Efficient Universal Recovery in Broadcast Networks

Similar documents
Near Optimal Broadcast with Network Coding in Large Sensor Networks

Shannon capacity and related problems in Information Theory and Ramsey Theory

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Lecture 5: Properties of convex sets

Treewidth and graph minors

Distributed Computing over Communication Networks: Leader Election

Group Secret Key Generation Algorithms

11.1. Definitions. 11. Domination in Graphs

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Lecture 11: Maximum flow and minimum cut

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

Johns Hopkins Math Tournament Proof Round: Point Set Topology

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

arxiv:math/ v3 [math.co] 24 Dec 1999

The strong chromatic number of a graph

Discrete mathematics , Fall Instructor: prof. János Pach

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments

Graph Connectivity G G G

by conservation of flow, hence the cancelation. Similarly, we have

Coded Cooperative Data Exchange for Multiple Unicasts

The Capacity of Wireless Networks

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

Graph Definitions. In a directed graph the edges have directions (ordered pairs). A weighted graph includes a weight function.

Math 170- Graph Theory Notes

Error correction guarantees

Judicious bisections

The Encoding Complexity of Network Coding

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Suppose we have a function p : X Y from a topological space X onto a set Y. we want to give a topology on Y so that p becomes a continuous map.

Ma/CS 6b Class 26: Art Galleries and Politicians

Graph Theory S 1 I 2 I 1 S 2 I 1 I 2

Module 7. Independent sets, coverings. and matchings. Contents

MAXIMAL FLOW THROUGH A NETWORK

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

An algorithm for Performance Analysis of Single-Source Acyclic graphs

The Role of Network Coding in Wireless Unicast

1 Minimum Cut Problem

Notes for Lecture 20

Ma/CS 6b Class 13: Counting Spanning Trees

Layer 2 functionality bridging and switching

CMPSCI 311: Introduction to Algorithms Practice Final Exam

Disjoint directed cycles

FOUR EDGE-INDEPENDENT SPANNING TREES 1

Abstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H.

Paths, Circuits, and Connected Graphs

Tutorial for Algorithm s Theory Problem Set 5. January 17, 2013

Module 11. Directed Graphs. Contents

The Multi-Sender Multicast Index Coding

Connectivity of the zero-divisor graph for finite rings

Superconcentrators of depth 2 and 3; odd levels help (rarely)

Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding

Modeling web-crawlers on the Internet with random walksdecember on graphs11, / 15

Minimal Classes of Bipartite Graphs of Unbounded Clique-width

Convexity: an introduction

arxiv: v1 [math.co] 4 Apr 2011

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Integer Programming Theory

Exercise set 2 Solutions

In this chapter, we define limits of functions and describe some of their properties.

Assignment # 4 Selected Solutions

Pebble Sets in Convex Polygons

Edge intersection graphs. of systems of grid paths. with bounded number of bends

Today. Maximum flow. Maximum flow. Problem

MATH 682 Notes Combinatorics and Graph Theory II. One interesting class of graphs rather akin to trees and acyclic graphs is the bipartite graph:

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Throughout this course, we use the terms vertex and node interchangeably.

Approximation Algorithms

6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality

Queue Length Stability in Trees Under Slowly Convergent Traffic Using Sequential Maximal Scheduling

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng

The Encoding Complexity of Network Coding

Λέων-Χαράλαμπος Σταματάρης

On the Robustness of Distributed Computing Networks

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016

cs/ee 143 Fall

VIZING S THEOREM AND EDGE-CHROMATIC GRAPH THEORY. Contents

CSE 417 Network Flows (pt 3) Modeling with Min Cuts

Network flows and Menger s theorem

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

On the Robustness of Distributed Computing Networks

Introduction to Graph Theory

Hierarchical Coded Caching

Lecture 2 September 3

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4)

Mobility Control for Complete Coverage in Wireless Sensor Networks

Generalized Interlinked Cycle Cover for Index Coding

IN A WIRELINE network having a single source and a single

Independence Number and Cut-Vertices

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem

Discharging and reducible configurations

POLYHEDRAL GEOMETRY. Convex functions and sets. Mathematical Programming Niels Lauritzen Recall that a subset C R n is convex if

Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two

SANDRA SPIROFF AND CAMERON WICKHAM

Matching and Planarity

Lecture 6: Graph Properties

WHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks

Transcription:

Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 1 / 19

System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 2 / 19

System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 2 / 19

System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. p 1 p 3 p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 2 / 19

System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. p 1 p 1, p 2, p 3 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 2 / 19

System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. p 2, p 1 + p 3 p 2, p 1 + p 3 p 1 p 1, p 2, p 3 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 2 / 19

System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. Universal Recovery is achieved if some transmission scheme permits each node to recover all k packets. p 1, p 2, p 3 p 1, p 2, p 3 p 1, p 2, p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 2 / 19

System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. Universal Recovery is achieved if some transmission scheme permits each node to recover all k packets. Question What is the minimum number of transmissions required for universal recovery? Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 2 / 19

Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 3 / 19

Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. For the previous example, b 1 1 = 1, b1 3 = 1, and b2 2 = 2 is a transmission strategy that permits universal recovery. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 3 / 19

Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. For the previous example, b 1 1 = 1, b1 3 = 1, and b2 2 = 2 is a transmission strategy that permits universal recovery. Given a transmission strategy that permits universal recovery, the encoding operations can be efficiently computed using the algorithm developed by Jaggi et al. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 3 / 19

Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 4 / 19

Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 4 / 19

Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 4 / 19

Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. 3 Each minimal cut corresponds to a constraint defining R r (and vice versa). Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 4 / 19

Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. 3 Each minimal cut corresponds to a constraint defining R r (and vice versa). 4 Thus, a transmission strategy permits universal recovery iff {b j i } R r. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 4 / 19

Neighborhood of a set S S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 5 / 19

Neighborhood of a set S Γ(S ) S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 5 / 19

The Region R r A Set of Transmission Strategies Definition (The region R r Z N r + ) {b j i } R r if and only if: S 0 S r [N] satisfying S j Γ(S j 1 ) for each j [r], the following inequalities hold : r b (r+1 j) i. j=1 i Sj c Γ(S j 1) i S r P c i Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 6 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 S 2 S 0 = {1}, S 1 = S 2 = {1, 2} b 1 3 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 S 2 S 0 = S 1 = {1}, S 2 = {1, 2} b 2 2 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

S 0 S 1 S 2 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 = S 1 = S 2 = {1} b 1 2 + b2 2 2 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i S 0 = {1}, S 1 = S 2 = {1, 2} b 1 3 1 S 0 = S 1 = {1}, S 2 = {1, 2} b 2 2 1 S 0 = S 1 = S 2 = {1} b 1 2 + b2 2 2 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i S 0 = {1}, S 1 = S 2 = {1, 2} b 1 3 1 S 0 = S 1 = {1}, S 2 = {1, 2} b 2 2 1 S 0 = S 1 = S 2 = {1} b 1 2 + b2 2 2 By symmetry: b 1 1 1. All other sequences of sets give redundant constraints. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 7 / 19

Sequences of Networks We can consider sequences of networks indexed by k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 8 / 19

Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 8 / 19

Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 8 / 19

Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 8 / 19

Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 8 / 19

Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Let P c S = 1 P S. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 8 / 19

Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Let P c S = 1 P S. Convergence can take place in probability. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 8 / 19

Border Nodes Characterized by simple cuts Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 9 / 19

Border Nodes Characterized by simple cuts S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 9 / 19

Border Nodes Characterized by simple cuts (S) S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 9 / 19

Per-round Transmission Constraints Simple Cuts Suffice Theorem For a fixed network topology, τ k/r fixed, and a well-behaved sequence of packet distributions {P i (k)} N i=1, if node i is allowed to transmit b i times per round and b i > τp c S, S [N] i (S) then universal recovery is possible for all sufficiently large k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 10 / 19

Per-round Transmission Constraints Simple Cuts Suffice Theorem For a fixed network topology, τ k/r fixed, and a well-behaved sequence of packet distributions {P i (k)} N i=1, if node i is allowed to transmit b i times per round and b i > τp c S, S [N] i (S) then universal recovery is possible for all sufficiently large k. Interpretation: If border nodes have the ability to relay the packets S is missing, then universal recovery is possible. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 10 / 19

Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 11 / 19

Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) Interpretation: The nodes in (S) form a bottleneck which is too tight. i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 11 / 19

Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) Interpretation: The nodes in (S) form a bottleneck which is too tight. Question What is the minimum number of transmissions required for universal recovery? i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 11 / 19

Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 12 / 19

Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 12 / 19

Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 12 / 19

Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Definition (Nonsingular Networks) A network is nonsingular if its adjacency matrix is nonsingular. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 12 / 19

Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Definition (Nonsingular Networks) A network is nonsingular if its adjacency matrix is nonsingular. Conjecture (Costello and Vu): For d 3, almost every d-regular network is nonsingular. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 12 / 19

Bounding Excess Transmissions by the Number of Nodes A theorem for structured networks Theorem For all nonsingular d-regular, d-connected networks with ρ > 0 fixed, and P i = ρ < P S, i [N], S : {i} S, (N S ) P c i > d P c S, S : S > N d we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 13 / 19

Packets Available to d Nodes Corollary For all nonsingular d-regular, d-connected networks with each packet available to at least d nodes, and P i = ρ < P S, i [N], S : {i} S, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If each packet is originally available to d nodes, then almost all transmissions are useful. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 14 / 19

Sparsely Distributed Packets Corollary For all nonsingular d-regular, d-connected networks with 0 < ρ < 1 d+1 fixed, and P i = ρ < P S, i [N], S : {i} S, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If packets are sparsely distributed and each node has ρ k packets, then almost every transmission is useful. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 15 / 19

Independent and Identically Distributed Packets Corollary For all nonsingular d-regular, d-connected networks with P S = 1 (1 q) S, S [N] 1 (1 q) N for some 0 < q < 1, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If packets are available independently at each node with probability q, then almost every transmission is useful in recovering the set of packets available to the network. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 16 / 19

Examples Two hypothetical scenarios N = 10, Ring Network Ten servers connected in a ring collectively have 1000 files. Each server has a unique 200-file subset. Between 4000 and 4010 file transfers are required for each server to recover all files. N = 1000, Fully Connected Network 1000 peers in a P2P network collectively have a movie consisting of 1,000,000 packets. Each peer has a random half of the movie (i.e. 500,000 randomly selected packets). Between 500,500 and 501,500 packet transmissions are required for universal recovery. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 17 / 19

Conclusions and Extensions Main Results Defined a region R r which characterizes all transmission strategies that permit universal recovery. Proved that it suffices to consider simple cuts in networks with a per-round transmission constraint. Bounded excess transmissions by the number of nodes for many structured networks. Extensions Can include scenarios where helper nodes are present, etc. Convergence in probability can replace Well-behaved and all results hold with arbitrarily high probability as the total number of packets grows. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 18 / 19

Thank You! Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton 2010 19 / 19