Analysis of Precoding-based Intersession Network Coding and The Corresponding 3-Unicast Interference Alignment Scheme Jaemin Han, Chih-Chun Wang * Center.

Slides:



Advertisements
Similar presentations
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Advertisements

Packing Multicast Trees Philip A. Chou Sudipta Sengupta Minghua Chen Jin Li Kobayashi Workshop on Modeling and Analysis of Computer and Communication Systems,
5.4 Basis And Dimension.
5.1 Real Vector Spaces.
Boyce/DiPrima 9th ed, Ch 2.8: The Existence and Uniqueness Theorem Elementary Differential Equations and Boundary Value Problems, 9th edition, by William.
On the Density of a Graph and its Blowup Raphael Yuster Joint work with Asaf Shapira.
1 Index Coding Part II of tutorial NetCod 2013 Michael Langberg Open University of Israel Caltech (sabbatical)
C&O 355 Mathematical Programming Fall 2010 Lecture 22 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A.
Uniqueness of Optimal Mod 3 Circuits for Parity Frederic Green Amitabha Roy Frederic Green Amitabha Roy Clark University Akamai Clark University Akamai.
Bioinformatics III1 We will present an algorithm that originated by Ford and Fulkerson (1962). Idea: increase the flow in a network iteratively until it.
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Eigenvalues and Eigenvectors
1 By Gil Kalai Institute of Mathematics and Center for Rationality, Hebrew University, Jerusalem, Israel presented by: Yair Cymbalista.
Entropy Rates of a Stochastic Process
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
1 Network Coding: Theory and Practice Apirath Limmanee Jacobs University.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Network Coding Theory: Consolidation and Extensions Raymond Yeung Joint work with Bob Li, Ning Cai and Zhen Zhan.
15 PARTIAL DERIVATIVES.
Network Coding Project presentation Communication Theory 16:332:545 Amith Vikram Atin Kumar Jasvinder Singh Vinoo Ganesan.
1 Simple Network Codes for Instantaneous Recovery from Edge Failures in Unicast Connections Salim Yaacoub El Rouayheb, Alex Sprintson Costas Georghiades.
1 On the Performance of Slotted Aloha with Capture Effect in Wireless Networks Arash Behzad and Julan Hsu Professor Mario Gerla CS218 Project UCLA December.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
Orthogonality and Least Squares
Boyce/DiPrima 9th ed, Ch 11.2: Sturm-Liouville Boundary Value Problems Elementary Differential Equations and Boundary Value Problems, 9th edition, by.
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
Networking Seminar Network Information Flow R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network Information Flow. IEEE Transactions on Information.
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
The Quasi-Randomness of Hypergraph Cut Properties Asaf Shapira & Raphael Yuster.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Great Theoretical Ideas in Computer Science.
NETWORK CODING. Routing is concerned with establishing end to end paths between sources and sinks of information. In existing networks each node in a.
Approximating the Minimum Degree Spanning Tree to within One from the Optimal Degree R 陳建霖 R 宋彥朋 B 楊鈞羽 R 郭慶徵 R
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
1 The edge removal problem Michael Langberg SUNY Buffalo Michelle Effros Caltech.
Number Theory Project The Interpretation of the definition Andre (JianYou) Wang Joint with JingYi Xue.
Great Theoretical Ideas in Computer Science.
Delay-Based Back-Pressure Scheduling in Multi-Hop Wireless Networks 1 Bo Ji, 2 Changhee Joo and 1 Ness B. Shroff 1 Department of ECE, The Ohio State University.
10. Lecture WS 2006/07Bioinformatics III1 V10: Network Flows V10 follows closely chapter 12.1 in on „Flows and Cuts in Networks and Chapter 12.2 on “Solving.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
Planar graphs with no 5- cycles, 6-cycles or intersecting triangles are 3-colorable Carl Yerger, Davidson College Clemson Mini-Conference 2012.
10. Lecture WS 2014/15 Bioinformatics III1 V10 Metabolic networks - Graph connectivity Graph connectivity is related to analyzing biological networks for.
Information and Coding Theory Cyclic codes Juris Viksna, 2015.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
Unique Games Approximation Amit Weinstein Complexity Seminar, Fall 2006 Based on: “Near Optimal Algorithms for Unique Games" by M. Charikar, K. Makarychev,
Dense graphs with a large triangle cover have a large triangle packing Raphael Yuster SIAM DM’10.
Joint Moments and Joint Characteristic Functions.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
Some Favorite Problems Dan Kleitman, M.I.T.. The Hirsch Conjecture 1. How large can the diameter of a bounded polytope defined by n linear constraints.
1 Finding a decomposition of a graph T into isomorphic copies of a graph G is a classical problem in Combinatorics. The G-decomposition of T is balanced.
12. Lecture WS 2012/13Bioinformatics III1 V12 Menger’s theorem Borrowing terminology from operations research consider certain primal-dual pairs of optimization.
Linear Programming Chap 2. The Geometry of LP  In the text, polyhedron is defined as P = { x  R n : Ax  b }. So some of our earlier results should.
Chapter 5 Chapter Content 1. Real Vector Spaces 2. Subspaces 3. Linear Independence 4. Basis and Dimension 5. Row Space, Column Space, and Nullspace 6.
Ch 9.6: Liapunov’s Second Method In Section 9.3 we showed how the stability of a critical point of an almost linear system can usually be determined from.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
 2004 SDU Uniquely Decodable Code 1.Related Notions 2.Determining UDC 3.Kraft Inequality.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Network Coding Beyond Network Coding
Objective The student will be able to:
Non-additive Security Games
Network Coding and its Applications in Communication Networks
Distinct Distances in the Plane
Polyhedron Here, we derive a representation of polyhedron and see the properties of the generators. We also see how to identify the generators. The results.
Root-Locus Analysis (1)
Polyhedron Here, we derive a representation of polyhedron and see the properties of the generators. We also see how to identify the generators. The results.
V11 Metabolic networks - Graph connectivity
V11 Metabolic networks - Graph connectivity
Existence of 3-factors in Star-free Graphs with High Connectivity
Complexity Theory in Practice
Presentation transcript:

Analysis of Precoding-based Intersession Network Coding and The Corresponding 3-Unicast Interference Alignment Scheme Jaemin Han, Chih-Chun Wang * Center for Wireless Systems and Applications School of ECE, Purdue University Ness B. Shroff Department of ECE and CSE The Ohio State University Han, Wang, and Shroff – p. 1/20

Content  Pre-coding-based intersession Network Coding (NC) − Comparison to “An algebraic approach to network coding” [Koetter et al. IT03] − Existing results on 3-unicast Asymptotic Network Alignment (3-ANA) [Das et al. ISIT10], [Ramakrishnan et al. ALT10], − Under certain algebraic conditions, 3-ANA achieves rate  From algebraic to graph-theoretic conditions − New characterization theorems for general pre-coding-based NC. − Graph-theoretic conditions are easier to check (mostly polynomial time)!  Graph-theoretic characterizations for 3-ANA − Feasibility of 3-ANA New graph-theoretic conditions  Conclusion Han, Wang, and Shroff – p. 2/20

 An algebraic approach to network coding [Koetter et. al IT03] − Total network control: − Complete information at the receivers. − Algebraic conditions: The NC demands can be met if the code satisfies (i) Full information along the principal path (ii) Zero interference along the cross paths Algebraic conditions are easy to verify but hard to solve. [Koetter et al. 03], [Lehman]. − For special scenarios, we can develop graph-theoretic conditions.  Feasibility of a single multicast session rate is less than the min min-cut. [Li et al. 03]  Feasibility of 2 simple unicast sessions whether the critical cuts are properly placed.  Various capacity inner / outer bounds: [Harvey et al. IT06], [Yan et al. IT06], etc. Precoding Channel Decoding The Algebraic Framework of NC Han, Wang, and Shroff – p. 3/20 Hard to control what happens inside the network. The local coding kernel:

Precoding Channel Precoding Channel  Precoding-based Framework − Distributed, partial control: Design, leave the network kernels random. − Complete information at the receivers. − Algebraic conditions (i) Full information along the principal path (ii) Zero interference along the cross paths − Several design choices  Coding across multiple time slots.  Strictly causal vs. Causal vs. Non-causal. Also time-invariant versus time-varying. − Again, easy to verify but hard to solve. − The only known special scenario is the single multicast setting. INC : New Framework  : vertical concatenation of precoding  : horizontal concatenation of decoding  : block diagonalization of channels Decoding Han, Wang, and Shroff – p. 4/20 If we relax the “complete info. at Rx” condition, then we have the non-coherent random lin. NC. [Koetter, Kschischang 08].

 A specific example: 3-unicast Asymptotic Network Alignment (ANA) by [Das et al. ISIT10], [Ramakrishnan et al. ALT10] − Consider a simple 3-unicast network.  Three coexisting sessions  and  Fully interfering: can be reached from.  Time-invariant topology − Application of “Interference Alignment” devised in wireless channel [Cadambe et. al IT08] to 3-unicast stable DAG − The goal is to achieve rate vector Existing 3-Unicast ANA Han, Wang, and Shroff – p. 5/20

 3-unicast Asymptotic Network Alignment (ANA) − Application of “Interference Alignment” achieving for integer − The channel gain polynomial: − Precoding design of IA [Cadambe et. al IT08] :  Define  Let  is the vertical concatenation of where  Non-causal & time-invariant design with the Vandermonde form − Feasibility conditions Precoding matrices must satisfy: 3-Unicast ANA (1)-(4) hold w.h.p. [Cadambe et. al IT08] Not easy to solve! Han, Wang, and Shroff – p. 6/20 Wireless Interference Channel channel gains must satisfy : w.h.p. 3-unicast ANA Relationships between channel gains and network topology An example network with

 Some useful algebraic notation − A set of polynomials are linearly dependent if for some not-all-zero coefficients,. − if and are linearly dependent. − if and are linearly independent.  The graph-theoretic condition: − If the edge-cut value between is one, then use 1-EC to denote the collection of all 1-edge cuts separating − If the edge-cut value between is not one, then define 1-EC Some Further Notation Han, Wang, and Shroff – p. 7/20

Conjectured, verified by simulations  is still hard to check  Conjecture remains open even for with high prob. New Graph-Theoretic Characterizations Main Results must satisfy : with high prob. except all zeros State-of-the-art Knowledge [Ramakrishnan et al. ALT10] : Han, Wang, and Shroff – p. 8/20 & When, Why this is not enough? Easily derived by Theorem 1 Easily derived by Corollary 1 Easily derived by Theorem 1 Hard to solve! Easy to solve! Main Result #1 Easy to solve! Main Result #2 Prove the conjecture for the simplest case n=1.

The Subgraph Property Let be the network variables present in a subgraph be the collection of all channel gains present in Consider two arbitrary polynomial functions and taking the same number of arguments and producing a value.  Similar flavor to the result of [Koetter et. al IT03] for the single multicast.  However, the problem persists. Finding a subgraph is still hard since we do not have any graph-theoretic characterization as guidance. Han, Wang, and Shroff – p. 9/20

The Role of 1-Edge Cuts  That is, the 1-edge cuts decompose the channel gain as a product of multiple irreducible components. Han, Wang, and Shroff – p. 10/20

The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Step 1: WLOG, consider and Step 2: Establish that is upstream of. Intuitively, and Step 3: Examine L(x) and R(x) saparately. Recall

The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Step 1: WLOG, consider and Step 2: Establish that is upstream of. Intuitively, and Step 3: Examine L(x) and R(x) saparately. Recall

The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Step 1: WLOG, consider and Step 2: Establish that is upstream of. Intuitively, and Step 3: Examine L(x) and R(x) saparately. Recall

The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Step 1: WLOG, consider and Step 2: Establish that is upstream of. Intuitively, and Step 3: Examine L(x) and R(x) saparately. Recall

The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Step 1: WLOG, consider and Step 2: Establish that is upstream of. Intuitively, and Step 3: Examine L(x) and R(x) saparately. Recall

The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Step 1: WLOG, consider and Step 2: Establish that is upstream of. Intuitively, and Step 3: Examine L(x) and R(x) saparately. Recall

Cannot be part of and The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Now we start from Part 1 Cannot be part of and All and are non-empty.

Part of but not part of nor Must be part of For the following, we prove Suppose there exists a path not using (colored by ). Then we can prove that path will touch neither nor. However, if we consider the current subgraph, we clearly have and. This contradicts the subgraph property in Theorem 2. The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Part 2: If, say. Now we start from

The GTC of L ≠ R Proposition 1 such that & satisfies − Proof of Part 3: In this case, we can show graphic-theoretically (no need to use algebraic arguments) that and. The proof is thus complete. Intuition: when the 1-edge-cuts overlap with each other sufficiently (when ), then inevitably we will have the overlap between any pairs of and and any pairs of and.

Conjectured, verified by simulations with high prob. New Graph-Theoretic Characterizations Main Results must satisfy : with high prob. except all zeros Han, Wang, and Shroff – p. 20/20 & When, Easily derived by Theorem 1 Easily derived by Corollary 1 Easily derived by Theorem 1 Hard to solve! Easy to solve! Main Result #1 Easy to solve! Main Result #2 Prove the conjecture for the simplest case n=1.

The Remaining Task  The challenges of proving Main Result #2: − L ≠ R is the linear independence condition between two polynomials. − The Main Result #2 is regarding the linear independence among 2n+1 polynomials. Too many choices of the coefficients. − On the other hand, the graph-theoretic properties greatly help us simplify the problem. − We have proven the case when n=1. Han, Wang, and Shroff – p. 21/20

Summary of The Results  Current Understanding of 3-unicast ANA Graph-Theoretic Characterizations Han, Wang, and Shroff – p. 22/20 with high prob.  Conclusion − Intersession NC : Precoding-based Framework  Theoretic DAG analysis of precoding-based solution on DAG. − Special example of Precoding-based Framework : 3-uincast ANA  Graph-theoretic characterizations that can be easily checked. Algebraic Graph-Theoretic

Future Work  Obviously, the graph-theoretic results for n>1  With the graph-theoretic condition, we can answer questions in a more definite way: − Whether / how much throughput loss is induced by a 3-ANA scheme − More general networks other than 3-ANA? Han, Wang, and Shroff – p. 23/20

Theorem 1: The set of polynomials are linearly independent if and only if. Sketch of the proof: When are linearly dependent,. When for all, we fix the values of to, the cofactors will give us the coefficient in the linear sum. L. I. on is From Det≠0 To Lin. Indep. is row-invariant where Han, Wang, and Shroff – p. 24/20 must satisfy : with high prob. except all zeros [2.1] [Cond. 1] proposed by [Ramakrishnan 10] [2.1] [Cond. 1] [Cond. 1] + [1] [2.1] [1] + [2] [1] + [Cond. 1] By Theorem 1