Network Alignment(PPT讲稿)Treating Networks as Wireless Interference Channel

Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ, of california Irvine
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine

Outline o Motivation Network a Wireless Interference Channel approaches NA in the middle, Precoding- Based NA O PBNA Feasibility of PBna Conclusion
o Motivation: Network ≈ Wireless Interference Channel o Approaches: NA in the middle, Precoding-Based NA o PBNA Feasibility of PBNA o Conclusion 2 Outline

State of the art-I Intra-Session Nc Achievable rate min-cut[,] LP-formulation[31 v Code design: RNCI4], deterministic[5] 1R Ahlswede, et al, " Network information flow [2]R Koetter and M. M'edard, "An algebraic approach to network coding BJZ. Li, et al, "On Achieving Maximum Multicast Throughput in Undirected Networks 4]T Ho, et al, a random linear network coding approach to multicast [5]S Jaggi, et al, "Polynomial Time algorithms for Multicast Network Code Construction
Intra-Session NC ✓ Achievable rate = min-cut[1,2] LP-formulation[3] ✓ Code design: RNC[4], deterministic[5] 3 State of the Art - I [1] R. Ahlswede, et al, “Network information flow” [2] R. Koetter and M. M′edard, “An algebraic approach to network coding” [3] Z. Li, et al, “On Achieving Maximum Multicast Throughput in Undirected Networks” [4] T. Ho, et al, “A random linear network coding approach to multicast” [5] S. Jaggi, et al, “Polynomial Time Algorithms for Multicast Network Code Construction

State of the Art-工I Inter-session nc v Only approximation of bounds [I Exponential number of variables v Code design: NP-hard[5] LP evolutionary approach 1]N. Harvey, et al, "On the Capacity of Information Networks [2JAR Lehman and E Lehman, " Complexity classification of network information flow problems 3]D. Traskov, et al, "Network coding for multiple unicasts: An approach based on linear optimization 4 4]M. Kim, et al, " An evolutionary approach to inter-session network coding
Inter-Session NC ✓ Only approximation of bounds [1] Exponential number of variables ✓ Code design: NP-hard[5] LP, evolutionary approach 4 State of the Art - II [1] N. Harvey, et al, “On the Capacity of Information Networks” [2] A. R. Lehman and E. Lehman, “Complexity classification of network information flow problems” [3] D. Traskov, et al, “Network coding for multiple unicasts: An approach based on linear optimization” [4] M. Kim, et al, “An evolutionary approach to inter-session network coding

Restrictive Framework 1 1 Z1=m11x)X1+m21(x)X2+m31(x)X3 Interference must be canceled out 5 R Koetter and M. M'edard, "An algebraic approach to network coding
5 Restrictive Framework 𝑋1 𝑋2 𝑋3 𝑍2 𝑍1 𝑍3 R. Koetter and M. M′edard, “An algebraic approach to network coding” Interference must be canceled out

Network vs Wireless Channel-I Min-cut =1 x R Rx y2 R Network with multiple unicasts 21=m1(x)X1+m2(x)X2+m3(x)X3 yi= h1i 1+h2i C2+h3i3+n Transfer function introduced by network Channel gain: introduced by nature 6
6 Network vs. Wireless Channel - I Network with multiple unicasts SISO Channel gain: introduced by nature 𝑋1 𝑋2 𝑋3 𝑍2 𝑍1 𝑍3 𝑥1 𝑥2 𝑥3 𝑦1 𝑦2 𝑦3 Transfer function: introduced by network Min-cut = 1

Networks vs, ireless Channel-II Min -cut>1 Z 3 Network with multiple unicasts MIMO Z1=M1X1+M2X2+M32X3 yi=LixI +H2i X2+H3ix3+n Transfer matrⅸx Channel matrix
7 Networks vs. Wireless Channel - II Network with multiple unicasts MIMO 𝐗1 𝐗2 𝐗3 𝐙2 𝐙1 𝐙3 𝐱1 𝐱2 𝐱3 𝐲1 𝐲2 𝐲3 Min-cut > 1 Transfer matrix Channel matrix

Interference ali ignment Common problem Too MANy unknowns Solution: Align interferences to reduce the number of unknowns Benef计: Everyone gets one half of the cake V. Cadambe and S Jafar, " Interference Alignment and Degrees of Freedom of the K-User Interference Channel
8 Interference Alignment Common problem: Too MANY unknowns! Solution: Align interferences to reduce the number of unknowns V. Cadambe and S. Jafar, “Interference Alignment and Degrees of Freedom of the K-User Interference Channel” Benefit: Everyone gets one half of the cake

Brief Intro of ia o Originally introduced by cadambe& jafar pproaches Asymptotic alignment, Ergodic alignment Lattice alignment Blind alignment pplIcaTions K-user wireless interference channel K-user Mimo interference channe Cellular networks Multi-hop interference networks Exact repair in distributed storage Syed A Jafar, " Interference Alignment -A New Look at Signal Dimensions in a Communication Network
9 Brief Intro of IA o Originally introduced by Cadambe & Jafar o Approaches: • Asymptotic alignment, • Ergodic alignment, • Lattice alignment, • Blind alignment o Applications • K-user wireless interference channel, • K-user MIMO interference channel, • Cellular networks, • Multi-hop interference networks, • Exact repair in distributed storage Syed A. Jafar, “Interference Alignment — A New Look at Signal Dimensions in a Communication Network

Network Is Not wireless channel Zi=mi(x)X1+mi2(x)X2+mi3(x)X3 yi=h1:1+h2:2+h3i3+n o Xi, Zi symbols from finite field I o yi, xi: real complex numbers o mii(x): polynomial of coding variables I o hij; structureless 10
10 Network Is NOT Wireless Channel o 𝑋𝑖 , 𝑍𝑖 : symbols from finite field o 𝑚𝑖𝑗(𝐱): polynomial of coding variables o 𝑦𝑖 , 𝑥𝑖 : real & complex numbers o ℎ𝑖𝑗: structureless
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 中国科学技术大学:《高级操作系统 Advanced Operating System》课程教学资源(PPT课件讲稿)第四章 分布式进程和处理机管理.ppt
- 东南大学:《操作系统概念 Operating System Concepts》课程教学资源(PPT课件讲稿)08 Main Memory(主讲:张柏礼).ppt
- 《高级语言程序设计》课程教学资源(试卷习题)试题三(无答案).doc
- 《数字图像处理》课程教学资源(PPT课件)第五章 代数运算.ppt
- 南京大学:《面向对象技术 OOT》课程教学资源(PPT课件讲稿)类和对象 Class and Object.ppt
- Detecting Evasion Attack at High Speed without Reassembly.ppt
- 《数字图像处理》课程教学资源(PPT课件)第七章 图像分割.ppt
- 中国科学技术大学:《信息论与编码技术》课程教学资源(PPT课件讲稿)第2章 离散信源及其信息测度.pptx
- 清华大学出版社:《计算机网络安全与应用技术》课程教学资源(PPT课件讲稿)第6章 黑客原理与防范措施.ppt
- 大连工业大学:《数据结构》课程教学资源(PPT课件讲稿,共十章,路莹).pps
- 哈尔滨工业大学:词义消歧(PPT讲稿)Word sense disambiguation.ppt
- 香港城市大学:Adaptive Random Test Case Prioritization(PPT讲稿).pptx
- 《单片机原理及接口技术》课程教学资源(PPT课件)第7章 AT89C51单片机系统扩展 7.4 数据存储器的扩展 7.5 I/O口的扩展.ppt
- 《计算机组装与维护》课程教学资源(PPT课件讲稿)第16章 常见计算机故障解决案例.ppt
- 《计算机组装与维护》课程教学资源(PPT讲稿)第九章 计算机软件维护.ppt
- 对外经济贸易大学:《电子商务概论 Electronic Commerce》课程教学资源(PPT课件讲稿)第八章 电子支付与网络银行.pptx
- 西安电子科技大学:《Mobile Programming》课程PPT教学课件(Android Programming)Lecture 04 Activity, Intent and UI.pptx
- 中国科学技术大学:《网络信息安全 NETWORK SECURITY》课程教学资源(PPT课件讲稿)第九章 网络攻击.ppt
- 《面向对象建模技术》课程教学资源(PPT课件讲稿)第11章 UML与RUP.ppt
- 上海交通大学:IT项目管理(PPT讲稿)讲座5 目标、范围管理与需求工程.ppt
- 虚拟存储(PPT课件讲稿)Virtual Memory.ppt
- 《计算机组成原理》课程教学资源(PPT课件讲稿)第二章 电子计算机中信息的表示及其运算.ppt
- 中国科学技术大学:《算法设计与分析》课程教学资源(PPT课件讲稿)第一部分 概率算法(黄刘生).ppt
- 《程序设计语言原理》课程教学资源(PPT课件讲稿)形式语义学 Formal Semantics.ppt
- MSC Software Corporation:Dynamic System Modeling, Simulation, and Analysis Using MSC.EASY5(Advanced Class).ppt
- SVM原理与应用(PPT讲稿).pptx
- 安徽理工大学:《汇编语言》课程教学资源(PPT课件讲稿)第二章 80x86计算机组织.ppt
- 南京大学:《面向对象技术 OOT》课程教学资源(PPT课件讲稿)设计模式 Design Pattern(3).ppt
- 《C语言程序设计》课程教学资源(PPT课件讲稿)第2章 数据类型与常用库函数.ppt
- 山东大学:《数据结构》课程教学资源(PPT课件讲稿)第5章 堆栈(STACKS)Restricted version of a linear list.ppt
- 澳门大学:统计机器翻译领域适应性研究 Domain Adaptation for Statistical Machine Translation Master Defense.pptx
- 北京大学:《高级软件工程》课程教学资源(PPT课件讲稿)第九讲 静态代码的可信性分析概述.ppt
- 《C语言程序设计》课程教学资源(PPT课件讲稿)第10章 指针.ppt
- 南京大学:《面向对象技术 OOT》课程教学资源(PPT课件讲稿)分布对象 Distributed Objects(1).ppt
- 四川大学:《操作系统 Operating System》课程教学资源(PPT课件讲稿)Chapter 1 Computer System Overview.ppt
- 安徽理工大学:《算法设计与分析 Algorithm Design and Analysis》课程教学资源(PPT课件讲稿)第一章 导引与基本数据结构.ppt
- 《结构化程序设计》课程教学资源(PPT课件讲稿)第4章 VB控制结构.ppt
- 香港城市大学:PERFORMANCE ANALYSIS OF CIRCUIT SWITCHED NETWORKS(PPT讲稿).pptx
- 上海交通大学:《计算机组成原理 Computer Organization》课程教学资源(PPT课件讲稿)Chapter 4A The Processor, Part A.pptx
- 清华大学出版社:《计算机网络安全与应用技术》课程教学资源(PPT课件讲稿)第5章 Windows NT/2000的安全与保护措施.ppt