Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
In this paper we investigate the problems of searching for the capacity factors and determining the capacity ranks of edges in a network coding-based network, which were first proposed in (K. Cai and P.Y. Fan, 2007). For the former problem, we prove that it is computationally hard by reducing the well known NP-complete SUB-SUM problem to the current problem. For the latter problem, we devise efficient algorithms in a special case of networks and conjecture that in general case the problem is also hard.
2008
This work addresses the computational complexity of achieving the capacity of a general network coding instance. We focus on the linear capacity, namely the capacity of the given instance when restricted to linear encoding functions. It has been shown [Lehman and Lehman, SODA 2005] that determining the (scalar) linear capacity of a general network coding instance is NP-hard. In this work we initiate the study of approximation in this context. Namely, we show that given an instance to the general network coding problem of linear capacity C, constructing a linear code of rate alphaC for any universal (i.e., independent of the size of the instance) constant alphales1 is ldquohardrdquo. Specifically, finding such network codes would solve a long standing open problem in the field of graph coloring. In addition, we consider the problem of determining the (scalar) linear capacity of a planar network coding instance (i.e., a general instance in which the underlying graph is planar). We show that even for planar networks this problem remains NP-hard.
2006
In the multicast network coding problem, a source needs to deliver packets to a set of terminals over an underlying communication network . The nodes of the multicast network can be broadly categorized into two groups. The first group incudes encoding nodes, i.e., nodes that generate new packets by combining data received from two or more incoming links. The second group includes forwarding nodes that can only duplicate and forward the incoming packets. Encoding nodes are, in general, more expensive due to the need to equip them with encoding capabilities. In addition, encoding nodes incur delay and increase the overall complexity of the network. Accordingly, in this paper, we study the design of multicast coding networks with a limited number of encoding nodes. We prove that in a directed acyclic coding network, the number of encoding nodes required to achieve the capacity of the network is bounded by 3 2 . Namely, we present (efficiently constructible) network codes that achieve capacity in which the total number of encoding nodes is independent of the size of the network and is bounded by 3 2 . We show that the number of encoding nodes may depend both on and by presenting acyclic coding networks that require ( 2 ) encoding nodes. In the general case of coding networks with cycles, we show that the number of encoding nodes is limited by the size of the minimum feedback link set, i.e., the minimum number of links that must be removed from the network in order to eliminate cycles. We prove that the number of encoding nodes is bounded by (2 + 1) 3 2 , where is the minimum size of a feedback link set. Finally, we observe that determining or even crudely approximating the minimum number of required encoding nodes is an -hard problem.
2004
In this paper, we consider the problem of information multicast, namely transmitting common information from a sender s to a set of receivers T , in a communication network. Conventionally, in a communication network such as the Internet, this is done by distributing information over a multicast distribution tree. The nodes of such a tree are required only to replicate and forward, i.e., route, information received. Recently, Ahlswede et al.
IEEE Transactions on Information Theory, 2005
The famous max-flow min-cut theorem states that a source node can send information through a network ( ) to a sink node at a rate determined by the min-cut separating and . Recently, it has been shown that this rate can also be achieved for multicasting to several sinks provided that the intermediate nodes are allowed to re-encode the information they receive. We demonstrate examples of networks where the achievable rates obtained by coding at intermediate nodes are arbitrarily larger than if coding is not allowed. We give deterministic polynomial time algorithms and even faster randomized algorithms for designing linear codes for directed acyclic graphs with edges of unit capacity. We extend these algorithms to integer capacities and to codes that are tolerant to edge failures.
2007
We consider the multi-source network coding problem in cyclic networks. This problem involves several difficulties not found in acyclic networks, due to additional causality requirements. This paper highlights the difficulty of these causality conditions by analyzing two example cyclic networks. The networks appear quite similar at first glance, and indeed both have invalid rate-1 network codes that violate causality. However, the two networks are actually quite different: one also has a valid rate-1 network code obeying causality, whereas the other does not. This unachievability result is proven by a new information inequality for causal coding schemes in a simple cyclic network.
International Teletraffic Congress, 2012
Network coding has been shown to be the solution that allows to reach the theoretical maximum throughput in a capacitated telecommunication network [1]. It has also been shown to be a very appealing and practical alternative to routing-based approaches to send traffic from sources (servers) to terminals (clients) for many different applications. However, the initial theoretical claim of throughput benefit remains relatively unclear, mainly because the multicast throughput maximization problem is difficult to solve (it is closely related to the fractional Steiner tree packing problem which is NP-hard). In this paper, we show that these optimization problems are still tractable even for instances with a significant size (up to 50 nodes and 300 edges). We also propose and solve the multicast maximum throughput problem with an additional constraint on the number of multicast trees. We apply our algorithms on large sets of randomly generated instances, mainly based on bidirected graphs, because they are the most relevant to model fixed telecommunication infrastructures. The main result of our intensive experimental study is that, in practice, network coding does not increase throughput compared to traditional multicast. Instances showing a throughput gain can only be generated somewhat artificially by imposing some structure or trying to maximize the throughput gap. However, when we limit the number of multicast trees, then, most of the times, very significant throughput gaps appeared. Since management constraints often impose on network administrators a very limited use of multicast trees, network coding appears clearly as a very nice alternative for delivering content to customers.
2011 Wireless Advanced, 2011
Adopting a cross-layer approach, in this paper we propose an algorithm for joint routing and network coding. The proposed algorithm jointly assigns routes and designs linear network codes over finite fields to achieve the capacity of the network. The algorithm has a dynamic programming approach where a cost function is used to assign weights to all edges in the network. The cheapest flow is chosen subject to certain encoding constraints in order to achieve the network capacity with network coding while minimizing the network complexity. The effectiveness of the algorithm is demonstrated through carefully chosen examples. We show that the constraints imposed by the joint routing and coding algorithm are necessary for successful decoding at the sinks, and their violation can lead to a failure in achieving the network capacity or an increase in the number of encoding nodes.
IEEE Transactions on Information Theory, 2000
Consider a communication network in which certain source nodes multicast information to other nodes on the network in the multihop fashion where every node can pass on any of its received data to others. We are interested in how fast each node can receive the complete information, or equivalently, what the information rate arriving at each node is. Allowing a node to encode its received data before passing it on, the question involves optimization of the multicast mechanisms at the nodes. Among the simplest coding schemes is linear coding, which regards a block of data as a vector over a certain base field and allows a node to apply a linear transformation to a vector before passing it on. We formulate this multicast problem and prove that linear coding suffices to achieve the optimum, which is the max-flow from the source to each receiving node.
Classical, Semi-classical and Quantum Noise, 2011
This paper is a tutorial on the application of graph theoretic techniques in classical coding theory. A fundamental problem in coding theory is to determine the maximum size of a code satisfying a given minimum Hamming distance. This problem is thought to be extremely hard and still not completely solved. In addition to a number of closed form expressions for special cases and some numerical results, several relevant bounds have been derived over the years.
Discrete Applied Mathematics, 2013
A set S of vertices of a graph G is a dominating set of G if every vertex u of G is either in S or it has a neighbour in S. In other words S is dominating if the sets S ∩ N [u] where u ∈ V (G) and N [u] denotes the closed neighbourhood of u in G, are all nonempty. A set S ⊆ V (G) is called a locating code in G, if the sets S ∩ N [u] where u ∈ V (G) \ S are all nonempty and distinct. A set S ⊆ V (G) is called an identifying code in G, if the sets S ∩ N [u] where u ∈ V (G) are all nonempty and distinct. We study locating and identifying codes in the circulant networks C n (1, 3). For an integer n 7, the graph C n (1, 3) has vertex set Z n and edges xy where x, y ∈ Z n and |x − y| ∈ {1, 3}. We prove that a smallest locating code in C n (1, 3) has size n/3 + c, where c ∈ {0, 1}, and a smallest identifying code in C n (1, 3) has size 4n/11 + c , where c ∈ {0, 1}.
2004
We consider a multicast configuration with two sources, and translate the network code design problem to vertex coloring of an appropriately defined graph. This observation enables to derive code design algorithms and alphabet size bounds, as well as establish a connection with a number of well-known results from discrete mathematics that increase our insight in the different trade-offs possible for network coding.
2009 IEEE International Symposium on Information Theory, 2009
Explicit characterization and computation of the multi-source network coding capacity region (or even bounds) is long standing open problem. In fact, finding the capacity region requires determination of the set of all entropic vectors Γ * , which is known to be an extremely hard problem. On the other hand, calculating the explicitly known linear programming bound is very hard in practice due to an exponential growth in complexity as a function of network size. We give a new, easily computable outer bound, based on characterization of all functional dependencies in networks. We also show that the proposed bound is tighter than some known bounds.
Operations Research and Computing: Algorithms and Software for Analytics, 2015
Recent advances in communication technology allow to compress data streams in communication networks by deploying physical devices (caches) at routers, yielding a more efficient usage of link capacities. This gives rise to the network design problem with compression (NDPC), a generalization of the classical Network Design problem. In this paper, we compare both problems, focusing on the computational complexity and analyzing the differences induced by the compression aspect. We show that the subproblem of adding compression, i.e., the compressor placement problem (CPP), is already weakly N P-hard, even on instances where Network Design alone is easy. We conclude with a pseudopolynomial algorithm for tree instances and a restricted polynomial case.
2008 5th International Conference on Broadband Communications, Networks and Systems, 2008
The alphabet size of a network code is a crucial parameter for the existence of a code in a network topology. In this paper we present a method to compute the alphabet size of a linear network code for an one-source acyclic directed graph using only the outgoing edges from the source. In addition we show a method to reduce the alphabet size for a class of combination networks.
2008 IEEE International Symposium on Information Theory, 2008
In this paper we show that the Index Coding problem captures several important properties of the more general Network Coding problem. An instance of the Index Coding problem includes a server that holds a set of information messages X = {x1, . . . , x k } and a set of receivers R. Each receiver has some side information, known to the server, represented by a subset of X and demands another subset of X. The server uses a noiseless communication channel to broadcast encodings of messages in X to satisfy the receivers' demands. The goal of the server is to find an encoding scheme that requires the minimum number of transmissions.
2009
In this work, we study the computational perspective of network coding, focusing on two issues. First, we address the computational complexity of finding a network code for acyclic multicast networks. Second, we address the issue of reducing the amount of computation performed by network nodes. In particular, we consider the problem of finding a network code with the minimum possible number of encoding nodes, i.e., nodes that generate new packets by performing algebraic operations on packets received over incoming links.
Networking, IEEE/ACM Transactions on, 2003
We take a new look at the issue of network capacity. It is shown that network coding is an essential ingredient in achieving the capacity of a network. Building on recent work by Li et al., who examined the network capacity of multicast networks, we extend the network coding framework to arbitrary networks and robust networking. For networks which are restricted to using linear network codes, we find necessary and sufficient conditions for the feasibility of any given set of connections over a given network. We also consider the problem of network recovery for nonergodic link failures. For the multicast setup we prove that there exist coding strategies that provide maximally robust networks and that do not require adaptation of the network interior to the failure pattern in question. The results are derived for both delay-free networks and networks with delays.
2010
Index Coding has received considerable attention recently motivated in part by applications such as fast video-on-demand and efficient communication in wireless networks and in part by its connection to Network Coding. Optimal encoding schemes and efficient heuristics were studied in various settings, while also leading to new results for Network Coding such as improved gaps between linear and non-linear capacity as well as hardness of approximation. The basic setting of Index Coding encodes the side-information relation, the problem input, as an undirected graph and the fundamental parameter is the broadcast rate β, the average communication cost per bit for sufficiently long messages (i.e. the non-linear vector capacity). Recent nontrivial bounds on β were derived from the study of other Index Coding capacities (e.g. the scalar capacity β 1 ) by Bar-Yossef et al (2006), Lubetzky and Stav (2007) and Alon et al (2008). However, these indirect bounds shed little light on the behavior of β: there was no known polynomial-time algorithm for approximating β in a general network to within a nontrivial (i.e. o(n)) factor, and the exact value of β remained unknown for any graph where Index Coding is nontrivial.
2012 Information Theory and Applications Workshop, 2012
Determining the achievable rate region for networks using routing, linear coding, or non-linear coding is thought to be a difficult task in general, and few are known. We describe the achievable rate regions for three interesting networks and show that achievable rate regions for linear codes need not be convex.
Foundations and Trends® in Communications and Information Theory, 2005
Store-and-forward had been the predominant technique for transmitting information through a network until its optimality was refuted by network coding theory. Network coding offers a new paradigm for network communications and has generated abundant research interest in information and coding theory, networking, switching, wireless communications, cryptography, computer science, operations research, and matrix theory. We review the foundational work that has led to the development of network coding theory and discuss the theory for the transmission from a single source node to other nodes in the network. A companion issue discusses the theory when there are multiple source nodes each intending to transmit to a different set of destination nodes. Publisher's Note References to 'Part I' and 'Part II' in this issue refer to Foundations and Trends R in Communications and Information Technology Volume 2 Numbers 4 and 5 respectively. 3 Cyclic Networks 3.1 Non-equivalence between local and global descriptions 3.2 Convolutional network code 3.3 Decoding of convolutional network code 4 Network Coding and Algebraic Coding 4.1 The combination network 4.2 The Singleton bound and MDS codes 4.3 Network erasure/error correction and error detection vii 4.4 Further remarks a summary of the literature (see page 135) in the form of a table according to the following categorization of topics: 1. Linear coding 2. Nonlinear coding 3. Random coding 4. Static codes 5. Convolutional codes 6. Group codes 7. Alphabet size 8. Code construction 9. Algorithms/protocols 10. Cyclic networks 11. Undirected networks 12. Link failure/Network management 13. Separation theorem 14. Error correction/detection 15. Cryptography 16. Multiple sources 17. Multiple unicasts 18. Cost criteria 19. Non-uniform demand 20. Correlated sources 21. Max-flow/cutset/edge-cut bound 22. Superposition coding 23. Networking 24. Routing 25. Wireless/satellite networks 26. Ad hoc/sensor networks 27. Data storage/distribution 28. Implementation issues 29. Matrix theory 30. Complexity theory 31. Graph theory 32. Random graph 33. Tree packing 1.2. Some examples 245 Fig. 1.1 Multicasting over a communication network. Assume that we multicast two data bits b 1 and b 2 from the source node S to both the nodes Y and Z in the acyclic network depicted by Figure 1.1(a). Every channel carries either the bit b 1 or the bit b 2 as indicated. In this way, every intermediate node simply replicates and sends out the bit(s) received from upstream. The same network as in Figure 1.1(a) but with one less channel appears in Figures 1.1(b) and (c), which shows a way of multicasting 3 bits b 1 , b 2 and b 3 from S to the nodes Y and Z in 2 time units. This
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.