ebook img

Representations of the Multicast Network Problem PDF

1.1 MB·
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Representations of the Multicast Network Problem

Representations of the Multicast Network Problem∗† Sarah E. Anderson1, Wael Halbawi2, Nathan Kaplan 3, Hiram H. 7 1 Lo´pez4, Felice Manganiello4, Emina Soljanin5, and Judy Walker6 0 2 1University of St. Thomas n 2California Institute of Technology a 3University of California, Irvine J 0 4Clemson University 2 5Rutgers University 6University of Nebraska–Lincoln ] T I . January 24, 2017 s c [ 1 Abstract v We approach the problem of linear network coding for multicast net- 4 works from different perspectives. We introduce the notion of the coding 4 pointsofanetwork,whichareedgesofthenetworkwheremessagescom- 9 bine and coding occurs. We give an integer linear program that leads 5 to choices of paths through the network that minimize the number of 0 coding points. We introduce the code graph of a network, a simplified . 1 directedgraphthatmaintainstheinformationessentialtounderstanding 0 the coding properties of the network. One of the main problems in net- 7 work coding is to understand when the capacity of a multicast network 1 is achieved with linear network coding over a finite field of size q. We : v explain how this problem can be interpreted in terms of rational points i on certain algebraic varieties. X r a 1 Introduction Acombinationalnetwork,orsimplynetwork,isrepresentedbyadirectedacyclic graph G=(V,E,S,R,S,F ) where: q ∗TheauthorswouldliketoacknowledgethehospitalityofIPAMandtheorganizersofits AlgebraicGeometryforCodingTheoryandCryptographyWorkshop: EverettHowe,Kristin Lauter,andJudyWalker. †The third author was supported by NSA Young Investigator Grant H98230-16-10305 and by an AMS-Simons Travel Grant. The fourth author was partially supported by the CONACyT under grant title ”Network Codes”. The fifth uthor was partially supported by theNationalScienceFoundationundergrantDMS-1547399 1 • V is the vertex set. • E is the set of unit-capacity directed edges. • S ⊂V is the source set, meaning the set of vertices with in-degree 0. • R ⊂ V is the receiver set, meaning the set of vertices with out-degree 0 and without loss of generality, we assume S∩R=∅. • F is a finite field with q elements and the alphabet used for communica- q tion. In a network G, the sources originate messages and send them through the network via the edges of G, which represent error-free point-to-point communi- cationchannels. ThecommunicationrequirementsofanetworkGarenonempty subsets D ⊆ S for R ∈ R that represent collections of sources from which R R must receive a message. Definition1.1. AmulticastnetworkisadirectedacyclicgraphG=(V,E,S,R,F ) q with communication requirements D = S for every receiver R ∈ R, meaning R that every receiver demands the message sent by every source. ForagivennetworkG, acollectionofrequirements{D |R∈R}isachiev- R ableifthereexistanalphabetF andacommunicationtechniqueforwhicheach q receiver can reconstruct the messages sent by the sources it demands. Examples of communication techniques are routing and network coding. In routing,verticesofanetworkforwardachoiceoftheirincomingmessages. Net- work coding generalizes routing, and vertices can forward combinations of their incoming messages. Linear network coding is a special case of network coding where messages are vectors of Fn and vertices forward F -linear combinations q q of their incoming messages. 1.1 Achieving multicast network requirements We briefly explain how to achieve the requirements of a multicast network and describe some open problems in this area. For a more detailed explanation of the subject, we refer the interested reader to [Ksc11]. Let G be a multicast network with only one receiver R. Then its commu- nication requirement is achieved by routing the messages if and only if |S| = mincut(S,R). Thisisaconsequenceoftheresultknownastheedge-connectivity version of Mengers Theorem [CLRS09], which states that mincut(S,R) is equal to the maximum number of edge-disjoint paths between the source set S and the receiver R. If the multicast network has multiple receivers, then a necessary condition for the communication requirements to be achieved is that |S|= minmincut(S,R). R∈R 2 This constant is called the capacity of a multicast network and corresponds to the maximum number of messages that every receiver might be able to recon- struct from the communication. It it evident that achieving the capacity of a multicast network is equivalent to achieving its communication requirements. Routingdoesnotgenerallyachievecapacityformulticastnetworks. Thenet- workinFigure1withtherequirementsthatbothreceiversreceivethemessages from both sources, is the simplest nontrivial example of a multicast network with multiple sources and multiple receivers for which routing does not achieve capacity. This network is called the butterfly network and was first introduced in [LYC03]. In order for the communication to achieve capacity, it is necessary for the vertex connected to both S and S to combine its incoming messages, 1 2 meaning that it performs network coding. Figure 1: The butterfly network. Lietal. in[LYC03]provethatthecapacityofamulticastnetworkisachieved bylinearnetworkcoding. LetN bethenumberofreceiversofagivenmulticast network. In [KM03], K¨otter and M´edard prove that linear network coding suffices to achieve capacity using vector spaces over any finite field F with size q q >N. In[HMK+06],Hoetal. showedthatthecapacityofamulticastnetwork is achieved with high probability if the linear combinations are taken uniformly at random from a large finite field. Although every finite field of size q > N is enough to achieve the capacity of every multicast network with N receivers, it is believed that this bound is not tight. For a given multicast network, let q denote the smallest finite field size min for which network capacity is achievable using linear network coding. It is important to note that achievability of capacity over F does not automatically q implyachievabilityofcapacityoverlargerfields. Indeed,Sunet al. showedthat there exists a family of multicast networks such that q is bounded below by √ min a constant times N, but for which capacity is not achieveable over every field F with q < q ≤ N [SYLL15]. In particular, they give a multicast network q min wherecapacityisachievableoverF butnotoverF . Wereturntothisexample 7 8 in Section 4. Therefore, in addition to determining q , it is an important min problem in multicast network communication to understand the set of q with q <q ≤N for which capacity is achievable using linear network coding over min the finite field F . q The aim of this work is to concisely provide different representations of the 3 multicastnetworkproblemforresearcherstoapproachthisproblemfromvarious viewpoints. The main background reference for this paper is the monograph [FS07]. Fortherestofthework,werestricttomulticastnetworksforwhichcapacity isachievable,meaningthatthenumberofsourcesisequaltothecapacityofthe network. This condition is equivalent to the existence for each receiver R ∈ R of a set of edge-disjoint paths P ={P |S ∈S}, where P is a path from R S,R S,R S to R. The paper is organized as follows. In Section 2, we define coding points as thebottlenecksofthenetworkwherethelinearcombinationsoccur. Weprovide an integer optimization algorithm that, given a network, returns the subgraph ofthenetworkcorrespondingtoachoiceofpathsbetweensourcesandreceivers thatusesthesmallestpossiblenumberofcodingpoints. Section3isdedicatedto codegraphs, whichmaybethoughtofasskeletonsofmulticastnetworks. More precisely, a code graph is a labeled directed graph whose vertices correspond to sources and coding points, with vertex labels representing the edge-disjoint pathsfromsourcestoreceivers. Wegivepropertiesforalabeled,directedacyclic graph to be the code graph of a multicast network. In the multicast network problem we label sources with vectors over F and specify how incoming mes- q sages combine at coding points. Capacity is achievable if and only if there is a labeling where these combinations satisfy certain linear independence condi- tions. In Section 4, we describe how these conditions translate to conditions on the vector labelings of the code graph of the network. This leads to the study of matrices over F with prescribed linear dependence and independence q conditions, and then to the study of F -rational points on certain varieties. We q discuss the problem of determining the set of finite fields F for which such an q F -vector labeling of a code graph exists, and how to understand the collection q of all such labelings as the solutions to systems of algebraic equations. 2 Coding Points and Reduced Multicast Net- works Let G = (V,E,S,R) be the underlying directed acyclic graph of a multicast network. Inthissection,westudythecodingpointsofG,whicharethedirected edges transmitting nontrivial linear combinations of the messages received at theirtails. Weareinterestedinchoosingthesetofedge-disjointpathsthatuses the smallest possible number of coding points. Definition 2.1. Let G be the underlying directed graph of a multicast network and for each R ∈ R let P = {P | S ∈ S} be a set of edge-disjoint paths, R S,R where P denotes a path from S to R. A coding point of G is an edge E = S,R (V,V(cid:48))∈E such that: • there are distinct sources S, S(cid:48) and distinct receivers R, R(cid:48) such that E appears in both P ∈P and P ∈P , and S,R R S(cid:48),R(cid:48) R(cid:48) 4 • if (W,V)∈P and (W(cid:48),V)∈P , then W (cid:54)=W(cid:48). S,R S(cid:48),R(cid:48) Example 2.2. Consider the multicast network with four sources and three receiversshowninFigure2(a). Tomakethefiguremorereadable,weomitfrom thenetworkthedirectededgestoR fromS andS ,toR fromS andS ,and 1 1 4 2 1 2 to R from S , S , and S . For each receiver in this network, there is exactly 3 2 3 4 onesetofedge-disjointpathsfromthesourcestothatreceiver; theseareshown in Figure 2(b), Figure 2(c), and Figure 2(d). Using Definition 2.1, we note that thecodingpointsofthenetworkarepreciselytheedgesdepictedinFigure2(e). (b) P . (c) P . R1 R2 (a) A network with four sourcesandthreereceivers. For readability, we have omitted edges (S ,R ), 1 1 (S ,R ),(S ,R ),(S ,R ), 4 1 1 2 2 2 (S ,R ), (S ,R ), and 2 3 3 3 (S ,R ). 4 3 (d) P . (e) Coding points. R2 Figure 2: A multicast network with four sources and three receivers. Network coding has been studied using linear programming. The Ford- Fulkerson algorithm from [FF87] can be used to find the maximum flow of a unicastnetwork,meaninganetworkwithasourceandareceiver. Itcanalsobe adapted to the case of a multicast network with only one receiver. In Section 3.5of[FS07],theauthorsspecifyalinearoptimizationproblemtomaximizethe flow of a network when using network coding. Our goal is to specify an integer linear optimization problem whose solution correspondstoasetofpathsP ,oneforeachR∈R,withtheminimalnumber R of coding points. Without loss of generality, write V = {V ,...,V ,...,V ,V ,...,V }, 1 N t t+1 t+L where S = {V ,...,V } and R = {V ,...,V } for N > 0 and L > 0. Let 1 N t+1 t+L Adj(G) be the adjacency matrix of the directed graph G. For every choice of V ∈S and V ∈R, construct the |V|×|V| matrix k t+(cid:96) X :=Adj(G,x )−Adj(G,x )T k(cid:96) k(cid:96) k(cid:96) 5 where Adj(G,x ) is obtained from Adj(G) by replacing each nonzero entry in k(cid:96) position (i,j) by the variable x . Let 1 be the vector of ones of size |V|. k(cid:96)ij Theorem 2.3. Let G = (V,E,S,R) be the underlying graph of a multicast network where V = {V | i = 1,...,t + L}, S = {V | i = 1,...,N} and i i R={V |i=1,...,L}. Consider the following integer optimization problem: t+i (cid:88) Minimize |E|− z (1) ij (Vi,Vj)∈E Subject to ∀ k =1,...,N, (cid:96)=1,...,L, (V ,V )∈E, i j k-th (cid:96)-th X ·1 = [0,...,0, 1 ,0,...,0,0,...,0,0,...,0,−1,0,··· ,0]T (2) k(cid:96) (cid:124) (cid:123)(cid:122) (cid:125) (cid:124) (cid:123)(cid:122) (cid:125) (cid:124) (cid:123)(cid:122) (cid:125) N t−N L x ,z ∈ {0,1} (3) k(cid:96)ij ij N (cid:88) x ≤ 1, (4) k(cid:48)(cid:96)ij k(cid:48)=1 z ≤ 4−x −x −x −x , (5) ij k(cid:96)i(cid:48)i k(cid:96)ij k(cid:48)(cid:96)(cid:48)i(cid:48)(cid:48)i k(cid:48)(cid:96)(cid:48)ij ∀ k(cid:48) >k, (cid:96)(cid:48) (cid:54)=(cid:96); (V ,V )(cid:54)=(V ,V )∈E i(cid:48) i i(cid:48)(cid:48) i where the x’s and the z’s are variables. A solution x∗ ,z∗ ∈ {0,1} of this optimization problem corresponds to a k(cid:96)ij ij collection of sets of edge-disjoint paths, one for each (cid:96), P ={P |k =1,...,N} Vt+(cid:96) VkVt+(cid:96) where P ={(V ,V )∈E |x∗ =1} is a path from V to V . VkVt+(cid:96) i j k(cid:96)ij k t+(cid:96) The number of coding points of G used by these collections of paths is (cid:88) |E|− z∗. ij (Vi,Vj)∈E No other choice of paths gives a smaller number of coding points. Proof. Observe that variables x run over V ∈S, V ∈R and (i,j) where k(cid:96)ij k t+(cid:96) (V ,V ) ∈ E. We begin by analyzing the meaning of each constraint of the i j optimization problem. Throughout the proof we say that an edge (V ,V ) has i j value 1 if the corresponding entry of the solution x∗ is equal to 1, for a given k(cid:96)ij source V and receiver V and for a solution x∗ ∈{0,1} of the optimization k t+(cid:96) k(cid:96)ij problem. • Constraint(2)consistsofNLlinearsystemsofequations,anditssolutions correspond to paths between sources and receivers. A given system of (2) represents the constraints of the communication flow between source V ∈ S and receiver V ∈ R. The system has k t+(cid:96) t+L equations. Each equation corresponds to the flow of a vertex of the network, meaning the sum of the values of its outgoing edges minus the sumofthevaluesofitsincomingedges. Theseequationsdivideintothree types: 6 – The first N equations correspond to the flow starting from the N sources. The only equation that is equal to 1 is the kth equation and the remaining are zero. This means that, given a solution of the system,theonlyedgeswithpossiblynonzerovaluearetheonesleav- ing source V . Since a solution has only entries in {0,1} and the kth k equationsumsthoseentriesto1,asolutionhasentry1corresponding to only one of the edges leaving V and 0 otherwise. k – The last L equations correspond to the flow getting into the L re- ceivers. The only equation that is equal to −1 is the (cid:96)th equation and the remaining are zero. This means that, given a solution of the system, the only edges with possibly nonzero value are the ones leaving source V . Since a solution has only entries in {0,1} and t+(cid:96) the (cid:96)th equation subtracts those entries to −1, a solution has entry 1 corresponding to one of the edges leaving V and 0 otherwise. T t+(cid:96) – The remaining equations are always equal to zero and correspond to the conservation of flow. This means that, at each remaining vertex, the number of incoming edges with value 1 equals the number of outgoing edges with value 1. It follows that every solution of the system is a path P and that VkVt+(cid:96) every path P satisfies the previous conditions. VkVt+(cid:96) • Constraint (4) says that, given a receiver V and an edge (V ,V ), as we t+(cid:96) i j vary over all of the sources, that is, vary over all values of k, at most one oftheentriesofthesolutionx∗ hasvalue1. Thisinequalityimpliesthat k(cid:96)ij the sets P with (cid:96) ∈ {1,...,L} obtained from the solution consists of Vt+(cid:96) edge-disjoint paths. SinceGisamulticastnetworkbyhypothesis,thereexistsetsofedge-disjoint paths P = {P | k = 1,...,N}, one for each V ∈ R. This implies Vt+(cid:96) VkVt+(cid:96) t+(cid:96) that a solution of the linear optimization system satisfying (2), (3) and (4) exists. Constraint(5)dealswiththecodingpoints. FromDefinition2.1,if(V ,V )∈ i j E is a coding point for a solution x∗ ∈ {0,1}, then there exist distinct k(cid:96)ij sources V ,V ∈ S, distinct receivers V ,V ∈ R, and distinct edges k k(cid:48) t+(cid:96) t+(cid:96)(cid:48) (V ,V ),(V ,V ) ∈ E such that x∗ = x∗ = x∗ = x∗ = 1. As a i(cid:48) i i(cid:48)(cid:48) i k(cid:96)i(cid:48)j k(cid:96)ij k(cid:48)(cid:96)(cid:48)i(cid:48)(cid:48)j k(cid:48)(cid:96)(cid:48)ij consequence z∗ =0. Instead, if (V ,V )∈E is not a coding point for a solution ij i j x∗ ∈ {0,1} then z∗ ≤ 1. Condition (1) combined with constraints (3) and k(cid:96)ij ij (5) implies that z∗ = 0 if (V ,V ) ∈ E is a coding point and z∗ = 1 otherwise. ij i j ij Therefore, the number of coding points for a fixed assignment of the variables x∗ is k(cid:96)ij (cid:88) |E|− z∗. ij (Vi,Vj)∈E We illustrate the algorithm with an example. 7 Example 2.4. Consider the modified butterfly network of Figure 3(a). In this (a) Modified butterfly network. (b) Labels for algorithm. (c) Paths P (d) Paths P (e) Path P (f) Paths P S1,R1 S1,R2 S2,R1 S2,R2 Figure 3: Modified Butterfly Network case,wehaveN =2sourcesandL=2receivers. Asexplainedinthediscussion leading up to the statement of Theorem 2.3, for each k,l∈{1,2} we define the matrix   0 0 x 0 x x kl13 kl15 kl16  0 0 xkl23 0 0 xkl26    Xkl = −x0kl13 −x0kl23 −x0kl34 xk0l34 xk0l45 xk0l46 .    −xkl15 0 0 −xkl45 0 0  −x −x 0 −x 0 0 kl16 kl26 kl46 Constraint (2) gives the following four linear systems of equations: X ·1 = [1,0,0,0,−1,0] (6) 11 X ·1 = [1,0,0,0,0,−1] (7) 12 X ·1 = [0,1,0,0,−1,0] (8) 21 X ·1 = [0,1,0,0,0,−1]. (9) 22 Constraint (3) imposes the solutions of the system to be in {0,1}. It holds that: • System (6) has two solutions (see Figure 3(c)): S (1):={x =x =x =1 and the rest 0} and 11 1113 1134 1145 S (2):={x =1 and the rest 0}. 11 1115 8 • System (7) has two solutions (see Figure 3(d)): S (1):={x =x =x =1 and the rest 0} and 12 1213 1234 1246 S (2):={x =1 and the rest 0}. 12 1216 • System (8) has one solution (see Figure 3(e)): S (1):={x =x =x =1 and the rest 0}. 21 2123 2134 2145 • System (9) has two solutions (see Figure 3(f)): S (1):={x =x =x =1 and the rest 0} and 22 2223 2234 2246 S (2):={x =1 and the rest 0}. 22 2226 Combining with constraint (4), we obtain three possible solutions: S = S (2)∪S (1)∪S (1)∪S (2) 1 11 12 21 22 S = S (2)∪S (2)∪S (1)∪S (1) 2 11 12 21 22 S = S (2)∪S (2)∪S (1)∪S (2). 3 11 12 21 22 Finally, for every edge (i,j) of the network, we define the variable z . The ij expressionin(1)tellsuswhichofonethesolutionsS ,S orS hastheminimum 1 2 3 number of coding points. If we take S , then constraint (5) says that z = 0 since x = x = 1 34 1213 1234 x = x = 1. There is no restriction on the remaining z ’s for S , 2134 2123 ij 1 meaning that each one can be either 0 or 1. Then the minimum value of (cid:80) |E| − z is 8 − 7 = 1. This implies that S is a choice of paths (Vi,Vj)∈E ij 1 with one coding point, (3,4)∈E. If we take either S or S , then constraint (5) implies that there are no 2 3 (cid:80) restrictions on the z ’s. Thus, the minimum value of |E|− z is ij (Vi,Vj)∈E ij 8−8=0. This implies that S and S are two choices of paths without coding 2 3 points. The algorithm in Theorem 2.3 returns either S or S . 2 3 Definition 2.5. Let G = (V,E,S,R,{P |R ∈ R}) be a multicast network. R We say G is reduced if every edge and vertex of G appears in some path P . S,R Note that the multicast network of Figure 2(a), where P , P and P R1 R2 R3 areasshowninFigures2(b), 2(c), and2(d), respectively, isreducedsinceevery edgeandvertexappearsinsomepath. However,themodifiedbutterflynetwork shown in Figure 3(a) is not reduced for any choice of paths. For any of the collectionsofpathsS ,S , orS fromExample2.4, thereisatleastoneedgeof 1 2 3 the modified butterfly network that does not appear. Therefore, the modified butterfly network is not reduced. Every multicast network G with a choice of a set of paths {P |R ∈ R}, R contains a reduced multicast network G(cid:48) as a subgraph. It is obtained from G by omitting the unused edges and vertices. The multicast network G and its reducedformG(cid:48) havethesamepropertieswithrespecttolinearnetworkcoding. 9 For the rest of this paper, we assume that G=(V,E,S,R,{P |R∈R}) R isareducedmulticastnetworkandforwhichtheset{P |R∈R}corresponds R toachoiceofsetsofedge-disjointpathswithaminimalnumberofcodingpoints. 3 Code Graphs In this section we introduce the code graph of a multicast network, which is a directed graph with labeled vertices that preserves the information essential to understanding the properties of the network with respect to linear coding. We wanttheedgesinthisnewgraphtocorrespondtopathsintheoriginalnetwork along which the message being passed is constant. A maximal such path must originate either at a source or at the tail of a coding point. This motivates the next definition. Definition 3.1. Let G=(V,E,S,R,{P |R∈R}) be a multicast network. A R coding-direct path in G from V ∈ V to V ∈ V is a path in G from V to V 1 2 1 2 that does not pass through any coding point in G, except possibly a coding point with tail V . 1 Given a multicast network, we now construct our desired vertex-labeled di- rected graph that preserves the essential coding properties of the network. Lemma 3.2. Let G = (V,E,S,R,{P | R ∈ R}) be a multicast network and R let Q be its set of coding points. Let Γ = Γ(G) be the vertex-labeled directed graph constructed as follows: • The vertex set of Γ is S∪Q, i.e., there is one vertex in Γ for each source and for each coding point of G. Given a vertex V of Γ we call the corre- sponding source or coding point of G the G-object of V. • The edge set of Γ is the set of all ordered pairs of vertices of Γ such that there is a coding-direct path in G between the corresponding G-objects. • Each vertex V of Γ is labeled with a subset L of the set R. A receiver V R∈R is contained in L if and only if there is a coding-direct path in G V from the G-object of V to R. The following properties hold: 1. Γ is an acyclic graph. 2. The in-degree of every vertex in Γ is either 0 or at least 2. Moreover, the G-object of a vertex V of Γ is a source in G if and only if the in-degree of V is 0. 3. For each R∈R it holds that 10

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.