1 / 37

Algebraic Gossip: Network Coding for Rapid Data Dissemination Srinivas Shakkottai

Algebraic Gossip: Network Coding for Rapid Data Dissemination Srinivas Shakkottai University of Illinois at Urbana-Champaign ECE 559 April 4 th 2006. Based on the Papers. Algebraic Gossip : A Network Coding Approach to Optimal Rumor Mongering. - Supratim Deb and Muriel M édard .

frigsby
Download Presentation

Algebraic Gossip: Network Coding for Rapid Data Dissemination Srinivas Shakkottai

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Algebraic Gossip: Network Coding for Rapid Data Dissemination Srinivas Shakkottai University of Illinois at Urbana-Champaign ECE 559 April 4th 2006 University of Illinois at Urbana-Champaign

  2. Based on the Papers • Algebraic Gossip : A Network Coding Approach to Optimal Rumor Mongering. - Supratim Deb and Muriel Médard. • Network coding for large scale content distribution. - Christos Gkantsidis, Pablo Rodriguez. University of Illinois at Urbana-Champaign

  3. Outline • Peer to Peer Networks : Decentralization • Bittorrent: Chopping files into pieces • Network coding: Linear Combinations • Algebraic Gossip • Algorithms: Push and Pull • Simulation Results University of Illinois at Urbana-Champaign

  4. Peer to Peer Fully Connected University of Illinois at Urbana-Champaign

  5. Questions • Why should the peers cooperate? • How fast can all the peers get all the pieces? - With full information - Without full information • What happens when peers depart? • What happens when peers both arrive and depart? University of Illinois at Urbana-Champaign

  6. Model • Fully Connected Static Network. • Identical link capacities. • No Information: peers are unaware of what pieces other peers possess. • Altruistic peers: A peer will give another peer a piece regardless of whether it receives anything in exchange. • Time is discretized into rounds. • Explore the time aspect. University of Illinois at Urbana-Champaign

  7. b1 +b2 b1 +b2 b1 +b2 Network Coding b1 b2 b1 b2 b2 b2 b1 b2 b2 University of Illinois at Urbana-Champaign

  8. Peer to Peer • Example considered was that of multicast. • Can we do something similar in peer to peer networks? • Transmit linear combinations of pieces instead of uncoded pieces. • The coefficients used in the linear combinations could be transmitted in the header of the packet. • If one obtains enough linearly independent pieces, one can decode all the pieces to get the file. University of Illinois at Urbana-Champaign

  9. Algorithms • Random Message Selection (RMS) - Nodes have no information regarding what pieces the other nodes have. - Transmitting node picks a message at random (i.e., each message that it has is equally likely to be picked) to send to the receiving node. University of Illinois at Urbana-Champaign

  10. Algorithms • Random Linear Coding (RLC) Instead of viewing messages of size m bits as an m dimensional vector over a binary field, we may look at them as an dimensional vector over the finite field . Also, . • Push and Pull Algorithms. University of Illinois at Urbana-Champaign

  11. Decoding University of Illinois at Urbana-Champaign

  12. Useful result Node v transmits to node u using RLC in a round. = subspace spanned by vectors with u before. = subspace spanned by vectors with v before. = subspace spanned by vectors with u after. = subspace spanned by vectors with v after. Where q is the field size. University of Illinois at Urbana-Champaign

  13. Proof • Let there be l vectors in which have a component orthogonal to . Call them {g1,.,gl}. • is not larger than if the coefficients of all these in the linear combination is zero, i.e., • Represent [g1,.,gl]t = A (l x k) University of Illinois at Urbana-Champaign

  14. Continued… • All coefficients β are zero if : [β1,…, βl] A = 0. • This had k equations in l variables with field size q => max number of solutions is ql-1. • Also, since the β’s are chosen at random, University of Illinois at Urbana-Champaign

  15. Results for RLC • Time required for all nodes to get all messages using RLC with Pull: • Time required for all nodes to get all messages using RLC with Push: University of Illinois at Urbana-Champaign

  16. Proof Outline: RLC Pull Step I For i <= k/2 where, Let Can show University of Illinois at Urbana-Champaign

  17. Continued… Then we have, University of Illinois at Urbana-Champaign

  18. Step II Constant rounds per piece For i <= k/2 Further, • First part is obvious • For the second part use University of Illinois at Urbana-Champaign

  19. Continued… This gives: (Chernoff) Choose and University of Illinois at Urbana-Champaign

  20. Continued… So finally: and so, University of Illinois at Urbana-Champaign

  21. RLC Pull k>2i University of Illinois at Urbana-Champaign

  22. Continued… • Recall , • Prob that dimension of u remains i after a round: University of Illinois at Urbana-Champaign

  23. Continued… :event that node u fails to increase dimension in t Obviously This means that => For University of Illinois at Urbana-Champaign

  24. Continued… Finally University of Illinois at Urbana-Champaign

  25. Transition Probabilities where, University of Illinois at Urbana-Champaign

  26. Time to absorption Also, University of Illinois at Urbana-Champaign

  27. Which Finally Means… Thus, Constant rounds per piece University of Illinois at Urbana-Champaign

  28. Results for RMS • Time required for all nodes to get all messages using RMS with Pull: • Time required for all nodes to get all messages using RMS with Push: University of Illinois at Urbana-Champaign

  29. So far… • Showed that RLC O(n) does better than RMS in the settings given. • These are asymptotic results. • Now study more realistic scenarios by simulation. • Compare BitTorrent, FEC and RLC. University of Illinois at Urbana-Champaign

  30. Well Connected Network University of Illinois at Urbana-Champaign

  31. Clustered Network • Two Clusters of 100 nodes each. • Good connectivity with clusters. • Low connectivity between clusters. • Similar to BitTorrent operation. University of Illinois at Urbana-Champaign

  32. Clustered Network University of Illinois at Urbana-Champaign

  33. Differential Capacities • Some nodes with high capacity and some with low. • Many slow nodes and some fast ones. University of Illinois at Urbana-Champaign

  34. Differential Capacities University of Illinois at Urbana-Champaign

  35. Dynamic Arrivals • Nodes arrive and depart. • 40 empty nodes arrive every 20 rounds. • 100 block file size. • Nodes stay 10 rounds longer than they take to finish. University of Illinois at Urbana-Champaign

  36. Dynamic Arrivals University of Illinois at Urbana-Champaign

  37. Conclusion • Assumption: Peers are unaware of information possessed by other peers. • Showed through theory and simulation that in such a setting random linear coding outperforms an uncoded scheme. University of Illinois at Urbana-Champaign

More Related