network coding and its applications in communication networks
DESCRIPTION
Network Coding and its Applications in Communication Networks. Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering Texas A&M University. NP-hardness result. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/1.jpg)
1
Network Coding and its Applications in Communication
Networks
Alex Sprintson
Computer Engineering GroupDepartment of Electrical and
Computer EngineeringTexas A&M University
![Page 2: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/2.jpg)
NP-hardness result
Lemma (Rasala et. al. 2003). Deciding whether there exists a linear network code with alphabet size q for a multicast network coding instance is NP-hard when q is a prime power.
![Page 3: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/3.jpg)
NP-hardness result
Proof: Reduction from the chromatic number problem
s
s1 s2 s3 s4
T3T1T4 T5T2
S1
S2 S3
S4
qmin= least prime power > X(G)-1
y
x+1*y
yx y
x+y S1
S2
S4
S3
x+0*y
![Page 4: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/4.jpg)
Cyclic networks
In certain settings, cycles are necessary
s s
t1 t2
Acyclic Network Networks with Cycles
t1 t2
s
t1 t2
![Page 5: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/5.jpg)
Quiz
Given a network (G,s,T) with minimum cut h, is it possible to transmit h packets to all T terminals if each link can only transmit one packet?
Always yes, if the network is acyclics
a b
a
a
b
aÅb
t1 t2
![Page 6: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/6.jpg)
Quiz
Sometimes, if the network has cycles
t1 t2
a
a
a
b
b
b
t1 t2
a b
a
a b
ba
aÅb
aÅb
aÅbaÅb
![Page 7: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/7.jpg)
Quiz
These networks are not really cyclic:
t1 t2
s
a b
a
a b
ba
aÅb
aÅb
aÅbaÅb
v
t1 t2
s
a b
a
a b
ba
aÅb
aÅb
aÅb
aÅb
v
![Page 8: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/8.jpg)
Quiz
A example of a “truly” cyclic network We prove: it is impossible to send two
packets in one round to all destinations
t1 t2
s
a b
a
a b
bx y
x
xy
y
Proof: By way of contradiction
![Page 9: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/9.jpg)
Quiz
Let e be the first link of the cycle v1->v2->v3->v4->v1 that transmits a packet.
Case study. If e=(v1,v2) then t1 gets no information about b
t1 t2
s
a b
a
a b
bx y
x
xy
y
v1
v2
v3
v4
![Page 10: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/10.jpg)
Solution
We have shown that it is not possible to send two packets in one round to both terminals
However, it is possible to send 2n packets in n+1 rounds
Asymptotically, the rate is two packets per round
Use convolution codes
![Page 11: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/11.jpg)
Convolution Codes
Idea: mix messages from different rounds
t1 t2
s
a b
a
a b
bx y
x
xy
xi=aiÅyi-1=aiÅbi-1Åxi-2=aiÅbi-1Åai-2Åyi-3=aiÅbi-1Åai-2Åbi-3 . . . Åa2Åb1
yi=biÅxi-1=biÅai-1Åyi-2=biÅai-1Åbi-2Åxi-3=biÅai-1Åbi-2Åai-3 . . . Åb2Åa1
Å
otherwise
1 if
1
1
ii
i ya
iax
Å
otherwise
1 if
1
1
ii
i xb
iby
![Page 12: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/12.jpg)
Convolution Codes
Recovery at terminal t1
t1
x
a
Å
otherwise
1 if
1
1
ii
i ya
iax
a1
ÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅ
otherwise...
even is if...
123321
1234321
abababa
ibabababax
iiii
iiii
i
1 2 3 4
a2
b1
a3 a4
b2 b3
5
a5
b4
![Page 13: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/13.jpg)
13
Algebraic framework
t1 t2 t3 t4 t5 t6
z1 z2 z3 z4
s x2x1
=
z1
z2
z3
z4
a11 a12
a22a21
a31 a32x2x1
a41 a42
Ax=z
Observation: Any two rows of matrix A must be linearly independent
aij,xi,ziGF(2n)
![Page 14: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/14.jpg)
14
Algebraic framework (cont.)
A4x=z
Observation: Matrices A1, A2,…,Ak must be of full rank (invertible)
t3
=
z1
z2
z3
a11a21a31
x2
x1
G
s
t1
t2t4
t5
z82
z64
z54
a12a22a32
a13a23a33
x3
y11
y12y21
y22
y23
z31y41
z42 y43
y44
y51
y52
y61
y62 y71
z73
z74
y75
y81z82
z83z84
z91
y24
y11=b1x3+b2y24
y4 y1y2
x2 x3x1
![Page 15: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/15.jpg)
- the collection of () packets generated at node
- Packets transmitted on link e
- Packets received by the destination node
15
Notation
All operations in the network are linear
Y(e)
![Page 16: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/16.jpg)
16
Intermediate source
All operations in the network are linear
Y(e1) Y(e2)
Y(e3)
X(v,l)
At the intermediate nodes
![Page 17: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/17.jpg)
17
Receiver node
Y(e1) Y(e2)
Z(e3)
![Page 18: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/18.jpg)
18
Example 1
![Page 19: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/19.jpg)
Example 2
![Page 20: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/20.jpg)
Transfer matrix
2,1,
2,1,
55
44
00
00
00
ee
ee
B
![Page 21: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/21.jpg)
Transfer matrix
Observation: The information propagates throughout networks on paths with different length.
Length of the path - the number of hops between the source and the tail of the edge.
For example, for edge e5 there are two paths - one through path (e2,e5) and one through path (e1,e3,e5)
![Page 22: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/22.jpg)
Transfer matrix
Let be the vector of packets transmitted over all links
Let be the contribution (gain) of paths on length i:
Note that
0i ,,,,,54321
ie
ie
ie
ie
ie
i YYYYYY
54321
,,,, eeeee YYYYYY
...210 YYYY
![Page 23: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/23.jpg)
Transfer matrix
00010
00001 ,,,, 21
00000
0
54321
XXYYYYY
AXY
eeeee
Contribution of paths of length zero:
![Page 24: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/24.jpg)
Contribution of paths of length one
00000
00000
0000
0000
000
00010
00001
00000
00000
0000
0000
000
,,,,,,,,
53
52
4131
53
52
4131
5432154321
21
0000011111
01
ee
ee
eeee
ee
ee
eeee
eeeeeeeeee
XX
YYYYYYYYYY
FAXFYY
![Page 25: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/25.jpg)
Contribution of paths of length two
00000
00000
00000
00000
0000
00010
00001
00000
00000
0000
0000
000
,,,,,,,,
5331
53
52
4131
5432154321
21
1111122222
220112
eeee
ee
ee
eeee
eeeeeeeeee
XX
YYYYYYYYYY
FAXFYYFYY
![Page 26: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/26.jpg)
Transfer matrix
00010
00001 ,,,, 21
00000
54321
XXYYYYY eeeee
00000
00000
0000
0000
000
00010
00001 ,,,,
53
52
4131
54321 2111111
ee
ee
eeee
eeeee XXYYYYY
00000
00000
00000
00000
0000
00010
00001 ,,,,
5331
54321 2122222
eeee
eeeee XXYYYYY
![Page 27: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/27.jpg)
Transfer matrix
10
01
00
00
00
00000
00000
00000
00000
0000
00000
00000
0000
0000
000
10000
01000
00100
00010
00001
00010
00001
,,,,
5331
53
52
4131
5431
21
2
eeee
ee
ee
eeee
eeeee
XX
YYYYY
![Page 28: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/28.jpg)
Transfer matrix
10
01
00
00
00
,,,,5432121 eeeee YYYYYZZ
10
01
00
00
00
00000
00000
00000
00000
0000
00000
00000
0000
0000
000
10000
01000
00100
00010
00001
00010
00001
5331
53
52
4131
21
21
eeee
ee
ee
eeee
XX
ZZ
![Page 29: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/29.jpg)
Transfer matrix
10
01
00
00
00
10000
01000
0100
0010
01
00010
00001
53
52
53314131
2121 ee
ee
eeeeeeee
XXZZ
2121 0
52
533141 ZZXXee
eeeeee
TBFFIAM ...)( 2
![Page 30: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/30.jpg)
Transfer matrix
![Page 31: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/31.jpg)
Transfer matrix
10
01
00
00
00
10000
01000
0100
0010
01
00010
00001
53
52
53314131
2121 ee
ee
eeeeeeee
XXZZ
0
52
533141
2121
ee
eeeeeeXXZZ
TBFFIAM ...)( 2
![Page 32: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/32.jpg)
Linear network system
![Page 33: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/33.jpg)
![Page 34: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/34.jpg)
34
Example 3
Point-to-point connections
![Page 35: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/35.jpg)
35
Example 3
![Page 36: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/36.jpg)
36
Point-to-Point connections
Define matrices A, B, and M
![Page 37: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/37.jpg)
37
Point-to-Point connections
Idea: Choose parameters in an extension field such that the determinant of
is nonzero over
Then, we can set A to be the identity matrix and B so that M is the identity matrix
![Page 38: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/38.jpg)
38
Critical property
The equation
Admits a choice of variables over so that the polynomial does not evaluate to zero!!
![Page 39: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/39.jpg)
39
Point-to-Point connections
A possible solution:Set
And set to be equal zero.
Equivalent to finding three disjoint paths between s and t!
![Page 40: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/40.jpg)
An algebraic max flow min cut condition
[KM01, 02, 03]
![Page 41: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/41.jpg)
41
Recap (from Wikipedia)
( )
![Page 42: Network Coding and its Applications in Communication Networks](https://reader036.vdocument.in/reader036/viewer/2022062408/56813fed550346895daaf0dd/html5/thumbnails/42.jpg)
42
Polynomial Ring
Let F be a field. The set of all polynomials with coefficients in the field F, together with the addition and the multiplication forms itself a ring, the polynomial ring over F, which is denoted by F[X].