Low Complexity Encoding for Network Codes Yuval Cassuto Michelle Effros Sidharth Jaggi.

Slides:



Advertisements
Similar presentations
An Easy-to-Decode Network Coding Scheme for Wireless Broadcasting
Advertisements

Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers Kiran Kedlaya Sergey Yekhanin MIT Microsoft Research.
Digital Fountain Codes V. S
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li Institute of Network Coding (INC) The Chinese University of Hong Kong October 19, 2011 IEEE Information.
Multicut Lower Bounds via Network Coding Anna Blasiak Cornell University.
On Large-Scale Peer-to-Peer Streaming Systems with Network Coding Chen Feng, Baochun Li Dept. of Electrical and Computer Engineering University of Toronto.
Network coding techniques Elena Fasolo Network coding techniques Elena Fasolo PhD Student - SIGNET Group Wireless Systems - Lecture.
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
Fighting Byzantine Adversaries in Networks: Network Error-Correcting Codes Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
Resilient Network Coding in the presence of Byzantine Adversaries Michelle Effros Michael Langberg Tracey Ho Sachin Katti Muriel Médard Dina Katabi Sidharth.
Network Coding Theory: Consolidation and Extensions Raymond Yeung Joint work with Bob Li, Ning Cai and Zhen Zhan.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
FIGHTING ADVERSARIES IN NETWORKS Michelle Effros Michael Langberg Tracey Ho Philip Chou Kamal Jain Muriel Médard Dina Katabi Peter Sanders Ludo Tolhuizen.
Deterministic Network Coding by Matrix Completion Nick Harvey David Karger Kazuo Murota.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Processing Along the Way: Forwarding vs. Coding Christina Fragouli Joint work with Emina Soljanin and Daniela Tuninetti.
Forward Error Correction. FEC Basic Idea Send redundant data Receiver uses it to detect/correct errors Reduces retransmissions/NAKs Useful when RTT is.
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
Distributed zero-error network coding Tracey Ho Michelle Effros Sidharth Jaggi.
Optimal Multicast Algorithms Sidharth Jaggi Michelle Effros Philip A. Chou Kamal Jain.
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
Collecting Correlated Information from a Sensor Network Micah Adler University of Massachusetts, Amherst.
The Role of Specialization in LDPC Codes Jeremy Thorpe Pizza Meeting Talk 2/12/03.
Network Coding: Mixin’ it up Sidharth Jaggi Michelle Effros Michael Langberg Tracey Ho Philip Chou Kamal Jain Muriel MédardPeter Sanders Ludo Tolhuizen.
CS774. Markov Random Field : Theory and Application Lecture 10 Kyomin Jung KAIST Oct
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
Feng Lu Chuan Heng Foh, Jianfei Cai and Liang- Tien Chia Information Theory, ISIT IEEE International Symposium on LT Codes Decoding: Design.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Correlation testing for affine invariant properties on Shachar Lovett Institute for Advanced Study Joint with Hamed Hatami (McGill)
On coding for networks with errors Tracey Ho Caltech BIRS, August 2011.
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Information and Coding Theory Linear Block Codes. Basic definitions and some examples. Juris Viksna, 2015.
Zeev Dvir Weizmann Institute of Science Amir Shpilka Technion Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits.
Resilient Network Coding in the Presence of Eavesdropping Byzantine Adversaries Michael Langberg Sidharth Jaggi Open University of Israel ISIT 2007 Tsinghua.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Fields: Defns “Closed”: a,b in F  a+b, a.b in F Properties: – Commutative: a+b=b+a, a.b=b.a – Associative: a+(b+c)=(a+b)+c, a.(b.c) = (a.b).c – Distributive:
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Correction of Adversarial Errors in Networks Sidharth Jaggi Michael Langberg Tracey Ho Michelle Effros Submitted to ISIT 2005.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Erasure Coding for Real-Time Streaming Derek Leong and Tracey Ho California Institute of Technology Pasadena, California, USA ISIT
Some new(ish) results in network information theory Muriel Médard RLE EECS MIT Newton Institute Workshop January 2010.
Transmission over composite channels with combined source-channel outage: Reza Mirghaderi and Andrea Goldsmith Work Summary STATUS QUO A subset Vo (with.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
Generating a d-dimensional linear subspace efficiently Raphael Yuster SODA’10.
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Key insight.  With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation  Responding to ACK of the.
Network Coding Tomography for Network Failures
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
The Message Passing Communication Model David Woodruff IBM Almaden.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Network coding techniques
Game Theory Just last week:
Distributed Network Codes
Network Coding and its Applications in Communication Networks
General Strong Polarization
Background: Lattices and the Learning-with-Errors problem
General Strong Polarization
§2-2 Controllability of Linear Dynamical Equations
Indistinguishability by adaptive procedures with advice, and lower bounds on hardness amplification proofs Aryeh Grinberg, U. Haifa Ronen.
Chapter 3 Canonical Form and Irreducible Realization of Linear Time-invariant Systems.
§2-2 Controllability of Linear Dynamical Equations
General Strong Polarization
General Strong Polarization
Presentation transcript:

Low Complexity Encoding for Network Codes Yuval Cassuto Michelle Effros Sidharth Jaggi

Obligatory Example/History s t1t1 t2t2 b1b1 b2b2 b2b2 b2b2 b1b1 b1b1 b1b1 b1b1 b1b1 b1b1 (b 1,b 2 ) b 1 +b 2 (b 1,b 2 ) [ACLY00] [ACLY00] Characterization Non-constructive [LYC03], [KM02] Constructive (linear) Exp-time design [JCJ03], [SET03] Poly-time design Centralized design [HKMKE03], [JCJ03] Decentralized design SIMPLERSIMPLER... C=2 [This work] All the above, plus optimal implementation complexity.

Complexity b1b1 b2b2 bmbm β1β1 β2β2 βkβk F(2 m )-linear network [KM02],[HKMKE03],… Source:- Group together `m’ bits, Every node:- Perform linear combinations over finite field F(2 m )

Complexity “Thm”: For any algebraic code, at least half the β matrices in F(2 m ) have at least m 2 /2 non-zero elements Randomly chosen algebraic encoders require O(m 2 ) bit operations [HKMKE03],… = …,[JEHM04],… [KKHRM05]

Simplicity – Permute-and-add “Thm”: With “high” probability, permute-and-add codes have “almost” the same performance as algebraic codes Permute-and-add encoders require O(m) bit operations Tight! “Thm”: To achieve capacity, need O(m) bit operations = Permutation matrix (sparse)

Simplicity – Permute-and-add “Thm”: With “high” probability, permute-and-add codes have “almost” the same performance as algebraic codes Permute-and-add encoders require O(m) bit operations Tight! “Thm”: To achieve capacity, need O(m) bit operations = Loss of information

Permute-and-add Codes m “sufficiently” large  b1b1 b2b2 bmbm b’ 1 b’ 2 b’ m b’’ 1 b’’ 2 b’’ m  ’’  ’’ Uniformly at random b2b2 b1b1 bmbm b’ 1 b’ m b’ 2 b’’ m b’’ 1 b’’ 2

Permute-and-add Codes   ’’  ’’ Uniformly at random b2b2 b1b1 bmbm b’ 1 b’ m b’ 2 b’’ m b’’ 1 b’’ 2   Transfer matrix

Permute-and-add Codes Percolate transfer matrices across successive cutsets (in header) If each transfer matrix full rank, Final transfer matrices full rank Decode by inverting final transfer matrix, QED Not true, with probability c > 0

Permute-and-add Codes m “sufficiently” large Each transfer matrix “almost” full rank, Final transfer matrices “almost” full rank Decode by inverting final transfer matrix, QED Pr π [Row rank > (1-ε m ) fraction] > 1-2 -O(mε m ) Pr π [Row rank > (1-|E|ε m ) fraction] > 1-|T||E|2 -O(mε m ) R=C- |E|ε m - ε m Pr π [Final transform invertible] > 1-(|T||E|+1)2 -O(mε m ) (1-|E|ε m ) fraction (1-ε m ) fraction Thm: Permute-and-add codes achieve R=C-(|E|+1)ε m, Pr > 1-(|T||E|+1)2 -O(mε m )

Proof of Lemma Transform I L 1,L 2 Gaussian Elimination “Almost” full rank, w.h.p.

The End/Where now? Low-complexity decoding? Fewer packets encoded together at nodes? Same permutation at each node? Zero-error/Deterministic? Permute-and-add Vs. Algebraic [HKMKE03] RateAlmost Same (ε loss) Probability of errorAlmost same (smaller exp) Block-lengthAlmost same (1/ε increase) Simple Distributed DesignDitto Implementation ComplexityQuadratically better Randomness requiredQuadratically better