A logicians approach to Network Coding Søren Riis The Isaac Newton Institute, Cambridge 7 February, 2012 Søren Riis The Isaac Newton Institute, Cambridge.

Slides:



Advertisements
Similar presentations
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Advertisements

Minimum Clique Partition Problem with Constrained Weight for Interval Graphs Jianping Li Department of Mathematics Yunnan University Jointed by M.X. Chen.
NON - zero sum games.
Totally Unimodular Matrices
COMP 553: Algorithmic Game Theory Fall 2014 Yang Cai Lecture 21.
Introduction to Algorithms
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
B IPARTITE I NDEX C ODING Arash Saber Tehrani Alexandros G. Dimakis Michael J. Neely Department of Electrical Engineering University of Southern California.
Tutorial 6 of CSCI2110 Bipartite Matching Tutor: Zhou Hong ( 周宏 )
Information Theoretical Security and Secure Network Coding NCIS11 Ning Cai May 14, 2011 Xidian University.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
Bar Ilan University And Georgia Tech Artistic Consultant: Aviya Amir.
1 Algorithmic Game Theoretic Perspectives in Networking Dr. Liane Lewin-Eytan.
Isaac Newton Institute 9th of May 2012 Søren Riis Queen Mary University of London Valiant’s Shift problem: A reduction to a problem about graph guessing.
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
June 4, 2015 On the Capacity of a Class of Cognitive Radios Sriram Sridharan in collaboration with Dr. Sriram Vishwanath Wireless Networking and Communications.
Dynamic Index Coding Broadcast Station N N Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University of Southern California Paper available.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Dynamic Index Coding User set N Packet set P Broadcast Station N N p p p Michael J. Neely, Arash Saber Tehrani, Zhen Zhang University.
1 Summarizing Performance Data Confidence Intervals Important Easy to Difficult Warning: some mathematical content.
Clustering short time series gene expression data Jason Ernst, Gerard J. Nau and Ziv Bar-Joseph BIOINFORMATICS, vol
Firewall Policy Queries Author: Alex X. Liu, Mohamed G. Gouda Publisher: IEEE Transaction on Parallel and Distributed Systems 2009 Presenter: Chen-Yu Chang.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
An Introduction to Game Theory Part III: Strictly Competitive Games Bernhard Nebel.
December 8, 2009Theory of Computation Lecture 22: Turing Machines IV 1 Turing Machines Theorem 1.1: Any partial function that can be computed by a Post-
Bit Complexity of Breaking and Achieving Symmetry in Chains and Rings.
1 TCOM 501: Networking Theory & Fundamentals Lecture 7 February 25, 2003 Prof. Yannis A. Korilis.
Copyright © 2014 by McGraw-Hill Higher Education. All rights reserved.
Data Flow Analysis Compiler Design Nov. 8, 2005.
CPSC 411, Fall 2008: Set 4 1 CPSC 411 Design and Analysis of Algorithms Set 4: Greedy Algorithms Prof. Jennifer Welch Fall 2008.
HumanAUT Secure Human Identification Protocols Adam Bender Avrim Blum Manuel Blum Nick Hopper The ALADDIN Center Carnegie Mellon University.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
THE TRANSITION FROM ARITHMETIC TO ALGEBRA: WHAT WE KNOW AND WHAT WE DO NOT KNOW (Some ways of asking questions about this transition)‏
Radial Basis Function Networks
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
1 Summarizing Performance Data Confidence Intervals Important Easy to Difficult Warning: some mathematical content.
Models for Software Reliability N. El Kadri SEG3202.
Networking Seminar Network Information Flow R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network Information Flow. IEEE Transactions on Information.
Transfer Graph Approach for Multimodal Transport Problems
The Hat Game 11/19/04 James Fiedler. References Hendrik W. Lenstra, Jr. and Gadiel Seroussi, On Hats and Other Covers, preprint, 2002,
Provable Protocols for Unlinkability Ron Berman, Amos Fiat, Amnon Ta-Shma Tel Aviv University.
1 Performance Evaluation of Computer Networks: Part II Objectives r Simulation Modeling r Classification of Simulation Modeling r Discrete-Event Simulation.
Chapter 5.4: Bernoulli and Binomial Distribution
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
All that remains is to connect the edges in the variable-setters to the appropriate clause-checkers in the way that we require. This is done by the convey.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Independence and Bernoulli.
Graph Guessing Games & non-Shannon Information Inequalities First workshop on Entropy and Information Inequalities 17 April 2013 Søren Riis Queen Mary.
Digital Logic Lecture 4 Binary Codes The Hashemite University Computer Engineering Department.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 11.
A Game Approach for Multi-Channel Allocation in Multi-Hop Wireless Networks Lin Gao, Xinbing Wang Dept. of Electronic Engineering Shanghai Jiao Tong University.
Distributed Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopDistributed Algorithms1.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
05/2007ORNL Presentation Distributed Denial of Service Games by Chinar Dingankar, Student Dr. R. R. Brooks, Associate Professor Holcombe Department of.
Independence and Bernoulli Trials. Sharif University of Technology 2 Independence  A, B independent implies: are also independent. Proof for independence.
Submodule construction in logics 1 Gregor v. Bochmann, University of Ottawa Using First-Order Logic to Reason about Submodule Construction Gregor v. Bochmann.
Codes & the Hat Game Troy Lynn Bullock John H. Reagan High School, Houston ISD Shalini Kapoor McArthur High School, Aldine ISD Faculty Mentor: Dr. Tie.
1 Summarizing Performance Data Confidence Intervals Important Easy to Difficult Warning: some mathematical content.
Topics Paths and Circuits (11.2) A B C D E F G.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 22.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
1 On the Channel Capacity of Wireless Fading Channels C. D. Charalambous and S. Z. Denic School of Information Technology and Engineering, University of.
Introductory Lecture. What is Discrete Mathematics? Discrete mathematics is the part of mathematics devoted to the study of discrete (as opposed to continuous)
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Network Management Lecture 13. MACHINE LEARNING TECHNIQUES 2 Dr. Atiq Ahmed Université de Balouchistan.
Authors: Jiang Xie, Ian F. Akyildiz
Rank Aggregation.
Lecture 20 Linear Program Duality
Presentation transcript:

A logicians approach to Network Coding Søren Riis The Isaac Newton Institute, Cambridge 7 February, 2012 Søren Riis The Isaac Newton Institute, Cambridge 7 February, 2012

2 Outline The talk presents “recreational” as well as “fundamental” problems from my research in Network Coding. Most of the talk could be titled: a mathematicians approach to Network Coding It takes more than 30 min to get the logicians approach but i will try to give some hints how to get there. Only a brief taster... There is an partial overlap between this talk and other introductory talks I have given: i) Lecture series of 3 lectures given at the University of Bielefeld (2007) ii) Lecture given at 21 st Postgraduate Combinatorics Conference (2010) iii) Lecture given at IEEE International Symposium on Information Theory (2011) iv) Public lecture given at Queen Mary, University of London (2011) The talk presents “recreational” as well as “fundamental” problems from my research in Network Coding. Most of the talk could be titled: a mathematicians approach to Network Coding It takes more than 30 min to get the logicians approach but i will try to give some hints how to get there. Only a brief taster... There is an partial overlap between this talk and other introductory talks I have given: i) Lecture series of 3 lectures given at the University of Bielefeld (2007) ii) Lecture given at 21 st Postgraduate Combinatorics Conference (2010) iii) Lecture given at IEEE International Symposium on Information Theory (2011) iv) Public lecture given at Queen Mary, University of London (2011) 2

Network coding Research field concerning multi-user communication. First papers occurred around So far mainly a field of Electrical Engineering (Transactions on Information Theory etc.) The field contains many interesting problems relevant for mathematicians. Research field concerning multi-user communication. First papers occurred around So far mainly a field of Electrical Engineering (Transactions on Information Theory etc.) The field contains many interesting problems relevant for mathematicians.

Ordinary routing and data storage In Internet and wireless communication messages are treated similarly to cars in a traffic system In communication messages are split into packets In data storage data is split into disjoint items Network Coding challenge this paradigm In Internet and wireless communication messages are treated similarly to cars in a traffic system In communication messages are split into packets In data storage data is split into disjoint items Network Coding challenge this paradigm

Basic ideas of Network Coding Example 1: (Satellite Communication) Yeung and Zhang (1999) Example 1: (Satellite Communication) Yeung and Zhang (1999) Message x ∈ A to be sent from east to west Message y ∈ A to be sent from west to east The satellite transmits a message f(x,y) ∈ A

6 Satellite Communication (continued) East and West each receive a message f(x,y) ∈ A East: Knows x ∈ A, receives f(x,y) ∈ A, requires y ∈ A West: Knows y ∈ A, receives f(x,y) ∈ A, requires x ∈ A Which “coding functions” f:A 2 → A solves this problem? East and West each receive a message f(x,y) ∈ A East: Knows x ∈ A, receives f(x,y) ∈ A, requires y ∈ A West: Knows y ∈ A, receives f(x,y) ∈ A, requires x ∈ A Which “coding functions” f:A 2 → A solves this problem? 6

7 Basic ideas of Network Coding Observation: The function f:A 2 → A solves the communication problem if and only f is latin |A|=2 11 |A|=4 Observation: The function f:A 2 → A solves the communication problem if and only f is latin |A|=2 11 |A|=

Basic ideas of Network Coding Example 2: The Butterfly Network This problem equivalent to the satellite communication problem. Example 2: The Butterfly Network This problem equivalent to the satellite communication problem.

Basic ideas of Network Coding Example 3: (Orthogonal Latin Squares) Two messages x,y ∈ A have to be stored at 4 locations. Find functions f,g: A 2 → A such that x and y can be reconstructed from knowing any two of the values: x, y, f(x,y), g(x,y)

10 Basic ideas of Network Coding Two messages x,y ∈ A stored at 4 locations. Find functions f,g: A 2 → A such that x and y can be reconstructed from knowing any two of the values: x, y, f(x,y), g(x,y) Two messages x,y ∈ A stored at 4 locations. Find functions f,g: A 2 → A such that x and y can be reconstructed from knowing any two of the values: x, y, f(x,y), g(x,y) 10 Observation: f,g: A 2 →A solves the problem if and only (f,g) defines two orthogonal latin squares of order |A|

11 Basic ideas of Network Coding Observation: f,g: A 2 →A solves the problem if and only (f,g) defines two orthogonal latin squares of order |A| f |A|=4 g Observation: f,g: A 2 →A solves the problem if and only (f,g) defines two orthogonal latin squares of order |A| f |A|=4 g

Digital information is not an ordinary commodity How would ordinary goods be distributed if they could be copied during distribution? Digital information can be copied, transformed and mixed during distribution How can this be utilised? This is the main concern of Network Coding How would ordinary goods be distributed if they could be copied during distribution? Digital information can be copied, transformed and mixed during distribution How can this be utilised? This is the main concern of Network Coding

13 Guessing Games on Graphs The following class of problems looks recreational but they go straight to the heart of central problems in Network Coding Guessing Game (Riis1997) Requirements: n players + n dice each with s sides Rules: Each player rolls their die. A player is NOT allowed to see the value his/her own die value. Each player is allowed to look at all the other n-1 dice values. The play: The game is a cooperative game. Each player have to guess (possible by following some protocol) the value of their own dice. No communication between the players is allowed. The players have to make their guess simultaneously (and independently). Task: Each player must guess correctly the value of their own die. The following class of problems looks recreational but they go straight to the heart of central problems in Network Coding Guessing Game (Riis1997) Requirements: n players + n dice each with s sides Rules: Each player rolls their die. A player is NOT allowed to see the value his/her own die value. Each player is allowed to look at all the other n-1 dice values. The play: The game is a cooperative game. Each player have to guess (possible by following some protocol) the value of their own dice. No communication between the players is allowed. The players have to make their guess simultaneously (and independently). Task: Each player must guess correctly the value of their own die. 13

14 Guessing Games on Graphs (continued) Question: What is the probability that each player guess correctly the value of their own die? Naïve (wrong) answer: Each player have no “relevant” information about their own die value. Each player have probability 1/s of guessing their own dice value. The n dice values are independent so the probability all players guess correctly is (1/s) n This “argument” is seriously mistaken. Why? Question: What is the probability that each player guess correctly the value of their own die? Naïve (wrong) answer: Each player have no “relevant” information about their own die value. Each player have probability 1/s of guessing their own dice value. The n dice values are independent so the probability all players guess correctly is (1/s) n This “argument” is seriously mistaken. Why? 14

15 Guessing Games on Graphs (continued) Let us check each claim: 1) Each player has no relevant information about their own dice. This is correct 2) Each player have probability 1/s of guessing their own die value. This is correct 3) The n dice values are independent This is correct 4) The probability all players guess correctly is (1/s) n Serious mistake based on a fallacy. Let us check each claim: 1) Each player has no relevant information about their own dice. This is correct 2) Each player have probability 1/s of guessing their own die value. This is correct 3) The n dice values are independent This is correct 4) The probability all players guess correctly is (1/s) n Serious mistake based on a fallacy. 15

16 Guessing Games on Graphs (continued) The players can do MUCH better than (1/s) n The players have a strategy that can “bootstrap” the success of anyone player such that player is correct if and only if all players are correct. Strategy: Each player “assume” that the sum of all dice values is 0 modulo s, and guess accordingly. This strategy succeed with probability 1/s i.e. a factor s n-1 better than random guessing One player is correct if and only if all players are correct The players can do MUCH better than (1/s) n The players have a strategy that can “bootstrap” the success of anyone player such that player is correct if and only if all players are correct. Strategy: Each player “assume” that the sum of all dice values is 0 modulo s, and guess accordingly. This strategy succeed with probability 1/s i.e. a factor s n-1 better than random guessing One player is correct if and only if all players are correct 16

17 Guessing Games on Graphs (continued) The players have a guessing strategy where they all succeed with probability 1/s (and independent of n). The guessing strategy is optimal. The guessing strategy can described globally: Each player guess under the assumption that the sum of all dice values is 0 modulo s. The players have a guessing strategy where they all succeed with probability 1/s (and independent of n). The guessing strategy is optimal. The guessing strategy can described globally: Each player guess under the assumption that the sum of all dice values is 0 modulo s. 17

18 Guessing Games on Graphs (continued) The uncoordinated guessing strategy succeed with probability (1/s) n The optimal guessing strategy succeed with probability 1/s By cooperating the players “bootstrap” their success, by creating a strong correlation between when they succeed: Either all are wrong or all are right. The uncoordinated guessing strategy succeed with probability (1/s) n The optimal guessing strategy succeed with probability 1/s By cooperating the players “bootstrap” their success, by creating a strong correlation between when they succeed: Either all are wrong or all are right.

19 Guessing Games on Graphs (continued) Playing the guessing game on a graph* Requirements: A graph G with n nodes, n players, n dice each with s sides Rules: Each player correspond to a node in G. Each player rolls their die. A player is allowed only to see the dice values of the “incoming” nodes. The play: The game is a cooperative game. Each player have to guess (possible by following some protocol) the value of their own dice. No communication between the players is allowed during the game. The players have to make their guess simultaneously (and independently). Task: Each player must guess correctly the value of their own die. * In this talk graphs are directed graphs. Undirected graphs are treated as graphs with bi-directed edges. Playing the guessing game on a graph* Requirements: A graph G with n nodes, n players, n dice each with s sides Rules: Each player correspond to a node in G. Each player rolls their die. A player is allowed only to see the dice values of the “incoming” nodes. The play: The game is a cooperative game. Each player have to guess (possible by following some protocol) the value of their own dice. No communication between the players is allowed during the game. The players have to make their guess simultaneously (and independently). Task: Each player must guess correctly the value of their own die. * In this talk graphs are directed graphs. Undirected graphs are treated as graphs with bi-directed edges.

20 Guessing Games on Graphs (continued) The complete graph K n with bi-directed edges, corresponds to the guessing game we already considered. The guessing number of K n is n-1 because we can do s (n-1) times better than random uncoordinated guessing. For a general graph the task of the players is still to create a strong correlation between the correctness of their guesses The complete graph K n with bi-directed edges, corresponds to the guessing game we already considered. The guessing number of K n is n-1 because we can do s (n-1) times better than random uncoordinated guessing. For a general graph the task of the players is still to create a strong correlation between the correctness of their guesses

21

22 Network Coding ↔ Guessing Numbers Let N be a network with k input/output pairs. If we identify each input node with its corresponding output node, we get a graph G N. Theorem:[Riis 2005] N has a Network coding solution over alphabet A if and only if G N has guessing number  k (equivalent = k) over A. Let N be a network with k input/output pairs. If we identify each input node with its corresponding output node, we get a graph G N. Theorem:[Riis 2005] N has a Network coding solution over alphabet A if and only if G N has guessing number  k (equivalent = k) over A. 22

23 Network Coding ↔ Guessing Numbers (continued) An even a stronger result is valid: Theorem: [Riis 2005] Let N be a network with k input/output pairs. The number of distinct network coding solutions to N is identical to the number of distinct guessing strategies for G N that achieves guessing number k (the solutions are counted with respect to the same alphabet A). An even a stronger result is valid: Theorem: [Riis 2005] Let N be a network with k input/output pairs. The number of distinct network coding solutions to N is identical to the number of distinct guessing strategies for G N that achieves guessing number k (the solutions are counted with respect to the same alphabet A). 23

24 Network Coding ↔ Guessing Numbers (continued)

25 Network Coding ↔ Guessing Numbers (continued)

26 Network Coding ↔ Guessing Numbers (continued) The networks in b,c and d all appear by “splitting” the graph G in a. “Splitting” is the opposite operation as identifying input/output pairs. The networks in b,c and d has exactly the same number of network coding solutions (over a fixed alphabet A). This number is identical to the number of guessing strategies (over A) that achieve guessing number 3 for G. The networks in b,c and d all appear by “splitting” the graph G in a. “Splitting” is the opposite operation as identifying input/output pairs. The networks in b,c and d has exactly the same number of network coding solutions (over a fixed alphabet A). This number is identical to the number of guessing strategies (over A) that achieve guessing number 3 for G. 26

27 This was a basic introduction The results in this presentation were all introductory and from 2005 Since then: Supervised two PhD thesis to completion on Guessing Games and Network Coding Are 1.5 year into a EPSRC grant supporting 2 Post Docs on these topics. The results in this presentation were all introductory and from 2005 Since then: Supervised two PhD thesis to completion on Guessing Games and Network Coding Are 1.5 year into a EPSRC grant supporting 2 Post Docs on these topics. 27

28 This was a basic introduction Area contains many deep and open question that are fundamental in understanding network communication Spin off: The Network Coding - Guessing Game approach has lead to new areas of research Combinatorial Representations (2011) (With Peter Cameron and Max Gadouleau) A generalisation of Matroid theory Memoryless computation (2011) (With Max Gadouleau) Dynamic communication networks (2011) (With Max Gadouleau) Graph entropy and non-shannon information inequalities (Yun Sun PhD Thesis) (Riis 2008) Construction of new classes of communication networks (with Max Gadouleau) (2010) New max-flow min-cut theorem for multiuser communication (with Max Gadouleau) (2011) Area contains many deep and open question that are fundamental in understanding network communication Spin off: The Network Coding - Guessing Game approach has lead to new areas of research Combinatorial Representations (2011) (With Peter Cameron and Max Gadouleau) A generalisation of Matroid theory Memoryless computation (2011) (With Max Gadouleau) Dynamic communication networks (2011) (With Max Gadouleau) Graph entropy and non-shannon information inequalities (Yun Sun PhD Thesis) (Riis 2008) Construction of new classes of communication networks (with Max Gadouleau) (2010) New max-flow min-cut theorem for multiuser communication (with Max Gadouleau) (2011) 28

29 Work in progress: Links to logic Sample question: Let L be a first-order language and let φ(x 1,x 2,...,x n ) be an L-formula in n-variables. Given s ∈ {2,3,4,...} find an L- model M of size s which maximize the size of the set {(a 1,a 2,...,a n ) ∈ M n : M ||- φ(a 1,a 2,...,a n )} This type of questions is very broad - in many ways too broad - but instances for specific choice of the formula φ unifies quite diverse problems (hat-puzzles, guessing games, network coding, dynamic network coding etc.....) Sample question: Let L be a first-order language and let φ(x 1,x 2,...,x n ) be an L-formula in n-variables. Given s ∈ {2,3,4,...} find an L- model M of size s which maximize the size of the set {(a 1,a 2,...,a n ) ∈ M n : M ||- φ(a 1,a 2,...,a n )} This type of questions is very broad - in many ways too broad - but instances for specific choice of the formula φ unifies quite diverse problems (hat-puzzles, guessing games, network coding, dynamic network coding etc.....) 29

Application: By considering special quantifier free formula φ we get a result in many-to-many casting Under very general circumstances (dynamic, changing communication networks with link failure, distributed coding function, various user demands) The following principle is valid for dispersion of information (like in many-to-many casting). If there is a way to meet each user’s demands (disregarding all other users) it is possible to ….. *important disclaimer Under very general circumstances (dynamic, changing communication networks with link failure, distributed coding function, various user demands) The following principle is valid for dispersion of information (like in many-to-many casting). If there is a way to meet each user’s demands (disregarding all other users) it is possible to ….. *important disclaimer

Application in many-to-many casting..to meet all demands simultaneously. Thank you