1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.

Slides:



Advertisements
Similar presentations
Lecture 7. Network Flows We consider a network with directed edges. Every edge has a capacity. If there is an edge from i to j, there is an edge from.
Advertisements

Packing Multicast Trees Philip A. Chou Sudipta Sengupta Minghua Chen Jin Li Kobayashi Workshop on Modeling and Analysis of Computer and Communication Systems,
1 Index Coding Part II of tutorial NetCod 2013 Michael Langberg Open University of Israel Caltech (sabbatical)
1 Fault-Tolerant Computing Systems #6 Network Reliability Pattara Leelaprute Computer Engineering Department Kasetsart University
Multicut Lower Bounds via Network Coding Anna Blasiak Cornell University.
The Maximum Network Flow Problem. CSE Network Flows.
Lectures on Network Flows
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2001 Lecture 4 Tuesday, 2/19/02 Graph Algorithms: Part 2 Network.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
1 Maximum flow problems. 2 - Introduction of: network, max-flow problem capacity, flow - Ford-Fulkerson method pseudo code, residual networks, augmenting.
Network Coding and Reliable Communications Group Network Coding for Multi-Resolution Multicast March 17, 2010 MinJi Kim, Daniel Lucani, Xiaomeng (Shirley)
Network Coding Theory: Consolidation and Extensions Raymond Yeung Joint work with Bob Li, Ning Cai and Zhen Zhan.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
Network Optimization Models: Maximum Flow Problems In this handout: The problem statement Solving by linear programming Augmenting path algorithm.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2001 Lecture 4 Tuesday, 10/2/01 Graph Algorithms: Part 2 Network.
Yangjun Chen 1 Network Flow What is a network? Flow network and flows Ford-Fulkerson method - Residual networks - Augmenting paths - Cuts of flow networks.
Deterministic Network Coding by Matrix Completion Nick Harvey David Karger Kazuo Murota.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
Page 1 Page 1 Network Coding Theory: Tutorial Presented by Avishek Nag Networks Research Lab UC Davis.
Lecture 8. Why do we need residual networks? Residual networks allow one to reverse flows if necessary. If we have taken a bad path then residual networks.
Mario Čagalj supervised by prof. Jean-Pierre Hubaux (EPFL-DSC-ICA) and prof. Christian Enz (EPFL-DE-LEG, CSEM) Wireless Sensor Networks:
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2004 Lecture 5 Wednesday, 10/6/04 Graph Algorithms: Part 2.
Optimal Multicast Algorithms Sidharth Jaggi Michelle Effros Philip A. Chou Kamal Jain.
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
Networking Seminar Network Information Flow R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network Information Flow. IEEE Transactions on Information.
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
CS774. Markov Random Field : Theory and Application Lecture 13 Kyomin Jung KAIST Oct
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
1 The edge removal problem Michael Langberg SUNY Buffalo Michelle Effros Caltech.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
1 CPSC 320: Intermediate Algorithm Design and Analysis July 11, 2014.
Yangjun Chen 1 Network Flow What is a network? Flow network and flows Ford-Fulkerson method - Residual networks - Augmenting paths - Cuts of flow networks.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
1 COMMONWEALTH OF AUSTRALIA Copyright Regulations 1969 WARNING This material has been reproduced and communicated to you by or on behalf.
1 Multicasting in a Class of Multicast-Capable WDM Networks From: Y. Wang and Y. Yang, Journal of Lightwave Technology, vol. 20, No. 3, Mar From:
Flow Algorithms Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Analysis of Algorithms Week 9, Lecture 2.
1 WEEK 11 Graphs III Network Flow Problems A Simple Maximum-Flow Algorithm Izmir University of Economics.
Network Information Flow Nikhil Bhargava (2004MCS2650) Under the guidance of Prof. S.N Maheshwari (Dept. of Computer Science and Engineering) IIT, Delhi.
Solving Network Coding Problems with Genetic Algorithmic Methods Anthony Kim Advisers: Muriel Medard and Una-May O’Reilly.
Maximum Flow Chapter 26. Flow Concepts Source vertex s – where material is produced Sink vertex t – where material is consumed For all other vertices.
CS223 Advanced Data Structures and Algorithms 1 Maximum Flow Neil Tang 3/30/2010.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
1 CS612 Algorithms for Electronic Design Automation CS 612 – Lecture 8 Lecture 8 Network Flow Based Modeling Mustafa Ozdal Computer Engineering Department,
20/10/ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu Institute of Network Coding Please.
CSCI 256 Data Structures and Algorithm Analysis Lecture 20 Some slides by Kevin Wayne copyright 2005, Pearson Addison Wesley all rights reserved, and some.
11 The Cost of Stability in Network Flow Games Ezra Resnick Yoram Bachrach Jeffrey S. Rosenschein.
Secret Sharing in Distributed Storage Systems Illinois Institute of Technology Nexus of Information and Computation Theories Paris, Feb 2016 Salim El Rouayheb.
1)Effect of Network Coding in Graphs Undirecting the edges is roughly as strong as allowing network coding simplicity is the main benefit 2)Effect of Network.
Maximum Flow Problem Definitions and notations The Ford-Fulkerson method.
The Maximum Network Flow Problem
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
TU/e Algorithms (2IL15) – Lecture 8 1 MAXIMUM FLOW (part II)
Maximum Flow Chapter 26.
Network Coding Beyond Network Coding
Network Coding and its Applications in Communication Networks
Algorithms and Networks
Edmonds-Karp Algorithm
Network Flow and Connectivity in Wireless Sensor Networks
Richard Anderson Lecture 21 Network Flow
Augmenting Path Algorithm
Algorithms (2IL15) – Lecture 7
Algorithms and Networks
Lecture 21 Network Flow, Part 1
Augmenting Path Algorithm
Richard Anderson Lecture 22 Network Flow
Presentation transcript:

1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades Department of Electrical Engineering Texas A&M University

2 Information vs. Commodity Flow b1b1 b1b1 b1b1 Replication b1b1 b2b2 b 1 + b 2 Encoding Replication Encoding

3 Network Coding t1t1t1t1 t2t2t2t2 abababab s1s1s1s1 s2s2s2s2 a b demands bdemands a Network Coding increases the throughput!

4 Recovery from Failures Input A graph G(V,E) Link capacities c(e) for  e  E Number of packets that can be transmitted by e per time unit source s  V, destination t  V. h packets need to be sent reliably from s to t. Goal: Ensure the destination node t receives h packets even if a link fails Link capacities tsu v a b

5 Coding for restoration Standard approach: Rerouting upon a failure t

6 Coding for restoration With network coding: Instantaneous recovery Do not need to change coding/routing

7 Coding Advantage t s 2 2 u v w cut Failure! How many packets can be sent reliably from s to t? With instantaneous recovery No rerouting Traditional approach One packet Network Coding Two packets

8 Resilient Capacity Resilient capacity Definition: Resilient capacity, C r, of a unicast network G(V,E) is the maximum number of packets that can be sent reliably from s to t. Necessary Condition: G(V,E) must have C r paths between s and t in G/e, for any e  E. Min-Cut Max-Flow: C r = m i n C ( s, t ) X e 2 E ( C ) c ( e ) ¡ max e 2 E ( C ) c ( e )

9 Achieving Capacity Resilient Capacity can be achieved by linear network coding [Koetter and Medard 03] Robust network codes can be found in polynomial time For multicast and unicast Jaggi et al. [04] Required field size O(k|E|) k is the number of terminals

10 Results: Focus on h=2 Introduce the concept of a simple unicast network Simple networks are minimal - every link is essential for achieving capacity Show that minimal network have a certain structure Use this structure to design robust network codes over GF(2)

11 Simple Unicast Network ts A simple network.  Lemma: There exist a robust linear network code over F for a unicast network iff there exists one for the corresponding simple network over the same field! simple network First, we build a corresponding simple network N is feasible N is minimal Every node of degree 3 No multiple edges

12 Structure of minimal networks We prove that minimal unicast networks have a special structure Facilitates efficient network codes Small field size ts

13 Network Structure Type B Type A Type C Type D Lemma: Simple networks can only include nodes of the following types

Block Structure

15 Structure of Simple Networks Lemma: For any cut of size 3 holds One node must be of type A Two others must be of type C These nodes must be connected 1 A B 11 1 C D 1 2

16 Proof Techniques Proof techniques Use minimality property of simple networks Use the concept of network flows A cycle in the residual graph - the network is not minimal

17 Proof Techniques 2 2 ts Unicast Network Corresponding Flow Network Unicast Network is feasible Corresponding Flow Network admits a flow b of value ts Theorem:

18 Proof Techniques t s t Unicast Network Residual Graph s Flow of value 3

19 Code description s a,b  GF(2) a a+b b Coding at the source Coding for block A m1m1 m2m2 m3m3 m1m1 m2m2 m2m2 m2m2 m2m2 m3m3 m1m1 m2m2 m2m2 m3m3

20 Code Description(3) Coding for block C m1m1 m2m2 m3m3 m1m1 m1m1 m2m2 m2m2 m3m3 m3m3 m3m3 m4m4 m4m4 m4m4 m1m1 m3m3 m4m4 m2m2 m1m1 m2m2 m4m4 m4m4 m3m3 m 1 +m 2 m2m2 m 2 +m 4 m3m3 Coding for block B m3m3

21 Code Robustness Suppose the Network does not have block C Transfer matrix T: T is of full rank! Block AB I 2 I 3 I 1 O 1 O 2 O 3 O 1 O 2 O 3 1 A = A |{z} T I 1 I 2 I 3 1 A A B

22 Code Robustness(2) Even when one edge fails in block AB, rank {O 1,O 2,O 3 }≥2. The source will be always able to decode the two original packets even if one edge fails. s AB Failure rank=3 rank ≥ 2 a a+b b

23 Summary We studied instantaneous recovery from link failures in communication networks We showed that the minimality implies very simple and elegant structure We built robust linear network code for instantaneous recovery over GF(2) (for h=2). Our bound on the field size does not depend on the network size; Compared to the previous bound of O(|E|).

24 Open Problems Extend our results for h>2 Study the structure of the network Find the required field size Derive an efficient algorithm for finding robust network codes for Unicast networks. We conjecture that the required field size only depends on the number of packets Does not depend on the network size