Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Multiple Dimensional Encoding/Modulation Shift-and-Addition Design for Distributed Systems

Published: 01 January 2022 Publication History

Abstract

In distributed computing/storage/machine learning system, the method of encoding and decoding combing shift-and-addition (SA) and zigzag decoding (ZD) is proposed to solve the problem of high computational complexity. However, in each encoded packet, one element takes part in the encoding only once, so the obtained overhead is extremely high. In this work, based on the idea of multidimensional encoding/modulation, we propose to employ one element of the encoding process multiple times when constructing one encoded packet based on the Cauchy matrix, thereby leveraging the favourable properties of the code based on Cauchy matrix. The overhead is reduced from square to logarithmic in certain parameters. Compared with the overhead of the existing square computational complexity, it is greatly reduced.

References

[1]
M. Chen, S. Mao, and Y. Liu, “Big data: a survey,” Mobile networks & Applications, vol. 19, no. 2, pp. 171–209, 2014.
[2]
J. Dean and L. A. Barroso, “The tail at scale,” Communications of the ACM, vol. 56, no. 2, pp. 74–80, 2013.
[3]
P. Soto and J. Li, “Straggler-free coding for concurrent matrix multiplications,” in 2020 IEEE International Symposium on Information Theory (ISIT), pp. 3017–3021, Los Angeles, CA, USA, June 2020.
[4]
K. V. Rashmi, N. B. Shah, D. Gu, H. Kuang, D. Borthakur, and K. Ramchandran, “A solution to the network challenges of data recovery in erasure-coded distributed storage systems: a study on the Facebook warehouse cluster,” in 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 13), San Jose, CA, June 2013.
[5]
M. Sathiamoorthy, M. Asteris, D. Papailiopoulos, A. G. Dimakis, R. Vadali, S. Chen, and D. Borthakur, “XORing elephants,” Proceedings of the VLDB Endowment, vol. 6, no. 5, pp. 325–336, 2013.
[6]
A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, “A survey on network codes for distributed storage,” IEEE Journal on Selected Areas in Communications, vol. 99, no. 3, pp. 476–489, 2011.
[7]
D. S. Papailiopoulos, J. Luo, A. G. Dimakis, C. Huang, and J. Li, “Simple regenerating codes: network coding for cloud storage,” in Proceedings - IEEE INFOCOM, pp. 2801–2805, Orlando, FL, USA, March 2011.
[8]
V. R. Cadambe, S. A. Jafar, H. Maleki, K. Ramchandran, and C. Suh, “Asymptotic interference alignment for optimal repair of MDS codes in distributed storage,” IEEE Transactions on Information Theory, vol. 59, no. 5, pp. 2974–2987, 2013.
[9]
P. K. Akulakrishna, J. Lakshmi, and S. Nandy, “Efficient storage of big-data for real-time GPS applications,” in IEEE Fourth International Conference on Big Data & Cloud Computing, pp. 1–8, Sydney, NSW, Australia, December 2014.
[10]
Y. Aikebaier, T. E. Yang, and M. Takizawa, “Energy-efficient computation models for distributed systems,” in International Conference on Network-Based Information Systems, pp. 423–431, Indianapolis, IN, USA, August 2009.
[11]
S. Li, M. A. Maddah-Ali, and A. S. Avestimehr, “Coding for distributed fog computing,” IEEE Communications Magazine, vol. 55, no. 4, pp. 34–40, 2017.
[12]
A. Severinson, A. G. I Amat, and E. Rosnes, “Block-diagonal coding for distributed computing with straggling servers,” in 2017 IEEE Information Theory Workshop (ITW), pp. 464–468, Kaohsiung, Taiwan, November 2017.
[13]
A. B. Das, L. Tang, and A. Ramamoorthy, “C3LES: codes for coded computation that leverage stragglers,” in 2018 IEEE Information Theory Workshop (ITW), pp. 1–5, Guangzhou, China, November 2018.
[14]
T. Baharav, K. Lee, O. Ocal, and K. Ramchandran, “Straggler-proofing massive-scale distributed matrix multiplication with D-dimensional product codes,” in 2018 IEEE International Symposium on Information Theory (ISIT), pp. 1993–1997, Vail, CO, USA, June 2018.
[15]
M. Dai, Z. Zheng, S. Zhang, H. Wang, and X. Lin, “SAZD: a low computational load coded distributed computing framework for IoT systems,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 3640–3649, 2020.
[16]
L. Chen, R. Zhao, K. He, Z. Zhao, and L. Fan, “Intelligent ubiquitous computing for future UAV-enabled MEC network systems,” Cluster Computing, vol. 25, no. 4, pp. 1–11, 2022.
[17]
M. Dai, A. Xu, Q. Huang, Z. Zhang, and X. Lin, “Vertical federated DNN training,” Physical Communication, vol. 49, p. 101465, 2021.
[18]
J. Li, S. Dang, Y. Yan, Y. Peng, S. al-Rubaye, and A. Tsourdos, “Generalized quadrature spatial modulation and its application to vehicular networks with NOMA,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 7, pp. 4030–4039, 2021.
[19]
X. Pei, Y. Chen, M. Wen, H. Yu, E. Panayirci, and H. V. Poor, “Next-generation multiple access based on NOMA with power level modulation,” IEEE Journal on Selected Areas in Communications, vol. 40, no. 4, pp. 1072–1083, 2022.
[20]
M. Wen, Q. Li, K. J. Kim, D. López-Pérez, O. A. Dobre, H. V. Poor, P. Popovski, and T. A. Tsiftsis, “Private 5G networks: concepts, architectures, and research landscape,” IEEE Journal of Selected Topics in Signal Processing, vol. 16, no. 1, pp. 7–25, 2022.
[21]
S. Gollakota and D. Katabi, “Zigzag decoding: combating hidden terminals in wireless networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 4, pp. 159–170, 2008.
[22]
L. Zhang, W. Zhou, J. Xia, C. Gao, F. Zhu, C. Fan, and J. Ou, “DQN-based mobile edge computing for smart internet of vehicle,” EURASIP Journal on Advances in Signal Processing, vol. 2022, 16 pages, 2022.
[23]
J. Lu, L. Chen, J. Xia, F. Zhu, M. Tang, C. Fan, and J. Ou, “Analytical offloading design for mobile edge computing-based smart internet of vehicle,” EURASIP Journal on Advances in Signal Processing, vol. 2022, 19 pages, 2022.
[24]
H. Hou and Y. S. Han, “Cauchy MDS array codes with efficient decoding method,” 2016, http://arxiv.org/abs/1611.09968.
[25]
J. S. Plank, “A tutorial on Reed–Solomon coding for fault-tolerance in raid-like systems,” Software: Practice and Experience, vol. 27, no. 9, pp. 995–1012, 1997.
[26]
J. Bloemer, M. Kalfane, R. Karp, M. Karpinski, M. Luby, and D. Zuckerman, An XOR-based erasure-resilient coding scheme, Technical Report at ICSI, 1999.
[27]
M. Dai, C. W. Sung, H. Wang, X. Gong, and Z. Lu, “A new zigzag-decodable code with efficient repair in wireless distributed storage,” IEEE Transactions on Mobile Computing, vol. 16, no. 5, pp. 1218–1230, 2017.
[28]
N. Jacobson, Basic Algebra I, Freeman & Co, 1985.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Wireless Communications & Mobile Computing
Wireless Communications & Mobile Computing  Volume 2022, Issue
2022
25330 pages
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley and Sons Ltd.

United Kingdom

Publication History

Published: 01 January 2022

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media