SlideShare une entreprise Scribd logo
1  sur  31
Network Coding
Department of Computer Engineering
Sharif University of Technology
Winter 2016
Arash Pourdamghani
A Short Introduction
to
Outline
Background
Examples
Theories
Benefits & Challenges
2
Arash PourdamghaniNetwork Coding
Background
3
Arash PourdamghaniNetwork Coding
Networking
Sharing resources
Unify multiple devices
Packet switching
Through multiple layers
4
Arash PourdamghaniNetwork Coding
Routing
Planning trip for packets from source to destination
Model network by (weighted) graphs
0111
1001
5
Arash PourdamghaniNetwork Coding
Routing drawback
Treat information as independent commodities!
6
Arash PourdamghaniNetwork Coding
Examples
7
Arash PourdamghaniNetwork Coding
Butterfly Network
S
A B
C
𝑅1 𝑅2
8
Arash PourdamghaniNetwork Coding
Butterfly Network(cont’d)
S
A B
C
𝑅1 𝑅2
D
S
A B
C
𝑅1 𝑅2
D
S
A B
C
𝑅1 𝑅2
D
9
Arash PourdamghaniNetwork Coding
New Idea
10
Arash PourdamghaniNetwork Coding
Butterfly Network(cont’d)
S
A B
C
𝑅1 𝑅2
D
m1 m2
m1 ⊕ m2
11
Arash PourdamghaniNetwork Coding
Wireless Communication
A and B want to exchange 2 files by helping a
relay node R (e.g. a satellite link)
𝐴 𝑅 𝐵
𝐴 𝑅 𝐵
𝐴 𝑅 𝐵
𝐴 𝑅 𝐵
m1
m1
m2
m2
12
Arash PourdamghaniNetwork Coding
Wireless Communication (Cont’d)
Energy efficient
 Less delay
 More wireless bandwidth
𝐴 𝑅 𝐵
𝐴 𝑅 𝐵
m1 m2
m1 ⊕ m2 m1 ⊕ m2
13
Arash PourdamghaniNetwork Coding
Content Distribution
Combining collaborative content distribution &
network coding
14
Arash PourdamghaniNetwork Coding
Content Distribution(cont’d)
Capacity increase with increasing the clients
number !
15
Arash PourdamghaniNetwork Coding
Theories
16
Arash PourdamghaniNetwork Coding
Other disciplines
17
Arash PourdamghaniNetwork Coding
Overview
𝑆1, 𝑆2, … 𝑆 𝑘 want to transmit to 𝑅1, 𝑅2, … 𝑅 𝑛
simulatencly
𝑆1
𝑆2
𝑆 𝑘
𝑅1
𝑅2
𝑅 𝑛
18
h
Arash PourdamghaniNetwork Coding
Min-Cut Max-Flow
Acyclic graph G = (V,E) with unit capacity edges,
a source vertex S, and a receiver vertex R.
 If the min-cut between S and R equals h, then
the information can be send from S to R at a
maximum rate of h.
19
Arash PourdamghaniNetwork Coding
Main Theorem
There exists a multicast transmission scheme over a
large enough finite field 𝑭 𝒒, in which intermediate
network nodes linearly combine their incoming
information symbols over 𝐹𝑞, that delivers the
information from the sources simultaneously to each
receiver at a rate equal to h.
20
Arash PourdamghaniNetwork Coding
Multicast Transmission
One-to-many communication with specific
receiver addresses
21
Arash PourdamghaniNetwork Coding
Finite Fields
Abelian Group -> Galois Field -> Extension Fields
 Closure, Associativity, Commutativity
Identity & Inverse element
Closed on ‘+’ and ‘.’
22
+ 0 1
0 0 1
1 1 0
. 0 1
0 0 0
1 0 1
Arash PourdamghaniNetwork Coding
Finite Fields(cont’d)
Prime Fields: 𝐺𝐹(𝑝) where 𝑝 is prime number
Extension fields: 𝐺𝐹(𝑝 𝑚) where 𝑝 is prime
number and 𝑚 > 1
23
+ 0 1 A B
0 0 1 A B
1 1 0 B A
A A B 0 1
B B A 1 0
. 0 1 A B
0 0 0 0 0
1 0 1 A B
A 0 A B 1
B 0 B 1 A
Arash PourdamghaniNetwork Coding
Proof methods
•Algebraic
• There exist values in some large enough finite field 𝐹𝑞 for the
components {𝛼 𝑘} of the local coding vectors, such that all
matrices 𝑨𝒋,1 ≤ j ≤ N, defining the information that the
receivers observe, are full rank .
•Information Theoretic
• For each vertex 𝑣 select |𝑂𝑢𝑡(𝑣)| functions 𝑓𝑖
𝑣
: 2ℎ 𝐼𝑛 𝑣 → 2ℎ
chosen uniformly at random
• Each receiver could decode all source packets if get sufficient input
packets
24
Arash PourdamghaniNetwork Coding
Benefits
&
Challenges
25
Arash PourdamghaniNetwork Coding
Benefits
Throughput increment
In place coding
Efficiency of wireless resources
Using current cables
26
Arash PourdamghaniNetwork Coding 27
Coding Advantage
DIRECTED GRAPHS
Multicast : Ω( 𝑛)
Multiple unicast: Ω(𝑛)
UNDIRECTED GRAPHS
Upper bound is 2
Lower bound is
8
7
27
Arash PourdamghaniNetwork Coding
Challenges
Dynamic changes
Complexity of computations
Security of transmitted data
Integration with existing infrastructure
28
Arash PourdamghaniNetwork Coding
References
J. Kurose, K. Ross, “Computer Networking: Top-
Down Approach”,6th edition, Addison Wesley, 2013
M. Jafari Siavoshani, ”A Very Short Introduction to
Network Coding”, Sharif University of Technology,
Fall 2014
29
Arash PourdamghaniNetwork Coding
References(cont’d)
C. Fragouli, E. Soljanin, “Network coding
fundamentals” Foundations and Trends in
Networking, 2007
A. Sprintson, Theory and application of network
coding, Texas A&M University, 2016
30
Arash PourdamghaniNetwork Coding
Thank You
31

Contenu connexe

Tendances

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd Iaetsd
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
zaidinvisible
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)
IISRT
 

Tendances (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
E42032732
E42032732E42032732
E42032732
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...
 
02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight02 ldpc bit flipping_decoding_dark knight
02 ldpc bit flipping_decoding_dark knight
 
A03530107
A03530107A03530107
A03530107
 
Lightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoTLightweight Address Hopping forDefending the IPv6 IoT
Lightweight Address Hopping forDefending the IPv6 IoT
 
LDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming EncodingLDPC Encoding and Hamming Encoding
LDPC Encoding and Hamming Encoding
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
Aes cryptography algorithm based on intelligent blum blum-shub prn gs publica...
 
Text encryption
Text encryptionText encryption
Text encryption
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
 
LDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check MatrixLDPC - Low Density Parity Check Matrix
LDPC - Low Density Parity Check Matrix
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
 
Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)Iisrt swathi priya(26 30)
Iisrt swathi priya(26 30)
 
High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter ModeHigh Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter Mode
 
Mid term
Mid termMid term
Mid term
 

Similaire à A short introduction to Network coding

ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph AnalyticsScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
Toyotaro Suzumura
 
Svd filtered temporal usage clustering
Svd filtered temporal usage clusteringSvd filtered temporal usage clustering
Svd filtered temporal usage clustering
Liang Xie, PhD
 
A_law_and_Microlaw_companding
A_law_and_Microlaw_compandingA_law_and_Microlaw_companding
A_law_and_Microlaw_companding
Akshay Sharma
 
Data Encoding for Wireless Transmission
Data Encoding for Wireless TransmissionData Encoding for Wireless Transmission
Data Encoding for Wireless Transmission
Sean McQuay
 
Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)
Old Dominion University
 

Similaire à A short introduction to Network coding (20)

ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph AnalyticsScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
ScaleGraph - A High-Performance Library for Billion-Scale Graph Analytics
 
A HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGNA HIGH THROUGHPUT AES DESIGN
A HIGH THROUGHPUT AES DESIGN
 
error_detection_correction.pptx
error_detection_correction.pptxerror_detection_correction.pptx
error_detection_correction.pptx
 
Svd filtered temporal usage clustering
Svd filtered temporal usage clusteringSvd filtered temporal usage clustering
Svd filtered temporal usage clustering
 
Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1Digital logic-formula-notes-final-1
Digital logic-formula-notes-final-1
 
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry PiIRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
IRJET - Wireless Transmission of Data using LDPC Codes based on Raspberry Pi
 
ECAD lab manual
ECAD lab manualECAD lab manual
ECAD lab manual
 
A_law_and_Microlaw_companding
A_law_and_Microlaw_compandingA_law_and_Microlaw_companding
A_law_and_Microlaw_companding
 
Nand or gates ver_student
Nand or gates ver_studentNand or gates ver_student
Nand or gates ver_student
 
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
Performance analysis and implementation for nonbinary quasi cyclic ldpc decod...
 
Ldpc based error correction
Ldpc based error correctionLdpc based error correction
Ldpc based error correction
 
Chapter-10.pptx
Chapter-10.pptxChapter-10.pptx
Chapter-10.pptx
 
Data Encoding for Wireless Transmission
Data Encoding for Wireless TransmissionData Encoding for Wireless Transmission
Data Encoding for Wireless Transmission
 
Vlsi projects
Vlsi projectsVlsi projects
Vlsi projects
 
Smart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to EncryptionSmart City Lecture 5 - Introduction to Encryption
Smart City Lecture 5 - Introduction to Encryption
 
Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)Logisim Ethernet MAC Address Reader(Final)
Logisim Ethernet MAC Address Reader(Final)
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Ijmsr 2016-05
Ijmsr 2016-05Ijmsr 2016-05
Ijmsr 2016-05
 
Kailash(13EC35032)_mtp.pptx
Kailash(13EC35032)_mtp.pptxKailash(13EC35032)_mtp.pptx
Kailash(13EC35032)_mtp.pptx
 
Design of 8-Bit Comparator Using 45nm CMOS Technology
Design of 8-Bit Comparator Using 45nm CMOS TechnologyDesign of 8-Bit Comparator Using 45nm CMOS Technology
Design of 8-Bit Comparator Using 45nm CMOS Technology
 

Plus de Arash Pourdamghani

Plus de Arash Pourdamghani (14)

ابزارهای مدیریت معماری سازمانی
ابزارهای مدیریت معماری سازمانیابزارهای مدیریت معماری سازمانی
ابزارهای مدیریت معماری سازمانی
 
Behavioral Decision Making
Behavioral Decision MakingBehavioral Decision Making
Behavioral Decision Making
 
Regret-Based Econometrics in Repeated Games
Regret-Based Econometrics in Repeated GamesRegret-Based Econometrics in Repeated Games
Regret-Based Econometrics in Repeated Games
 
برنامه‌ی آموزشی ویکی‌پدیا؛ چالش‌ها و دستاوردها
 برنامه‌ی آموزشی ویکی‌پدیا؛  چالش‌ها و دستاوردها برنامه‌ی آموزشی ویکی‌پدیا؛  چالش‌ها و دستاوردها
برنامه‌ی آموزشی ویکی‌پدیا؛ چالش‌ها و دستاوردها
 
On the Configuration-LP of the Restricted Assignment Problem
On the Configuration-LP of the Restricted Assignment ProblemOn the Configuration-LP of the Restricted Assignment Problem
On the Configuration-LP of the Restricted Assignment Problem
 
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
Behavioral Game Theory and Neuroecomonics: Applied approaches to model decisi...
 
کاربرد هوش مصنوعی در زندگی انسان
کاربرد هوش مصنوعی در زندگی انسانکاربرد هوش مصنوعی در زندگی انسان
کاربرد هوش مصنوعی در زندگی انسان
 
Load balancing in OSPF
Load balancing  in OSPFLoad balancing  in OSPF
Load balancing in OSPF
 
State of LTE
State of LTEState of LTE
State of LTE
 
واقعیت افزوده
واقعیت افزودهواقعیت افزوده
واقعیت افزوده
 
تکنولوژی و انسان از دیدگاه قرآن
تکنولوژی و انسان از دیدگاه قرآنتکنولوژی و انسان از دیدگاه قرآن
تکنولوژی و انسان از دیدگاه قرآن
 
ربات های رمان‌ نویس
ربات های رمان‌ نویسربات های رمان‌ نویس
ربات های رمان‌ نویس
 
آشنایی با المپیاد کامپیوتر
آشنایی با المپیاد کامپیوترآشنایی با المپیاد کامپیوتر
آشنایی با المپیاد کامپیوتر
 
Wearable Technology
Wearable TechnologyWearable Technology
Wearable Technology
 

Dernier

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 

A short introduction to Network coding

Notes de l'éditeur

  1. Prime = mod gerftan Asso = (a+b)+c = c+(a+b) Commutativity = a+b = b+a inverse = a+b = 0
  2. قطر باید ۰ باشه و این که جمع یه چیزی با یک نمی تونه ۰ و ۱ و اون یکی باشه