On the Connection Between Multiple-Unicast Network Coding and - - PowerPoint PPT Presentation

on the connection between multiple unicast network coding
SMART_READER_LITE
LIVE PREVIEW

On the Connection Between Multiple-Unicast Network Coding and - - PowerPoint PPT Presentation

On the Connection Between Multiple-Unicast Network Coding and Single-Source Single-Sink Network Error Correction Jrg Kliewer NJIT Joint work with Wentao Huang and Michael Langberg Network Error Correction Problem: Adversary has control of


slide-1
SLIDE 1

Jörg Kliewer NJIT

On the Connection Between Multiple-Unicast Network Coding and Single-Source Single-Sink Network Error Correction

Joint work with Wentao Huang and Michael Langberg

slide-2
SLIDE 2

Network Error Correction

2

Problem: Adversary has control of some edges in a network Objective: Design coding scheme that is resilient against adversary Which rates are achievable?

slide-3
SLIDE 3

Network Error Correction

2

Problem: Adversary has control of some edges in a network Objective: Design coding scheme that is resilient against adversary Which rates are achievable?

s1 s2 s3 s4 t4 t3 t2 t1

slide-4
SLIDE 4

Known Cases

3

Adversary controls z links in the network Single source multicast, equal capacity links

  • Capacity:
  • Code design, e.g., in [Cai & Yeung 06], [Koetter &

Kschischang 08], [Jaggi et al. 08], [Silva et al. 08], [Brito, Kliewer 13] mincut − 2z

s t4 t3 t2 t1

slide-5
SLIDE 5

Less Known and Studied Cases

4

Single source multicast: different edge capacities, node adversaries, restricted adversaries (e.g., [Kosut, Tong, Tse 09], [Kim et al. 11], [Wang, Silva, Kschischang 08]) Multiple sources and terminals: Upper and lower capacity bounds [Vyetrenko, Ho, Dikaliotis 10], [Liang, Agrawal, Vaidya 10]

s1 s2 s3 s4 t4 t3 t2 t1

slide-6
SLIDE 6

This Work

5

Single-source single-sink Acyclic network Edges may not have unit capacity

s t

slide-7
SLIDE 7

This Work

5

Single-source single-sink Acyclic network Edges may not have unit capacity Adversary controls single link

s t

slide-8
SLIDE 8

This Work

5

Single-source single-sink Acyclic network Edges may not have unit capacity Adversary controls single link Some edges cannot be accessed by the adversary

s t

slide-9
SLIDE 9

This Work

5

Single-source single-sink Acyclic network Edges may not have unit capacity Adversary controls single link Some edges cannot be accessed by the adversary Reliable communication rate?

s t

slide-10
SLIDE 10

Results

6

slide-11
SLIDE 11

Results

6

s t

Network error correction problem:

slide-12
SLIDE 12

Results

6

Computing capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

s t

Network error correction problem:

slide-13
SLIDE 13

Results

6

Computing capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

s t

Network error correction problem:

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

slide-14
SLIDE 14

Results

6

Computing capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

s t

Network error correction problem:

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

slide-15
SLIDE 15

Results

6

Computing capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

s t

Network error correction problem:

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

slide-16
SLIDE 16

Results

6

Computing capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

s t

Network error correction problem:

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

slide-17
SLIDE 17

Reductions

7

Result proved by reduction Significant interest recently

  • Index coding/network coding, index coding/interference alignment,

network equivalence, multiple unicast vs. multiple multicast NC, edge removal problem, …

slide-18
SLIDE 18

Reductions

7

Result proved by reduction Significant interest recently

  • Index coding/network coding, index coding/interference alignment,

network equivalence, multiple unicast vs. multiple multicast NC, edge removal problem, …

Generate a clustering of network communication problems via reductions

Network communication problems

slide-19
SLIDE 19

Reductions

7

Result proved by reduction Significant interest recently

  • Index coding/network coding, index coding/interference alignment,

network equivalence, multiple unicast vs. multiple multicast NC, edge removal problem, …

Generate a clustering of network communication problems via reductions

Network communication problems

Reductions

slide-20
SLIDE 20

Reductions

7

Result proved by reduction Significant interest recently

  • Index coding/network coding, index coding/interference alignment,

network equivalence, multiple unicast vs. multiple multicast NC, edge removal problem, …

Identify canonical problems (central problems that are related to several other problems) Generate a clustering of network communication problems via reductions

Network communication problems

Reductions

slide-21
SLIDE 21

Reductions

7

Result proved by reduction Significant interest recently

  • Index coding/network coding, index coding/interference alignment,

network equivalence, multiple unicast vs. multiple multicast NC, edge removal problem, …

Identify canonical problems (central problems that are related to several other problems) Generate a clustering of network communication problems via reductions

Network communication problems

Reductions

slide-22
SLIDE 22

Proof

8

Computing error correcting capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

Proof for zero error communication Result also holds for both the case of asymptotic rate and asymptotic error

slide-23
SLIDE 23

. . . . . .

N

sk s1 tk t1

Proof

8

Computing error correcting capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

Proof for zero error communication Result also holds for both the case of asymptotic rate and asymptotic error Starting point: MU NC problem Is rate tuple achievable with zero error? N (1, 1, . . . , 1)

slide-24
SLIDE 24

. . . . . .

N

sk s1 tk t1

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof

8

Computing error correcting capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

Proof for zero error communication Result also holds for both the case of asymptotic rate and asymptotic error Starting point: MU NC problem Is rate tuple achievable with zero error? N (1, 1, . . . , 1) Reduction: Construct new network N

N

slide-25
SLIDE 25

. . . . . .

N

sk s1 tk t1

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof

8

Computing error correcting capacity is as hard as computing the capacity of an error-free multiple unicast network coding problem.

Proof for zero error communication Result also holds for both the case of asymptotic rate and asymptotic error Starting point: MU NC problem Is rate tuple achievable with zero error? N (1, 1, . . . , 1) Reduction: Construct new network N Adversary can access any single link except links leaving s and t

X X X X N

slide-26
SLIDE 26

Zero Error Case

9

Theorem Rates achievable on iff rate k is achievable on . (1, 1, . . . , 1) N N

slide-27
SLIDE 27

Zero Error Case

9

Theorem Rates achievable on iff rate k is achievable on . (1, 1, . . . , 1) N N

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

slide-28
SLIDE 28

Zero Error Case

9

Theorem Rates achievable on iff rate k is achievable on . (1, 1, . . . , 1) N N

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Assume on Source sends information on ai

Proof sketch:

(1, 1, . . . , 1) N

slide-29
SLIDE 29

Zero Error Case

9

Theorem Rates achievable on iff rate k is achievable on . (1, 1, . . . , 1) N N

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Assume on Source sends information on ai

Proof sketch:

(1, 1, . . . , 1) One error may occur on xi, yi, zi, z

i

N

slide-30
SLIDE 30

Zero Error Case

9

Theorem Rates achievable on iff rate k is achievable on . (1, 1, . . . , 1) N N

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Assume on Source sends information on ai

Proof sketch:

(1, 1, . . . , 1) One error may occur on xi, yi, zi, z

i

Bi performs majority decoding Rate k is possible on N N

slide-31
SLIDE 31

Zero Error Case

10

slide-32
SLIDE 32

Zero Error Case

10

Proof sketch:

slide-33
SLIDE 33

Zero Error Case

10

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch: M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N

slide-34
SLIDE 34

Zero Error Case

10

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N

slide-35
SLIDE 35

Zero Error Case

10

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N Error correction: For if a then For terminal cannot distinguish between M1, M2 M1 ̸= M2 bi(M1) ̸= bi(M2) z′

i(M1) ̸= z′ i(M2)

z′

i(M1) = z′ i(M2)

slide-36
SLIDE 36

Zero Error Case

10

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N Error correction: For if a then For terminal cannot distinguish between M1, M2 M1 ̸= M2 bi(M1) ̸= bi(M2) z′

i(M1) ̸= z′ i(M2)

z′

i(M1) = z′ i(M2)

slide-37
SLIDE 37

Zero Error Case

10

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N Error correction: For if a then For terminal cannot distinguish between M1, M2 M1 ̸= M2 bi(M1) ̸= bi(M2) z′

i(M1) ̸= z′ i(M2)

z′

i(M1) = z′ i(M2)

slide-38
SLIDE 38

Zero Error Case

10

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N Error correction: For if a then For terminal cannot distinguish between M1, M2 M1 ̸= M2 bi(M1) ̸= bi(M2) z′

i(M1) ̸= z′ i(M2)

z′

i(M1) = z′ i(M2)

slide-39
SLIDE 39

Zero Error Case

10

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N Error correction: For if a then For terminal cannot distinguish between M1, M2 M1 ̸= M2 bi(M1) ̸= bi(M2) z′

i(M1) ̸= z′ i(M2)

z′

i(M1) = z′ i(M2)

1-1 correspondence between bi ↔ z′

i

slide-40
SLIDE 40

Zero Error Case

11

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N 1-1 correspondence between bi ↔ z′

i

slide-41
SLIDE 41

Zero Error Case

11

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N 1-1 correspondence between bi ↔ z′

i

Same argument: 1-1 correspondence between ai ↔ xi ↔ yi ↔ zi

slide-42
SLIDE 42

Zero Error Case

11

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N 1-1 correspondence between bi ↔ z′

i

Same argument: 1-1 correspondence between ai ↔ xi ↔ yi ↔ zi

slide-43
SLIDE 43

Zero Error Case

11

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N 1-1 correspondence between bi ↔ z′

i

Same argument: 1-1 correspondence between ai ↔ xi ↔ yi ↔ zi In summary: Implies : multiple unicast zi ↔ xi ↔ bi ↔ z′

i

zi ↔ z′

i

slide-44
SLIDE 44

Zero Error Case

11

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch:

Full rate (cut): 1-1 corresp. between message M, a1, . . . , ak, b1, . . . , bk

M

Assume rate k achievable on : show rate on N (1, 1, . . . , 1) N 1-1 correspondence between bi ↔ z′

i

Same argument: 1-1 correspondence between ai ↔ xi ↔ yi ↔ zi In summary: Implies : multiple unicast zi ↔ xi ↔ bi ↔ z′

i

zi ↔ z′

i

slide-45
SLIDE 45

Asymptotic Error Case

12

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch: M

slide-46
SLIDE 46

Asymptotic Error Case

12

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch: M

Arguments are more complicated Essentially the same

slide-47
SLIDE 47

Asymptotic Error Case

12

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch: M

Arguments are more complicated Essentially the same a We show:

  • a
  • a
  • a lim

n,0 I(bi; z i)/n = 1

lim

n,0 I(ai; zi)/n = 1

lim

n,0 I(ai; bi)/n = 1

slide-48
SLIDE 48

Asymptotic Error Case

12

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch: M

Arguments are more complicated Essentially the same a We show:

  • a
  • a
  • a lim

n,0 I(bi; z i)/n = 1

lim

n,0 I(ai; zi)/n = 1

lim

n,0 I(ai; bi)/n = 1

slide-49
SLIDE 49

Asymptotic Error Case

12

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

Proof sketch: M

Arguments are more complicated Essentially the same a We show:

  • a
  • a
  • a lim

n,0 I(bi; z i)/n = 1

lim

n,0 I(ai; zi)/n = 1

lim

n,0 I(ai; bi)/n = 1

> 0 In summary: Block codes: MU with possible lim

n,0 I(zi; z i)/n = 1

slide-50
SLIDE 50

Current Understanding

13

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

slide-51
SLIDE 51

Current Understanding

13

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

slide-52
SLIDE 52

Current Understanding

13

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

feasible with zero error (1, 1, . . . , 1) Rate k feasible with zero error

slide-53
SLIDE 53

Current Understanding

13

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

feasible with zero error (1, 1, . . . , 1) Rate k feasible with zero error feasible with error (1, 1, . . . , 1)

  • Rate k feasible

with error

slide-54
SLIDE 54

Current Understanding

13

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

feasible with zero error (1, 1, . . . , 1) Rate k feasible with zero error feasible with error (1, 1, . . . , 1)

  • Rate k feasible

with error

  • asymp.

feasible, not exactly (1, 1, . . . , 1) Rate k asymp. feasible, not exactly not

  • asymp. feasible

(1, 1, . . . , 1) Rate k not asymp. feasible

slide-55
SLIDE 55

Current Understanding

13

. . . . . . . . . . . .

a1 ak A1 Ak zk z1 z

1

z

k

t x1 y1 yk xk bk b1 B1 Bk

N

sk s1 tk t1 s

. . . . . .

N

sk s1 tk t1

feasible with zero error (1, 1, . . . , 1) Rate k feasible with zero error feasible with error (1, 1, . . . , 1)

  • Rate k feasible

with error

  • asymp.

feasible, not exactly (1, 1, . . . , 1) Rate k asymp. feasible, not exactly not

  • asymp. feasible

(1, 1, . . . , 1) Rate k not asymp. feasible

slide-56
SLIDE 56

Infeasibility of Multiple Unicast

14

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N

slide-57
SLIDE 57

a1 a2 A1 A2 z2 z1 z

1

z

2

t x1 y1 y2 x2 b2 b1 B1 B2 s2 s1 t2 t1 s C D

Infeasibility of Multiple Unicast

14

Proof (constructive):

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N

slide-58
SLIDE 58

a1 a2 A1 A2 z2 z1 z

1

z

2

t x1 y1 y2 x2 b2 b1 B1 B2 s2 s1 t2 t1 s C D

Infeasibility of Multiple Unicast

14

Proof (constructive):

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N Unit capacity edges, messages M = (M1, M2), H(M1) = H(M2) = n-1 bits, adversary can access one link Network code:

slide-59
SLIDE 59

a1 a2 A1 A2 z2 z1 z

1

z

2

t x1 y1 y2 x2 b2 b1 B1 B2 s2 s1 t2 t1 s C D

Infeasibility of Multiple Unicast

14

Proof (constructive):

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N Unit capacity edges, messages M = (M1, M2), H(M1) = H(M2) = n-1 bits, adversary can access one link Network code: a1(M) = x1(M) = y1(M) = z1(M) = M1

slide-60
SLIDE 60

a1 a2 A1 A2 z2 z1 z

1

z

2

t x1 y1 y2 x2 b2 b1 B1 B2 s2 s1 t2 t1 s C D

Infeasibility of Multiple Unicast

14

Proof (constructive):

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N Unit capacity edges, messages M = (M1, M2), H(M1) = H(M2) = n-1 bits, adversary can access one link Network code: a1(M) = x1(M) = y1(M) = z1(M) = M1 a2(M) = x2(M) = y2(M) = z2(M) = M2

slide-61
SLIDE 61

a1 a2 A1 A2 z2 z1 z

1

z

2

t x1 y1 y2 x2 b2 b1 B1 B2 s2 s1 t2 t1 s C D

Infeasibility of Multiple Unicast

14

Proof (constructive):

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N Unit capacity edges, messages M = (M1, M2), H(M1) = H(M2) = n-1 bits, adversary can access one link Network code: a1(M) = x1(M) = y1(M) = z1(M) = M1 a2(M) = x2(M) = y2(M) = z2(M) = M2 z

1(M) = z 2(M) = M1 + M2

slide-62
SLIDE 62

a1 a2 A1 A2 z2 z1 z

1

z

2

t x1 y1 y2 x2 b2 b1 B1 B2 s2 s1 t2 t1 s C D

Infeasibility of Multiple Unicast

15

Proof (cont.):

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N

slide-63
SLIDE 63

a bi reserves one bit to indicate if case 1

  • r 2 happens

a1 a2 A1 A2 z2 z1 z

1

z

2

t x1 y1 y2 x2 b2 b1 B1 B2 s2 s1 t2 t1 s C D

Infeasibility of Multiple Unicast

15

Proof (cont.):

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N bi(xi, xi, z

i) =

  • xi

if xi = yi (case 1) z

i

if xi = yi (case 2)

slide-64
SLIDE 64

a bi reserves one bit to indicate if case 1

  • r 2 happens

a1 a2 A1 A2 z2 z1 z

1

z

2

t x1 y1 y2 x2 b2 b1 B1 B2 s2 s1 t2 t1 s C D

Infeasibility of Multiple Unicast

15

Proof (cont.):

Theorem There exist networks and such that rate k is asymptotically achievable on but is not asymp. achievable on . (1, 1, . . . , 1) N N N N bi(xi, xi, z

i) =

  • xi

if xi = yi (case 1) z

i

if xi = yi (case 2)

t is able to decode (M1, M2) correctly at asymptotic rate 2 Multiple unicast with rate (1, 1) is not feasible

slide-65
SLIDE 65

Take Aways

16

Error correction in a simple network setting Single-source network error correction is at least as hard as multiple-unicast (error-free) network coding Falls into broader framework that connects different network communication problems via reductions

slide-66
SLIDE 66

Take Aways

16

Error correction in a simple network setting Single-source network error correction is at least as hard as multiple-unicast (error-free) network coding Falls into broader framework that connects different network communication problems via reductions [Huang, Langberg, Kliewer, accepted for ISIT 2015]