The Capacity of a Network

Size: px
Start display at page:

Download "The Capacity of a Network"

Transcription

1 The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT

2 What is the Capacity of a Network? Source a Source b c d e Sink f Sink

3 What is the Capacity of a Network? Source Source a 1/2 c 1/2 b 1/2 1/2 e 1/2 d 1/2 f Sink Sink

4 What is the Capacity of a Network? Source bit x Source bit y a x x c y x y b y e Sink wants y d f Sink wants x

5 Information Fluid We understand fluid flows fairly well, but... Information can be copied and encoded. There is as yet no unified theory of network information flow. But there can be no doubt that a complete theory of communication networks would have wide implications for the theory of communication and computation. - Cover & Thomas, Elements of Information Theory. Little known about the capacity of information networks!

6 Theme: Blend Information Theory and Combinatorics Information theory: deep understanding of complex communication problems over structurally simple networks. Little understanding of arbitrary network structures Combinatorial techniques: deep understanding of simple (fluid) flows through structurally complex networks. But information can flow in different ways. Use ideas from both fields to understand capacity of information networks.

7 Combinatorial Background Ford-Fulkerson 62: Max-flow min-cut theorem. Hu 63: Two-commodity max-flow min-cut theorem. Okamura-Seymour 81: Gap between min-cut and max multicommodity flow. Leighton-Rao 99: Approximate max-flow min-cut theorem. Gap between sparsest cut and max-flow is O(log n). Expander example in which this gap is achieved.

8 Information Theory Background Shannon 48, Fujishige 78: Entropy is submodular, nonnonnegative, non-decreasing set function. Ahlswede et al Multicast capacity depends on a mincut condition. Jaggi et al Algorithm achieving capacity for multicast. Song, Yeung and Cai 03 - Outer (upper) bound on capacity for DAGS. Li and Li 04 - Conjecture: in undirected networks, max information flow = max multicommodity flow. Jain et al. graphs Verified conjecture for interesting class of

9 This Talk: Outer Bounds on Capacity Model for information flow in general graphs. Consider natural cut-based outer bound on capacity. Show bound is not tight. Develop useful information theoretic techniques. Improve bound using information theoretic techniques. Derive information inequalities from graph structure. Combine these using facts about entropy. Yields best known outer bound for general graphs. Special Case: use outer bound to verify Li and Li conjecture on same class of graphs as Jain et al. 05.

10 The Network Coding Problem S b T r S r T b Given: Graph G. c(u, v) for each edge (u, v). k-commodities: Set of sources. Set of sinks. Demand d i.

11 The Network Coding Problem S b T r S r T b Given: Graph G. c(u, v) = 1. k-commodities: Single source. Single sink. d i = 1.

12 Network Coding Solution A solution is a sequence of rules: S b M b M b M r M r S r Each rule specifies information transmitted on some edge. T r M b M r M b M r M r M b T b Source edge S i transmits M i. A non-source edge (u, v) transmits a function of information previously sent to u. Sink edge T i transmits M i. Allow multiple transmissions across each internal edge.

13 Rate of a Solution Messages, M i s, selected independently at random. Sequence of symbols transmitted on each edge is a R.V. Rate r solution, H(S i ) r for all commodities and Edges don t exceed capacity. - Directed graph: H(e) c(e). - Undirected graph: H( e ) + H( e ) c(e).

14 This Talk: Outer Bounds on Capacity Model for information flow in general graphs. Consider natural cut-based outer bound on capacity. Show bound is not tight. Develop useful information theoretic techniques. Improve bound using information theoretic techniques. Derive information inequalities from graph structure. Combine these using facts about entropy. Yields best known outer bound for general graphs. Special Case: use outer bound to verify Li and Li conjecture on same class of graphs as Jain et al. 05.

15 Sparsity Sparsity of a cut is: capacity of edges in cut # commodities with no remaining source-sink path Sparsity of a graph is minimum sparsity over all cuts. There exist directed graphs in which the maximum rate > sparsity. Sparsity = 1/2 Rate = 1

16 Meagerness A set of commodities P is separated by a cut if there is no remaining path from a source of any commodity in P to a sink of any commodity in P. The meagerness of a graph is the minimum over all sets of commodities P and cuts that separate P of capacity of edges in cut The maximum rate meagerness in directed graphs. P Meagerness = 1 Rate = 1

17 Sometimes Max Rate < Meagerness The meagerness is 1. This flow solution has rate 2/3. Best possible?

18 Sometimes Max Rate < Meagerness The meagerness is 1. This flow solution has rate 2/3. Best possible?

19 Sometimes Max Rate < Meagerness The meagerness is 1. This flow solution has rate 2/3. Best possible?

20 Better Bounds Through Entropy Show max rate 2/3 for previous example. Obtain strictly better bounds on rate through entropy arguments. Implies meagerness is a loose upper bound on rate. Motivates stronger outer bound based on structural conditions and characteristics of information.

21 Sg Informational Dominance Sb Sr V informationally dominates U if the information transmitted on edges in V is sufficient to determine the information transmitted on edges in U. F G If V informationally dominates U, H(V ) = H(U, V ). Tr Tb Tg Ex: {S g, F } informationally dominates T r. H(S g, F ) = H(S g, T r, F ). Ex: {S r, G} informationally dominates T g. H(S r, G) = H(S r, T g, G).

22 Sg Informational Dominance Sb Sr V informationally dominates U if the information transmitted on edges in V is sufficient to determine the information transmitted on edges in U. F G If V informationally dominates U, H(V ) = H(U, V ). Tr Tb Tg Ex: {S g, F } informationally dominates T r. H(S g, F ) = H(S g, T r, F ). Ex: {S r, G} informationally dominates T g. H(S r, G) = H(S r, T g, G).

23 Proof: Max Rate = 2/3

24 H(S g, F) = H(S g, T r, F) =

25 + = + H(S g, F) + H(S r, G) = H(S g, T r, F) + H(T g, S r, G)

26 + = +

27 + = + sources = sinks

28 + = + > + submodularity: H(A) + H(B) H(A B) + H(A B)

29 + = + > + informational dominance

30 + = + > + sources = sinks

31 + = + > + = 2(H(S g ) + H(S r )) + H(S b )

32 Max Rate = 2/3 + 2(H(S g ) + H(S r )) + H(S b )

33 Max Rate = 2/ (H(S g ) + H(S r )) + H(S b )

34 Max Rate = 2/ (H(S g ) + H(S r )) + H(S b )

35 Max Rate = 2/ (H(S g ) + H(S r )) + H(S b ) H(S g ) H(S r )

36 Max Rate = 2/3 + H(S g ) + H(S r ) + H(S b )

37 Max Rate = 2/3 2 + H(S g ) + H(S r ) + H(S b )

38 Max Rate = 2/ r

39 Generalize Proof Ideas Combine facts about entropy (e.g. submodularity) with constraints based on the structure of the graph. Generalize these ideas get a set of linear constraints on a network coding solution. Results in a large linear program whose optimal value is best known upper bound on capacity.

40 Constraints on Network Coding Solution Information Theoretic: Entropy is a submodular, nonnegative and nondecreasing set function. Independence of sources: H(S A, S B ) = H(S A ) + H(S B ). Rate of sources: H(S A ) r. sources = sinks: H(S A, U) = H(T A, U) for all U. Structural: Edge capacity: H(e) c(e). Informational dominance: Information transmitted on edges in A sufficient to compute information transmitted on edges in B: H(A) = H(A B) c(a) H(A B).

41 Constraints on Network Coding Solution Information Theoretic: Entropy is a submodular, nonnegative and nondecreasing set function. Independence of sources: H(S A, S B ) = H(S A ) + H(S B ). Rate of sources: H(S A ) r. sources = sinks: H(S A, U) = H(T A, U) for all U. Structural: Edge capacity: H(e) c(e). Informational dominance: Information transmitted on edges in A sufficient to compute information transmitted on edges in B: H(A) = H(A B) c(a) H(A B).

42 Informational Dominance Is A dominates B? decidable? Yes. We give a polynomial-time algorithm. Based on structural characterization of informational dominance. Examples of structural conditions implying informational dominance. In-edges to a set of nodes V informationally dominates all edges adjacent to V. A set of edges A informationally dominates S(i) and T (i) if S(i) and T (i) are in different weakly connected components of G \ A. These rules sufficient to prove interesting theorems.

43 This Talk: Outer Bounds on Capacity Model for information flow in general graphs. Consider natural cut-based outer bound on capacity. Show bound is not tight. Develop useful information theoretic techniques. Improve bound using information theoretic techniques. Derive information inequalities from graph structure. Combine these using facts about entropy. Yields best known outer bound for general graphs. Special Case: use outer bound to verify Li and Li conjecture on same class of graphs as Jain et al. 05.

44 Li and Li Conjecture Conjecture 1 In an undirected graphs: max network coding rate = max multicommodity flow rate Interesting cases when max flow < sparsity. Sparsity is an upper bound on rate for undirected graphs. Conjecture trivially true if multicommodity flow = sparsity. Use capacity constraints to verify for an infinite class of interesting graphs. Demonstrate proof for a small example.

45 Okamura-Seymour Example Undirected graph. 4-commodities. Demand 1 for all commodities. Capacity 1 for all edges. Sparsity 1. Max multicommodity flow = 3/4. Prove max network coding rate = 3/4.

46 = informational dominance

47 + = + informational dominance

48 + + = + + informational dominance

49 + + = + + sources = sinks

50 + + = submodularity

51 + + = submodularity

52 + + = informational dominance

53 + + = informational dominance

54 + + = H(S) + 2(H(S) + H(S) + H(S)) independence of sources

55 + + H(S) + 2(H(S) + H(S) + H(S))

56 + + + H(S) + 2(H(S) + H(S) + H(S)) Submodularity

57 H(S) + 2(H(S) + H(S) + H(S)) Submodularity

58 H(S) + 2(H(S) + H(S) + H(S)) Submodularity

59 H(S) H(S) + 2(H(S) + H(S) + H(S))

60 H(S) + + H(S) H(S) + 2(H(S) + H(S) + H(S))

61 H(S) + + H(S) + + H(S) + H(S) + 2(H(S) + H(S) + H(S))

62 + + H(S) + H(S) + H(S) + H(S)

63 + + H(S) + H(S) + H(S) + H(S) + H(S) + H(S) + H(S) + H(S)

64 + + H(S) + H(S) + H(S) + H(S) + + H(S) + H(S) + H(S) + H(S) 6 c(e) 2( H(S) + H(S) + H(S) + H(S) )

65 + + H(S) + H(S) + H(S) + H(S) + + H(S) + H(S) + H(S) + H(S) 6 8 r

66 General Theorem Theorem 2 Maximum network coding rate equals maximum multicommodity flow rate for graph which: are undirected and bipartite, have capacity 1 for all edges, have demand 1 for all commodities, and distance 2 between source and sink for all commodities. Corollary 3 First gap between sparsity and capacity of an information network.

67 Summary First outer bound on capacity for general graphs. Combined constraints based on graph structure with characteristics of entropy. Identified importance of informational dominance. Polynomial-time algorithm for informational dominance. Verified Li and Li conjecture for an infinite class of graphs. Demonstrated a gap between sparsity and capacity of information networks.

68 Open Questions Do we need non-shannon type information inequalities to get a tight upper bound on capacity? Is the Li and Li conjecture true for all undirected graphs? Is there a Ω(log n) between sparsity and capacity for 3- regular expanders? How do we use the full capacity of a network?

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of

More information

New algorithms for Disjoint Paths and Routing Problems

New algorithms for Disjoint Paths and Routing Problems New algorithms for Disjoint Paths and Routing Problems Chandra Chekuri Dept. of Computer Science Univ. of Illinois (UIUC) Menger s Theorem Theorem: The maximum number of s-t edgedisjoint paths in a graph

More information

A tool oriented approach to network capacity. Ralf Koetter Michelle Effros Muriel Medard

A tool oriented approach to network capacity. Ralf Koetter Michelle Effros Muriel Medard A tool oriented approach to network capacity Ralf Koetter Michelle Effros Muriel Medard ralf.koetter@tum.de effros@caltech.edu medard@mit.edu The main theorem of NC [Ahlswede, Cai, Li Young, 2001] Links

More information

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation

More information

Code Construction for Two-Source Interference Networks

Code Construction for Two-Source Interference Networks Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il

More information

Theory of Network Communication

Theory of Network Communication Theory of Network Communication Dr. Christian Scheideler Johns Hopkins Uniersity, Sept. 9 2002 Introduction The goal of this lecture is to gie an introduction to the state of the art in the theory of network

More information

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,

More information

conp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology.

conp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology. 1 conp and good characterizations In these lecture notes we discuss a complexity class called conp and its relationship to P and NP. This discussion will lead to an interesting notion of good characterizations

More information

The Capacity Region for Multi-source Multi-sink Network Coding

The Capacity Region for Multi-source Multi-sink Network Coding The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.

More information

Algorithms and Theory of Computation. Lecture 11: Network Flow

Algorithms and Theory of Computation. Lecture 11: Network Flow Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a

More information

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs

- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs

More information

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu

More information

Generalized Network Sharing Outer Bound and the Two-Unicast Problem

Generalized Network Sharing Outer Bound and the Two-Unicast Problem Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,

More information

Deterministic Network Coding by Matrix Completion. Nicholas James Alexander Harvey Bachelor of Mathematics, University of Waterloo, 2000

Deterministic Network Coding by Matrix Completion. Nicholas James Alexander Harvey Bachelor of Mathematics, University of Waterloo, 2000 Deterministic Network Coding by Matrix Completion by Nicholas James Alexander Harvey Bachelor of Mathematics, University of Waterloo, 2000 Submitted to the Department of Electrical Engineering and Computer

More information

Analyzing Large Communication Networks

Analyzing Large Communication Networks Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate

More information

Flow-Cut Gaps for Integer and Fractional Multiflows

Flow-Cut Gaps for Integer and Fractional Multiflows Flow-Cut Gaps for Integer and Fractional Multiflows Chandra Chekuri F. Bruce Shepherd Christophe Weibel September 6, 2012 Abstract Consider a routing problem instance consisting of a demand graph H = (V,

More information

Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007

Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007 CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007 So far in this course, we have been proving upper bounds on the approximation factors

More information

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code

More information

Entropy Vectors and Network Information Theory

Entropy Vectors and Network Information Theory Entropy Vectors and Network Information Theory Sormeh Shadbakht and Babak Hassibi Department of Electrical Engineering Caltech Lee Center Workshop May 25, 2007 1 Sormeh Shadbakht and Babak Hassibi Entropy

More information

Lecture: Flow-based Methods for Partitioning Graphs (1 of 2)

Lecture: Flow-based Methods for Partitioning Graphs (1 of 2) Stat260/CS294: Spectral Graph Methods Lecture 10-02/24/2015 Lecture: Flow-based Methods for Partitioning Graphs (1 of 2) Lecturer: Michael Mahoney Scribe: Michael Mahoney Warning: these notes are still

More information

Design of linear Boolean network codes for combination networks

Design of linear Boolean network codes for combination networks Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2006 Design of linear Boolean network codes for combination networks Shoupei Li Louisiana State University and Agricultural

More information

Quasi-linear Network Coding

Quasi-linear Network Coding Quasi-linear Network Coding Moshe Schwartz Electrical and Computer Engineering Ben-Gurion University of the Negev Beer Sheva 8410501, Israel schwartz@ee.bgu.ac.il Abstract We present a heuristic for designing

More information

Approximation Algorithms and Hardness of Integral Concurrent Flow

Approximation Algorithms and Hardness of Integral Concurrent Flow Approximation Algorithms and Hardness of Integral Concurrent Flow Parinya Chalermsook Julia Chuzhoy Alina Ene Shi Li May 16, 2012 Abstract We study an integral counterpart of the classical Maximum Concurrent

More information

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest

More information

Realization of set functions as cut functions of graphs and hypergraphs

Realization of set functions as cut functions of graphs and hypergraphs Discrete Mathematics 226 (2001) 199 210 www.elsevier.com/locate/disc Realization of set functions as cut functions of graphs and hypergraphs Satoru Fujishige a;, Sachin B. Patkar b a Division of Systems

More information

On Secret Sharing Schemes, Matroids and Polymatroids

On Secret Sharing Schemes, Matroids and Polymatroids On Secret Sharing Schemes, Matroids and Polymatroids Jaume Martí-Farré, Carles Padró Dep. de Matemàtica Aplicada 4, Universitat Politècnica de Catalunya, Barcelona, Spain {jaumem,cpadro}@ma4.upc.edu June

More information

. CS711008Z Algorithm Design and Analysis. Lecture 10. Algorithm design technique: Network flow and its applications 1. Dongbo Bu

. CS711008Z Algorithm Design and Analysis. Lecture 10. Algorithm design technique: Network flow and its applications 1. Dongbo Bu CS711008Z Algorithm Design and Analysis Lecture 10 Algorithm design technique: Network flow and its applications 1 Dongbo Bu Institute of Computing Technology Chinese Academy of Sciences, Beijing, China

More information

Network Coding for Computing

Network Coding for Computing Networ Coding for Computing Rathinaumar Appuswamy, Massimo Franceschetti, Nihil Karamchandani, and Kenneth Zeger Abstract The following networ computation problem is considered A set of source nodes in

More information

An introduction to basic information theory. Hampus Wessman

An introduction to basic information theory. Hampus Wessman An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on

More information

Characterising Probability Distributions via Entropies

Characterising Probability Distributions via Entropies 1 Characterising Probability Distributions via Entropies Satyajit Thakor, Terence Chan and Alex Grant Indian Institute of Technology Mandi University of South Australia Myriota Pty Ltd arxiv:1602.03618v2

More information

Deterministic Network Coding by Matrix Completion

Deterministic Network Coding by Matrix Completion Deterministic Network Coding by Matrix Completion Nicholas J. A. Harvey David R. Karger Kazuo Murota Abstract We present a new deterministic algorithm to construct network codes for multicast problems,

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III Instructor: Shaddin Dughmi Announcements Today: Spanning Trees and Flows Flexibility awarded

More information

arxiv:quant-ph/ v1 3 Nov 2006

arxiv:quant-ph/ v1 3 Nov 2006 Quantum Network Coding for General Graphs arxiv:quant-ph/06039v 3 Nov 006 Kazuo Iwama Harumichi Nishimura Rudy Raymond 3 Shigeru Yamashita 4 School of Informatics, Kyoto University iwama@kuis.kyoto-u.ac.jp

More information

CSCI 2570 Introduction to Nanocomputing

CSCI 2570 Introduction to Nanocomputing CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication

More information

A GRAPH-THEORETIC APPROACH TO NETWORK CODING

A GRAPH-THEORETIC APPROACH TO NETWORK CODING A GRAPH-THEORETIC APPROACH TO NETWORK CODING A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of

More information

GRAPH PARTITIONING USING SINGLE COMMODITY FLOWS [KRV 06] 1. Preliminaries

GRAPH PARTITIONING USING SINGLE COMMODITY FLOWS [KRV 06] 1. Preliminaries GRAPH PARTITIONING USING SINGLE COMMODITY FLOWS [KRV 06] notes by Petar MAYMOUNKOV Theme The algorithmic problem of finding a sparsest cut is related to the combinatorial problem of building expander graphs

More information

Network Flows. CTU FEE Department of control engineering. March 28, 2017

Network Flows. CTU FEE Department of control engineering. March 28, 2017 Network Flows Zdeněk Hanzálek, Přemysl Šůcha hanzalek@fel.cvut.cz CTU FEE Department of control engineering March 28, 2017 Z. Hanzálek (CTU FEE) Network Flows March 28, 2017 1 / 44 Table of contents 1

More information

On Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim

On Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim On Network Coding Capacity - Matroidal Networks and Network Capacity Regions by Anthony Eli Kim S.B., Electrical Engineering and Computer Science (2009), and S.B., Mathematics (2009) Massachusetts Institute

More information

Network Coding on Directed Acyclic Graphs

Network Coding on Directed Acyclic Graphs Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information

More information

MA015: Graph Algorithms

MA015: Graph Algorithms MA015 3. Minimum cuts 1 MA015: Graph Algorithms 3. Minimum cuts (in undirected graphs) Jan Obdržálek obdrzalek@fi.muni.cz Faculty of Informatics, Masaryk University, Brno All pairs flows/cuts MA015 3.

More information

Cutting Plane Methods II

Cutting Plane Methods II 6.859/5.083 Integer Programming and Combinatorial Optimization Fall 2009 Cutting Plane Methods II Gomory-Chvátal cuts Reminder P = {x R n : Ax b} with A Z m n, b Z m. For λ [0, ) m such that λ A Z n, (λ

More information

Node-capacitated ring routing

Node-capacitated ring routing Egerváry Research Group on Combinatorial Optimization Technical reports TR-2001-09. Published by the Egrerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.

More information

6.046 Recitation 11 Handout

6.046 Recitation 11 Handout 6.046 Recitation 11 Handout May 2, 2008 1 Max Flow as a Linear Program As a reminder, a linear program is a problem that can be written as that of fulfilling an objective function and a set of constraints

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

arxiv:quant-ph/ v5 3 Dec 2009

arxiv:quant-ph/ v5 3 Dec 2009 Quantum network communication the butterfly and beyond Debbie Leung (1), Jonathan Oppenheim (2) and Andreas Winter (3) (1) Institute for Quantum Computing, University of Waterloo, Waterloo, Canada (2)

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO. Network coding for function computation

UNIVERSITY OF CALIFORNIA, SAN DIEGO. Network coding for function computation UNIVERSITY OF CALIFORNIA, SAN DIEGO Network coding for function computation A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Electrical Engineering

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

Multicommodity flows over time: Efficient algorithms and complexity

Multicommodity flows over time: Efficient algorithms and complexity Theoretical Computer Science 379 (27) 387 44 www.elsevier.com/locate/tcs Multicommodity flows over time: Efficient algorithms and complexity Alex Hall a, Steffen Hippler b, Martin Skutella c, a Institut

More information

Lecture 21 November 11, 2014

Lecture 21 November 11, 2014 CS 224: Advanced Algorithms Fall 2-14 Prof. Jelani Nelson Lecture 21 November 11, 2014 Scribe: Nithin Tumma 1 Overview In the previous lecture we finished covering the multiplicative weights method and

More information

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals

More information

Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation

Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Viveck R. Cadambe EE Department, Pennsylvania State University, University Park, PA, USA viveck@engr.psu.edu Nancy Lynch

More information

Lower Bounds for External Memory Integer Sorting via Network Coding

Lower Bounds for External Memory Integer Sorting via Network Coding Lower Bounds for External Memory Integer Sorting via Network Coding Alireza Farhadi University of Maryland College Park, MD MohammadTaghi Hajiaghayi University of Maryland College Park, MD Elaine Shi Cornell

More information

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check

More information

CMSC 451: Max-Flow Extensions

CMSC 451: Max-Flow Extensions CMSC 51: Max-Flow Extensions Slides By: Carl Kingsford Department of Computer Science University of Maryland, College Park Based on Section 7.7 of Algorithm Design by Kleinberg & Tardos. Circulations with

More information

FRACTIONAL PACKING OF T-JOINS. 1. Introduction

FRACTIONAL PACKING OF T-JOINS. 1. Introduction FRACTIONAL PACKING OF T-JOINS FRANCISCO BARAHONA Abstract Given a graph with nonnegative capacities on its edges, it is well known that the capacity of a minimum T -cut is equal to the value of a maximum

More information

On a Cut-Matching Game for the Sparsest Cut Problem

On a Cut-Matching Game for the Sparsest Cut Problem On a Cut-Matching Game for the Sparsest Cut Problem Rohit Khandekar Subhash A. Khot Lorenzo Orecchia Nisheeth K. Vishnoi Electrical Engineering and Computer Sciences University of California at Berkeley

More information

Maximum Flow. Jie Wang. University of Massachusetts Lowell Department of Computer Science. J. Wang (UMass Lowell) Maximum Flow 1 / 27

Maximum Flow. Jie Wang. University of Massachusetts Lowell Department of Computer Science. J. Wang (UMass Lowell) Maximum Flow 1 / 27 Maximum Flow Jie Wang University of Massachusetts Lowell Department of Computer Science J. Wang (UMass Lowell) Maximum Flow 1 / 27 Flow Networks A flow network is a weighted digraph G = (V, E), where the

More information

Hardness of Embedding Metric Spaces of Equal Size

Hardness of Embedding Metric Spaces of Equal Size Hardness of Embedding Metric Spaces of Equal Size Subhash Khot and Rishi Saket Georgia Institute of Technology {khot,saket}@cc.gatech.edu Abstract. We study the problem embedding an n-point metric space

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

Network Capacity under Traffic Symmetry: Wireline and Wireless Networks

Network Capacity under Traffic Symmetry: Wireline and Wireless Networks Network Capacity under Traffic Symmetry: Wireline and Wireless Networks Sudeep Kamath, Sreeram Kannan, Pramod Viswanath ECE Department, University of California, San Diego, sudeep@eecs.berkeley.edu EECS

More information

Capacitated Network Design on Undirected Graphs

Capacitated Network Design on Undirected Graphs Capacitated Network Design on Undirected Graphs Deeparnab Chakrabarty, Ravishankar Krishnaswamy, Shi Li, and Srivatsan Narayanan Abstract. In this paper, we study the approximability of the capacitated

More information

An Ins t Ins an t t an Primer

An Ins t Ins an t t an Primer An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,

More information

On the dominant of the s-t-cut polytope: Vertices, facets, and adjacency

On the dominant of the s-t-cut polytope: Vertices, facets, and adjacency Math. Program., Ser. B DOI 10.1007/s10107-010-0373-7 FULL LENGTH PAPER On the dominant of the s-t-cut polytope: Vertices, facets, and adjacency Martin Skutella Alexia Weber Received: 15 August 2008 / Accepted:

More information

Lower Bounds for Multiplication via Network Coding

Lower Bounds for Multiplication via Network Coding Lower Bounds for Multiplication via Network Coding Peyman Afshani Casper Freksen Lior Kamma Kasper Green Larsen Abstract Multiplication is one of the most fundamental computational problems, yet its true

More information

Symmetries in the Entropy Space

Symmetries in the Entropy Space Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy

More information

Graph independent field size bounds on failure protecting network codes

Graph independent field size bounds on failure protecting network codes Egerváry Research Group on Combinatorial Optimization Technical reports TR-25-. Published by the Egerváry Research Group, Pázmány P. sétány /C, H 7, Budapest, Hungary. Web site: www.cs.elte.hu/egres. ISSN

More information

1 The independent set problem

1 The independent set problem ORF 523 Lecture 11 Spring 2016, Princeton University Instructor: A.A. Ahmadi Scribe: G. Hall Tuesday, March 29, 2016 When in doubt on the accuracy of these notes, please cross chec with the instructor

More information

1 Computational Problems

1 Computational Problems Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

A Complexity Theory for Parallel Computation

A Complexity Theory for Parallel Computation A Complexity Theory for Parallel Computation The questions: What is the computing power of reasonable parallel computation models? Is it possible to make technology independent statements? Is it possible

More information

A Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices

A Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices A Relation Between Weight Enumerating Function and Number of Full Ran Sub-matrices Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,

More information

Notes for Lecture Notes 2

Notes for Lecture Notes 2 Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source

More information

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)

More information

Mathematics for Decision Making: An Introduction. Lecture 13

Mathematics for Decision Making: An Introduction. Lecture 13 Mathematics for Decision Making: An Introduction Lecture 13 Matthias Köppe UC Davis, Mathematics February 17, 2009 13 1 Reminder: Flows in networks General structure: Flows in networks In general, consider

More information

Approximating Multicut and the Demand Graph

Approximating Multicut and the Demand Graph Approximating Multicut and the Demand Graph Chandra Chekuri Vivek Madan November 2, 2016 Abstract In the minimum Multicut problem, the input is an edgeweighted supply graph G (V, E) and a demand graph

More information

BBM402-Lecture 20: LP Duality

BBM402-Lecture 20: LP Duality BBM402-Lecture 20: LP Duality Lecturer: Lale Özkahya Resources for the presentation: https://courses.engr.illinois.edu/cs473/fa2016/lectures.html An easy LP? which is compact form for max cx subject to

More information

Graphs and Network Flows IE411. Lecture 12. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 12. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 12 Dr. Ted Ralphs IE411 Lecture 12 1 References for Today s Lecture Required reading Sections 21.1 21.2 References AMO Chapter 6 CLRS Sections 26.1 26.2 IE411 Lecture

More information

New Hardness Results for Undirected Edge Disjoint Paths

New Hardness Results for Undirected Edge Disjoint Paths New Hardness Results for Undirected Edge Disjoint Paths Julia Chuzhoy Sanjeev Khanna July 2005 Abstract In the edge-disjoint paths (EDP) problem, we are given a graph G and a set of source-sink pairs in

More information

Low Complexity Encoding for Network Codes

Low Complexity Encoding for Network Codes Low Complexity Encoding for Network Codes Sidharth Jaggi 1 Laboratory of Information and Decision Sciences Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: jaggi@mit.edu Yuval Cassuto

More information

Climbing an Infinite Ladder

Climbing an Infinite Ladder Section 5.1 Section Summary Mathematical Induction Examples of Proof by Mathematical Induction Mistaken Proofs by Mathematical Induction Guidelines for Proofs by Mathematical Induction Climbing an Infinite

More information

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1 U.C. Berkeley CS278: Computational Complexity Handout N1 Professor Luca Trevisan August 30, 2004 Notes for Lecture 1 This course assumes CS170, or equivalent, as a prerequisite. We will assume that the

More information

Combinatorial Auctions Do Need Modest Interaction

Combinatorial Auctions Do Need Modest Interaction Combinatorial Auctions Do Need Modest Interaction Sepehr Assadi University of Pennsylvania Motivation A fundamental question: How to determine efficient allocation of resources between individuals? Motivation

More information

Near-Optimal Hardness Results and Approximation Algorithms for Edge-Disjoint Paths and Related Problems

Near-Optimal Hardness Results and Approximation Algorithms for Edge-Disjoint Paths and Related Problems Near-Optimal Hardness Results and Approximation Algorithms for Edge-Disjoint Paths and Related Problems Venkatesan Guruswami Sanjeev Khanna Rajmohan Rajaraman Bruce Shepherd Mihalis Yannakakis Abstract

More information

Amobile satellite communication system, like Motorola s

Amobile satellite communication system, like Motorola s I TRANSACTIONS ON INFORMATION THORY, VOL. 45, NO. 4, MAY 1999 1111 Distributed Source Coding for Satellite Communications Raymond W. Yeung, Senior Member, I, Zhen Zhang, Senior Member, I Abstract Inspired

More information

Edge-Disjoint Paths in Planar Graphs with Constant Congestion

Edge-Disjoint Paths in Planar Graphs with Constant Congestion Edge-Disjoint Paths in Planar Graphs with Constant Congestion Chandra Chekuri Sanjeev Khanna F. Bruce Shepherd November 8, 2006 Abstract We study the maximum edge-disjoint paths problem in undirected planar

More information

Scheduling unit processing time arc shutdown jobs to maximize network flow over time: complexity results

Scheduling unit processing time arc shutdown jobs to maximize network flow over time: complexity results Scheduling unit processing time arc shutdown jobs to maximize network flow over time: complexity results Natashia Boland Thomas Kalinowski Reena Kapoor Simranjit Kaur Abstract We study the problem of scheduling

More information

Capacity Region of the Permutation Channel

Capacity Region of the Permutation Channel Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes

More information

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees

A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of

More information

A well-quasi-order for tournaments

A well-quasi-order for tournaments A well-quasi-order for tournaments Maria Chudnovsky 1 Columbia University, New York, NY 10027 Paul Seymour 2 Princeton University, Princeton, NJ 08544 June 12, 2009; revised April 19, 2011 1 Supported

More information

Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing

Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing Oriol Farràs 1, Tarik Kaced 2, Sebastià Martín 3, and Carles Padró 3 1 Universitat Rovira i Virgili, Tarragona,

More information

Flow Network. The following figure shows an example of a flow network:

Flow Network. The following figure shows an example of a flow network: Maximum Flow 1 Flow Network The following figure shows an example of a flow network: 16 V 1 12 V 3 20 s 10 4 9 7 t 13 4 V 2 V 4 14 A flow network G = (V,E) is a directed graph. Each edge (u, v) E has a

More information

Quadratic and Polynomial Inequalities in one variable have look like the example below.

Quadratic and Polynomial Inequalities in one variable have look like the example below. Section 8 4: Polynomial Inequalities in One Variable Quadratic and Polynomial Inequalities in one variable have look like the example below. x 2 5x 6 0 (x 2) (x + 4) > 0 x 2 (x 3) > 0 (x 2) 2 (x + 4) 0

More information

Amulticast network is a directed multigraph containing a

Amulticast network is a directed multigraph containing a IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 10, OCTOBER 2004 2243 Linearity and Solvability in Multicast Networks Randall Dougherty, Christopher Freiling, and Kenneth Zeger, Fellow, IEEE Abstract

More information

Lecture 15 (Oct 6): LP Duality

Lecture 15 (Oct 6): LP Duality CMPUT 675: Approximation Algorithms Fall 2014 Lecturer: Zachary Friggstad Lecture 15 (Oct 6): LP Duality Scribe: Zachary Friggstad 15.1 Introduction by Example Given a linear program and a feasible solution

More information

Kernelization by matroids: Odd Cycle Transversal

Kernelization by matroids: Odd Cycle Transversal Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the

More information

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels

More information

Approximability of Packing Disjoint Cycles

Approximability of Packing Disjoint Cycles Approximability of Packing Disjoint Cycles Zachary Friggstad Mohammad R. Salavatipour Department of Computing Science University of Alberta Edmonton, Alberta T6G 2E8, Canada zacharyf,mreza@cs.ualberta.ca

More information

Flows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek

Flows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek CS 787: Advanced Algorithms Flows and Cuts Instructor: Dieter van Melkebeek This lecture covers the construction of optimal flows and cuts in networks, their relationship, and some applications. It paves

More information