61 research outputs found
Cooperative Data Exchange with Unreliable Clients
Consider a set of clients in a broadcast network, each of which holds a
subset of packets in the ground set X. In the (coded) cooperative data exchange
problem, the clients need to recover all packets in X by exchanging coded
packets over a lossless broadcast channel. Several previous works analyzed this
problem under the assumption that each client initially holds a random subset
of packets in X. In this paper we consider a generalization of this problem for
settings in which an unknown (but of a certain size) subset of clients are
unreliable and their packet transmissions are subject to arbitrary erasures.
For the special case of one unreliable client, we derive a closed-form
expression for the minimum number of transmissions required for each reliable
client to obtain all packets held by other reliable clients (with probability
approaching 1 as the number of packets tends to infinity). Furthermore, for the
cases with more than one unreliable client, we provide an approximation
solution in which the number of transmissions per packet is within an
arbitrarily small additive factor from the value of the optimal solution.Comment: 8 pages; in Proc. 53rd Annual Allerton Conference on Communication,
Control, and Computing (Allerton 2015
Successive Local and Successive Global Omniscience
This paper considers two generalizations of the cooperative data exchange
problem, referred to as the successive local omniscience (SLO) and the
successive global omniscience (SGO). The users are divided into nested
sub-groups. Each user initially knows a subset of packets in a ground set
of size , and all users wish to learn all packets in . The users exchange
their packets by broadcasting coded or uncoded packets. In SLO or SGO, in the
th () round of transmissions, the th smallest sub-group
of users need to learn all packets they collectively hold or all packets in
, respectively. The problem is to find the minimum sum-rate (i.e., the total
transmission rate by all users) for each round, subject to minimizing the
sum-rate for the previous round. To solve this problem, we use a
linear-programming approach. For the cases in which the packets are randomly
distributed among users, we construct a system of linear equations whose
solution characterizes the minimum sum-rate for each round with high
probability as tends to infinity. Moreover, for the special case of two
nested groups, we derive closed-form expressions, which hold with high
probability as tends to infinity, for the minimum sum-rate for each round.Comment: Accepted for publication in Proc. ISIT 201
Weakly Secure Regenerating Codes for Distributed Storage
We consider the problem of secure distributed data storage under the paradigm
of \emph{weak security}, in which no \emph{meaningful information} is leaked to
the eavesdropper. More specifically, the eavesdropper cannot get any
information about any individual message file or a small group of files. The
key benefit of the weak security paradigm is that it incurs no loss in the
storage capacity, which makes it practically appealing.
In this paper, we present a coding scheme, using a coset coding based outer
code and a Product-Matrix Minimum Bandwidth Regenerating code (proposed by
Rashmi et al.) as an inner code, that achieves weak security when the
eavesdropper can observe any single storage node. We show that the proposed
construction has good security properties and requires small finite field size.Comment: Extended version of the paper accepted in NetCod 201
On Coding for Cooperative Data Exchange
We consider the problem of data exchange by a group of closely-located
wireless nodes. In this problem each node holds a set of packets and needs to
obtain all the packets held by other nodes. Each of the nodes can broadcast the
packets in its possession (or a combination thereof) via a noiseless broadcast
channel of capacity one packet per channel use. The goal is to minimize the
total number of transmissions needed to satisfy the demands of all the nodes,
assuming that they can cooperate with each other and are fully aware of the
packet sets available to other nodes. This problem arises in several practical
settings, such as peer-to-peer systems and wireless data broadcast. In this
paper, we establish upper and lower bounds on the optimal number of
transmissions and present an efficient algorithm with provable performance
guarantees. The effectiveness of our algorithms is established through
numerical simulations.Comment: Appeared in the proceedings of the 2010 IEEE Information Theory
Workshop (ITW 2010, Cairo
- β¦