29
Duality for Simple Multiple Access Networks Iwan Duursma Department of Mathematics and Coordinated Science Laboratory U of Illinois at Urbana-Champaign DIMACS Workshop on Network Coding December 15-17, 2015 Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 1 / 29

Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Duality for Simple Multiple Access Networks

Iwan Duursma

Department of Mathematics and Coordinated Science LaboratoryU of Illinois at Urbana-Champaign

DIMACS Workshop on Network CodingDecember 15-17, 2015

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 1 / 29

Page 2: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Outline

1 - Reliability and Security

2 - Efficient repair

3 - Constrained codes and Duality

Tail-biting trellises

Simple multiple access networks

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 2 / 29

Page 3: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

1 - Reliability and Security

High rank submatrices protect against erasures and

eavesdroppers

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 3 / 29

Page 4: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Details

Erasure channelEncoding using GC yields a vector with entropy H(C).For vectors observed outside the erased positions E ⊂ [n],

H(C) = H(C|E) (information gain) + I(C; E) (equivocation)

Wiretep channel II

Decoding using GTD distinguishes vectors with entropy H(D).

For vectors observed in the eavesdropped positions E ⊂ [n],

H(D) = I(D; E) (information gain) + H(D|E) (equivocation)

H(C|E),H(D|E) = rank

( ), for E =

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 4 / 29

Page 5: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Protection against erasures AND eavesdroppers

Nested codes

Combine encoding via GC with decoding via GTD

Transmission rate reduces from H(C) to H(C|D⊥) in return for ahigher threshold for the eavesdropper.

We may assume wlog that D⊥ ⊂ C (nested codes)

For vectors observed outside E ⊂ [n] (legitimate receiver),

H(C|D⊥) = H(C)− H(D⊥)

= H(C|E)− H(D⊥|E) (information gain)

+ I(C; E)− I(D⊥; E) (equivocation)

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 5 / 29

Page 6: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Main example (Reed-Solomon)

GRS =

1 1 1 1 1 1 · · · · · · · · ·x y z u v wx2 y2 z2 u2 v2 w2

x3 y3 z3 u3 v3 w3

x4 y4 z4 u4 v4 w4

x5 y5 z5 u5 v5 w5 · · · · · · · · ·

B = rank

= 6.

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 6 / 29

Page 7: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

2 - Efficient repair

Reed-Solomon codes provide maximum protection of a messageagainst erasures.

is full rank

However repair using RS-codes is inefficient. For RS-codes,

repair bandwith = rank

.

Other codes are more suitable when erasure repair is important(e.g. in distributed storage).

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 7 / 29

Page 8: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

MSR construction (Rashmi-Shah-Kumar 2010)

GMSR =

1 0 1 0 1 0 · · · · · · · · ·x 1 y 1 z 10 x 0 y 0 zx2 0 y2 0 z2 0x3 x2 y3 y2 z3 z2

0 x3 0 y3 0 z3 · · · · · · · · ·

B = rank

= 6. (k = 3, α = 2)

γ = repair bandwith = 4 (d = 4, β = 1)

(modify if char 6= 2)

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 8 / 29

Page 9: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

MBR construction (Rashmi-Shah-Kumar 2010)

GMBR =

1 0 0 1 0 0 · · · · · · · · ·x 1 0 y 1 00 x 0 0 y 0x 1 0 y 1 0x2 2x 1 y2 2y 10 x2 x 0 y2 y · · · · · · · · ·

B = rank

= 5. (k = 2, α = 3)

γ = repair bandwith = 3 (d = 3, β = 1)

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 9 / 29

Page 10: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Storage vs bandwith trade-off

MSR minimizes storage per disk.

MBR minimizes repair bandwith.

For exact repair solutions in between MBR and MSR,the optimal trade-offs are an open problem.Case n = k + 1 = d + 1 is solved

Tian; Sasidharan, Senthoor, Kumar; D;Tian, Sasidharan, Aggarwal, Vaishampayan, Kumar;Mohajer, Tandon; Prakash, Krishnan; D’

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 10 / 29

Page 11: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Storing four bits on four disks

x , y , z, t

x , z + t

y , t + x

z, x + y

t , y + z

B = 4 n = 4

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 11 / 29

Page 12: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Reading four bits from any two disks

x , z + t

y , t + x

z, x + y

t , y + z

k = 2α = 2

x , z + tt , y + z

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 12 / 29

Page 13: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Disk repair with help form any three disks

x , z + t

y , t + x

z, x + y

t , y + z t

z + t

t + x + y

z, x + y

d = 3β = 1

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 13 / 29

Page 14: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Repair matrix

The repair matrix summarizes storage and repair for a regeneratingcode.

W1

W2

W3

W4

S1→2 S1→3 S1→4

S2→1 S2→3 S2→4

S3→1 S3→2 S3→4

S4→1 S4→2 S4→3

Wi = data stored at node iSi→j = helper information from node i to node j

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 14 / 29

Page 15: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

[D - arxiv 2014]Theorem 1

Let Bq = H(W1) + · · ·+ H(Wq) +∑

H(Si→j), such that B ≤ Bq.

Let q,q1, . . . ,qm−2, r , s > 0 such that (explicit condition). Then

mB ≤ Bq +m−2∑i=1

Bqi + Br+s − rsβ.

Theorem 2

Let Bq = H(W1) + · · ·+ H(Wq) +∑

H(SM→L), such that B ≤ Bq.

For each (M,L), let ` = |L|, m = |M|, and let r ≥ `. Then

B +∑(M,L)

`B ≤ Bq +∑(M,L)

(Br+m−1 + (`− 1)(Br+m−2 − β)).

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 15 / 29

Page 16: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

[D arXiv 2015]

Theorem 3For any set of parameters (n, k ,d), and for 0 ≤ ` ≤ k , 0 ≤ v ,(

v + 22

)B ≤

(v + 1

2

)Bk + (v + 1)Bk−` − v

(`

2

)β.

Independently (special cases)

Prakash-Krishnan, arXiv 2015Mohajer-Tandon, ITA/ISIT 2015a, ISIT2015b.

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 16 / 29

Page 17: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

3 - Constrained codes

David Forney (Talk at Allerton ’97)

Does the Golay code have a generator matrix of the form

∗∗ ∗∗ ∗∗ ∗∗ ∗∗ 00 00 00 00 00 00 0000 ∗∗ ∗∗ ∗∗ ∗∗ ∗∗ 00 00 00 00 00 0000 00 ∗∗ ∗∗ ∗∗ ∗∗ ∗∗ 00 00 00 00 0000 00 00 ∗∗ ∗∗ ∗∗ ∗∗ ∗∗ 00 00 00 00

00 00 00 00 ∗∗ ∗∗ ∗∗ ∗∗ ∗∗ 00 00 0000 00 00 00 00 ∗∗ ∗∗ ∗∗ ∗∗ ∗∗ 00 0000 00 00 00 00 00 ∗∗ ∗∗ ∗∗ ∗∗ ∗∗ 0000 00 00 00 00 00 00 ∗∗ ∗∗ ∗∗ ∗∗ ∗∗

∗∗ 00 00 00 00 00 00 00 ∗∗ ∗∗ ∗∗ ∗∗∗∗ ∗∗ 00 00 00 00 00 00 00 ∗∗ ∗∗ ∗∗∗∗ ∗∗ ∗∗ 00 00 00 00 00 00 00 ∗∗ ∗∗∗∗ ∗∗ ∗∗ ∗∗ 00 00 00 00 00 00 00 ∗∗

Answer: Yes (Calderbank-Forney-Vardy 1999)

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 17 / 29

Page 18: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Characteristic matrices (Koetter-Vardy 2003)

A set of characteristic generators for the row space row G is a subsetof n vectors such that

1) Spans of vectors start and end in distinct positions, and

2) The sum of the spanlengths of the vectors is minimal.

A square matrix is called a characteristic matrix for G if its rows form aset of characteristic generators.

Example

X =

1 1 1 0 00 1 1 0 10 0 1 1 00 1 0 1 11 0 0 0 1

Y =

1 0 1 1 11 1 0 0 10 1 1 1 00 1 1 1 01 0 1 1 1

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 18 / 29

Page 19: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Dual characteristic matrices

QuestionUnder what conditions is a pair of characteristic matrices in duality,i.e. when does a pair define dual trellises?

Conjecture (KV 2003)For a choice of lexicographically first characteristic generators for Gand for a matching choice of lexicographically first characteristicgenerators for H, the obtained tail-biting trellises are in duality.

(Gleussen-Larssing and Weaver 2011)Counterexample to the conjecture.

Characterization of dual characteristic matrices in terms of local dualityof trellises

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 19 / 29

Page 20: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

(GLW 2011)

Example

X =

1 1 0 00 1 1 11 0 1 10 1 1 1

Y =

1 1 0 11 1 0 11 1 1 00 0 1 1

X ′ =

1 1 0 00 1 1 11 0 1 11 0 1 1

Y ′ =

1 1 1 01 1 0 11 1 1 00 0 1 1

Conjecture: X ∼ Y . Local duality: X ∼ Y ′ and X ′ ∼ Y .

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 20 / 29

Page 21: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

-Adjusted- Conjecture holds (D 2015)

We define unique reduced characteristic matrices and show

TheoremReduced characteristic matrices are in duality.

CorollaryThe KV conjecture holds if the characteristic generators for G arelexicographically ordered in a forward direction and the characteristicgenerators for H are lexicographically ordered in a reverse direction.

Furthermore, an explicit duality is given by

TheoremA pair of characteristic matrices X and Y , with maximal orthogonal rowspaces, is in duality if and only if X and Y have orthogonal columnspaces.

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 21 / 29

Page 22: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Simple Multiple Access NetworkSources Si transmit at rates ri to a unique receiver T via a layer of nintermediate nodes. T observes (c1, c2, . . . , cn) ∈ C.

S1

S2

S3

x1

x1 + x2

x1 + x2 + x3

x2 + x3

x1 + x3

x2

x3

T

Shown is C = [7,3,4] simplex code.Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 22 / 29

Page 23: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Related problems

Opportunistic data exchange

El Rouayheb, Sprintson, Sadeghi, ITW 2010On coding for cooperative data exchange

Sensor networks

Dau, Song, Dong, Yuen, ISIT 2013Balanced Sparsest generator matrices for MDS codes

Error-correction in networks

Dikaliotis, Ho, Jaggi, Vyetrenko, Yao, Effros, Kliewer, Erez, IT-2011Multiple access network information-flow and correction codes

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 23 / 29

Page 24: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Dual version (same network, arrows reversed)Receivers Ri request data at rates ri from a unique source T via alayer of n intermediate nodes. T uploads (y1, y2, . . . , yn).

R1

R2

R3

y1

y2

y3

y4

y5

y6

y7

T

e.g. R1 requests x1, to be obtained from y1, y2, y3, y4, y5.Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 24 / 29

Page 25: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

SMAN (reliable multiple access (S1,S2,S3) −→ T )

[x1 x2 x3

] x x x x x 0 00 x x x x x 00 0 x x x x x

=[

c1 c2 c3 c4 c5 c6 c7]

Dual version (secure broadcast T −→ (R1,R2,R3))

[y1 y2 y3 y4 y5 y6 y7

] x x x x x 0 00 x x x x x 00 0 x x x x x

T

=[

x1 x2 x3]

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 25 / 29

Page 26: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Theorem

For the same three-layer network,

A SMAN can transmit at rates (r1, . . . , rk ) tolerating z erasures

if and only if

The dual version can reach receivers at rates (r1, . . . , rk ) toleratingz eavesdroppers.

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 26 / 29

Page 27: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Distributed Reed-Solomon codesGiven a generator matrix of the form

x 0 0 x x x x 0 0 xx 0 0 x x x x 0 0 x0 x 0 x x 0 0 x x x0 x 0 x x 0 0 x x x0 0 x 0 0 x x x x x0 0 x 0 0 x x x x x

can the nonzero entries be chosen such that the matrix represents aReed-Solomon code?

Theorem (Halbawi, Ho, Yao, D ISIT 2014)

For any rate vector in the capacity region of a three-source SMAN, wecan construct a distributed Reed-Solomon code.

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 27 / 29

Page 28: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

Why is this difficult?

Question (http://math.stackexchange.com) 10/31/12Dimension of Intersection of three vector spaces satisfying specificpostulates. Let A,B,C, be subspaces of V such that

dim A = dim A′,dim B = dim B′,dim C = dim C′

dim A∩B = dim A′∩B′, dim C∩B = dim C′∩B′, dim A∩C = dim A′∩C′

dim A + B + C = dim A′ + B′ + C′

Prove that dim A ∩ B ∩ C = dim A′ ∩ B′ ∩ C′. Thanks.

AnswerThe result stated is false, so you need not bother to try and prove it.MvL

ReplyThank MvL. This is a great answer.

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 28 / 29

Page 29: Duality for Simple Multiple Access Networksdimacs.rutgers.edu/Workshops/Next15/Slides/Duursma.pdf · Outline 1 - Reliability and Security 2 - Efficient repair 3 - Constrained codes

The next 15 months

Extend SMAN and its dual version to

multiple sources AND multiple receivers

reliability AND security

As well as many other things

distributed storage, matroids, . . .

THANK YOU.

Iwan Duursma (U Illinois) Duality DIMACS - Dec 2015 29 / 29