scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Insufficiency of linear coding in network information flow

TL;DR: It is shown that the network coding capacity of this counterexample network is strictly greater than the maximum linear coding capacity over any finite field, so the network is not even asymptotically linearly solvable.
Abstract: It is known that every solvable multicast network has a scalar linear solution over a sufficiently large finite-field alphabet. It is also known that this result does not generalize to arbitrary networks. There are several examples in the literature of solvable networks with no scalar linear solution over any finite field. However, each example has a linear solution for some vector dimension greater than one. It has been conjectured that every solvable network has a linear solution over some finite-field alphabet and some vector dimension. We provide a counterexample to this conjecture. We also show that if a network has no linear solution over any finite field, then it has no linear solution over any finite commutative ring with identity. Our counterexample network has no linear solution even in the more general algebraic context of modules, which includes as special cases all finite rings and Abelian groups. Furthermore, we show that the network coding capacity of this network is strictly greater than the maximum linear coding capacity over any finite field (exactly 10% greater), so the network is not even asymptotically linearly solvable. It follows that, even for more general versions of linearity such as convolutional coding, filter-bank coding, or linear time sharing, the network has no linear solution.

Summary (3 min read)

I. INTRODUCTION

  • Associated with the sources are messages and associated with the sinks are demands.
  • The goal is for each sink to deduce its demanded messages from its in-edges by having information propagate from the sources through the network.
  • The following result was recently shown in [2] .
  • Also, the authors compute the exact network coding capacity and the linear network coding capacity of this network for any finite-field alphabet (Corollary IV.5).

II. INSUFFICIENCY OF NETWORK LINEAR CODES OVER FINITE FIELDS

  • The authors establish the existence of a solvable network that has no linear solution over any finite field and any vector dimension.
  • Suppose there exists a fractional coding solution over alphabet with, also known as Proof.
  • If all messages other than are fixed, then each edge of the path from to can take on at most different values.
  • Suppose the authors impose on a network code the constraint that for every node with in-degree one, the out-edges must carry the same symbol as the lone in-edge, and for every source with exactly one message, the out-edges must carry the source's lone message.

Lemma II.2:

  • The network has a scalar linear solution over any ring with characteristic two, but has no linear solution for any vector dimension over a finite field with odd characteristic.
  • Proof: A scalar linear solution (as illustrated in Fig. 1 ) to the network over any ring of characteristic two is given by the following edge functions and sink decoding functions: (any edge function not shown is assumed to be an identity mapping).
  • Note that the fact that the alphabet is a ring with characteristic two is used only in decoding the message at node where .
  • Let be the identity matrix and for each and , let be the vector carried on the edge from to .
  • Since by (14) , the matrices and are invertible.

Lemma II.3:

  • The network has a scalar linear solution over any ring where is a unit, but has no linear solution for any vector dimension over a finite field with characteristic two.
  • Proof: A scalar linear solution (as illustrated in Fig. 2 ) to the network over any ring where is invertible is given by the following edge functions and sink decoding functions (any edge function not shown is assumed to be an identity mapping):.
  • This contradicts the assumption that the demand at node can be recovered, since is not uniquely determined by the node's inputs.
  • Since is the only node that produces message and node demands message , and since there is a unique directed path from to , the coding capacity of is at most by Lemma II.1.

Theorem II.4:

  • There exists a solvable network that has no linear solution over any finite field and any vector dimension.
  • The proof is achieved with , which combines networks and .
  • The symbols and indicate addition and subtraction in the ring of integers modulo , the symbol indicates addition in the ring (i.e., bitwise XOR), and indicates the result of exchanging the order of the bits in a 2-bit binary word .
  • Note that the functions and are linear over but not over GF or , the function is linear over and GF but not over , and the function is not linear over any of these.
  • In decoding at node , the authors used the fact that if the 2-bit binary representation of is , then the following binary representations also hold: Corollary II.5: Proof: By Theorem II.4, the network is solvable and therefore the coding capacity is at least (independent of the alphabet size by Lemma I.1).

III. INSUFFICIENCY OF NETWORK LINEAR CODES OVER RINGS AND MODULES

  • The authors start by showing how to extend nonsolvability over finite fields to nonsolvability over finite commutative rings with identity.
  • If a network does not have a linear solution over any finite field in dimensions, then it does not have a linear solution over any finite commutative ring with identity in dimensions, also known as Theorem III.1.
  • The authors need only show that the demands are met.
  • It follows by induction that along every edge, if is the vector carried by the new coding and is the vector carried by the old coding, then (component-wise).
  • The corollary establishes that linear network codes are insufficient over a class of rings that includes finite fields.

Corollary III.2:

  • There exists a solvable network such that for every vector dimension there is no linear solution over any finite commutative ring with identity.
  • In [11] , solvable networks were given, whose minimum alphabet size required for a solution could be made arbitrarily large.
  • By combining such a network with the network used in the proof of Theorem II.4 (i.e., taking the disjoint union of them) one obtains a solvable network with no linear solution for any vector dimension and an arbitrarily large minimum alphabet size for a solution.
  • From this fact and Corollary III.2, the authors immediately obtain the following corollary.

Corollary III.3: For each

  • , there exists a solvable network which has no scalar solution for any alphabet of cardinality smaller than , and such that for every vector dimension there is no linear solution over any finite commutative ring with identity.
  • The authors can talk about linearity in even more generality than the above, if they are willing to separate the set of coefficients allowed in linear functions from the set of inputs to the linear functions (the set of messages).
  • Or the authors can let the set of coefficients be any field and let the message set be any vector space over .
  • This action must satisfy the analogues of the usual vector space laws: for any and , the authors have (the first here is the ring zero and the second is the group zero).
  • The notions of scalar linear solution and linear solution for a network now easily generalize to the context of an -module .

Theorem III.4:

  • There exists a solvable network that does not have an -linear solution over for any ring , any finite -module with more than one element, and any vector dimension.
  • If the authors have a scalar -linear solution over , then for each demand at a sink node they get an equation of the form where are the source messages and is the composition of decoding and edge functions given by the specified solution; this equation must hold for all choices of from .
  • (The authors thank Daniel Goldstein for this clean proof of the result and Lance Small for the reference.).
  • The division into cases will be on whether in the final ring (or, equivalently, whether for all in ).
  • If , then the proof of Lemma II.2 shows that does not have a scalar -linear solution over .

IV. ASYMPTOTIC INSUFFICIENCY OF NETWORK LINEAR CODES OVER FINITE FIELDS

  • Throughout this section, is a finite field, all matrices have entries in , denotes the identity matrix for each , and denotes the vector carried on the edge from a node to a node , where and are two adjacent nodes in some given network.
  • The following notation will be used in proofs in this section.
  • Therefore, using (40) and the identity gives which, in turn, implies Since the right-hand side of (41) has terms and must be written as a linear combination of the terms on the left-hand side of (41), the term on the left-hand side of (41) must have a zero matrix coefficient in the linear combination.
  • Therefore, the number of possible values for the right-hand side is no larger than the number of possible values for the left-hand side.
  • The next corollary follows immediately from IV.3 and IV.4, and together with Corollary II.5 shows that the coding capacity of (i.e., ) is exactly 10% greater than the maximum linear coding capacity (i.e., ) over any finite field.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 8, AUGUST 2005
2745
Insufficiency of Linear Coding in Network
Information Flow
Randall Dougherty, Christopher Freiling, and Kenneth Zeger, Fellow, IEEE
Abstract—It is known that every solvable multicast network has
a scalar linear solution over a sufficiently large finite-field alphabet.
It is also known that this result does not generalize to arbitrary
networks. There are several examples in the literature of solvable
networks with no scalar linear solution over any finite field. How-
ever, each example has a linear solution for some vector dimension
greater than one. It has been conjectured that every solvable net-
work has a linear solution over some finite-field alphabet and some
vector dimension. We provide a counterexample to this conjecture.
We also show that if a network has no linear solution over any finite
field, then it has no linear solution over any finite commutative ring
with identity. Our counterexample network has no linear solution
even in the more general algebraic context of modules, which in-
cludes as special cases all finite rings and Abelian groups. Further-
more, we show that the network coding capacity of this network
is strictly greater than the maximum linear coding capacity over
any finite field (exactly 10% greater), so the network is not even
asymptotically linearly solvable. It follows that, even for more gen-
eral versions of linearity such as convolutional coding, filter-bank
coding, or linear time sharing, the network has no linear solution.
Index Terms—Asymptotics, flows, linear coding, network infor-
mation theory, routing.
I. INTRODUCTION
I
N the context of network information theory [1], [18], a net-
work is a directed acyclic multigraph, some of whose nodes
are sources or sinks. Associated with the sources are messages
and associated with the sinks are demands.
1
The demands at
each sink are a subset of all the messages of all the sources. Each
directed edge
in a network carries information from node
to node . The goal is for each sink to deduce its demanded
messages from its in-edges by having information propagate
from the sources through the network. A multicast network is
Manuscript received March 2, 2004; revised January 7, 2005. This work was
supported by the Institute for Defense Analyses, the National Science Founda-
tion, and Ericsson.
R. Dougherty is with the Center for Communications Research, San Diego,
CA 92121-1969 USA (e-mail: rdough@ccrwest.org).
C. Freiling is with the Department of Mathematics, California State Uni-
versity, San Bernardino, San Bernardino, CA 92407-2397 USA (e-mail:
cfreilin@csusb.edu).
K. Zeger is with the Department of Electrical and Computer Engineering,
University of California, San Diego, La Jolla, CA 92093-0407 USA (e-mail:
zeger@ucsd.edu).
Communicated by M. Médard, Associate Editor for Communications.
Digital Object Identifier 10.1109/TIT.2005.851744
1
Here we use the terms “source” and “sink” in the graph-theoretic sense,
namely, nodes with no in-edges and no out-edges, respectively. More gener-
ally, a network can have messages and demands associated with non-sources
and non-sinks, respectively, but such a network can always be converted into a
network satisfying our given definition, without altering the network solvability
properties. Also, some definitions of a network allow directed cycles.
a network with exactly one source and such that each sink de-
mands all of the source’s messages.
A network’s messages are assumed to be arbitrary elements
of a fixed finite alphabet. At any node in the network, each
out-edge carries an alphabet symbol which is a function (called
an edge function) of the symbols carried on the in-edges to the
node, or a function of the node’s messages if it is a source. Also,
each sink has demand functions for each of its demands, which
attempt to deduce the node’s demands from its inputs. A net-
work code is a collection of edge functions, one for each edge
in the network, and demand functions, one for each demand of
each node in the network. A solution is a code which results in
every sink being able to deduce its demands from its demand
functions, and a network that has a solution is called solvable.
It was noted by Ahlswede, Cai, Li, and Yeung [1] that for some
networks, coding can achieve solutions that are otherwise un-
achievable using only routing or switching.
One way of modeling multiple uses of a network is to view
each network edge as carrying a vector of alphabet symbols. For
a network code using vector transmission, the out-edge of each
node carries a vector of alphabet symbols which is a function
of the vectors carried on the in-edges to the node, or a func-
tion of the node’s message vectors if it is a source. Also, each
source has a vector of messages and each sink demands a subset
of all the source vector messages. All edge vectors are assumed
to have the same dimension
and all message vectors are as-
sumed to have the same dimension
. Note that the definition
of a solution is with respect to the case when
. If there
is a solution with
, the solution is said to be scalar.
For general
and , a code that allows the sink nodes to deduce
their demands is called a
fractional coding solution.
For a network alphabet with an algebraic structure (such as a
ring or field), a fractional coding solution is said to be linear if all
edge functions and all demand functions are linear combinations
of their vector inputs, where the coefficients are matrices over
the alphabet. That is, in a linear solution, if a node has in-edges
and/or source messages carrying vectors
,
then an out-edge of the node carries a vector
where each matrix has elements in the alphabet , and is
of dimension
when is a source message and is of di-
mension
when is an in-edge. A demand function is
linear if it has an identical form as the equation for
, but with
the number of rows in each matrix equal to
instead of .
0018-9448/$20.00 © 2005 IEEE

2746 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 8, AUGUST 2005
The coding capacity of a network with respect to an alphabet
and a class of network codes (e.g., see [2] and a related
denition in [18, p. 339]) is
fractional coding solution in over
If consists of all network codes, then we simply refer to the
above quantity as the coding capacity of the network with re-
spect to
. The following result was recently shown in [2].
Lemma I.1: The coding capacity of a network is independent
of the alphabet size.
The linear coding capacity is the coding capacity when
con-
sists of all fractional linear codes. Whereas the coding capacity
of a network is known to be independent of the alphabet size [2],
the linear coding capacity of a network does in general depend
on the alphabet size chosen (e.g., see Theorems IV.3 and IV.4).
We say that a class of network codes is sufficient over a class of
alphabets if every solvable network has a solution in the class
of codes over some member of the alphabet class. A network is
asymptotically solvable with respect to an alphabet and a class
of codes if its coding capacity is at least
. We say that a class
of network codes is asymptotically sufficient over a class of al-
phabets if every solvable network is asymptotically solvable in
the class of codes over some member of the alphabet class.
In this paper, we rst show that network linear codes are insuf-
cient over nite eld alphabets (Theorem II.4), and then over
commutative ring alphabets (Corollary III.2), and even over the
general class of alphabets consisting of
-modules
2
(Theorem
III.4). Finally, we show that network linear codes are asymptot-
ically insufcient over nite eld alphabets (Corollary IV.6). In-
terestingly, a single network is used to establish all four of these
counterexamples. Also, we compute the exact network coding
capacity and the linear network coding capacity of this network
for any nite-eld alphabet (Corollary IV.5). The method used
to obtain the network exploits techniques from the theory of ma-
troids, which we will discuss in a future publication.
Li, Yeung, and Cai [12] showed that any solvable multicast
network has a scalar linear solution over a sufciently large -
nite-eld alphabet. Riis [15] noted in particular that every solv-
able multicast network has a linear solution over GF
in some
vector dimension. For multicast networks, there have been var-
ious studies of algorithms for constructing scalar linear codes
as well as the alphabet sizes needed for obtaining scalar linear
solutions [3][6], [9][12].
For nonmulticast networks, various results have been given.
Riis [15] constructed a network which is solvable over a binary
alphabet, but which has no scalar linear solution over the nite
eld GF
, and yet does have a linear solution over GF in
three dimensions. He also demonstrated in [15] solvable net-
works which can achieve linear solutions over GF
only if
the vector dimension grows at least linearly with the number of
nodes in the network.
Rasala Lehman and Lehman [11] gave a collection of net-
works which are solvable, but which have no scalar linear so-
lution over any nite-eld alphabet. Médard, Effros, Ho, and
2
An
R
-module is like a vector space, but the coefcients of its vectors come
from a ring
R
rather than from a eld.
Karger [13] pointed out that the networks in [11] have linear so-
lutions (based purely on routing) over every nite eld in two
dimensions. Similarly, it was noted in [13] that a certain network
given by Koetter has no scalar linear solution but does have a
linear (routing) solution in two dimensions.
It is clear that linear codes in dimensions two and higher
are more powerful than scalar linear codes. Riis stated in
[14]: Maybe the most important question is whether any ow
problem can be solved using linear coding. In fact, Médard,
Effros, Ho, and Karger stated in [13]: We conjecture that
linear coding under its most general denition is sufcient for
network coding in systems with arbitrary demands. The most
general denition of linear coding is not specied in [13], but
some clarication is given by Jaggi, Effros, Ho, and Médard
[8] who state that the most general possible linear codes are
lter-bank network codes, a generalization of convolutional
codes. It is also stated in [8] that in [13] it is conjectured that
(linear codes) are asymptotically optimal.
We prove that vector linear coding is insufcient over the
general class of
-modules, which includes as special cases -
nite elds, commutative rings with identity, and Abelian groups.
Thus, the result is not restricted to alphabet cardinalities which
are powers of primes, nor to linearity with respect to only a
nite eld. In addition, we show that linear coding (over -
nite elds) is not sufcient even asymptotically using fractional
coding, as the ratio of message dimensions to edge dimensions
approaches one. (In fact, we show that, in our example network,
nonlinear network coding gives exactly 10% more capacity than
the maximum capacity achievable using linear coding over -
nite elds.) From this, we deduce that even convolutional or
lter-bank linear coding is not sufcient for network coding.
3
Another form of linearity that one might consider (as sug-
gested by R. Yeung) consists of time sharing between linear
codes on different nite eld alphabets. We note at the end of
Section IV that this form of linearity is not sufcient for our ex-
ample network either.
In what follows, the insufciency of linear network codes is
shown for nite elds in Section II, for rings and modules in
Section III, and asymptotically for nite elds in Section IV.
We will often need to handle separately the cases of nite
elds with even cardinality (i.e., characteristic two) and odd car-
dinality (i.e., odd characteristic).
II. I
NSUFFICIENCY OF
NETWORK LINEAR CODES OVER
FINITE FIELDS
In this section, we establish the existence of a solvable net-
work that has no linear solution over any nite eld and any
vector dimension.
First we give a useful lemma (an alternative proof follows
from the max-ow bound, e.g., see [18, p. 328]).
Lemma II.1: Suppose a network has a message
which is
demanded by a node
and is produced by exactly one source
node
. If there is a unique directed path from to , then the
coding capacity of the network is at most
.
3
Our proofs that linear codes are neither optimal for
R
-modules nor asymp-
totically optimal did not appear in the present paper until we submitted our revi-
sion in January 2005. (The quest for a proof based on
R
-modules was motivated
by a comment from one referee and for asymptotics by a question from another
referee.)

DOUGHERTY et al.: INSUFFICIENCY OF LINEAR CODING IN NETWORK INFORMATION FLOW 2747
Fig. 1. The network
N
has sources
n
,
n
,
n
emitting messages
a
,
b
,
c
,
respectively, and sinks
n
,
n
,
n
with demands
c
,
b
,
a
, respectively. Some
edges are labeled to their left to illustrate a scalar linear solution over any ring
alphabet with characteristic two (used in Lemma II.2), and edges are labeled
to their right with matrix coefcients
M
of an assumed solution used in Lem-
ma II.2.
Proof: Suppose there exists a fractional coding so-
lution over alphabet
with . If all messages other than
are xed, then each edge of the path from to can take
on at most
different values. So can only decode at most
different values. But, so not every possible
message
at can be decoded at , a contradiction.
Suppose we impose on a network code the constraint that
for every node with in-degree one, the out-edges must carry the
same symbol as the lone in-edge, and for every source with ex-
actly one message, the out-edges must carry the sources lone
message. Then, it is easy to see that the network has a linear so-
lution under this constraint for a given vector dimension over a
given nite eld if and only if the network has an unconstrained
linear solution for the same vector dimension and over the same
nite eld. This fact is used implicitly in the proofs of Lemmas
II.2 and II.3 and Theorem II.4 by assuming the described code
constraint.
Denote by
the network shown in Fig. 1.
Lemma II.2: The network
has a scalar linear solution
over any ring with characteristic two, but has no linear solution
for any vector dimension over a nite eld with odd character-
istic. Also, the coding capacity of
is .
Proof: A scalar linear solution (as illustrated in Fig. 1) to
the network
over any ring of characteristic two is given by
the following edge functions and sink decoding functions:
(any edge function not shown is assumed to be an identity map-
ping). Note that the fact that the alphabet is a ring with charac-
teristic two is used only in decoding the message
at node
where .
Now, suppose the network has a linear solution over a nite
eld
with odd characteristic and some vector dimension .
Let
be the identity matrix and for each and , let
be the vector carried on the edge from to . Then there exist
matrices with entries in (as illustrated in
Fig. 1), such that
(1)
(2)
(3)
(4)
(5)
(6)
Equating coefcients of
, , in (5) and (6) gives
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
By (9) and (13), the matrices
, , , , , are
invertible. Therefore,
by (8), and hence,
(16)
by (11). This implies that the matrices
and are in-
vertible. We have
by (10), so matrices
and are invertible. Since
by (14), the matrices and are invertible. Since
by (7), the matrix is invertible. Thus, since
by (15), the matrix is invertible. So,
is invertible for all .
Now, we have
[from (10)]
[from (16)]
(17)

2748 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 8, AUGUST 2005
Fig. 2. The network
N
has sources
n
,
n
,
n
,
n
,
n
with messages
a
,
b
,
c
,
d
,
e
, respectively. Sinks
n
through
n
each demand one of the messages,
as indicated. Some edges are labeled to illustrate a scalar linear solution over
any ring alphabet where
2
is invertible (used in Lemma II.3), and edges are
labeled to their right with matrix coefcients
M
of an assumed solution used
in Lemma II.3.
and
[from (12)]
[from (15)]
[from (8), (14)]
[from (16)]
(18)
But (17) and (18) imply that
which is impossible in a
eld with odd characteristic.
Finally, since
has a scalar linear solution over GF , its
coding capacity (independent of alphabet size by Lemma I.1)
is at least
. Since is the only node that produces message
and node demands message , and since there is a unique
directed path from
to , the coding capacity of is at
most
by Lemma II.1. Hence, the coding capacity of is
exactly
.
Denote by the network shown in Fig. 2.
Lemma II.3: The network
has a scalar linear solution
over any ring where
is a unit, but has no linear solution for
any vector dimension over a nite eld with characteristic two.
Also, the coding capacity of
is .
Proof: A scalar linear solution (as illustrated in Fig. 2) to
the network
over any ring where is invertible is given by
the following edge functions and sink decoding functions (any
edge function not shown is assumed to be an identity mapping):
Now, suppose the network has a linear solution over some
nite eld
of characteristic two and with some nite vector
dimension
. Henceforth, let denote addition in . We can
write
(19)
(20)
(21)
(22)
(23)
where each
is a matrix with elements in , and
the messages
, , , , are -dimensional vectors. Equations
(21)(23) come from the demands at sinks
, , . Let
be the identity matrix over . Equating coefcients of ,
, in (21)(23) gives
(24)
(25)
(26)
(27)
(28)
(29)
(30)
where minus signs have been omitted since the nite-eld al-
phabet has characteristic two. Equation (24) implies that
are invertible. Since the right-hand sides of (25)(30) are invert-
ible, the left-hand-side matrices
must also be invertible. So is invertible for all . Thus,
[from (25), (26)]

DOUGHERTY et al.: INSUFFICIENCY OF LINEAR CODING IN NETWORK INFORMATION FLOW 2749
Fig. 3. The network
N
has sources
n
,
n
,
n
,
n
,
n
with messages
a
,
b
,
c
,
d
,
e
, respectively. Sinks
n
through
n
each demand one of the messages, as
indicated. Some edges are labeled to illustrate a nonlinear solution over an alphabet of size
4
(used in Theorem II.4).
[from (27), (28)]
[from (29),(30)]
and therefore,
Finally
so
(31)
Hence, for any message assigned to
, if the messages
and are assigned to and , respectively,
then
, by (19) and (20), and therefore,
by (31). A similar argument shows that, for any
message assigned to
, there exist messages that can be assigned
to
and that result in .
Thus, for every message vector assigned to
, there exist as-
signments of messages to
, , , such that all six inputs
to node are zero. This contradicts the assumption that the
demand
at node can be recovered, since is not uniquely
determined by the nodes inputs.
Finally, since
has a scalar linear solution over GF , its
coding capacity (independent of alphabet size by Lemma I.1)
is at least
. Since is the only node that produces message
and node demands message , and since there is a unique
directed path from
to , the coding capacity of is at
most
by Lemma II.1. Hence, the coding capacity of is
exactly
.
Denote by the network shown in Fig. 3, with nodes
. In the network, the left-most part is the
network (with sinks , , ) and the rest of is the
network.
Theorem II.4 shows that linear network codes are insufcient
over nite-eld alphabets.
Theorem II.4: There exists a solvable network that has no
linear solution over any nite eld and any vector dimension.
Proof: The proof is achieved with
, which combines
networks
and . Lemmas II.2 and II.3 show that network
does not have a vector linear solution over any nite-eld
alphabet.
We now demonstrate a solution to the network over an al-
phabet of cardinality
, as indicated in Fig. 3. The symbols
and indicate addition and subtraction in the ring of in-
tegers modulo
, the symbol indicates addition in the ring
(i.e., bitwise XOR), and indicates the result of
exchanging the order of the bits in a 2-bit binary word
.We
represent the elements of the alphabet either as members of
when using or , or as elements of (i.e., 2-bit binary
words) when using
or . Note that the functions and
are linear over but not over GF or , the function
is linear over and GF but not over , and the
function
is not linear over any of these. The demands are
met as follows:

Citations
More filters
Book
16 Jan 2012
TL;DR: In this article, a comprehensive treatment of network information theory and its applications is provided, which provides the first unified coverage of both classical and recent results, including successive cancellation and superposition coding, MIMO wireless communication, network coding and cooperative relaying.
Abstract: This comprehensive treatment of network information theory and its applications provides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon's point-to-point information theory, single-hop networks, multihop networks, and extensions to distributed computing, secrecy, wireless communication, and networking. Elementary mathematical tools and techniques are used throughout, requiring only basic knowledge of probability, whilst unified proofs of coding theorems are based on a few simple lemmas, making the text accessible to newcomers. Key topics covered include successive cancellation and superposition coding, MIMO wireless communication, network coding, and cooperative relaying. Also covered are feedback and interactive communication, capacity approximations and scaling laws, and asynchronous and random access channels. This book is ideal for use in the classroom, for self-study, and as a reference for researchers and engineers in industry and academia.

2,442 citations

Journal ArticleDOI
TL;DR: The results show that using COPE at the forwarding layer, without modifying routing and higher layers, increases network throughput, and the gains vary from a few percent to several folds depending on the traffic pattern, congestion level, and transport protocol.
Abstract: This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that intelligently mixing packets increases network throughput. Our design is rooted in the theory of network coding. Prior work on network coding is mainly theoretical and focuses on multicast traffic. This paper aims to bridge theory with practice; it addresses the common case of unicast traffic, dynamic and potentially bursty flows, and practical issues facing the integration of network coding in the current network stack. We evaluate our design on a 20-node wireless network, and discuss the results of the first testbed deployment of wireless network coding. The results show that using COPE at the forwarding layer, without modifying routing and higher layers, increases network throughput. The gains vary from a few percent to several folds depending on the traffic pattern, congestion level, and transport protocol.

2,190 citations


Cites background from "Insufficiency of linear coding in n..."

  • ...It is known that linear codes are insufficient for optimal inter-session network coding [ 18 ], and even if we limit ourselves to linear codes, determining how to perform the coding is NP-hard [6]....

    [...]

Journal ArticleDOI
11 Aug 2006
TL;DR: The results show that COPE largely increases network throughput, and the gains vary from a few percent to several folds depending on the traffic pattern, congestion level, and transport protocol.
Abstract: This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that intelligently mixing packets increases network throughput. Our design is rooted in the theory of network coding. Prior work on network coding is mainly theoretical and focuses on multicast traffic. This paper aims to bridge theory with practice; it addresses the common case of unicast traffic, dynamic and potentially bursty flows, and practical issues facing the integration of network coding in the current network stack. We evaluate our design on a 20-node wireless network, and discuss the results of the first testbed deployment of wireless network coding. The results show that COPE largely increases network throughput. The gains vary from a few percent to several folds depending on the traffic pattern, congestion level, and transport protocol.

890 citations


Cites background from "Insufficiency of linear coding in n..."

  • ...It is known that linear codes are insufficient for optimal inter-session network coding [18], and even if we limit ourselves to linear codes, determining how to perform the coding is NP-hard [6]....

    [...]

Journal ArticleDOI
04 Feb 2011
TL;DR: In this paper, the authors provide an overview of the research results on network coding for distributed storage systems and provide a comparison between erasure codes and network coding techniques, showing that maintenance bandwidth can be reduced by orders of magnitude compared to standard erasure code.
Abstract: Distributed storage systems often introduce redundancy to increase reliability. When coding is used, the repair problem arises: if a node storing encoded information fails, in order to maintain the same level of reliability we need to create encoded information at a new node. This amounts to a partial recovery of the code, whereas conventional erasure coding focuses on the complete recovery of the information from a subset of encoded packets. The consideration of the repair network traffic gives rise to new design challenges. Recently, network coding techniques have been instrumental in addressing these challenges, establishing that maintenance bandwidth can be reduced by orders of magnitude compared to standard erasure codes. This paper provides an overview of the research results on this topic.

738 citations

Journal ArticleDOI
TL;DR: This work reduces the problem of establishing minimum-cost multicast connections over coded packet networks to a polynomial-time solvable optimization problem, and presents decentralized algorithms for solving it.
Abstract: We consider the problem of establishing minimum-cost multicast connections over coded packet networks, i.e., packet networks where the contents of outgoing packets are arbitrary, causal functions of the contents of received packets. We consider both wireline and wireless packet networks as well as both static multicast (where membership of the multicast group remains constant for the duration of the connection) and dynamic multicast (where membership of the multicast group changes in time, with nodes joining and leaving the group). For static multicast, we reduce the problem to a polynomial-time solvable optimization problem, and we present decentralized algorithms for solving it. These algorithms, when coupled with existing decentralized schemes for constructing network codes, yield a fully decentralized approach for achieving minimum-cost multicast. By contrast, establishing minimum-cost static multicast connections over routed packet networks is a very difficult problem even using centralized computation, except in the special cases of unicast and broadcast connections. For dynamic multicast, we reduce the problem to a dynamic programming problem and apply the theory of dynamic programming to suggest how it may be solved.

451 citations


Cites background from "Insufficiency of linear coding in n..."

  • ...One rea son for this is that coding for multiple connections is a very difficult problem—one that, in fact, remains currently open with only cumbersome bounds on the asymptotic capability of coding [16] and examples that demonstrate the insufficiency of various classes of linear codes [17], [18], [19], [20]....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: This work reveals that it is in general not optimal to regard the information to be multicast as a "fluid" which can simply be routed or replicated, and by employing coding at the nodes, which the work refers to as network coding, bandwidth can in general be saved.
Abstract: We introduce a new class of problems called network information flow which is inspired by computer network applications. Consider a point-to-point communication network on which a number of information sources are to be multicast to certain sets of destinations. We assume that the information sources are mutually independent. The problem is to characterize the admissible coding rate region. This model subsumes all previously studied models along the same line. We study the problem with one information source, and we have obtained a simple characterization of the admissible coding rate region. Our result can be regarded as the max-flow min-cut theorem for network information flow. Contrary to one's intuition, our work reveals that it is in general not optimal to regard the information to be multicast as a "fluid" which can simply be routed or replicated. Rather, by employing coding at the nodes, which we refer to as network coding, bandwidth can in general be saved. This finding may have significant impact on future design of switching systems.

8,533 citations


"Insufficiency of linear coding in n..." refers background in this paper

  • ...The authors thank Kris Popat for providing a helpful suggestion....

    [...]

Journal ArticleDOI
TL;DR: This work forms this multicast problem and proves that linear coding suffices to achieve the optimum, which is the max-flow from the source to each receiving node.
Abstract: Consider a communication network in which certain source nodes multicast information to other nodes on the network in the multihop fashion where every node can pass on any of its received data to others. We are interested in how fast each node can receive the complete information, or equivalently, what the information rate arriving at each node is. Allowing a node to encode its received data before passing it on, the question involves optimization of the multicast mechanisms at the nodes. Among the simplest coding schemes is linear coding, which regards a block of data as a vector over a certain base field and allows a node to apply a linear transformation to a vector before passing it on. We formulate this multicast problem and prove that linear coding suffices to achieve the optimum, which is the max-flow from the source to each receiving node.

3,660 citations

Book
01 Jan 1961

2,827 citations

Journal ArticleDOI
TL;DR: For the multicast setup it is proved that there exist coding strategies that provide maximally robust networks and that do not require adaptation of the network interior to the failure pattern in question.
Abstract: We take a new look at the issue of network capacity. It is shown that network coding is an essential ingredient in achieving the capacity of a network. Building on recent work by Li et al.(see Proc. 2001 IEEE Int. Symp. Information Theory, p.102), who examined the network capacity of multicast networks, we extend the network coding framework to arbitrary networks and robust networking. For networks which are restricted to using linear network codes, we find necessary and sufficient conditions for the feasibility of any given set of connections over a given network. We also consider the problem of network recovery for nonergodic link failures. For the multicast setup we prove that there exist coding strategies that provide maximally robust networks and that do not require adaptation of the network interior to the failure pattern in question. The results are derived for both delay-free networks and networks with delays.

2,628 citations

Proceedings ArticleDOI
30 Nov 2006
TL;DR: This paper presents their recent experiences with a highly optimized and high-performance C++ implementation of randomized network coding at the application layer, and presents their observations based on an extensive series of experiments.
Abstract: With network coding, intermediate nodes between the source and the receivers of an end-to-end communication session are not only capable of relaying and replicating data messages, but also of coding incoming messages to produce coded outgoing ones. Recent studies have shown that network coding is beneficial for peer-to-peer content distribution, since it eliminates the need for content reconciliation, and is highly resilient to peer failures. In this paper, we present our recent experiences with a highly optimized and high-performance C++ implementation of randomized network coding at the application layer. We present our observations based on an extensive series of experiments, draw conclusions from a wide range of scenarios, and are more cautious and less optimistic as compared to previous studies.

1,525 citations

Trending Questions (1)
What are the limitations of linear information flow?

Linear coding is insufficient for all solvable networks, as shown by a counterexample in the paper. It fails even in broader contexts like finite rings and modules.