Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures



Similar documents
Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Availability-Based Path Selection and Network Vulnerability Assessment

Wireless Inter-Session Network Coding - An Approach Using Virtual Multicasts

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Optimization of network mesh topologies and link capacities for congestion relief

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

Sngle Snk Buy at Bulk Problem and the Access Network

Secure Network Coding Over the Integers


1 Example 1: Axis-aligned rectangles

What is Candidate Sampling

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

An Alternative Way to Measure Private Equity Performance

Efficient Project Portfolio as a tool for Enterprise Risk Management

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Recurrence. 1 Definitions and main statements

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

J. Parallel Distrib. Comput.

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

Enabling P2P One-view Multi-party Video Conferencing

A Secure Password-Authenticated Key Agreement Using Smart Cards

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

An Interest-Oriented Network Evolution Mechanism for Online Communities

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)

Multi-Source Video Multicast in Peer-to-Peer Networks

DEFINING %COMPLETE IN MICROSOFT PROJECT

The Greedy Method. Introduction. 0/1 Knapsack Problem

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

Traffic State Estimation in the Traffic Management Center of Berlin

This circuit than can be reduced to a planar circuit

A Lyapunov Optimization Approach to Repeated Stochastic Games

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

Relay Secrecy in Wireless Networks with Eavesdropper

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

BERNSTEIN POLYNOMIALS

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

A Performance Analysis of View Maintenance Techniques for Data Warehouses

Traffic Engineering without Congestion Hot Spots in MPLS

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

How To Calculate An Approxmaton Factor Of 1 1/E

Network Security Situation Evaluation Method for Distributed Denial of Service

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

Energy Conserving Routing in Wireless Ad-hoc Networks

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

RequIn, a tool for fast web traffic inference

Research of Network System Reconfigurable Model Based on the Finite State Automation

8 Algorithm for Binary Searching in Trees

A New Paradigm for Load Balancing in Wireless Mesh Networks

An Efficient Recovery Algorithm for Coverage Hole in WSNs

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

QoS-Aware Active Queue Management for Multimedia Services over the Internet

On Secrecy Capacity Scaling in Wireless Networks

Calculation of Sampling Weights

An agent architecture for network support of distributed simulation systems

Generalizing the degree sequence problem

Dynamic Routing in Self-Healing MPLS Networks

Support Vector Machines

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

General Auction Mechanism for Search Advertising

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

Virtual Network Embedding with Coordinated Node and Link Mapping

Ad-Hoc Games and Packet Forwardng Networks

On the Interaction between Load Balancing and Speed Scaling

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

Forecasting the Direction and Strength of Stock Market Movement

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Retailers must constantly strive for excellence in operations; extremely narrow profit margins

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

On the Interaction between Load Balancing and Speed Scaling

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Transcription:

Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng SNS College of Technology,Combatore. ashlyj89gmal.com 2 Professor,Department of Computer Scence Engneerng SNS College of Technology,Combatore. sadshsendl@yahoo.com 3 HOD,Department of CSE, SNS College of Technology,Combatore, kkarthkraja@yahoo.com Abstract-Protectng nodes aganst lnk falures n communcaton networks(both uncast and multcast) s essental to ncrease robustness, accessblty, and relablty of data transmsson. The use of network codng algorthm offers, establshng relable uncast connectons across a communcaton network wth non-unform edge capabltes. The Proposed System addresses the task of multcast communcaton usng usng the concept of network codng n the presence of passve eavesdroppers and actve jammers. Despte the complexty ntroduced by dstrbuted network codng, recently, t has been shown that ths rate can also be acheved for multcastng to several snks provded that the ntermedate nodes are allowed to re-encode the nformaton they receve. Index Terms- Instantaneous recovery, network codng, relable communcaton, uncast,multcast. I.INTRODUCTION In today's practcal communcaton networks such as the Internet, end-to-end nformaton delvery s performed by routng,.e., by havng ntermedate nodes store and forward packets. Note though, routng does not encompass all operatons that can be performed at a node.the ssue of relably transportng data from a sngle orgnal source to multple nterested recpents, partcularly when the recever set s large, s one of growng promnence. Recently, the noton of network codng arses as a very mportant promsng generalzaton of routng.network codng refers to a scheme where a node s allowed to generate output data by encodng (.e., computng certan functons of) ts receved data. Thus, network codng allows nformaton to be mxed", n contrast to the tradtonal routng approach where each node smply forwards receved data. Potental advantages of ths generalty of network codng over routng are many fold: resource effcency, computatonal effcency, and robustness to network dynamcs.network codng s potentally applcable to many forms of network communcatons. Up to now, the best understood scenaro where network codng offers unque advantages s multcastng n a communcaton network. A sgnfcant effort has been devoted to mprovng the reslence of communcaton networks to falures and ncreasng ther survvablty. Edge falures are frequent n communcaton networks due to the nherent vulnerablty of the communcaton nfrastructure. Wth the dramatc ncrease n data transmsson rates, even a sngle falure may result n vast data losses and cause major servce dsruptons for many users. Accordngly, there s a sgnfcant nterest n mprovng network recovery mechansms that enable a contnuous flow of data from the source to the destnaton wth mnmal damage n the event of a falure. Edge falures may occur due to several reasons, such as physcal damage, msconfguraton, or a human error. Networks are typcally desgned to be wthstand aganst a sngle edge falure. Indeed, protecton from multple falures ncurs hgh costs n terms of network utlzaton, whch s usually not justfed by the rare occurrence of such falures. we consdered the problem of establshng relable uncast (sngle-source sngle-destnaton) connectons across a communcaton 674

network wth nonunform edge capactes. Our goal s to provde nstantaneous recovery from sngle edge falures. Here focus on two cases of practcal nterest: 1) Backup protecton of a sngle flow that can be splt up to two subflows; and 2) shared backup protecton of two uncast flows. The nstantaneous recovery mechansms ensure a contnuous flow of data from the source to the destnaton node, wth no nterrupton or data loss n the event of a falure. Such mechansms elmnate the need of retransmsson and reroutng. Instantaneous recovery s typcally acheved by addng redundant packets and by routng packets over multple paths n a way that ensures that the destnaton node can recover the data t needs form the receved packets. Instantaneous recovery s typcally acheved by addng redundant packets and by routng packets over multple paths n a way that ensures that the destnaton node can recover. Fg.2. Dversty-Codng method for h=2. The dversty codng technque extends the dedcated path protecton scheme by usng multple dsjont paths for sendng the data. Ths technque can be used for protectng a sngle uncast connecton or for shared backup protecton of two or more uncast connectons (Fg.2). In the case of a sngle uncast connecton, the nformaton flow s splt nto two or more subflows, and each subflow uses a separate path to reach the destnaton. Fg.1. Dedcated path protecton method There are several technques to acheve nstantaneous recovery. A standard approach s to use the 1+1 dedcated path protecton scheme. Ths approach requres provsonng of two dsjont paths p1 and p2 between s and t. Each packet generated by the source node s sent over both paths, p1 and p2(fg. 1). In the case of a sngle edge falure, at least one of the paths remans operatonal, hence the destnaton node wll be able to receve the data wthout nterrupton. Wth ths scheme, both p1 and p2 must be of capacty at least h. Sngle edge falure, at least one of the paths remans operatonal, hence the destnaton node wll be able to receve the data wthout nterrupton. Wth ths scheme, both p1 and p2 must be of capacty at least h. Whle the dedcated path protecton scheme s smple and easy to mplement, t ncurs hgh communcaton overhead due to the need to transmt two copes of each packet. The dedcated path protecton scheme s smple and easy to mplement, t ncurs hgh communcaton overhead due to the need to transmt two copes of each packet. In addton, t requres the exstence of two dsjont paths, each of capacty h between s and t. some examples shows a dversty codng scheme that uses three dsjont pathsp1, P2, and P3 of capacty one between s and t to protect a uncast flow of rate two packets per communcaton round. In ths example, the flow s splt nto two subflows that use paths P1 and P2 to send data to the destnaton, whle path P3 serves as a shared backup protecton for these subflows. The network codng approach generalzes both the dedcated protecton and the dversty codng approach. In partcular, t enables shared backup protecton of multple uncast connectons and does not requre multple lnkdsjont paths between the source and destnaton nodes. The network, edges (s,v1) and (s,v2)are of capacty two, whle all other edges are of unt capacty. Our goal s to establsh a uncast connecton that delvers two packets from s to t per communcaton round. Thus ths paper ncludes a robust network code for both uncast and multcast networks can be establshed through the standard network codng algorthm.by dvdng the smple network nto blocks,t s possble to route the packets effcently n the case when h=2 and also when h>2.some mprovements on the exstng network codng algorthm s done for effcently handlng the above mentoned functonaltes. We also address the problem of effcent allocaton of network resources for a robust codng network. 675

by removng an edge or decreasng the capacty of an edge s no longer feasble. It s easy to verfy that the capacty of each edge n a mnmal network s bounded by h. Related work The network codng technque has been ntroduced n the semnal paper of Ahlswede et al. [3]. Intal work on network codng has focused on multcast connectons. It was shown n [3] that the maxmum rate of a multcast network s equal to the mnmum total capacty of a cut that separates the source from a termnal. Ths maxmum rate can be acheved by usng lnear network codes [8]. Ho et al. [9] showed that the maxmum rate can be acheved by usng random lnear network codes. Jagg et al. [10] proposed a determnstc polynomal-tme algorthm for fndng feasble network codes n multcast networks. They showed that f the network has a suffcent capacty to recover from each falure scenaro (e.g., by reroutng) then nstantaneous recovery from each falure scenaro can be acheved by employng lnear network codes. A. Our contrbuton In ths paper we propose effcent algorthms for constructon of robust network codes over small fnte felds. We consder two major cases. In the frst case, we assume that all edges of the network have unform capacty, whle n the second case the capacty of network edges can vary. For the frst case we present an effcent network codng algorthm that dentfes a robust network code over a small feld. The algorthm takes advantage of specal propertes of Maxmum Rank Dstance (MRD) codes [13]. For the second case, we focus on settngs n whch the source node needs to delver two packets per tme unt to all termnals. We show that n ths case, a specal topologcal propertes of robust codng networks can be exploted for constructng a network code over a small fnte feld. II MODEL A. Multcast Network A multcast network N that uses a drected acyclc graph G(V,E) to send data from source s to a set T of k destnaton nodes {t1,..., tk} V. The data s delvered n packets. We assume that each packet s an element of a fnte feld Fq = GF(q). We also assume that the data exchange s performed n rounds, such that each edge e E can transmt c(e) packets per communcaton round. We assume that c(e) s an nteger number and refer to t as the capacty of edge e. At each communcaton round, the source node needs to transmt h packets R = (p1, p2,..., ph) T from the source node s V to each destnaton node t T. We refer to h as the rate of the multcast connecton. It was shown n [3] and [8] that the maxmum rate of the network,.e., the maxmum number of packets that can be sent from the source s to a set T of termnals per tme unt, s equal to the mnmum capacty of a cut that separates the source s from a termnal t T. Accordngly, we say that a multcast network N s feasble f any cut that separates s and a termnal t T has at least h edges. We say that a codng network N s mnmal f any network formed from N B. Codng Networks For clarty of presentaton, we defne an auxlary graph ˆG(V,A) formed by the network graph G(V,E) by substtutng each edge e E by c(e) parallel arcs that have the same tal and head nodes as e; each arc can transmt one packet per communcaton round. We denote by A(e) A the set of arcs that correspond to edge e. In what follows we only refer to packets sent at the current communcaton round. The packets sent n the subsequent rounds are handled n a smlar manner. C. Robust Codng Networks Snce a faled edge e cannot transmt packets, we assume that the encodng functon fa of each arc a A(e) s dentcally equal to zero,.e., fa 0. To guarantee nstantaneous recovery, t s suffcent to ensure that for each edge falure there exsts a set of h lnearly ndependent packets receved by t. We dstngush between two types of robust networks codes. In strongly robust network codes the local encodng coeffcents of all arcs n A reman the same, except for the arcs A(e) that correspond to the faled edge e whch are assgned zero encodng coeffcents. In weakly robust network codes, the arcs that are located downstream of the faled edge e are allowed to change ther encodng coeffcents, whle all the encodng coeffcents that correspond to other edges must reman the same. III. STRONGLY ROBUST CODES FOR NETWORKS WITH UNIFORM CAPACITIES All edges are of the network have unform capacty c,.e., each edge can send exactly c packets per tme unt. We present an effcent algorthm that can construct a robust network code over a fnte feld of sze O(k). We observe that wthout loss of generalty, we can assume that the capacty of each edge s one unt. Indeed, a feasble network code for unt capacty edges can be extended nto the case n whch the capacty of each edges s equal to c by combnng c communcaton rounds nto a sngle round. In [10] t was shown that communcaton at rate h wth nstantaneous recovery from sngle edge falures s possble f and only f for each edge e E, t holds that the network G (V,E ) formed from G(V,E) by removng e, contans at least h edge-dsjont paths from source s to each termnal node t T. Ths mples that a necessary and suffcent condton for the feasblty of network N s the exstence of h+1 edgedsjont paths between s and each t T. Our approach can be summarzed as follows. Frst, we generate a specal party check packet, referred to as ph+1. Ths packet s a lnear combnaton of the orgnal packets and s constructed as descrbed n Secton III-A. Then, we use a standard network codng algorthm due to Jagg et al. [10] for sendng ˆR = {p1, p2,..., ph, ph+1} 676

IV. NETWORK WITH NON-UNIFORM CAPACITIES packets from s to T. The standard algorthm wll treat the packets n ˆR as generated by ndependent random processes. The algorthm ensures that n the normal network condtons, each destnaton node receves h + 1 ndependent lnear combnaton of the packets n ˆR. The followng lemma shows that after a sngle edge falure, each destnaton node receves at least h lnearly ndependent combnatons of packets n ˆR. Lemma 1: Upon an edge falure, each termnal t T receves at least h lnear combnatons of packets n ˆR. Proof: Snce we assume that all edges are of unt capacty, each edge n the network can be represented by a sngle arc. For each arc a A we defne the global encodng vector that captures the relaton between the packet pa transmtted on arc a and the orgnal packets n ˆR: h + 1 = 1 p = p γ e. e Let t be a termnal n T. We defne the transfer matrx Mt that captures the relaton between the orgnal packets R and the packets receved by the termnal node t T over ts ncomng edges. The dfferent network edges have dfferent capactes. We focus on a specal case n whch only two packets need to be delvered from the source to all termnals at each communcaton round. The desgn of robust network codes for h = 2 n the context of uncast connectons has been studed n [11]. In ths work, we buld on the results of [22] for constructng a robust network code for multcast connectons. Let G(V,E) be a mnmum robust codng network,.e, a feasble robust network such that the removal of an edge or a reducton n the capacty of an edge results n a volaton of ts feasblty. Note that the capacty of any edge e E s at most two. For each termnal t T let Gt(Vt,Et) to be a subgraph of G(V,E) that contans a mnmum codng network wth respect to termnal t. That s, Gt(Vt,Et) only contans edges of G(V,E) that are necessary to guarantee the condtons defned by Equaton 1 for termnal t. Furthermore, any reducton of the capacty of edges n Gt(Vt,Et) wll result n a volaton of ths condton for at least one of the (s, t) cuts. V. CONCLUSION A. Creatng party check packet Lemma 1 mples that n the event of any sngle edge falure, each termnal node receves at least h ndependent lnear combnatons of the packets n {p1, p2,..., ph, ph+1}. Snce packet ph+1 s a lnear combnaton of h orgnal packets R = {p1, p2,..., ph}, each destnaton nodes receves, n fact, h lnear combnatons of R. Accordngly, our goal s to construct packet ph+1 n such a way that each destnaton node receves h ndependent lnear combnatons of R. Ths wll allow each destnaton node to decode the orgnal packets. For clarty of presentaton we frst focus on the case of h = 2. In ths case we have two orgnal packets, p1 and p2, and one party check packet p3 = γ1 p1+γ2 p2. Suppose that a termnal t T receves two lnearly ndependent combnatons of p1, p2, and p3. B. General case We turn to consder a more general case of h > 2. Snce we need to only recover from a sngle falure, we need to fnd a (h + 1, h) MRD code. For ths case, we can use the party check matrx [13]: 2 h H = α, α, Kα,1 over the feld GF(qh+1), wth h p h + 1 = α p = 1 We summarze our results by the followng theorem: Theorem 1: The proposed scheme acheves an nstantaneous recovery from any sngle edge falure. Proof: Follows drectly from the propertes of MRD codes [13]. Ths paper addressed the problem of constructng robust network codes for uncast networks,.e., codes that enable nstantaneous recovery from sngle edge falures. There s need to obtan the same results for multcast connectons also. But the networks where the achevable rates obtaned by codng at ntermedate nodes are arbtrarly larger s not allowed. An effcent network codng algorthm based on the MRD codes that requres a small fnte feld O(k)can be used. For the case of nonunform capactes, we focused on a specal case of h = 2 and showed that t s also possble to construct a robust code over a small feld. Future research ncludes the constructon of network codes wth non-unform capactes and transmsson of more than two packets per communcaton round. REFERENCES [1] W.D.Grover.,Ho. lugmesh-based Survvable Transport Networks:Optons and Strateges ntented for Optcal,MPLS,SONET and ATM Networkng.Prentce- Hall,New York,NY,USA,2003 [2] E.Ayanoglu,C.L.I.R.D.Gtln And J.E.Mazo.Dversty codng for transparent self-healng and fault-tolerent communcaton networks. IEEE Transactons on communcatons,41,(11):1677, 1686,1993. [3] R.Ahlswede,N.Ca,S.Y.R.L,and R.w.Yeung.Network Informaton Flow,IEEE Transactons on Informaton Theory,46(4):1204-1216,2000. 677

[4] R.Kotter and M.Medard.An Algebrac Approach to Network Codng.IEEE/ACM Transactons On Networkng, 11(5):782-795,2003. [5] T.Ho,M.Medara, and R.Koetter.An Informaton Theoretc vew of Network Management.IEEE Transactons on Informaton Theory,51(4),Aprl 2005. [6] Desmond S Lun,Murel Medard,Ralf Kotter, and Mchelle Effros.Further results on codng for Relable communcaton over packet networks. In IEEE Internatonal Symposum on Informaton Theory (ISIT 05),2005. [7] Desmond S.Lun,Murel Medard, and Mchelle Effros, On codng for relable communcaton Over packet networks.in Proc.42 nd Annual Allerton Conference on Communcaton, Control,And Computng,Sept- Oct.2004,Invted,2004. [8] S.Y.R.L,R.W.Yeung,and N.Ca.Lnear Network Codng, IEEE Transactons on Informaton Theory,49(2):371-381,2003 [9] T.Ho,R.Kotter,M.Medard,D.Karger, and M.Effros. The Benefts of Codng Over Routng n a Randomzed Settng, In Proceedngs of the IEEE Internatonal Symposum on Informaton Theory,2003. [10] S. Jagg, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jan, and L. Tolhuzen. Polynomal Tme Algorthms for Multcast Network Code Constructon. To appear n IEEE Transactons on Informaton Theory, 2005. [11] S. Jagg, M. Langberg, S. Katt, T. Ho, D. Katab, R.C.N.M. Medard, and M. Effros. Reslent Network Codng n the Presence of Byzantne Adversares. IEEE Transactons on Informaton Theory, 54(6):2596 2603, June 2008. [12] D. Slva, F.R. Kschschang, and R. Koetter. A Rank- Metrc Approach to Error Control I Random Network Codng. Informaton Theory, IEEE Transactons on, 54(9):3951 3967, Sept. 2008. [13] E. Gabduln. Theory of codes wth maxmum rank dstance. Problems of Informaton Transmsson, 21(1):3 14, July 1985. 678