on designs and steiner systems over finite fields
play

On designs and Steiner systems over finite fields Alfred Wassermann - PowerPoint PPT Presentation

On designs and Steiner systems over finite fields Alfred Wassermann Department of Mathematics, Universitt Bayreuth, Germany Special Days on Combinatorial Construction Using Finite Fields, Linz 2013 Outline Network coding Design


  1. On designs and Steiner systems over finite fields Alfred Wassermann Department of Mathematics, Universität Bayreuth, Germany Special Days on Combinatorial Construction Using Finite Fields, Linz 2013

  2. Outline ◮ Network coding ◮ Design theory ◮ Symmetry ◮ Computer construction ◮ Projective geometry ◮ New results (joint work with M. Braun, T. Etzion, A. Kohnert, P . Östergård, A. Vardy) ◮ Summary

  3. Network coding

  4. Flow network source ◮ directed graph, with sources and sinks ◮ each edge e has a capacity c e ◮ each edge receives a non-negative flow ƒ e ≤ c e ◮ the net flow into any non-source non-sink vertex is zero In the following: ◮ c e = 1 ◮ ƒ e ∈ { 0 , 1 } sink sink

  5. Flow networks Theorem (Ford, Fulkerson 1956, Elias, Feinstein, Shannon 1956) In a flow network, the maximum amount of flow passing from a source s to a sink t is equal to the minimum capacity, which when removed, separates s from t. Theorem (Menger 1927) Maximum number of edge-disjoint paths from s to t in a directed graph is equal to the minimum s-t cut.

  6. Example: 1 source, 1 sink source ◮ cut-capacity = 2 ◮ min-cut = 2 = max-flow ◮ Menger’s theorem: two edge-disjoint paths ◮ route packets  and b along these paths sink

  7. Example: 1 source, 1 sink source  b ◮ cut-capacity = 2 b ◮ min-cut = 2 = max-flow ◮ Menger’s theorem: two edge-disjoint paths  b ◮ route packets  and b along these paths b sink

  8. Example: 1 source, 2 sinks source ◮ cut-capacity = 2 ◮ can route 2 packets to one sink, 1 packet to the other ◮ and vice-versa ◮ Time-sharing between these two strategies can achieve a multicast rate of 1.5 packets per use of the network. sink sink

  9. Example: 1 source, 2 sinks source  b ◮ cut-capacity = 2 b ◮ can route 2 packets to one sink, 1 packet to the other ◮ and vice-versa  ◮ Time-sharing between these b two strategies can achieve a multicast rate of 1.5 packets per use of the network. b b sink sink

  10. Example: 1 source, 2 sinks source  b ◮ cut-capacity = 2  ◮ can route 2 packets to one sink, 1 packet to the other ◮ and vice-versa  ◮ Time-sharing between these b two strategies can achieve a multicast rate of 1.5 packets per use of the network.   sink sink

  11. Example: 1 source, 2 sinks source ◮ perform coding at the  b bottle-neck ◮  and b are packets of bits  b ◮  ⊕ b =  + b over F 2 ◮  ⊕ (  ⊕ b ) = b b ⊕ (  ⊕ b ) =  ◮ both sinks can recover both   ⊕ b b messages ◮ Network coding achieves a multicast rate of 2 packets per use of the network  ⊕ b  ⊕ b ◮ best possible sink sink

  12. Network coding – essence ◮ R. Ahlswede, N. Cai, S.-Y . R. Li, R. W. Yeung 2000 ◮ packets can be mixed with each other – rather than just routed or replicated ◮ a higher throughput can be achieved

  13. Error correction in noncoherent network coding R. Kötter F . Kschischang ◮ Kötter, Kschischang (2008) ◮ Silva, Kötter, Kschischang (2008)

  14. Error correction in noncoherent network coding Possible error sources: ◮ Random errors that could not be detected at the physical layer ◮ Corrupt packets injected at the application level by a malicious user

  15. Error correction in noncoherent network coding Possible error sources: ◮ Random errors that could not be detected at the physical layer ◮ Corrupt packets injected at the application level by a malicious user Local view at routing node: ◮ Randomly combine incoming packets linearly ◮ A corrupt packet is modeled as the addition of an error packet to a genuine packet m � P ( ot )  j P ( in ) = + E   j j = 1

  16. Error propagation ◮ Packet mixing makes network coding highly prone to error propagation. This essentially rules out classical error correction.

  17. Error correction in noncoherent network coding Global view: ◮ The overall network can be viewed as a point-to-point channel  X 1   Y 1  X 2 Y 2 ◮ Source: X =     sink: Y = . .  .   .  . .     X k Y k ′ ◮ X  , Y j ∈ F  q ◮ Transmission: �→ Y = A · X + B · E, X where A , B , E are unknown

  18. Key observation X �→ Y = A · X + B · E In case E = 0: X �→ Y = A · X rows of A · X (= row space of X ) ∈ 〈 X 1 , X 2 , . . . , X k 〉

  19. Random linear network coding ◮ Randomly combine information vectors at intermediate nodes ◮ Codewords are subspaces of a finite vector space ◮ Convenient: all codewords have same dimension k

  20. Network codes ◮ ambient space V = F  q ◮ constant dimension (network) code: C ⊆ { U ≤ F  q : d im U = k } ◮ Grassmannian: G q ( , k ) : = { U ≤ F  q : dim U = k } H. Graßmann

  21. Subspace lattice of F 4 2 1000 0100 G 2 ( 4 , 4 ) 0010 0001 0100 G 2 ( 4 , 3 ) 0010 0001 0010 G 2 ( 4 , 2 ) 0001 G 2 ( 4 , 1 ) 0001 G 2 ( 4 , 0 ) 0000

  22. Subspace lattice �  � ◮ | G q ( , k ) | = k q ◮ Gaussian coefficient: ( q  − 1 )( q  − 1 − 1 ) · · · ( q  − k + 1 − 1 ) �  � = ( q k − 1 )( q k − 1 − 1 ) · · · ( q − 1 ) k q �  �  � � ◮ lim q → 1 q = k k

  23. Subspace distance ◮ subspace distance for U, V ∈ G q ( , k ) d im U + dim V − 2 dim U ∩ V d ( U, V ) = 2 k − 2 dim U ∩ V = = : 2 δ ◮ minimum distance d ( C ) : = min{ d ( U, V ) : U, V ∈ C , U � = V }

  24. Subspace distance in F 4 2 G 2 ( 4 , 4 ) G 2 ( 4 , 3 ) G 2 ( 4 , 2 ) G 2 ( 4 , 1 ) G 2 ( 4 , 0 )

  25. Problems ◮ maximize | C | for given  , k , d ◮ determine upper and lower bounds for A q ( , k, d ) : = mx{ | C | : C ⊆ G q ( , k ) , d ( C ) ≥ d }

  26. Upper bounds | G q ( , k ) | ◮ Sphere packing bound: A q ( , k, 2 δ ) ≤ | B k ( δ − 1 ) | �  − δ + 1 ◮ Singleton bound: A q ( , k, 2 δ ) ≤ � k − δ + 1 q ◮ Anticode bound: ◮ Anticode of diameter e : set of subspaces U ∈ G q ( , k ) such that all pairwise distances are ≤ e �   � � � k − δ + 1 k q q ◮ A q ( , k, 2 δ ) ≤ = �  − k + δ − 1 k � � � δ − 1 k − δ + 1 q q ◮ Johnson type bounds: � q  − 1 � A q ( , k, 2 δ ) ≤ · A q (  − 1 , k − 1 , 2 δ ) q k − 1

  27. Previous bounds for A 2 ( , 3 , 4 ) Ref ≥ ≤  6 77 81 [K] 7 329 381 [B] 8 1312 1493 [B] 9 5694 6205 [E] 10 21483 24698 [K] 11 92411 99718 [B] 12 385515 398385 [B] 13 1490762 1597245 14 5996178 6387029 [B] d im 3 = k U V ◮ [K] Kohnert, Kurz (2008) ◮ [E] Etzion, Vardy (2008) dim 1 ◮ [B] Braun, Reichelt (2013) {0}

  28. Constant dimension codes ◮ U, V ∈ G q ( , k ) : d ( U, V ) = 2 k − 2 d im U ∩ V = 2 δ ◮ Let t − 1 : = k − δ U V dim k δ W dim t U ∩ V dim t − 1 ◮ d ( C ) = 2 δ : for all U, V ∈ C , U � = V dim U ∩ V ≤ t − 1 ◮ For all W ∈ G q ( , t ) : | { U ∈ C : W ≤ U } | ≤ 1

  29. Extremal case ◮ C ⊆ G q ( , k ) ◮ For all W ∈ G q ( , t ) : | { U ∈ C : W ≤ U } | ≤ 1

  30. Extremal case ◮ C ⊆ G q ( , k ) ◮ For all W ∈ G q ( , t ) : | { U ∈ C : W ≤ U } | ≤ 1 ◮ Extremal case: for all W ∈ G q ( , t ) | { U ∈ C : W ≤ U } | = 1

  31. Extremal case ◮ C ⊆ G q ( , k ) ◮ For all W ∈ G q ( , t ) : | { U ∈ C : W ≤ U } | ≤ 1 ◮ Extremal case: for all W ∈ G q ( , t ) | { U ∈ C : W ≤ U } | = 1 ◮ In this case, | C | meets anticode bound and Johnson bound: �   � � � k − δ + 1 t q q | C | = = � k k � � � k − δ + 1 t q q ◮ C : perfect diameter code

  32. Design theory

  33. Design theory ◮ Cameron (1974), Delsarte (1976) P . Cameron ◮ B ⊆ G q ( , k ) : set of k -subspaces (blocks) ◮ ( F  q , B ) : q -Steiner system S q [ t, k,  ] each t -subspace of F  q is contained in exactly one block of B

  34. Design theory ◮ Cameron (1974), Delsarte (1976) P . Cameron ◮ B ⊆ G q ( , k ) : set of k -subspaces (blocks) ◮ ( F  q , B ) : q -Steiner system S q [ t, k,  ] each t -subspace of F  q is contained in exactly one block of B More general: ◮ B ⊆ G q ( , k ) : set of k -subspaces (blocks) ◮ ( F  q , B ) : t - ( , k, λ ; q ) design over F q each t -subspace of F  q is contained in exactly λ blocks of B

  35. Design theory ◮ B set: simple design ◮ B multiset: non-simple design

  36. Design theory ◮ B set: simple design ◮ B multiset: non-simple design �  − t � ◮ B = G q ( , k ) is a t - ( , k, q ; q ) design: trivial k − t design trivial 1- ( 4 , 2 , 7; 2 ) design

  37. Design theory ◮ B set: simple design ◮ B multiset: non-simple design �  − t � ◮ B = G q ( , k ) is a t - ( , k, q ; q ) design: trivial k − t design trivial 1- ( 4 , 2 , 7; 2 ) design 1- ( 4 , 2 , 1; 2 ) design

  38. t - ( , k, λ ; q ) designs  ◮ | B | = λ [ t ] q k [ t ] q ◮ Necessary conditions: �  −  � t −  q for  = 0 , . . . , t ∈ Z λ  = λ � k −  � t −  q ◮ Example: t = 2, k = 3 , λ = 1  ≡ 1 , 3 ( mod 6 ) ⇒

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend