22,719 research outputs found
On Approximating the Sum-Rate for Multiple-Unicasts
We study upper bounds on the sum-rate of multiple-unicasts. We approximate
the Generalized Network Sharing Bound (GNS cut) of the multiple-unicasts
network coding problem with independent sources. Our approximation
algorithm runs in polynomial time and yields an upper bound on the joint source
entropy rate, which is within an factor from the GNS cut. It
further yields a vector-linear network code that achieves joint source entropy
rate within an factor from the GNS cut, but \emph{not} with
independent sources: the code induces a correlation pattern among the sources.
Our second contribution is establishing a separation result for vector-linear
network codes: for any given field there exist networks for which
the optimum sum-rate supported by vector-linear codes over for
independent sources can be multiplicatively separated by a factor of
, for any constant , from the optimum joint entropy
rate supported by a code that allows correlation between sources. Finally, we
establish a similar separation result for the asymmetric optimum vector-linear
sum-rates achieved over two distinct fields and
for independent sources, revealing that the choice of field
can heavily impact the performance of a linear network code.Comment: 10 pages; Shorter version appeared at ISIT (International Symposium
on Information Theory) 2015; some typos correcte
Parameterizable Byzantine Broadcast in Loosely Connected Networks
We consider the problem of reliably broadcasting information in a multihop
asynchronous network, despite the presence of Byzantine failures: some nodes
are malicious and behave arbitrarly. We focus on non-cryptographic solutions.
Most existing approaches give conditions for perfect reliable broadcast (all
correct nodes deliver the good information), but require a highly connected
network. A probabilistic approach was recently proposed for loosely connected
networks: the Byzantine failures are randomly distributed, and the correct
nodes deliver the good information with high probability. A first solution
require the nodes to initially know their position on the network, which may be
difficult or impossible in self-organizing or dynamic networks. A second
solution relaxed this hypothesis but has much weaker Byzantine tolerance
guarantees. In this paper, we propose a parameterizable broadcast protocol that
does not require nodes to have any knowledge about the network. We give a
deterministic technique to compute a set of nodes that always deliver authentic
information, for a given set of Byzantine failures. Then, we use this technique
to experimentally evaluate our protocol, and show that it significantely
outperforms previous solutions with the same hypotheses. Important disclaimer:
these results have NOT yet been published in an international conference or
journal. This is just a technical report presenting intermediary and incomplete
results. A generalized version of these results may be under submission
Interest communities and flow roles in directed networks: the Twitter network of the UK riots
Directionality is a crucial ingredient in many complex networks in which
information, energy or influence are transmitted. In such directed networks,
analysing flows (and not only the strength of connections) is crucial to reveal
important features of the network that might go undetected if the orientation
of connections is ignored. We showcase here a flow-based approach for community
detection in networks through the study of the network of the most influential
Twitter users during the 2011 riots in England. Firstly, we use directed Markov
Stability to extract descriptions of the network at different levels of
coarseness in terms of interest communities, i.e., groups of nodes within which
flows of information are contained and reinforced. Such interest communities
reveal user groupings according to location, profession, employer, and topic.
The study of flows also allows us to generate an interest distance, which
affords a personalised view of the attention in the network as viewed from the
vantage point of any given user. Secondly, we analyse the profiles of incoming
and outgoing long-range flows with a combined approach of role-based similarity
and the novel relaxed minimum spanning tree algorithm to reveal that the users
in the network can be classified into five roles. These flow roles go beyond
the standard leader/follower dichotomy and differ from classifications based on
regular/structural equivalence. We then show that the interest communities fall
into distinct informational organigrams characterised by a different mix of
user roles reflecting the quality of dialogue within them. Our generic
framework can be used to provide insight into how flows are generated,
distributed, preserved and consumed in directed networks.Comment: 32 pages, 14 figures. Supplementary Spreadsheet available from:
http://www2.imperial.ac.uk/~mbegueri/Docs/riotsCommunities.zip or
http://rsif.royalsocietypublishing.org/content/11/101/20140940/suppl/DC
Delay Reduction in Multi-Hop Device-to-Device Communication using Network Coding
This paper considers the problem of reducing the broadcast decoding delay of
wireless networks using instantly decodable network coding (IDNC) based
device-to-device (D2D) communications. In a D2D configuration, devices in the
network can help hasten the recovery of the lost packets of other devices in
their transmission range by sending network coded packets. Unlike previous
works that assumed fully connected network, this paper proposes a partially
connected configuration in which the decision should be made not only on the
packet combinations but also on the set of transmitting devices. First, the
different events occurring at each device are identified so as to derive an
expression for the probability distribution of the decoding delay. The joint
optimization problem over the set of transmitting devices and the packet
combinations of each is, then, formulated. The optimal solution of the joint
optimization problem is derived using a graph theory approach by introducing
the cooperation graph and reformulating the problem as a maximum weight clique
problem in which the weight of each vertex is the contribution of the device
identified by the vertex. Through extensive simulations, the decoding delay
experienced by all devices in the Point to Multi-Point (PMP) configuration, the
fully connected D2D (FC-D2D) configuration and the more practical partially
connected D2D (PC-D2D) configuration are compared. Numerical results suggest
that the PC-D2D outperforms the FC-D2D and provides appreciable gain especially
for poorly connected networks
Fast Structuring of Radio Networks for Multi-Message Communications
We introduce collision free layerings as a powerful way to structure radio
networks. These layerings can replace hard-to-compute BFS-trees in many
contexts while having an efficient randomized distributed construction. We
demonstrate their versatility by using them to provide near optimal distributed
algorithms for several multi-message communication primitives.
Designing efficient communication primitives for radio networks has a rich
history that began 25 years ago when Bar-Yehuda et al. introduced fast
randomized algorithms for broadcasting and for constructing BFS-trees. Their
BFS-tree construction time was rounds, where is the network
diameter and is the number of nodes. Since then, the complexity of a
broadcast has been resolved to be rounds. On the other hand, BFS-trees have been used as a crucial building
block for many communication primitives and their construction time remained a
bottleneck for these primitives.
We introduce collision free layerings that can be used in place of BFS-trees
and we give a randomized construction of these layerings that runs in nearly
broadcast time, that is, w.h.p. in rounds for any constant . We then use these
layerings to obtain: (1) A randomized algorithm for gathering messages
running w.h.p. in rounds. (2) A randomized -message
broadcast algorithm running w.h.p. in rounds. These
algorithms are optimal up to the small difference in the additive
poly-logarithmic term between and . Moreover, they imply the
first optimal round randomized gossip algorithm
- …