Efficient Universal Recovery in Broadcast Networks
|
|
- Deborah Mason
- 6 years ago
- Views:
Transcription
1 Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
2 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
3 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
4 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. p 1 p 3 p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
5 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. p 1 p 1, p 2, p 3 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
6 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. p 2, p 1 + p 3 p 2, p 1 + p 3 p 1 p 1, p 2, p 3 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
7 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. Universal Recovery is achieved if some transmission scheme permits each node to recover all k packets. p 1, p 2, p 3 p 1, p 2, p 3 p 1, p 2, p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
8 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. Universal Recovery is achieved if some transmission scheme permits each node to recover all k packets. Question What is the minimum number of transmissions required for universal recovery? Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
9 Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
10 Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. For the previous example, b 1 1 = 1, b1 3 = 1, and b2 2 = 2 is a transmission strategy that permits universal recovery. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
11 Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. For the previous example, b 1 1 = 1, b1 3 = 1, and b2 2 = 2 is a transmission strategy that permits universal recovery. Given a transmission strategy that permits universal recovery, the encoding operations can be efficiently computed using the algorithm developed by Jaggi et al. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
12 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
13 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
14 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
15 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. 3 Each minimal cut corresponds to a constraint defining R r (and vice versa). Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
16 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. 3 Each minimal cut corresponds to a constraint defining R r (and vice versa). 4 Thus, a transmission strategy permits universal recovery iff {b j i } R r. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
17 Neighborhood of a set S S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
18 Neighborhood of a set S Γ(S ) S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
19 The Region R r A Set of Transmission Strategies Definition (The region R r Z N r + ) {b j i } R r if and only if: S 0 S r [N] satisfying S j Γ(S j 1 ) for each j [r], the following inequalities hold : r b (r+1 j) i. j=1 i Sj c Γ(S j 1) i S r P c i Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
20 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
21 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
22 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
23 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 S 2 S 0 = {1}, S 1 = S 2 = {1, 2} b Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
24 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
25 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
26 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
27 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 S 2 S 0 = S 1 = {1}, S 2 = {1, 2} b Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
28 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
29 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
30 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
31 S 0 S 1 S 2 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 = S 1 = S 2 = {1} b b2 2 2 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
32 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i S 0 = {1}, S 1 = S 2 = {1, 2} b S 0 = S 1 = {1}, S 2 = {1, 2} b S 0 = S 1 = S 2 = {1} b b2 2 2 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
33 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i S 0 = {1}, S 1 = S 2 = {1, 2} b S 0 = S 1 = {1}, S 2 = {1, 2} b S 0 = S 1 = S 2 = {1} b b2 2 2 By symmetry: b All other sequences of sets give redundant constraints. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
34 Sequences of Networks We can consider sequences of networks indexed by k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
35 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
36 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
37 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
38 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
39 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Let P c S = 1 P S. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
40 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Let P c S = 1 P S. Convergence can take place in probability. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
41 Border Nodes Characterized by simple cuts Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
42 Border Nodes Characterized by simple cuts S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
43 Border Nodes Characterized by simple cuts (S) S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
44 Per-round Transmission Constraints Simple Cuts Suffice Theorem For a fixed network topology, τ k/r fixed, and a well-behaved sequence of packet distributions {P i (k)} N i=1, if node i is allowed to transmit b i times per round and b i > τp c S, S [N] i (S) then universal recovery is possible for all sufficiently large k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
45 Per-round Transmission Constraints Simple Cuts Suffice Theorem For a fixed network topology, τ k/r fixed, and a well-behaved sequence of packet distributions {P i (k)} N i=1, if node i is allowed to transmit b i times per round and b i > τp c S, S [N] i (S) then universal recovery is possible for all sufficiently large k. Interpretation: If border nodes have the ability to relay the packets S is missing, then universal recovery is possible. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
46 Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
47 Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) Interpretation: The nodes in (S) form a bottleneck which is too tight. i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
48 Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) Interpretation: The nodes in (S) form a bottleneck which is too tight. Question What is the minimum number of transmissions required for universal recovery? i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
49 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
50 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
51 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
52 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Definition (Nonsingular Networks) A network is nonsingular if its adjacency matrix is nonsingular. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
53 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Definition (Nonsingular Networks) A network is nonsingular if its adjacency matrix is nonsingular. Conjecture (Costello and Vu): For d 3, almost every d-regular network is nonsingular. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
54 Bounding Excess Transmissions by the Number of Nodes A theorem for structured networks Theorem For all nonsingular d-regular, d-connected networks with ρ > 0 fixed, and P i = ρ < P S, i [N], S : {i} S, (N S ) P c i > d P c S, S : S > N d we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
55 Packets Available to d Nodes Corollary For all nonsingular d-regular, d-connected networks with each packet available to at least d nodes, and P i = ρ < P S, i [N], S : {i} S, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If each packet is originally available to d nodes, then almost all transmissions are useful. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
56 Sparsely Distributed Packets Corollary For all nonsingular d-regular, d-connected networks with 0 < ρ < 1 d+1 fixed, and P i = ρ < P S, i [N], S : {i} S, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If packets are sparsely distributed and each node has ρ k packets, then almost every transmission is useful. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
57 Independent and Identically Distributed Packets Corollary For all nonsingular d-regular, d-connected networks with P S = 1 (1 q) S, S [N] 1 (1 q) N for some 0 < q < 1, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If packets are available independently at each node with probability q, then almost every transmission is useful in recovering the set of packets available to the network. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
58 Examples Two hypothetical scenarios N = 10, Ring Network Ten servers connected in a ring collectively have 1000 files. Each server has a unique 200-file subset. Between 4000 and 4010 file transfers are required for each server to recover all files. N = 1000, Fully Connected Network 1000 peers in a P2P network collectively have a movie consisting of 1,000,000 packets. Each peer has a random half of the movie (i.e. 500,000 randomly selected packets). Between 500,500 and 501,500 packet transmissions are required for universal recovery. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
59 Conclusions and Extensions Main Results Defined a region R r which characterizes all transmission strategies that permit universal recovery. Proved that it suffices to consider simple cuts in networks with a per-round transmission constraint. Bounded excess transmissions by the number of nodes for many structured networks. Extensions Can include scenarios where helper nodes are present, etc. Convergence in probability can replace Well-behaved and all results hold with arbitrarily high probability as the total number of packets grows. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
60 Thank You! Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19
Near Optimal Broadcast with Network Coding in Large Sensor Networks
in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA
More informationShannon capacity and related problems in Information Theory and Ramsey Theory
Shannon capacity and related problems in Information Theory and Ramsey Theory Eyal Lubetzky Based on Joint work with Noga Alon and Uri Stav May 2007 1 Outline of talk Shannon Capacity of of a graph: graph:
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,
More informationLecture 5: Properties of convex sets
Lecture 5: Properties of convex sets Rajat Mittal IIT Kanpur This week we will see properties of convex sets. These properties make convex sets special and are the reason why convex optimization problems
More informationTreewidth and graph minors
Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under
More informationDistributed Computing over Communication Networks: Leader Election
Distributed Computing over Communication Networks: Leader Election Motivation Reasons for electing a leader? Reasons for not electing a leader? Motivation Reasons for electing a leader? Once elected, coordination
More informationGroup Secret Key Generation Algorithms
Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]
More information11.1. Definitions. 11. Domination in Graphs
11. Domination in Graphs Some definitions Minimal dominating sets Bounds for the domination number. The independent domination number Other domination parameters. 11.1. Definitions A vertex v in a graph
More informationMatching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.
18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have
More informationLecture 11: Maximum flow and minimum cut
Optimisation Part IB - Easter 2018 Lecture 11: Maximum flow and minimum cut Lecturer: Quentin Berthet 4.4. The maximum flow problem. We consider in this lecture a particular kind of flow problem, with
More informationOn the Relationships between Zero Forcing Numbers and Certain Graph Coverings
On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,
More informationJohns Hopkins Math Tournament Proof Round: Point Set Topology
Johns Hopkins Math Tournament 2019 Proof Round: Point Set Topology February 9, 2019 Problem Points Score 1 3 2 6 3 6 4 6 5 10 6 6 7 8 8 6 9 8 10 8 11 9 12 10 13 14 Total 100 Instructions The exam is worth
More informationIMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS
IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST
More informationCS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department
CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of
More informationarxiv:math/ v3 [math.co] 24 Dec 1999
arxiv:math/9911125v3 [math.co] 24 Dec 1999 Dynamic Monopolies of Constant Size Eli Berger February 8, 2008 Abstract The paper deals with a polling game on a graph. Initially, each vertex is colored white
More informationThe strong chromatic number of a graph
The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same
More informationDiscrete mathematics , Fall Instructor: prof. János Pach
Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,
More informationOn the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments
Electronic Journal of Graph Theory and Applications 3 (2) (2015), 191 196 On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Rafael Del Valle
More informationGraph Connectivity G G G
Graph Connectivity 1 Introduction We have seen that trees are minimally connected graphs, i.e., deleting any edge of the tree gives us a disconnected graph. What makes trees so susceptible to edge deletions?
More informationby conservation of flow, hence the cancelation. Similarly, we have
Chapter 13: Network Flows and Applications Network: directed graph with source S and target T. Non-negative edge weights represent capacities. Assume no edges into S or out of T. (If necessary, we can
More informationCoded Cooperative Data Exchange for Multiple Unicasts
Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationBounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks
Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of
More informationBipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx
Bipartite Perfect Matching in O(n log n) Randomized Time Nikhil Bhargava and Elliot Marx Background Matching in bipartite graphs is a problem that has many distinct applications. Many problems can be reduced
More informationNP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.
CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT
More informationGraph Definitions. In a directed graph the edges have directions (ordered pairs). A weighted graph includes a weight function.
Graph Definitions Definition 1. (V,E) where An undirected graph G is a pair V is the set of vertices, E V 2 is the set of edges (unordered pairs) E = {(u, v) u, v V }. In a directed graph the edges have
More informationMath 170- Graph Theory Notes
1 Math 170- Graph Theory Notes Michael Levet December 3, 2018 Notation: Let n be a positive integer. Denote [n] to be the set {1, 2,..., n}. So for example, [3] = {1, 2, 3}. To quote Bud Brown, Graph theory
More informationError correction guarantees
Error correction guarantees Drawback of asymptotic analyses Valid only as long as the incoming messages are independent. (independence assumption) The messages are independent for l iterations only if
More informationJudicious bisections
Judicious bisections Po-Shen Loh Carnegie Mellon University Joint work with Choongbum Lee and Benny Sudakov Max Cut Problem Given a graph, find a bipartition which maximizes the number of crossing edges.
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationExact Optimized-cost Repair in Multi-hop Distributed Storage Networks
Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1
More informationSuppose we have a function p : X Y from a topological space X onto a set Y. we want to give a topology on Y so that p becomes a continuous map.
V.3 Quotient Space Suppose we have a function p : X Y from a topological space X onto a set Y. we want to give a topology on Y so that p becomes a continuous map. Remark If we assign the indiscrete topology
More informationMa/CS 6b Class 26: Art Galleries and Politicians
Ma/CS 6b Class 26: Art Galleries and Politicians By Adam Sheffer The Art Gallery Problem Problem. We wish to place security cameras at a gallery, such that they cover it completely. Every camera can cover
More informationGraph Theory S 1 I 2 I 1 S 2 I 1 I 2
Graph Theory S I I S S I I S Graphs Definition A graph G is a pair consisting of a vertex set V (G), and an edge set E(G) ( ) V (G). x and y are the endpoints of edge e = {x, y}. They are called adjacent
More informationModule 7. Independent sets, coverings. and matchings. Contents
Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................
More informationMAXIMAL FLOW THROUGH A NETWORK
MAXIMAL FLOW THROUGH A NETWORK L. R. FORD, JR. AND D. R. FULKERSON Introduction. The problem discussed in this paper was formulated by T. Harris as follows: "Consider a rail network connecting two cities
More informationMinimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions
Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,
More informationAn algorithm for Performance Analysis of Single-Source Acyclic graphs
An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs
More informationThe Role of Network Coding in Wireless Unicast
The Role of Network Coding in Wireless Unicast Ramakrishna Gummadi (Ramki), UIUC Laurent Massoulie, Thomson Paris Research Lab Ramavarapu Sreenivas, UIUC June 10, 2010 Introduction Wireline: Some well
More information1 Minimum Cut Problem
CS 6 Lecture 6 Min Cut and Karger s Algorithm Scribes: Peng Hui How, Virginia Williams (05) Date: November 7, 07 Anthony Kim (06), Mary Wootters (07) Adapted from Virginia Williams lecture notes Minimum
More informationNotes for Lecture 20
U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general
More informationMa/CS 6b Class 13: Counting Spanning Trees
Ma/CS 6b Class 13: Counting Spanning Trees By Adam Sheffer Reminder: Spanning Trees A spanning tree is a tree that contains all of the vertices of the graph. A graph can contain many distinct spanning
More informationLayer 2 functionality bridging and switching
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
More informationCMPSCI 311: Introduction to Algorithms Practice Final Exam
CMPSCI 311: Introduction to Algorithms Practice Final Exam Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more detail including
More informationDisjoint directed cycles
Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint
More informationFOUR EDGE-INDEPENDENT SPANNING TREES 1
FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem
More informationAbstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H.
Abstract We discuss a class of graphs called perfect graphs. After defining them and getting intuition with a few simple examples (and one less simple example), we present a proof of the Weak Perfect Graph
More informationPaths, Circuits, and Connected Graphs
Paths, Circuits, and Connected Graphs Paths and Circuits Definition: Let G = (V, E) be an undirected graph, vertices u, v V A path of length n from u to v is a sequence of edges e i = {u i 1, u i} E for
More informationTutorial for Algorithm s Theory Problem Set 5. January 17, 2013
Tutorial for Algorithm s Theory Problem Set 5 January 17, 2013 Exercise 1: Maximum Flow Algorithms Consider the following flow network: a) Solve the maximum flow problem on the above network by using the
More informationModule 11. Directed Graphs. Contents
Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................
More informationThe Multi-Sender Multicast Index Coding
The Multi-Sender Multicast Index Coding Lawrence Ong The University of Newcastle, Australia Email: lawrence.ong@cantab.net Fabian Lim Massachusetts Institute of Technology, USA Email: flim@mit.edu Chin
More informationConnectivity of the zero-divisor graph for finite rings
Connectivity of the zero-divisor graph for finite rings Reza Akhtar and Lucas Lee Abstract The vertex-connectivity and edge-connectivity of the zero-divisor graph associated to a finite commutative ring
More informationSuperconcentrators of depth 2 and 3; odd levels help (rarely)
Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv
More informationDelay Minimization for Relay-Based Cooperative Data Exchange With Network Coding
1890 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 6, DECEMBER 2015 Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding Zheng Dong, Son Hoang Dau, Chau Yuen, Senior Member,
More informationModeling web-crawlers on the Internet with random walksdecember on graphs11, / 15
Modeling web-crawlers on the Internet with random walks on graphs December 11, 2014 Modeling web-crawlers on the Internet with random walksdecember on graphs11, 2014 1 / 15 Motivation The state of the
More informationMinimal Classes of Bipartite Graphs of Unbounded Clique-width
Minimal Classes of Bipartite Graphs of Unbounded Clique-width A. Atminas, R. Brignall, N. Korpelainen, V. Lozin, J. Stacho Abstract The celebrated result of Robertson and Seymour states that in the family
More informationConvexity: an introduction
Convexity: an introduction Geir Dahl CMA, Dept. of Mathematics and Dept. of Informatics University of Oslo 1 / 74 1. Introduction 1. Introduction what is convexity where does it arise main concepts and
More informationarxiv: v1 [math.co] 4 Apr 2011
arxiv:1104.0510v1 [math.co] 4 Apr 2011 Minimal non-extensible precolorings and implicit-relations José Antonio Martín H. Abstract. In this paper I study a variant of the general vertex coloring problem
More informationPlanar Graphs. 1 Graphs and maps. 1.1 Planarity and duality
Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter
More informationInteger Programming Theory
Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x
More informationExercise set 2 Solutions
Exercise set 2 Solutions Let H and H be the two components of T e and let F E(T ) consist of the edges of T with one endpoint in V (H), the other in V (H ) Since T is connected, F Furthermore, since T
More informationIn this chapter, we define limits of functions and describe some of their properties.
Chapter 2 Limits of Functions In this chapter, we define its of functions and describe some of their properties. 2.. Limits We begin with the ϵ-δ definition of the it of a function. Definition 2.. Let
More informationAssignment # 4 Selected Solutions
Assignment # 4 Selected Solutions Problem 2.3.3 Let G be a connected graph which is not a tree (did you notice this is redundant?) and let C be a cycle in G. Prove that the complement of any spanning tree
More informationPebble Sets in Convex Polygons
2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon
More informationEdge intersection graphs. of systems of grid paths. with bounded number of bends
Edge intersection graphs of systems of grid paths with bounded number of bends Andrei Asinowski a, Andrew Suk b a Caesarea Rothschild Institute, University of Haifa, Haifa 31905, Israel. b Courant Institute,
More informationToday. Maximum flow. Maximum flow. Problem
5 Maximum Flow (slides 1 4) Today Maximum flow Algorithms and Networks 2008 Maximum flow problem Applications Briefly: Ford-Fulkerson; min cut max flow theorem Preflow push algorithm Lift to front algorithm
More informationMATH 682 Notes Combinatorics and Graph Theory II. One interesting class of graphs rather akin to trees and acyclic graphs is the bipartite graph:
1 Bipartite graphs One interesting class of graphs rather akin to trees and acyclic graphs is the bipartite graph: Definition 1. A graph G is bipartite if the vertex-set of G can be partitioned into two
More informationMathematical and Algorithmic Foundations Linear Programming and Matchings
Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis
More informationThroughout this course, we use the terms vertex and node interchangeably.
Chapter Vertex Coloring. Introduction Vertex coloring is an infamous graph theory problem. It is also a useful toy example to see the style of this course already in the first lecture. Vertex coloring
More informationApproximation Algorithms
Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours
More information6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality
6.854 Advanced Algorithms Scribes: Jay Kumar Sundararajan Lecturer: David Karger Duality This lecture covers weak and strong duality, and also explains the rules for finding the dual of a linear program,
More informationQueue Length Stability in Trees Under Slowly Convergent Traffic Using Sequential Maximal Scheduling
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering November 2008 Queue Length Stability in Trees Under Slowly Convergent Traffic Using
More informationLifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng
Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks Presented by Yao Zheng Contributions Analyzing the lifetime of WSN without knowing the lifetime of sensors Find a accurate approximation
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationΛέων-Χαράλαμπος Σταματάρης
Λέων-Χαράλαμπος Σταματάρης INTRODUCTION Two classical problems of information dissemination in computer networks: The broadcasting problem: Distributing a particular message from a distinguished source
More informationOn the Robustness of Distributed Computing Networks
1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,
More informationGRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016
GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS ZOÉ HAMEL March 3, 2016 1. Introduction Let G = (V (G), E(G)) be a graph G (loops and multiple edges not allowed) on the set of vertices V (G) and the set
More informationcs/ee 143 Fall
cs/ee 143 Fall 2018 5 2 Ethernet 2.1 W&P, P3.2 3 Points. Consider the Slotted ALOHA MAC protocol. There are N nodes sharing a medium, and time is divided into slots. Each packet takes up a single slot.
More informationVIZING S THEOREM AND EDGE-CHROMATIC GRAPH THEORY. Contents
VIZING S THEOREM AND EDGE-CHROMATIC GRAPH THEORY ROBERT GREEN Abstract. This paper is an expository piece on edge-chromatic graph theory. The central theorem in this subject is that of Vizing. We shall
More informationCSE 417 Network Flows (pt 3) Modeling with Min Cuts
CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined
More informationNetwork flows and Menger s theorem
Network flows and Menger s theorem Recall... Theorem (max flow, min cut strong duality). Let G be a network. The maximum value of a flow equals the minimum capacity of a cut. We prove this strong duality
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationOn the Robustness of Distributed Computing Networks
1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,
More informationIntroduction to Graph Theory
Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex
More informationHierarchical Coded Caching
Hierarchical Coded Caching ikhil Karamchandani, Urs iesen, Mohammad Ali Maddah-Ali, and Suhas Diggavi Abstract arxiv:403.7007v2 [cs.it] 6 Jun 204 Caching of popular content during off-peak hours is a strategy
More informationLecture 2 September 3
EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give
More informationCharacterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4)
S-72.2420/T-79.5203 Basic Concepts 1 S-72.2420/T-79.5203 Basic Concepts 3 Characterizing Graphs (1) Characterizing Graphs (3) Characterizing a class G by a condition P means proving the equivalence G G
More informationMobility Control for Complete Coverage in Wireless Sensor Networks
Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida
More informationGeneralized Interlinked Cycle Cover for Index Coding
Generalized Interlinked Cycle Cover for Index Coding Chandra Thapa, Lawrence Ong, and Sarah J. Johnson School of Electrical Engineering and Computer Science, The University of Newcastle, Newcastle, Australia
More informationIN A WIRELINE network having a single source and a single
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 463 A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Student Member, IEEE, Amir F. Dana, Student Member, IEEE, Babak Hassibi,
More informationIndependence Number and Cut-Vertices
Independence Number and Cut-Vertices Ryan Pepper University of Houston Downtown, Houston, Texas 7700 pepperr@uhd.edu Abstract We show that for any connected graph G, α(g) C(G) +1, where α(g) is the independence
More informationEfficient Content Delivery and Low Complexity Codes. Amin Shokrollahi
Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter
More informationMethods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem
Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem L. De Giovanni M. Di Summa The Traveling Salesman Problem (TSP) is an optimization problem on a directed
More informationDischarging and reducible configurations
Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs
More informationPOLYHEDRAL GEOMETRY. Convex functions and sets. Mathematical Programming Niels Lauritzen Recall that a subset C R n is convex if
POLYHEDRAL GEOMETRY Mathematical Programming Niels Lauritzen 7.9.2007 Convex functions and sets Recall that a subset C R n is convex if {λx + (1 λ)y 0 λ 1} C for every x, y C and 0 λ 1. A function f :
More informationAnalysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two
Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Nabiha Asghar Department of Combinatorics & Optimization University of Waterloo, Ontario, Canada
More informationSANDRA SPIROFF AND CAMERON WICKHAM
A ZERO DIVISOR GRAPH DETERMINED BY EQUIVALENCE CLASSES OF ZERO DIVISORS arxiv:0801.0086v2 [math.ac] 17 Aug 2009 SANDRA SPIROFF AND CAMERON WICKHAM Abstract. We study the zero divisor graph determined by
More informationMatching and Planarity
Matching and Planarity Po-Shen Loh June 010 1 Warm-up 1. (Bondy 1.5.9.) There are n points in the plane such that every pair of points has distance 1. Show that there are at most n (unordered) pairs of
More informationLecture 6: Graph Properties
Lecture 6: Graph Properties Rajat Mittal IIT Kanpur In this section, we will look at some of the combinatorial properties of graphs. Initially we will discuss independent sets. The bulk of the content
More informationWHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks
570 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY 2012 Bounding the Coding Advantage of Combination Network Coding in Undirected Networks Shreya Maheshwar, Zongpeng Li, Member, IEEE,
More information