 Network coding

Network coding is a technique where, instead of simply relaying the packets of information they receive, the nodes of a network will take several packets and combine them together for transmission. This can be used to attain the maximum possible information flow in a network. Network coding is a field of information theory and coding theory.
Contents
A brief history
A network is represented by a directed graph . V is the set of nodes or vertices, E is the set of directed links (or edges), and C gives the capacity of each link of E. Let t(s,t) be the maximum possible throughput from node s to node t. It has long been known that t(s,t) is upper bounded by the minimum capacity of all cuts, which is the sum of the capacities of the edges on a cut, between these two nodes.
Karl Menger proved that there is always a set of edgedisjoint paths achieving the upper bound in a unicast scenario, known as the maxflow mincut theorem. Later, the FordFulkerson algorithm was proposed to find such paths in a polynomial time. Then, Edmonds proved in the paper "EdgeDisjoint Branchings" the upper bound in the broadcast scenario is also achievable, and proposed a polynomial time algorithm.
However, the situation in the multicast scenario is more complicated, and in fact, such an upper bound can't be reached using traditional routing ideas. Ahlswede, et al. proved that it can be achieved if additional computing tasks (incoming packets are combined into one or several outgoing packets) can be done in the intermediate nodes.^{[1]}
In 2003, Li, et al. proved that linear coding is enough to achieve the upper bound in multicast problems ^{[2]} In 2005, Randall Dougherty, Chris Freiling, and Ken Zeger showed that the linear coding is not sufficient in general (multisource, multisink with arbitrary demands), even for more general versions of linearity such as convolutional coding, filterbank coding, etc.^{[3]}
Linear network coding
In a Linear Network coding problem, a group of nodes P are involved in moving the data from S source nodes to K sink nodes. Each node generates a new packet, which is a linear combination of the earlier received packets on the link, by coefficients in the finite field.
A message generated so X_{k} is related to the received messages M_{i} by the relation:
Each node forwards the computed value X_{k} along with all the coefficients used in the k^{th} level, .
The values are the coefficients from the Galois field GF(2^{s}). Since the operations are computed in the finite field, the result of the operation is also of the same length, as the size of each vector M.
Each node produces a similar output, as computed above. This yields a linear problem of the type X = GM, where with the knowledge of the X,G we need to compute M. Each of the receivers in K, try to solve this linear equation, and for which at least packets must be received. The received packets are continually used in the Gaussian elimination method to reduce G matrix into the rowechelon form. Finally the resulting values of X = G_{echelon}M are solved to obtain M.
Example
In the butterfly network, there are two sources (at the top of the picture), each having knowledge of some value A and B. There are two destination nodes (at the bottom), which each want to know both A and B. Each edge can carry only a single value (we can think of an edge transmitting a bit in each time slot).
If we only used routing, then the central line would be able to carry A or B, but not both. Suppose we send A through the center; then the left destination would receive A twice and not know B at all. Sending B poses a similar problem for the right destination. We say that routing is insufficient because no routing scheme can transmit both A and B simultaneously to both destinations.
Using a simple code, as shown, we do get both A and B to both destinations simultaneously by sending the sum of the symbols through the center (in other words, we encode A and B using the formula "A+B"). The left destination receives A and A+B, and can find B by subtracting the two values. This is a linear code because the encoding and decoding schemes are linear operations.
Throughput
At the middle of the butterfly network, 3 messages are being transmitted (A, A+B, B). However 4 messages are being received at the endpoints at the bottom (receive 4 messages for the cost of 3 messages, Note that a message storage in the middle center router could store messages A and B and still provide all 4 messages to the endpoints (receive 4 messages for the cost of 2 messages, a 100% improvement).
Random network coding
Random Network Coding relies on using random codes at nodes for multicast or in cast networks. It was originally proposed in  T. Ho, R. Koetter, M. Medard, D. R. Karger and M. Effros, "The Benefits of Coding over Routing in a Randomized Setting" 2003 IEEE International Symposium on Information Theory. In random network coding, interior network nodes independently choose random linear mappings from inputs to outputs. The effect of the network is that of a transfer matrix from sources to receivers. To recover symbols at the receivers, we require sufficient degrees of freedom – an invertible matrix in the coefficients of all nodes. Receiver nodes can decode if they receive as many independent linear combinations as the number of source processes.
Codingaware routing
The example of codingaware routing was first proposed in ROCX.^{[4]} Consider the scenario in Fig. 2 with three flows f1 : 2→1, f2 : 1→3, f3 : 3→2. If all the links are perfect with no loss, the corresponding shortest paths are 2→5→7→4→1, 1→4→7→6→3, and 3→9→8→2 respectively. Without coding, the total number of transmissions needed to deliver one packet of each flow is 11. Under COPE, since nodes 4, 5 and 6 can not overhear each other, there is only one coding opportunity at node 4 as node 1 and node 7 exchange packets through node 4, reducing the total from 11 to 10. On the other hand, if the route of f3 is changed to 3→6→7→5→2, we need no more than 9 transmissions. Though this path has one more hop (one more transmission) than the shortest path, it creates coding opportunities at nodes 5 and 6. This leads us to investigate the extent of gain possible when routing is performed with the awareness of coding opportunities.
Applications
Network coding is seen to be useful in the following areas:
 Alternative to forward error correction and ARQ in traditional and wireless networks. eg: Multiuser ARQ^{[5]}
 Robust and resilient to network attacks like snooping, eavesdropping or replay attacks.^{[6]}
 Digital file distribution and P2P file sharing. eg: Avalanche from Microsoft
 Throughput increase in wireless mesh networks. eg : COPE,^{[7]} Codingaware routing^{[8]}^{[9]}
 Bidirectional low energy transmission in wireless sensor networks.
 Manytomany broadcast network capacity augmentations.
 Buffer and Delay reduction in spatial sensor networks: Spatial buffer multiplexing ^{[10]}
 Reduce the number of packet retransmission for a singlehop wireless multicast transmission, and hence improve network bandwidth.^{[11]}
 Packet collision.^{[12]}
Network coding and PeertoPeer Networks
Network coding may be used in a peertopeer network to reduce the amount of routing information required by peers to achieve near optimal throughput^{[citation needed]}. In large networks this can be a significant advantage, since otherwise the amount of routing overhead would scale with the size of the network. Unlike scenarios such as the butterfly network example above, network coding does not increase the maximum achievable throughput of a peertopeer network.^{[13]}
However there are several difficulties when utilising network coding in peertopeer networks.
 A peer may need to spend a large amount of time and resources decoding received data.
 It can be difficult to ensure the uniqueness of the coefficients when there are many pieces in the transferred data.
 The topology of a peertopeer network is constantly changing through the addition and removal of peers.
See also
 Secret sharing protocol
 Homomorphic Signatures for Network Coding
References
 ^ Ahlswede, Rudolf; N. Cai, ShuoYen Robert Li, and Raymond WaiHo Yeung (2000). "Network Information Flow". IEEE Transactions on Information Theory, IT46 46 (4): 1204–1216. doi:10.1109/18.850663.
 ^ S. Li, R. Yeung, and N. Cai, “Linear Network Coding”(PDF), in IEEE Transactions on Information Theory, Vol 49, No. 2, pp. 371381, 2003.
 ^ Dougherty, Freiling, and Zeger. Insufficiency of Linear Coding in Network Information Flow.[1] and [2]
 ^ http://arena.cse.sc.edu/lib/exe/fetch.php/wiki/arena/public/publications/rocx.secon06.pdf
 ^ http://www.ericsson.com/technology/research_papers/wireless_access/doc/MultiUser%20ARQ.pdf
 ^ http://home.eng.iastate.edu/~yuzhen/publications/ZhenYu_INFOCOM_2008.pdf
 ^ Sigcomm 2006 Form >> XORs in The Air: Practical Wireless Network Coding
 ^ http://arena.cse.sc.edu/papers/rocx.secon06.pdf
 ^ http://www.cs.wisc.edu/~shravan/infocom072.pdf
 ^ Welcome to IEEE Xplore 2.0: Looking at Large Networks: Coding vs. Queueing
 ^ Jalaluddin Qureshi, Chuan Heng Foh and Jianfei Cai, "An Efficient Network Coding based Retransmission Algorithm for Wireless Multicasts," IEEE PIMRC 2009, Tokyo, Japan.
 ^ Jalaluddin Qureshi, Jianfei Cai and Chuan Heng Foh, "Cooperative Retransmissions Through Collisions," IEEE ICC 2011, Tokyo, Japan
 ^ http://personal.ie.cuhk.edu.hk/~dmchiu/p2pnetcoding.pdf
External links
 Network Coding Homepage
 A network coding bibliography
 Raymond W. Yeung, Information Theory and Network Coding, Springer 2008, http://iest2.ie.cuhk.edu.hk/~whyeung/book2/
 Raymond W. Yeung et al., Network Coding Theory, now Publishers, 2005, http://iest2.ie.cuhk.edu.hk/~whyeung/netcode/monograph.html
 Christina Fragouli et al., Network Coding: An Instant Primer, ACM SIGCOMM 2006, http://infoscience.epfl.ch/getfile.py?mode=best&recid=58339.
 Avalanche Filesystem, http://research.microsoft.com/enus/projects/avalanche/default.aspx
 Random Network Coding, http://www.mit.edu/~medard/coding1.htm
 Digital Fountain Codes, http://www.icsi.berkeley.edu/~luby/
 CodingAware Routing, http://arena.cse.sc.edu/papers/rocx.secon06.pdf
 MIT offers a course: Introduction to Network Coding
 Network coding: Networking's next revolution?
 Codingaware protocol design for wireless networks: http://scholarcommons.sc.edu/etd/230/
Categories:
Wikimedia Foundation. 2010.
См. также в других словарях:
Coding theory — is the study of the properties of codes and their fitness for a specific application. Codes are used for data compression, cryptography, error correction and more recently also for network coding. Codes are studied by various scientific… … Wikipedia
Network Crack Program Hacker (NCPH) Group — Formation 1994 (1994) Type hacker group Location Sichuan Province, China Membership 4 core members, aprox. 10 members ( … Wikipedia
Network Abstraction Layer — The Network Abstraction Layer (NAL) is a part of the H.264/AVC Video Coding Standard. The main goal of the H.264/AVC NAL is the provision of a network friendly video representation addressing conversational (video telephony) and non… … Wikipedia
Network operations center — Overview of a typical NOC. Lot of monitors (front), backbone overview (back) and news broadcast on TV set (right) A network operations center (or NOC, pronounced like the word knock ) is one or more locations from which control is exercised over… … Wikipedia
Network Voice Protocol — NVP redirects here. For other uses, see NVP (disambiguation). The Network Voice Protocol (NVP) was a pioneering computer network protocol for transporting human speech over packetized communications networks. It was an early example of Voice over … Wikipedia
Omega network — An Omega network is a network configuration often used in parallel computing architectures. It is an indirect topology that relies on the perfect shuffle interconnection algorithm. Omega network with 8 processing elements Contents … Wikipedia
Advanced Audio Coding — AAC redirects here. For other uses, see AAC (disambiguation). Advanced Audio Codings iTunes standard AAC file icon Filename extension .m4a, .m4b, .m4p, .m4v, .m4r, .3gp, .mp4, .aac Internet media type audio/aac, audio/aacp, au … Wikipedia
Long noncoding RNA — Long noncoding RNAs (long ncRNAs) are generally considered (somewhat arbitrarily) as non protein coding transcripts longer than 200 nucleotides. This limit is due to practical considerations including the separation of RNAs in common experimental … Wikipedia
Distributed source coding — (DSC) is an important problem in information theory and communication. DSC problems regard the compression of multiple correlated information sources that do not communicate with each other.[1] By modeling the correlation between multiple sources … Wikipedia
Neural network — For other uses, see Neural network (disambiguation). Simplified view of a feedforward artificial neural network The term neural network was traditionally used to refer to a network or circuit of biological neurons.[1] The modern usage of the term … Wikipedia