A network coding tutorial. Tracey Ho Center for the Mathematics of Information California Institute of Technology
|
|
- Cody Adams
- 7 years ago
- Views:
Transcription
1 A network coding tutorial Tracey Ho Center for the Mathematics of Information California Institute of Technology
2 Introduction Network Coding Generalization of traditional store & forward Information can be operated on in network, not just transported Powerful framework for considering theoretical and operational issues in networking...a fresh and sharp tool that has the potential to open up stagnant fundamental areas of research Dr. Ralf Koetter, the Network Coding Home Page 2
3 A multicast example b s b 2 b s b 2 t b b 2 u t u w w b b 2 b b 2 b b 2 x y z y z [ACLY00] 3
4 A multicast example b s b 2 b s b 2 t b b 2 u t u w w b b 2 b b 2 b 2 b x y z y z [ACLY00] 4
5 A multicast example b s b 2 b s b 2 t b b 2 u t b b 2 u w w b b 2 b b 2 b 2 b x y z y z [ACLY00] 5
6 A multicast example b s b 2 b s b 2 t b b 2 u t b b 2 u w w b b 2 b b + b 2 b 2 b 2 b x y z y b + b 2 b + b 2 z [ACLY00] 6
7 . Determining feasibility of a network connection problem non-multicast:? multicast: min-cut max-flow bound satisfied for each receiver [ACLY00] transfer matrix A(I F) Bβ T non-singular [KM0] for each receiver β is 7
8 Algebraic network coding [KM0] Multi-source multicast Information transmitted as vectors of n bits Coding in finite field F 2 n Data Stream n bits n bits. Element of F 2 n 8
9 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 9
10 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 0
11 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ]
12 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 2
13 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 3
14 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 4
15 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I DF) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 5
16 . Determining feasibility of a network connection problem non-multicast:? multicast: min-cut max-flow bound satisfied for each receiver [ACLY00] transfer matrix A(I F) Bβ T non-singular [KM0] for each receiver β is 6
17 2. Types of network codes needed multicast: linear [LY03], algebraic [KM0] sufficient non-multicast: nonlinear codes may be needed [DFZ04] 7
18 3. Constructing linear multicast network codes Centralized general graphs: set code coefficient values sequentially, keeping the transfer matrix determinant polynomial nonzero [KM0] acyclic graphs: consider subgraph consisting of flow solutions to individual receivers [SET03, JCJ03] set coefficient values in ancestral ordering, maintaining a full rank frontier set for each receiver Decentralized general graphs: randomized linear network coding [HKMKE03] acyclic graphs, two sources: subtree decomposition and token distribution [FSS04] 8
19 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] 9
20 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] 20
21 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] 2
22 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] [0 ] 22
23 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] [0 ] [ 0] 23
24 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] [0 ] [ 0] [0 ] 24
25 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] [0 ] [ 0] [0 ] [ ] 25
26 3. Constructing linear multicast network codes Centralized general graphs: set code coefficient values sequentially, keeping the transfer matrix determinant polynomial nonzero [KM0] acyclic graphs: consider subgraph consisting of flow solutions to individual receivers [SET03, JCJ03] set coefficient values in ancestral ordering, maintaining a full rank frontier set for each receiver Decentralized general graphs: randomized linear network coding [HKMKE03] acyclic graphs, two sources: subtree decomposition and token distribution [FSS04] 26
27 Distributed random linear network coding Interior network nodes independently choose random linear mappings from inputs to outputs Coefficients of aggregate effect communicated to receivers X X X 2 X 2 y k = X 2 [0 0] y j = 2X + X 2 [2 0] X 3 y l = 3X 3 + 2y j + y k 3[0 0 ] + 2[2 0] + [0 0] = [4 3 3] Receiver nodes can decode if they receive as many independent linear combinations as the number of source processes 27
28 Distributed random linear network coding Interior network nodes independently choose random linear mappings from inputs to outputs Coefficients of aggregate effect communicated to receivers X X X 2 X 2 y k = X 2 [0 0] y j = 2X + X 2 [2 0] X 3 y l = 3X 3 + 2y j + y k 3[0 0 ] + 2[2 0] + [0 0] = [4 3 3] Receiver nodes can decode if they receive as many independent linear combinations as the number of source processes 28
29 Distributed random linear network coding Interior network nodes independently choose random linear mappings from inputs to outputs Coefficients of aggregate effect communicated to receivers X X X 2 X 2 y k = X 2 [0 0] y j = 2X + X 2 [2 0] X 3 y l = 3X 3 + 2y j + y k 3[0 0 ] + 2[2 0] + [0 0] = [4 3 3] Receiver nodes can decode if they receive as many independent linear combinations as the number of source processes 29
30 Success probability Theorem (HKMKE03, HMSEK03). For a feasible d-receiver multicast connection problem on a network with independent or linearly correlated sources a network code in which code coefficients a i,j, f l,j for η links are chosen independently and uniformly over F q the success probability is at least ( d/q) η for q > d. Error bound is of the order of the inverse of the field size q = 2 n, so error probability decreases exponentially with codeword length n 30
31 4. Choosing a minimum-cost coding subgraph Suppose each link (a, b) has cost C ab (g ab ) and capacity R ab linear or convex optimization Minimize ab C ab(g ab ) subject to λ i = b f β ib a f β ai i, β i λ i = a i f β aβ β T 0 f β ab g ab R ab a, b, β T where λ i is the source rate at node i 3
32 5. Throughput advantage of network coding directed wired networks, multicast: O(log V ) [SET03] directed wired networks, multiple unicasts: O( V ) [LL04] undirected wired networks, multicast: 2 [LL04] undirected wired networks, multiple unicasts: conjectured to be [LL04] 32
33 Throughput advantage in directed wired networks, multicast [SET03] source 2h relays h h sinks 33
34 Throughput advantage in directed wired networks, multicast [SET03] coding rate: h routing rate: 2 Proof: suppose source tries to send 2n symbols b,...,b 2n in n steps at most 2hn symbols can be sent to relay nodes in n steps let U i be the subset of relay nodes receiving b i since U +...U 2n 2hn, there is an i for which U i h any sink not connected to a node in U i does not receive b i 34
35 Throughput advantage in directed wired networks, multiple unicasts [LL04] 35
36 6. Network coding in wireless Additional elements to consider: Dependence of topology on transmit powers, medium access, etc. Wireless multicast advantage Network coding can offer advantages in throughput and energy: t b b 2 u t b b 2 u w w b b 2 b b 2 b 2 b b + b 2 y z y z 36
37 7. Complexity advantage of network coding Multicast throughput: integral/fractional routing: integral/fractional Steiner tree packing (NP complete) network coding: P Minimum-energy multicast/broadcast: routing: NP complete network coding: P [LMHK04] 37
38 Applications of network coding Network capacity / optimization Achieving capacity [ACLY00] Minimizing cost/energy [WCK04,LMHK04] Distributed compression [HMEK04] Network operations Analysis of network management [HMK02] Error correction [CY02a] Decentralized robust network operation [HKMKE03] Network security Wiretapping [CY02b] Byzantine fault detection [HLKMEK04] 38
39 Decentralized robust network operation using randomized network coding Decentralized scenarios X X X X Src Receiver position ( 2,4) (4,4) (8,0) (0,0) Randomized flooding upper bound Randomized F 2 6 lower bound Coding F 2 8 lower bound Online algorithms in dynamically varying environments Experimental demonstration on ISP graphs [CWJ03] 39
40 Byzantine security Robustness against faulty/malicious components with arbitrary behavior, e.g. dropping packets misdirecting packets sending spurious information Abstraction as Byzantine generals problem [LSP82] Byzantine robustness in networking [P88,MR97,KMM98,CL99] 40
41 Byzantine detection with network coding Distributed randomized network coding can be extended to detect Byzantine behavior Small computational and communication overhead small number of hash bits included with each packet, calculated as simple polynomial function of data Require only that a Byzantine attacker does not design and supply modified packets with complete knowledge of other nodes packets 4
42 Byzantine modification detection scheme Suppose each packet contains θ data symbols x,...,x θ and φ θ hash symbols y,...,y φ Consider the function π(x,...,x k ) = x x k+ k, and set k 2k x x π π π where k = θ φ y against detection probability y 2 y 3 is a design parameter trading off overhead 42
43 Detection probability Theorem (HLKMEK04). If the receiver gets s genuine packets, ( ) s. then the detection probability is at least k+ q E.g. With 2% overhead (k = 50), code length=7, s = 5, the detection probability is 98.9%. with % overhead (k = 00), code length=8, s = 5, the detection probability is 99.0%. 43
44 Distributed compression of correlated sources Distributed randomized network coding can remove or add redundancy according to network capacity Sources Receiver 44
45 Background Slepian-Wolf Separate encoding of two correlated sources for a single receiver X R rcv X 2 R 2 Achievable rate region found by Slepian and Wolf, 73 Error exponents for linear coding found by Csiszar, 82 45
46 Coding and decoding randomized linear network coding over vectors of bits in F 2 Y nc j j nc k Y j v source Xi originating at v Y nc l l = Υ,3 X nr i i + Ψ,3 Y nc j j + Ψ 2,3 Y nc k j receivers perform minimum entropy or maximum a posteriori probability decoding 46
47 Distributed compression problem Consider two sources of rates r, r 2 whose output values in each unit time period are i.i.d. with distribution Q. linear network coding in F 2 over vectors of nr i bits from each source Define m and m 2 the min cut capacities between the receiver and each source respectively m 3 the min cut capacity between the receiver and both sources L the maximum source-receiver path length 47
48 Theorem (HMEK04). The error probability at each receiver using minimum entropy or maximum a posteriori probability decoding is at most 3 i= pi e, where p i e exp n min D(P X X 2 Q) + X,X 2 m i( n log L) H(X i X i ) + +2 µ r +r 2 +r i log(n + ) for i =, 2 p 3 e exp n min D(P X X 2 Q) + X,X 2 m 3( n log L) H(X X 2 ) + +2 µ 2r +2r 2 log(n + ) Generalizes error exponents for linear Slepian-Wolf coding [Csi82] 48
49 Conclusions Network coding is potentially useful in many aspects of practical and theoretical networking Multicast in wired networks is well understood (algebraic codes suffice, efficient algorithms for constructing optimal solutions) Advantages exist for non-multicast, wireless settings, but many interesting questions remain 49
50 Further work Richer wireless network models: variable rates, correlated link variations Distributed, adaptive resource optimization and scheduling algorithms for networks with concurrent multicast and unicast connections Use of network coding in conjunction with signal combination or cooperation at the physical layer 50
51 The End My web page: trace Network coding homepage: 5
52 Proof outline Recall transfer matrix M β = A(I F) Bβ T must be non-singular for each receiver β We show an equivalent condition connected with bipartite A 0 matching: the Edmonds matrices (in the I F Bβ T A 0 acyclic delay-free case) or (in the case with I DF delays) are non-singular This shows that if η links have random coefficients, the determinant polynomial has maximum degree η in the random variables {a x,j, f i,j } is linear in each of these variables B T β 52
53 Proof outline (cont d) We want the product of the d receivers determinant polynomials to be nonzero We can show inductively, using the Schwartz-Zippel Theorem, that for any polynomial P F[ξ, ξ 2,...] of degree dη, in which each ξ i has exponent at most d, if ξ, ξ 2,... are chosen independently and uniformly at random from F q F, then P = 0 with probability at most ( d/q) η for d < q Particular form of the determinant polynomials gives rise to a tighter bound than the Schwartz-Zippel bound for general polynomials of the same total degree 53
54 Improvement with spare capacity Theorem. Consider multicasting independent or linearly correlated sources of joint entropy rate r on an acyclic graph with minimum redundancy y, i.e. deletion of any y links in the network preserves feasibility. At any receiver, successful reception occurs with probability at least r+y x=r ( r + y x ) ( ) ( Lx q ( ) ) L r+y x q where L is the longest source-receiver path in the network. Proof uses Theorem?? 54
55 Analysis Let M be the matrix whose i th row m i represents the concatenation of the data and corresponding hash value for packet i Suppose the receiver tries to decode using s unmodified packets, represented as C a [M I], where the i th row of the coefficient matrix C a is the vector of code coefficients of the i th packet r s modified packets, represented by [C b M + V C b ], where V is an arbitrary matrix 55
56 Analysis (cont d) Let C = C a C b Decoding is equivalent to pre-multiplying the matrix C a M C a C b M + V C b with C, which gives M + C 0 V I Consider any fixed C b and V. Since the receiver decodes only when it has a full rank set of packets, possible values of C a are such that C is non-singular 56
57 Analysis (cont d) We can show that for each of s packets, the attacker knows only that the decoded value will be one of q rank(v ) possibilities rank(v ) m i + γ i,j v j γ i,j F q j= at most k + out of the q vectors in a set {u + γv γ F q }, where u = (u,...,u k+ ) is a fixed length-(k + ) vector and v = (v,...,v k+ ) a fixed nonzero length-(k + ) vector, can satisfy the property that the last element of the vector equals the hash of the first k elements. 57
58 Outline Network coding tutorial Randomized linear network coding Decentralized robust network operation Byzantine fault detection Distributed compression [HMEK04] 58
59 Outline of proof of Theorem 48 Error probability 3 i= pi e, where p i e, i =, 2, is the probability of error in X i only p 3 e is the probability of error in both X, X 2 Proof approach using method of types similar to that in [Csi82] Type P x of a vector x is the empirical distribution of elements in the vector Bound error probabilities by summing over sequences of different joint types P X X X 2 X2 59
60 Proof outline (cont d) probability of source vector of type (x,x 2 ) T X X 2 Q n (x x 2 ) = exp{ n(d(p X X 2 Q) + H(X X 2 ))} decoding conditions minimum entropy decoder: H( X X2 ) H(X X 2 ) maximum a posteriori probability decoder: D(P X Q) + H( X X2 X2 ) D(P X X 2 Q) + H(X X 2 ) 60
61 Define Proof outline (cont d) P i, i =, 2, the probability that (x i,x i ), ( x i,x i ), where x i x i, give the same signals at the receiver P 3, the probability that (x,x 2 ), ( x, x 2 ), where x x,x 2 x 2, give the same signals at the receiver Two distinct input values are mapped to the same value on a link of capacity c with probability 2 nc We can show by induction on the minimum cut capacities m i that ( P i ( ) mi ( ) mi L 2 n )L 2 n 6
62 Proof outline (cont d) Bound error probabilities by summing over sets of joint types {P X X X 2 X X X2, X 2 = X 2 } i = P i n = {P X X X 2 X = X X2, X 2 X 2 } i = 2 {P X X X 2 X X X2, X 2 X 2 } i = 3 where X i, X i F nr i 2 sequences of each type T X X 2 = { [ x x 2 ] F n(r +r 2 ) 2 Px x 2 = P X X 2 } T X X2 X X 2 (x x 2 ) = { [ x x 2 ] F n(r +r 2 ) 2 P x x 2 x x 2 = P X X2 X X 2 } 62
63 Proof outline (cont d) We also use the cardinality bounds P n < (n + ) 22r +r 2 P 2 n < (n + ) 2r +2r 2 P 3 n < (n + ) 22r +2r 2 T X X 2 exp{nh(x X 2 )} T X X2 X X 2 (x x 2 ) exp{nh( X X2 X X 2 )} 63
64 Distributed random routing scheme RR: The source node sends one process in both directions on one axis and the other process in both directions along the other axis. A node receiving information on one link sends the same information on its three other links (these are nodes along the grid axes passing through the source node). A node receiving signals on two links sends one of the incoming signals on one of its two other links with equal probability, and the other signal on the remaining link. The probability that a receiver located at grid position (x, y) relative to the source receives both source processes is at most + 2 x y + (4 min( x, y ) )/3 2 x + y 2 64
65 Distributed random coding scheme RC: The source node sends one process in both directions on one axis and the other process in both directions along the other axis. A node receiving information on one link sends the same information on its three other links. A node receiving signals on two links sends a random linear combination of the source signals on each of its two other links. The probability that a receiver located at grid position (x, y) relative to the source can decode both source processes is at least ( /q) 2(x+y 2). 65
Network coding for security and robustness
Network coding for security and robustness 1 Outline Network coding for detecting attacks Network management requirements for robustness Centralized versus distributed network management 2 Byzantine security
More informationNetwork Monitoring in Multicast Networks Using Network Coding
Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: trace@mit.edu Ben Leong, Yu-Han Chang, Yonggang Wen
More informationGambling and Data Compression
Gambling and Data Compression Gambling. Horse Race Definition The wealth relative S(X) = b(x)o(x) is the factor by which the gambler s wealth grows if horse X wins the race, where b(x) is the fraction
More informationAchievable Strategies for General Secure Network Coding
Achievable Strategies for General Secure Network Coding Tao Cui and Tracey Ho Department of Electrical Engineering California Institute of Technology Pasadena, CA 91125, USA Email: {taocui, tho}@caltech.edu
More informationWeakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
More informationNetwork Coding for Security and Error Correction
Network Coding for Security and Error Correction NGAI, Chi Kin A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Doctor of Philosophy in Information Engineering c The Chinese
More informationSecure Network Coding via Filtered Secret Sharing
Secure Network Coding via Filtered Secret Sharing Jon Feldman, Tal Malkin, Rocco Servedio, Cliff Stein (Columbia University) jonfeld@ieor, tal@cs, rocco@cs, cliff@ieor columbiaedu Feldman, Malkin, Servedio,
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationSecurity for Wiretap Networks via Rank-Metric Codes
Security for Wiretap Networks via Rank-Metric Codes Danilo Silva and Frank R. Kschischang Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario M5S 3G4, Canada, {danilo,
More informationOn the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics
More informationA Numerical Study on the Wiretap Network with a Simple Network Topology
A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of
More informationA Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationLinear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB)
462 Linear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB) Nitin Rakesh 1 and VipinTyagi 2 1, 2 Department of CSE & IT, Jaypee University of Information Technology, Solan,
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationLink Status Monitoring Using Network Coding
Link Status Monitoring Using Network Coding Mohammad H. Firooz, Student Member, IEEE, Sumit Roy, Fellow, IEEE, Christopher Lydick, Student Member, IEEE, and Linda Bai, Student Member, IEEE Abstract In
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationOn the Security and Efficiency of Content Distribution Via Network Coding
1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li John C.S. Lui + Dah-Ming Chiu Crypto. & Security Department, Institute for Infocomm Research, Singapore + Computer
More informationSecure Network Coding: Bounds and Algorithms for Secret and Reliable Communications
Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications S. Jaggi and M. Langberg 1 Introduction Network coding allows the routers to mix the information content in packets before
More informationOn Secure Communication over Wireless Erasure Networks
On Secure Communication over Wireless Erasure Networks Andrew Mills Department of CS amills@cs.utexas.edu Brian Smith bsmith@ece.utexas.edu T. Charles Clancy University of Maryland College Park, MD 20472
More informationA Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
More informationSecure Network Coding on a Wiretap Network
IEEE TRANSACTIONS ON INFORMATION THEORY 1 Secure Network Coding on a Wiretap Network Ning Cai, Senior Member, IEEE, and Raymond W. Yeung, Fellow, IEEE Abstract In the paradigm of network coding, the nodes
More informationInformation Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
More informationOptimal Index Codes for a Class of Multicast Networks with Receiver Side Information
Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net
More informationReview Horse Race Gambling and Side Information Dependent horse races and the entropy rate. Gambling. Besma Smida. ES250: Lecture 9.
Gambling Besma Smida ES250: Lecture 9 Fall 2008-09 B. Smida (ES250) Gambling Fall 2008-09 1 / 23 Today s outline Review of Huffman Code and Arithmetic Coding Horse Race Gambling and Side Information Dependent
More informationInfluences in low-degree polynomials
Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known
More informationNimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff
Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear
More information1 Introduction to Matrices
1 Introduction to Matrices In this section, important definitions and results from matrix algebra that are useful in regression analysis are introduced. While all statements below regarding the columns
More informationLECTURE 4. Last time: Lecture outline
LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random
More information2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
More informationMathematical Modelling of Computer Networks: Part II. Module 1: Network Coding
Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University
More informationIn-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection
In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection Michele Albano Jie Gao Instituto de telecomunicacoes, Aveiro, Portugal Stony Brook University, Stony Brook, USA Data
More informationLecture 4: Partitioned Matrices and Determinants
Lecture 4: Partitioned Matrices and Determinants 1 Elementary row operations Recall the elementary operations on the rows of a matrix, equivalent to premultiplying by an elementary matrix E: (1) multiplying
More informationSecure Network Coding for Wiretap Networks of Type II
1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson Abstract We consider the problem of securing a multicast network against a wiretapper that can
More informationTransportation Polytopes: a Twenty year Update
Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationLinear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
More informationLecture 4: AC 0 lower bounds and pseudorandomness
Lecture 4: AC 0 lower bounds and pseudorandomness Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: Jason Perry and Brian Garnett In this lecture,
More informationNetwork Coding Applications
Foundations and Trends R in Networking Vol. 2, No. 2 (2007) 135 269 c 2007 C. Fragouli and E. Soljanin DOI: 10.1561/1300000013 Network Coding Applications Christina Fragouli 1 and Emina Soljanin 2 1 École
More informationLecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
More information1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
More informationCompressing Forwarding Tables for Datacenter Scalability
TECHNICAL REPORT TR12-03, TECHNION, ISRAEL 1 Compressing Forwarding Tables for Datacenter Scalability Ori Rottenstreich, Marat Radan, Yuval Cassuto, Isaac Keslassy, Carmi Arad, Tal Mizrahi, Yoram Revah
More informationComparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
More informationSYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis
SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationLecture Topic: Low-Rank Approximations
Lecture Topic: Low-Rank Approximations Low-Rank Approximations We have seen principal component analysis. The extraction of the first principle eigenvalue could be seen as an approximation of the original
More informationNetwork (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,
More informationVector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
More informationCapacity Limits of MIMO Channels
Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References
More informationEnergy Benefit of Network Coding for Multiple Unicast in Wireless Networks
Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber
More informationPower Control is Not Required for Wireless Networks in the Linear Regime
Power Control is Not Required for Wireless Networks in the Linear Regime Božidar Radunović, Jean-Yves Le Boudec School of Computer and Communication Sciences EPFL, Lausanne CH-1015, Switzerland Email:
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
More informationPerformance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
More informationFACTORING SPARSE POLYNOMIALS
FACTORING SPARSE POLYNOMIALS Theorem 1 (Schinzel): Let r be a positive integer, and fix non-zero integers a 0,..., a r. Let F (x 1,..., x r ) = a r x r + + a 1 x 1 + a 0. Then there exist finite sets S
More informationLattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University)
More informationBasics of information theory and information complexity
Basics of information theory and information complexity a tutorial Mark Braverman Princeton University June 1, 2013 1 Part I: Information theory Information theory, in its modern format was introduced
More informationby the matrix A results in a vector which is a reflection of the given
Eigenvalues & Eigenvectors Example Suppose Then So, geometrically, multiplying a vector in by the matrix A results in a vector which is a reflection of the given vector about the y-axis We observe that
More informationFunctional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
More informationMaximum Entropy Functions: Approximate Gács-Körner for Distributed Compression
Maximum Entropy Functions: Approximate Gács-Körner for Distributed Compression Salman Salamatian MIT Asaf Cohen Ben-Gurion University of the Negev Muriel Médard MIT ariv:60.03877v [cs.it] Apr 06 Abstract
More informationEnhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
More informationNational Sun Yat-Sen University CSE Course: Information Theory. Gambling And Entropy
Gambling And Entropy 1 Outline There is a strong relationship between the growth rate of investment in a horse race and the entropy of the horse race. The value of side information is related to the mutual
More informationSHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
More informationGraph theoretic techniques in the analysis of uniquely localizable sensor networks
Graph theoretic techniques in the analysis of uniquely localizable sensor networks Bill Jackson 1 and Tibor Jordán 2 ABSTRACT In the network localization problem the goal is to determine the location of
More informationNETWORK CODING OVERHEAD
NETWORK CODING OVERHEAD Yalin Saguyu y-saguyu@northwestern.eu Department of Electrical Engineering an Computer Science Northwestern University Joint work with M. Rimensberger, M. L. Honig, an W. Utschick
More informationSteiner Tree Approximation via IRR. Randomized Rounding
Steiner Tree Approximation via Iterative Randomized Rounding Graduate Program in Logic, Algorithms and Computation μπλ Network Algorithms and Complexity June 18, 2013 Overview 1 Introduction Scope Related
More information5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
More informationPEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
More informationDesign of LDPC codes
Design of LDPC codes Codes from finite geometries Random codes: Determine the connections of the bipartite Tanner graph by using a (pseudo)random algorithm observing the degree distribution of the code
More informationInformation Theoretic Analysis of Proactive Routing Overhead in Mobile Ad Hoc Networks
Information Theoretic Analysis of Proactive Routing Overhead in obile Ad Hoc Networks Nianjun Zhou and Alhussein A. Abouzeid 1 Abstract This paper considers basic bounds on the overhead of link-state protocols
More informationMATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix.
MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix. Nullspace Let A = (a ij ) be an m n matrix. Definition. The nullspace of the matrix A, denoted N(A), is the set of all n-dimensional column
More informationOn Secure Network Coding With Nonuniform or Restricted Wiretap Sets
166 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 On Secure Network Coding With Nonuniform or Restricted Wiretap Sets Tao Cui, Student Member, IEEE, TraceyHo, Senior Member, IEEE,
More informationExponential time algorithms for graph coloring
Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].
More informationLecture 2 Linear functions and examples
EE263 Autumn 2007-08 Stephen Boyd Lecture 2 Linear functions and examples linear equations and functions engineering examples interpretations 2 1 Linear equations consider system of linear equations y
More informationDirect Methods for Solving Linear Systems. Matrix Factorization
Direct Methods for Solving Linear Systems Matrix Factorization Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University c 2011
More informationData Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
More informationDistance Degree Sequences for Network Analysis
Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation
More informationInteger factorization is in P
Integer factorization is in P Yuly Shipilevsky Toronto, Ontario, Canada E-mail address: yulysh2000@yahoo.ca Abstract A polynomial-time algorithm for integer factorization, wherein integer factorization
More informationSensitivity analysis of utility based prices and risk-tolerance wealth processes
Sensitivity analysis of utility based prices and risk-tolerance wealth processes Dmitry Kramkov, Carnegie Mellon University Based on a paper with Mihai Sirbu from Columbia University Math Finance Seminar,
More informationThe Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/
The Binary Blocking Flow Algorithm Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Theory vs. Practice In theory, there is no difference between theory and practice.
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.
Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three
More information5. Orthogonal matrices
L Vandenberghe EE133A (Spring 2016) 5 Orthogonal matrices matrices with orthonormal columns orthogonal matrices tall matrices with orthonormal columns complex matrices with orthonormal columns 5-1 Orthonormal
More informationMATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets.
MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. Norm The notion of norm generalizes the notion of length of a vector in R n. Definition. Let V be a vector space. A function α
More informationOptimization Modeling for Mining Engineers
Optimization Modeling for Mining Engineers Alexandra M. Newman Division of Economics and Business Slide 1 Colorado School of Mines Seminar Outline Linear Programming Integer Linear Programming Slide 2
More informationMATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS 1. SYSTEMS OF EQUATIONS AND MATRICES 1.1. Representation of a linear system. The general system of m equations in n unknowns can be written a 11 x 1 + a 12 x 2 +
More information! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.
Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of
More informationGroup Testing a tool of protecting Network Security
Group Testing a tool of protecting Network Security Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics, National Chiao Tung University, Hsin Chu, Taiwan Group testing (General Model) Consider a set N
More informationEfficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
Du et al. EURASIP Journal on Wireless Communications and Networking 2014, 2014:5 RESEARCH Open Access Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation
More informationQuadratic forms Cochran s theorem, degrees of freedom, and all that
Quadratic forms Cochran s theorem, degrees of freedom, and all that Dr. Frank Wood Frank Wood, fwood@stat.columbia.edu Linear Regression Models Lecture 1, Slide 1 Why We Care Cochran s theorem tells us
More informationChapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling
Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one
More informationAnalysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs
Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute
More informationFactorization Theorems
Chapter 7 Factorization Theorems This chapter highlights a few of the many factorization theorems for matrices While some factorization results are relatively direct, others are iterative While some factorization
More informationA New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
More informationMATRIX ALGEBRA AND SYSTEMS OF EQUATIONS
MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a
More informationOPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
More informationLINEAR ALGEBRA. September 23, 2010
LINEAR ALGEBRA September 3, 00 Contents 0. LU-decomposition.................................... 0. Inverses and Transposes................................. 0.3 Column Spaces and NullSpaces.............................
More informationAdaptive Linear Programming Decoding
Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006
More informationSketch As a Tool for Numerical Linear Algebra
Sketching as a Tool for Numerical Linear Algebra (Graph Sparsification) David P. Woodruff presented by Sepehr Assadi o(n) Big Data Reading Group University of Pennsylvania April, 2015 Sepehr Assadi (Penn)
More informationTHE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS
THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear
More informationLecture 7: NP-Complete Problems
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit
More information