Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Combinatiorial algorithms for wireless information flow

Published: 26 December 2012 Publication History

Abstract

A long-standing open question in information theory is to characterize the unicast capacity of a wireless relay network. The difficulty arises due to the complex signal interactions induced in the network, since the wireless channel inherently broadcasts the signals and there is interference among transmissions. Recently, Avestimehr et al. [2007b] proposed a linear deterministic model that takes into account the shared nature of wireless channels, focusing on the signal interactions rather than the background noise. They generalized the min-cut max-flow theorem for graphs to networks of deterministic channels and proved that the capacity can be achieved using information theoretical tools. They showed that the value of the minimum cut is in this case the minimum rank of all the adjacency matrices describing source-destination cuts.
In this article, we develop a polynomial-time algorithm that discovers the relay encoding strategy to achieve the min-cut value in linear deterministic (wireless) networks, for the case of a unicast connection. Our algorithm crucially uses a notion of linear independence between channels to calculate the capacity in polynomial time. Moreover, we can achieve the capacity by using very simple one-symbol processing at the intermediate nodes, thereby constructively yielding finite-length strategies that achieve the unicast capacity of the linear deterministic (wireless) relay network.

References

[1]
Amaudruz, A. and Fragouli, C. 2009. Combinatorial algorithms for wireless information flow. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA).
[2]
Avestimehr, S., Diggavi, S. N., and Tse, D. N. C. 2007a. Wireless network information flow. In Proceedings of Allerton Conference on Communication, Control, and Computing. http://licos.epfl.ch/index.php?p=research_projWNC.
[3]
Avestimehr, S., Diggavi, S. N., and Tse, D. N. C. 2007b. A deterministic approach to wireless relay networks. In Proceedings of Allerton Conference on Communication, Control, and Computing. http://licos. epfl.ch/index.php?p=research_projWNC.
[4]
Ebrahimi, J. B. and Fragouli, C. 2010a. Multicasting algorithms for deterministic networks. In Proceedings of the Information Theory Workshop (ITW).
[5]
Ebrahimi, J. B. and Fragouli, C. 2010b. Vector network coding algorithms. In Proceedings of the Allerton Conference on Communication, Control, and Computing
[6]
Ebrahimi, J. B. and Fragouli, C. 2011. Algebraic algorithms for vector network coding. IEEE Trans. Info. Theory 57, 996--1007.
[7]
Ford, L. R., Fulkerson, J. R., and Fulkerson, D. R. 1956. Maximal flow through a network. Canad. J. Math. 8, 399--404.
[8]
Goemans, M., Iwata, S., and Zenklusen, R. 2009. An algorithmic framework for wireless information flow. In Proceedings of the Allerton Conference on Communication, Control, and Computing.
[9]
Harvey, N. 2005. Deterministic network coding by matrix completion. MS thesis, Department of Computer Science, MIT, Cambridge, MA.
[10]
Kim, M. and Medard, M. 2010. Algebraic network coding approach to deterministic wireless relay networks. In Proceedings of the Allerton Conference on Communication, Control, and Computing.
[11]
Shi, C. and Ramamoorthy, A. 2010. Fast algorithms for finding unicast capacity of linear deterministic wireless relay networks. arXiv:0909.5507v1.
[12]
Tabatabaei Yazdi, S. and Savari, S. 2010. A combinatorial study of linear deterministic relay networks. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA).

Cited By

View all
  • (2022)Gomory-Hu Trees Over WirelessIEEE Communications Letters10.1109/LCOMM.2022.315517626:5(1004-1007)Online publication date: May-2022
  • (2018)Load monitoring and system-traffic-aware live VM migration-based load balancing in cloud data center using graph theoretic solutionsCluster Computing10.5555/3287988.328800921:3(1623-1638)Online publication date: 1-Sep-2018
  • (2014)Compress-and-Forward Scheme for Relay Networks: Backword Decoding and Connection to Bisubmodular FlowsIEEE Transactions on Information Theory10.1109/TIT.2014.233432860:9(5627-5638)Online publication date: Sep-2014
  • Show More Cited By

Index Terms

  1. Combinatiorial algorithms for wireless information flow

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Algorithms
    ACM Transactions on Algorithms  Volume 9, Issue 1
    December 2012
    252 pages
    ISSN:1549-6325
    EISSN:1549-6333
    DOI:10.1145/2390176
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 December 2012
    Accepted: 01 October 2011
    Revised: 01 September 2011
    Received: 01 November 2010
    Published in TALG Volume 9, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Ford-Fulkerson algorithm
    2. Wireless networks
    3. deterministic networks
    4. unicast connection

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Gomory-Hu Trees Over WirelessIEEE Communications Letters10.1109/LCOMM.2022.315517626:5(1004-1007)Online publication date: May-2022
    • (2018)Load monitoring and system-traffic-aware live VM migration-based load balancing in cloud data center using graph theoretic solutionsCluster Computing10.5555/3287988.328800921:3(1623-1638)Online publication date: 1-Sep-2018
    • (2014)Compress-and-Forward Scheme for Relay Networks: Backword Decoding and Connection to Bisubmodular FlowsIEEE Transactions on Information Theory10.1109/TIT.2014.233432860:9(5627-5638)Online publication date: Sep-2014
    • (2014)Efficient Capacity Computation and Power Optimization for Relay NetworksIEEE Transactions on Information Theory10.1109/TIT.2013.229509960:3(1782-1792)Online publication date: 1-Mar-2014
    • (2011)A Max-Flow/Min-Cut Algorithm for Linear Deterministic Relay NetworksIEEE Transactions on Information Theory10.1109/TIT.2011.212025057:5(3005-3015)Online publication date: 1-May-2011

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media