that there is no disturbing interference from other connections.

From Theorem 2, the network problem is solvable only if MIN-CUT MAX-FLOW bound is satisfied i.e, the determinant of M 1,1 and M 2,1 is non-zero over Ғ 2 [ξ]. But this network is not solvable. Why ?

Generalized MIN CUT-MAX FLOW Condition Theorem 6: L et M = {M ij } be the corresponding transfer matrix relating the set of input nodes to the set of output nodes. The network problem (G,C) is solvable if and only if there exists an assignment of numbers to ξ such that, M i,j = 0 for all pairs (v i, v j ) of vertices such that (v i, v j,X (v i, v j )) C If C contains the connections (v i1,v j, X (v i1, v j )), (v i2, v j,X (v i2, v j )),…, (v il, v j,X (v il, v j )) the submatrix [M T i1,j M T i2,j,...., M T il,j ] is a non singular ν(v j ) × ν(v j ) matrix.

Conversely, if 1) is not satisfied, there is an interference which cannot be distinguish by v j Checking this two condition can be a tedious task as we have to find an assignment ξ Can we resolve solvability issue without necessarily finding a solution ? Theory of Grobner bases provides a structured approach which reveals the solvability of the network problem.

Robust Networks Can Network Coding be used to protect against link failures in networks ? Can we find a static solution ξ for classes of failure patterns ? Why static solution ? Under which failure pattern a successful network usage is still guaranteed ?

Notation: Let e = (u,v) denote the failing link. Let constant 0 be observed on failing link Set β e’,e, β e,e’’ and α e,l to zero for all e’, e’’ and l. Let this set of parameters be denoted as B e = {ξ i : ξ i is identified with β e’,e, β e,e’’ & α e,l } Let M[ξ] be the system matrix for a particular linear network coding problem For particular failure pattern f define, B(f)=

Lemma 3: Let M[ξ] be the system matrix of a linear network coding problem and let f be a particular link failure pattern. The system matrix M f [ξ] for the network G f obtained by deleting the failing links is obtained by replacing all ξ i ∈ B(f) with zero, i.e. M f [ξ] = M[ξ]| ξi=0:ξi ∈ B(f)

Theorem 7: Let a linear network G and a set of connections C = {(v, u 1,X (v)), (v, u 2,X (v)),..., (v, u N,X (v))} be given. There exists a common static solution to the network problems (G f,C ) for all f in F Proof: Consider the product, Follows from Lemma 1. But what is the trade-off ?

Theorem 8: Let a delay-free communication network G and a solvable multicast network problem be given with one source and N receivers. Moreover, let F be the set of failure patterns from which we want to recover. Let R be the rate at which the source generates information. There exists a solution to the network coding problem in a finite field F 2 m with m ≤log 2 (|F|NR + 1).