Subspace Properties of Network Coding and Their Applications

被引:11
作者
Siavoshani, Mahdi Jafari [1 ]
Fragouli, Christina [1 ]
Diggavi, Suhas N. [2 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, CH-1015 Lausanne, Switzerland
[2] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90095 USA
基金
瑞士国家科学基金会;
关键词
Byzantine attack; network coding; random subspaces; randomized network coding; subspace coding; topology inference; topology management; ERROR-CORRECTION;
D O I
10.1109/TIT.2012.2184656
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Systems that employ network coding for content distribution convey to the receivers linear combinations of the source packets. If we assume randomized network coding, during this process, the network nodes collect random subspaces of the space spanned by the source packets. We establish several fundamental properties of the random subspaces induced in such a system and show that these subspaces implicitly carry topological information about the network and its state that can be passively collected and inferred. We leverage this information toward a number of applications that are interesting in their own right, such as topology inference, bottleneck discovery in peer-to-peer systems, and locating Byzantine attackers. We thus argue that randomized network coding, apart from its better known properties for improving information delivery rate, can additionally facilitate network management and control.
引用
收藏
页码:2599 / 2619
页数:21
相关论文
共 35 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
[Anonymous], P IEEE INT C COMP CO
[3]  
[Anonymous], UNDERSTANDING PROPER
[4]  
[Anonymous], P ALL OCT
[5]  
[Anonymous], P ALL OCT
[6]  
[Anonymous], P IEEE INF THEOR WOR
[7]  
[Anonymous], P ACM SIGCOMM WORKSH
[8]  
[Anonymous], P INF THEOR APPL WOR
[9]  
[Anonymous], P 2 INT WORKSH DAT T
[10]  
[Anonymous], 2009, C LAS EL PAC RIM OPT