Next Article in Journal
A Bayesian Predictive Discriminant Analysis with Screened Data
Previous Article in Journal
Rolling Bearing Fault Diagnosis Based on Wavelet Packet Decomposition and Multi-Scale Permutation Entropy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Subspace Coding for Networks with Different Level Messages

The State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Entropy 2015, 17(9), 6462-6480; https://doi.org/10.3390/e17096462
Submission received: 6 July 2015 / Revised: 31 August 2015 / Accepted: 14 September 2015 / Published: 21 September 2015
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
We study the asymptotically-achievable rate region of subspace codes for wireless network coding, where receivers have different link capacities due to the access ways or the faults of the intermediate links in the network. Firstly, an outer bound of the achievable rate region in a two-receiver network is derived from a combinatorial method. Subsequently, the achievability of the outer bound is proven by code construction, which is based on superposition coding. We show that the outer bound can be achieved asymptotically by using the code presented by Koetter and Kschischang, and the outer bound can be exactly attained in some points by using a q-analog Steiner structure. Finally, the asymptotically-achievable rate region is extended to the general case when the network has m receivers with different levels.

1. Introduction

Network coding, introduced in [1,2], has attracted a substantial amount of research attention. It is a technique in which the intermediate node is allowed to make a combination of its received packets before sending the combined packet out to the network. This method can effectively improve the network throughput. However, there are still many problems to be studied, such as the collection of information about the network topology [3]. As the scale of the network grows, the complexity of network code construction increases accordingly. To address this issue, random network coding was proposed by Ho et al. [4] without considering network topology, where the intermediate nodes select coding coefficients at random from a finite field. It becomes an effective and robust tool when the network topology changes dynamically, especially in the case of a wireless network. Furthermore, since the characteristics of the wireless channel are time-varying in general, packets lost and errors are important factors affecting transmission performance. Therefore, error control in wireless network coding is essential [5,6].
Taking the advantage of the distance property of vector space, Koetter and Kschischang proposed the subspace metric codes for random network coding [7], where a subspace is used to represent a codeword. Even if partial changes occur in the received subspace, as long as the distance between the received subspace and the transmitted subspace satisfies a certain distance relationship, the message could still be decoded successfully. Closely relevant works about the coding bounds and the packing and covering properties of subspace codes are presented in [8,9,10]. However, the existing works about subspace codes are based on the multicast network model.
In this paper, we study a real-time media distribution system based on heterogeneous wireless networks, where end users are intelligent devices, such as smart TVs, mobile phones and computers. These terminals access the networks with different link capacities. There are several factors that make the link capacities different, such as the various ways that they access the networks (e.g., WLAN or mobile network), the packets lost and errors (due to the fault of the intermediate nodes or link failure) [11,12]. In this case, the terminals with high link capacity can receive more useful data, which means that some receivers are “stronger” than the others. For example, because they access the networks in a more stable way, they can always receive more than the “weaker” ones. Each end user wants to maximize the utilization of his link capacity to provide his best service. To meet the diverse requirements of the users, it is complex and a waste of resources to design the transmission approach for each user. A better solution is coding at the source node; then, the source node broadcasts the same encoded packets to the receivers, and each user collects as many packets as possible and then decodes to meet his requirement. A trivial coding method is to design a code corresponding to the “weaker” receiver. However, in this way, the “stronger” node cannot get his best service.
We assume that the media can be divided into several different priority levels according to their importance. The higher priority can ensure the basic demand of users. Meanwhile, the lower priority can guarantee the additional needs of users. To simplify the problem, we take the simplest case that there are only two receivers in the network. First, we derive an outer bound for the asymptotically-achievable rate region by a combinatorial method. Then, we prove the achievability of the outer bound by code construction with the codes that were proposed by Koetter and Kschischang (K-K codes) [7]. However, K-K codes require the dimension of ground space to be sufficiently large. We observe that the q-analog Steiner structure can be used in our construction. Our outer bound could be exactly attained in some points using a q-analog Steiner structure. We further extend our result to the general case of m receivers with different link capacities.
The rest of this paper is organized as follows. In Section 2.1, we briefly review the subspace code. Then, we observe that deletion correcting is equivalent to deletion and insertion error correcting in constant dimension codes. In Section 2.2, we extend the model to broadcast, which leads us to the definition of broadcast error correction network codes (BECNC). We state the asymptotically-achievable rate region of BECNC in Section 3. The main results are proven in Section 4. In Section 5, we present that the outer bound can be exactly attained in some points using the q-analog Steiner structure. In Section 6, we generalize the rate region to the network with more than two receivers.

2. Preliminaries and Our Model

2.1. Previous Results: Subspace Metric Codes

We begin with previous results about subspace metric codes, which were proposed by Koetter and Kschischang [7]. It is necessary to introduce the previous results of subspace metric codes, since our works are based on them.
In the “noncoherent” model, the transmitter and receiver are assumed to have no knowledge of the channel transfer matrix. Let F q be a finite field with q elements. We use F q l × k to denote the set of all l × k matrices over F q . In the error free case, the transmission model can be characterized as Y = F X , where F F q l × k is a full rank random matrix (the channel transfer matrix), X F q k × n is the transmitted matrix whose rows can be considered as source packets [11] and Y F q l × n is the received matrix whose rows can be considered as received packets.
Since the receiver does not know F , he only knows that the rows of X and Y span the same subspace. Then, he can correctly recover the transmitted space when no error occurs, if we regard space spanned by the rows of X as a codeword.
However, the transmitted space will be a subspace of the received space by the receiver when an insertion error occurs, whereas the receiver will receive a subspace of the transmitted space when a deletion occurs [7].
F q n can be regarded as an n-dimensional vector space over F q . Let P q ( n ) denote the set of all subspaces of F q n , forming the n-order projective space over F q [17]. A subspace metric code C is a nonempty set of subspaces of F q n , where each codeword is a vector space spanned by the rows of a message matrix. Let U , V P q ( n ) be two subspaces; the subspace distance between them is defined as d ( U , V ) = dim ( U ) + dim ( V ) - 2 dim ( U V ) , where dim ( U ) is the dimension of U. The minimum distance of code C is defined as D ( C ) = min U , V C : U V d ( U , V ) . If:
D ( C ) > 2 ( t + ρ ) ,
then a minimum distance decoder will produce the transmitted space from the received space, where t and ρ denote the maximum number of deletion and insertion errors induced by the channel, respectively. Deletion is actually the packets lost, and insertion error is equivalent to malicious attack.
In this paper, we only consider the constant dimension codes, where the dimensions of all codewords in C are the same. Let P q ( n , k ) denote the set of all k-dimensional subspaces ( k n ) of the n-dimensional vector space F q n . This means that constant dimension code C is a subset of P q ( n , k ) . The normalized weight is defined as λ = k / n , where k is the dimension of codewords. The rate of the code is defined as R = log q | C | n k .
In [7], Koetter and Kschischang obtained the Singleton-type bound of the subspace codes and constructed a Singleton bound-achieving code using the linearized polynomial. We refer to this code as the K-K code in the following. The Singleton-type bound is shown in the following lemma.
Lemma 1 (Corollary 10 of [7]). Let C be a collection of subspaces in P q ( n , k ) , with normalized minimum distance δ = D ( C ) 2 k . The rate of C is bounded by:
R ( 1 - δ ) ( 1 - λ ) + o ( 1 ) ,
where λ = k / n is the normalized weight and o ( 1 ) approaches zero as n grows.
They also mentioned that, for the decoder, the effects of insertion and deletion are equivalent in constant dimension codes. Furthermore, there may be an intersection between the insertion subspace and the transmitted subspace, which would possibly decrease the number of deletions seen by the receiver. In other words, the negative impact brought by simple deletion is not less than the negative impact caused by deletion and insertion simultaneously. Next, we will discuss the case of only deletions.
Observe that a subspace V r is received at the receiver; the minimum distance decoder will decode V r to V s , if the distance between V r and V s is minimal among all of the codewords in C , i.e.,
d ( V r , V s ) = min V C d ( V r , V ) .
We define the operation of deletions as mapping D τ . For a given k-dimensional subspace V, D τ ( V ) produces a random ( k - τ ) -dimensional subspace of V, where τ 0 . We say that a code is capable of correcting τ deletions, if it can correct τ deletions using the decoding criterion in (3). We refer to such a code as a τ-deletion-correcting code, and its minimum distance must satisfy:
D ( C ) > 2 τ .
Let V r = D τ ( V ) be the received subspace and V V be any other codeword in C , then D ( C ) d ( V , V ) d ( V , V r ) + d ( V r , V ) ; it follows that d ( V , V r ) D ( C ) - d ( V r , V ) . If the condition (4) could be satisfied, then d ( V , V r ) > d ( V r , V ) , the minimum distance decoder will produce the transmitted subspace V from the received subspace.
Remark 1. Since Condition (4) coincides with Condition (1), a τ-deletion-correcting code can correct t deletions and ρ insertions, if t + ρ = τ . Thus, it is sufficient for us to focus on deletion-correcting codes, because for this reason, all our results below for deletion hold for deletion and insertion, as well.
An ( n , k , M , τ ) -deletion-correcting code C over F q is a k-dimensional subspace code over F q n with M codewords whose maximum deletion-correcting capability is τ. The rate of code C is R = log q M n k .
Definition 1. A rate R is said to be ( λ , μ ) -asymptotically achievable if, for all ϵ > 0 and sufficiently large n, there exists an ( n , k , M , τ ) -deletion-correcting code, such that log q M n k > R - ϵ , where μ = τ / k and λ = k / n .
The network model of [7] is multicast, which is actually a point-to-point communication channel with just one sender and one receiver. In next subsection, we will extend the model to broadcast, which consists of one sender and m receivers.

2.2. Network Model

We are motivated by a real-time media distribution system based on heterogeneous wireless networks, where end users are individual intelligent terminals, such as tablets, smart phones and computers. These intelligent terminals access the network with heterogeneous link capacities. The difference of link capacities may be caused by different access ways (e.g., WLAN and mobile network) or the instability of their links.
We assume that the media can be divided into different priority levels corresponding to the link capacity of receivers. The higher priority level guarantees the basic media quality, and the lower priority level corresponds to detailed information about media. Let { M 1 , M 2 , , M m } be a collection of m message sets with ordered priority, where the index i { 1 , , m } indicates the priority level, and the smaller index corresponds to the higher-priority level. Without loss of generality, we assume there are m receivers in the network, each of which has a different level of link capacity. Let { t 1 , t 2 , , t m } be the ordered set of receivers, where the index i { 1 , , m } indicates the link capacity; the smaller index corresponds to the higher link capacity.
The media is encoded into packets that can be sent to the network. For arbitrary l { 1 , , m } , the receiver t l downloads the packets with its link capacity constraint. Although there exist some packets lost and errors in its link, t l can recover the messages with priority levels { 1 , 2 , , m - l + 1 } . Therefore, with respect to the receiver with lower link capacity, the receiver with higher link capacity can obtain more detailed information, and it can get clearer vision effects by decoding its received packets.
For simplicity of presentation, we focus the discussion on the network with two receivers nodes t 1 , t 2 . The extension to an arbitrary number of receivers is straightforward. This model can be regarded as a combinatorial version of the asymmetric two-output broadcast channel [18] in projective space. We show it in Figure 1. The media is divided into two priority level message sets M 1 and M 2 . The receiver t 1 has a higher link capacity than t 2 . This means that the receiver t 1 can recover both messages i M 1 and j M 2 ; meanwhile, the receiver t 2 can only decode the message i M 1 during the transmission. We assume that a message pair ( i , j ) is encoded into a codeword with k packets. Let τ 1 and τ 2 be the numbers of errors occurring at the link of receiver t 1 and t 2 , respectively. Receiver t 1 and t 2 can collect ( k - τ 1 ) and ( k - τ 2 ) independent packets with no error, respectively. We assume that τ 2 > τ 1 , i.e., the receiver t 1 can receive more correct packets than t 2 .
Figure 1. Asymmetric two-output broadcast channel.
Figure 1. Asymmetric two-output broadcast channel.
Entropy 17 06462 g001
Our aim is to design a code C with which the receivers can decode their messages correctly as long as they received ( k - τ 1 ) and ( k - τ 2 ) independent packets with no error, respectively. Meanwhile, we are interested in the achievable rate region of the code. Although both deletion and insertion errors should be considered, it is sufficient to consider deletion error according to Remark 1.
Let M 1 = { 1 , 2 , , M 1 } and M 2 = { 1 , 2 , , M 2 } be two message sets, where M 1 has higher level priority. The message pair ( i , j ) ( M 1 , M 2 ) is encoded into codeword V i , j of C by encoding mapping. Then, the codeword will be transmitted to the network. Due to the packets lost, the receiver t 1 can receive a ( k - τ 1 ) -dimensional subspace U 1 , and the receiver t 2 can receive a ( k - τ 2 ) -dimensional subspace U 2 . If the codewords satisfy some conditions, the messages ( i , j ) and i can be decoded correctly at t 1 and t 2 , respectively. The conditions will be discussed at the end of Section 4.1. In this case, the receiver t 1 can recover messages i and j. Meanwhile, the receiver t 2 can only recover message i. Next, we formally state the definition of such code.
Definition 2. Let t 1 and t 2 be the two receiver nodes of an acyclic single source network; the corresponding numbers of errors occurring at the link of receiver t 1 and t 2 are τ 1 and τ 2 , respectively, τ 2 > τ 1 . A constant dimension code C P q ( n , k ) is called an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC (broadcast error-correcting network code), if it satisfies that the two receivers can correct errors of τ 1 and τ 2 , respectively. The cardinalities of the two corresponding message sets are M 1 and M 2 .
We are interested in the maximum number of message set pairs ( M 1 , M 2 ) , when the dimension and the maximum numbers of correctable errors are given. Sometimes, the asymptotic rate pairs are also interesting.
The asymptotic rate pair is defined as ( R 1 , R 2 ) , where R i = log q M i n k , i = 1 , 2 .
Definition 3. A rate pair of non-negative real numbers ( R 1 , R 2 ) is said to be ( λ , μ 1 , μ 2 ) -asymptotically achievable if, for all ϵ > 0 and sufficiently large n, there exists an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC, such that log q M i n k > R i - ϵ , i = 1 , 2 , where τ 1 / k = μ 1 , τ 2 / k = μ 2 and k / n = λ . The asymptotically-achievable rate region is the set of all asymptotically-achievable rate pairs.

3. Main Results

We now state the asymptotically-achievable rate region of the broadcast error-correcting network codes. The proof of the theorem will be presented in next section.
Theorem 1. The asymptotically-achievable rate region of an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC with corresponding error-correcting capability τ 1 and τ 2 over field F q consists of pairs ( R 1 , R 2 ) of non-negative numbers that satisfy the inequalities,
R 1 0 , R 2 0
R 1 ( 1 - μ 1 ) ( λ x - λ ) ,
R 2 ( 1 - μ 2 ) ( 1 - λ x ) ,
where x is an auxiliary variable, such that k x n . The normalized weights are λ x = x / n , λ = k / n , and the normalized error-correcting capabilities are μ 1 = τ 1 / k , μ 2 = τ 2 / k .

4. Proofs

Before proving the theorem, we introduce some auxiliary results in combinatorial mathematics, which are used in the proof of our results.

4.1. Combinatorial Lemmas

This part, however, is rather technical. The readers who are not interested in it can just skim the conclusion without missing the essence of this section.
The number of elements in P q ( n , k ) is given by the Gaussian coefficient,
P q ( n , k ) = n k q = ( q n - 1 ) ( q n - 1 - 1 ) ( q n - k + 1 - 1 ) ( q k - 1 ) ( q k - 1 - 1 ) ( q - 1 ) .
The subscript q of the Gaussian coefficient will be omitted without causing ambiguity in the following text.
The asymptotic behavior of the Gaussian coefficient is given by the following lemma.
Lemma 2 ([7]) Gaussian coefficient n k , for 0 < k < n satisfies:
1 < q - k ( n - k ) n k < 4 .
We will introduce an important definition in combinatorial mathematics, which is very useful in our proof.
Let J be a collection of k-subsets of an n-set S, 0 k n . The collection:
J : = { K S k - 1 : K J , f o r s o m e J J }
is called the shadow of J , where S k - 1 denotes the set of all ( k - 1 ) -subsets of S. That is, J consists of all subsets of S, which can be obtained by deleting an element from a set in J .
The lower bound of the size of a shadow is given by the Kruskal–Katona theorem [13,14]. Additionally, Lovász [15] proposed a weaker and simpler form of the original theorem. In [16], Lovász’s theorem is extended to vector spaces.
For a given n-dimensional vector space W, we define the shadow as follows.
Definition 4. Let F be a collection of k-dimensional subspaces of an n-dimensional vector space W, where k < n . The shadow of F is denoted by F ,
F : = { E W k - 1 : E F , f o r s o m e F F } ,
where W k - 1 denotes the set of all ( k - 1 ) -dimensional subspaces of W.
A lower bound for the size of the shadow F is shown in the following lemma.
Lemma 3 ([16]) Let F W k , and let y k be the positive integer, which satisfies F = y k . Then, F y k - 1 . If equality holds, then y Z + and F = Y k , where Y is a y-dimensional subspace of W.
We extend Lemma 3 to the case of l-level shadow. Let ( l ) F denote the l-level shadow of a collection of k-dimensional subspaces of W. Namely, similarly to the definition of F , we define:
( l ) F : = { E W k - l : E F , f o r s o m e F F } ,
where W k - l denotes the set of all ( k - l ) -dimensional subspaces of W. For simplicity, the l-level shadow will be referred to as the l-shadow. The following lemma gives a lower bound of the size of the l-shadow.
Lemma 4. Let F W k , and let y k be the positive integer, which satisfies F = y k . Then, ( l ) F y k - l for k l . If equality holds, then y Z + and F = Y k , where Y is a y-dimensional subspace of W.
Proof. Refer to Appendix A.1.
In Lemma 4, if the equality holds, there exists a y-dimensional subspace Y, such that ( l ) F is the set of all ( k - l ) -dimensional subspaces of Y, for 0 l k .
Since the cardinality of the set F is not exactly equal to a Gaussian coefficient in general, we extend Lemma 4 to a general case in the following corollary.
Corollary 1. Let F W k be a collection of k-dimensional subspaces of W and F y k , then ( l ) F y k - l y k F .
Proof. Refer to Appendix A.2.
Corollary 1 gives the lower bound for the size of an l-shadow of a given collection of subspaces, which will be used in the proof of our result.
Using the representation of combinatorial mathematics, we discuss the conditions for correctly decoding BECNC. Due to the packets lost, the receiver t 1 can receive a ( k - τ 1 ) -dimensional subspace U 1 ( τ 1 ) { V i , j } , and the receiver t 2 can receive a ( k - τ 2 ) -dimensional subspace U 2 ( τ 2 ) { V i , j } . We say that the receivers can decode correctly, if for t 1 :
( τ 1 ) { V i , j } ( τ 1 ) { V i , j } = , i f ( i , j ) ( i , j ) ,
and for t 2 :
( τ 2 ) { V i , j } ( τ 2 ) { V i , j } = , i f i i , j , j .

4.2. Outer Bound

We prove the outer bound of the achievable rate region at first. By Remark 1, it is sufficient to consider the deletion error correcting in the proof. Inspired by the analogues between the definition of shadow and the packing sphere of deletion-correcting codes, we adopt the concept of shadow in combinatorial theory. Furthermore, there is a lower bound for the size of the shadow in vector space [16]. A small generalization of the lower bound is provided in Corollary 1, which will be used in the proof of the outer bound.
Theorem 2. (Outer bound of the achievable rate region) If ( R 1 , R 2 ) is an achievable rate pair of an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC, C P q ( n , k ) , for an x with k x n , then the following inequalities hold,
M 1 n k - τ 2 x k - τ 1 x k - τ 2 x - 1 k - τ 1
where x is the smallest integer, such that:
M 2 k k - τ 1 x k - τ 1
In particular, if the equality of (13) holds, we have:
M 1 n k - τ 2 x k - τ 2
We can obtain the asymptotic form of Theorem 2 directly.
Corollary 2. If ( R 1 , R 2 ) is an achievable rate pair of an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC, C P q ( n , k ) , for an x with k x n , then the following inequalities hold,
R 1 0 , R 2 0
R 1 ( 1 - μ 1 ) ( λ x - λ ) ,
R 2 ( 1 - μ 2 ) ( 1 - λ x ) ,
where λ x = x / n , λ = k / n are the normalized weights and μ 1 = τ 1 / k , μ 2 = τ 2 / k are the normalized deletion-correcting capabilities.
Proof of Theorem 2. Let V = { V i , j : i = 1 , 2 , , M 1 , j = 1 , 2 , , M 2 } be the codebook of an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC that can correct τ 1 and τ 2 deletions for receivers t 1 and t 2 , respectively, where dim ( V i , j ) = k , τ 1 < τ 2 < k and δ = τ 2 - τ 1 .
For fixed i, we denote the τ 1 -shadow of the codeword V i , j as ( τ 1 ) { V i , j } ; then, the τ 1 -shadows of V i , j , j = 1 , 2 , , M 2 are disjoint, namely:
( τ 1 ) { V i , j } ( τ 1 ) { V i , j } = ,
and the cardinality of each shadow is | ( τ 1 ) { V i , j } | = k k - τ 1 . We denote the set of these shadows as S H ( i ) = { ( τ 1 ) { V i , j } : j = 1 , 2 , , M 2 } ; then, | S H ( i ) | = M 2 k k - τ 1 .
Figure 2 illustrates the relationship of τ 1 -shadows when i is fixed. The big dotted line circle on the top level denotes the set of codewords, in which small solid circles denote the codewords. The small solid circle on the middle level denotes the τ 1 -level shadow of a codeword, while the big dotted line circle on the middle level denotes the set of the τ 1 -level shadow. Similarly, a small solid circle on the bottom level denotes the τ 2 -level shadow of a codeword, while the big dotted line circle on the bottom level denotes the set of τ 2 -level shadows.
Figure 2. The relationship of τ 1 -shadows when i is fixed.
Figure 2. The relationship of τ 1 -shadows when i is fixed.
Entropy 17 06462 g002
For i i and any j , j ,
( δ ) ( τ 1 ) { V i , j } ( δ ) ( τ 1 ) { V i , j } = ,
because otherwise,
( τ 2 ) { V i , j } ( τ 2 ) { V i , j } ,
which is contradictory to Condition (11). That is, the δ-shadows of S H ( i ) and S H ( i ) are disjoint for all i i . From Corollary 1, we can get the minimum size of the δ-shadow of S H ( i ) , which is bounded by ( δ ) S H ( i ) x k - τ 2 x k - τ 1 S H ( i ) , and x k - τ 2 is the minimum integer, such that S H ( i ) x k - τ 1 .
Then, we can get M 2 k k - τ 1 x k - τ 1 , and:
M 2 x k - τ 1 k k - τ 1 < ( a ) 4 q ( k - τ 1 ) ( x - k + τ 1 ) q ( k - τ 1 ) ( k - k + τ 1 ) = 4 q ( k - τ 1 ) ( x - k ) .
The inequality (a) holds according to Lemma 2.
Now, we consider the cardinality of δ S H i ,
δ S H i x k - τ 2 x k - τ 1 S H i ( b ) x k - τ 2 x k - τ 1 x - 1 k - τ 1 .
The inequality (b) holds since x is the minimum integer, such that S H ( i ) x k - τ 1 , and the Gaussian coefficient n k is monotone increasing with n.
By packing, M 1 is bounded by:
M 1 n k - τ 2 ( δ ) S H ( i ) n k - τ 2 x k - τ 1 x k - τ 2 x - 1 k - τ 1
< ( c ) 16 q ( k - τ 2 ) ( n - k + τ 2 ) + ( k - τ 1 ) ( x - k + τ 1 ) q ( k - τ 2 ) ( x - k + τ 2 ) + ( k - τ 1 ) ( x - 1 - k + τ 1 )
= 16 q ( k - τ 2 ) ( n - x ) + ( k - τ 1 ) .
The inequality (c) holds according to Lemma 2.
Then, the rate pair of [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC, C P q ( n , k ) , satisfies:
R 1 = log q M 2 n k ( k - τ 1 ) ( x - k ) n k + o ( 1 )
= ( 1 - μ 1 ) ( λ x - λ ) + o ( 1 )
and:
R 2 = log q M 1 n k ( k - τ 2 ) ( n - x ) + ( k - τ 1 ) n k + o ( 1 )
= ( 1 - μ 2 ) ( 1 - λ x ) + o ( 1 ) ,
where o ( 1 ) approaches zero as n grows, and x is an auxiliary variable, such that k x n . The normalized weights are λ x = x / n , λ = k / n , and the normalized deletion-correcting capabilities are μ 1 = τ 1 / k , μ 2 = τ 2 / k .
This completes the proof of the outer bound. ☐

4.3. Achievability

In this section, we propose a construction of BECNC based on superposition coding, with which the achievability of our outer bound can be proven. If the rate pair ( R 1 , R 2 ) is achievable, then the code used at each level must satisfy certain properties, which are specified below.
Construction: Let F q n be an n-dimensional vector space over F q and x be an integer, such that k x n . We can construct an x-dimensional constant dimension subspace code C x over F q n for t 1 and t 2 , such that it can correct deletions of x - k + τ 2 . The encoding mapping is f ^ , and the decoding mappings at t 1 and t 2 are φ ^ and ψ ^ , respectively.
The codeword f ^ ( i ) can be regarded as the cloud center, which will not be actually sent. For every i M 1 , the ( x - k + τ 2 ) -shadows of { f ^ ( i ) } are disjoint, namely,
( x - k + τ 2 ) { f ^ ( i ) } ( x - k + τ 2 ) { f ^ ( i ) } = , f o r i i ,
which guarantees the correctness of decoding at t 2 . The rate of C x is:
1 n x log | M 1 | .
Additionally, for every i M 1 , the ( x - k + τ 1 ) -shadow of { f ^ ( i ) } must be disjoint; otherwise, the ( τ 2 - τ 1 ) -shadow of the ( x - k + τ 1 ) -shadow of { f ^ ( i ) } will have a common subset. That is,
( x - k + τ 1 ) { f ^ ( i ) } ( x - k + τ 1 ) { f ^ ( i ) } = , f o r i i ,
which guarantees the correctness of decoding at t 1 .
Let A ( i ) be the ( x - k ) -shadow of a codeword f ^ ( i ) , i.e.,
A ( i ) = ( x - k ) { f ^ ( i ) } ,
the shadows A ( i ) , i M 1 are disjoint by construction of code C x .
To every i M 1 , by using f ^ ( i ) as the ground space, we can construct a k-dimensional subspace code C A ( i ) for t 1 , such that it can correct deletions of τ 1 . For each i, the code has the same message set M 2 . The encoding mapping is f i , and the decoding mapping is φ i ; the rate of C is:
1 x k log | M 2 | .
The codewords of C will be actually sent, which can be regarded as a satellite codeword. For every i M 1 , j M 2 , the τ 1 -shadows of { f i ( j ) } are disjoint, namely,
( τ 1 ) { f i ( j ) } ( τ 1 ) { f i ( j ) } = , f o r ( i , j ) ( i , j ) ,
which guarantees the correctness of decoding at t 1 .
The encoding mapping:
f : M 1 × M 2 P ( n , k ) ,
and the decoding mapping:
φ : P ( n , k - τ 1 ) M 1 × M 2 ,
and:
ψ : P ( n , k - τ 2 ) M 1 ,
are as follows:
f ( i , j ) = f i ( j ) , f o r e v e r y i M 1 , j M 2 ,
φ ( V r 1 ) = ( i , φ i ( V r 1 ) ) , w h e r e i = φ ^ ( V r 1 ) ,
ψ ( V r 2 ) = ψ ^ ( V r 2 ) ,
where V r 1 P ( n , k - τ 1 ) and V r 2 P ( n , k - τ 2 ) are the subspaces received by node t 1 and t 2 , respectively.
We do not specify the code C x and C used at each level in the above construction. The achievability of our outer bound could be proven if the subspace code used at each level satisfies some properties.
Proposition 1. For an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC, our outer bound could be achieved at ( R 1 , R 2 ) asymptotically by the above construction, if there exists an ( n , k , M , τ ) -deletion-correcting code for single-user communication, such that the code rate R = ( 1 - μ ) ( 1 - λ ) is asymptotically achievable.
Proof. If there exists such an asymptotically-achievable code, we can substitute this code for C x and C in the above construction, where the parameters are ( n , x , M 1 , x - k + τ 2 ) and ( x , k , M 2 , τ 1 ) , respectively.
The rate pair is:
log q | M 2 | n k x k ( 1 - μ k ) ( 1 - λ k ) n k - ϵ
= ( 1 - μ 1 ) ( λ x - λ ) - ϵ ,
log q | M 1 | n k n x ( 1 - μ x ) ( 1 - λ x ) n k - ϵ
= ( 1 - μ 2 ) ( 1 - λ x ) - ϵ ,
where μ k = τ 1 / k , μ x = x - k + τ 2 x , λ k = k / x , μ 1 = τ 1 / k , μ 2 = τ 2 / k , λ = k / n , λ x = x / n and ϵ > 0 .
That is, the rate pair ( R 1 , R 2 ) :
R 1 = ( 1 - μ 1 ) ( λ x - λ ) ,
R 2 = ( 1 - μ 2 ) ( 1 - λ x ) ,
is asymptotically achievable. ☐
Fortunately, K-K codes satisfy the requirement in Proposition 1. From the minimum distance decoder requirements in Condition (4), we can rewrite Equation (2) in the form of deletion-correcting capability τ,
R ( 1 - μ ) ( 1 - λ ) + o ( 1 ) ,
where μ = τ / k is normalized deletion-correcting capability.
The achievability of outer bound can be obtained subsequently.
Theorem 3. (Achievability) If for a rate pair ( R 1 , R 2 ) of nonnegative numbers, there exists an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC, C P q ( n , k ) , such that the following inequalities hold,
R 1 0 , R 2 0
R 1 ( 1 - μ 1 ) ( λ x - λ ) ,
R 2 ( 1 - μ 2 ) ( 1 - λ x ) ,
where x is an auxiliary variable, such that k x n . The normalized weights are λ x = x / n , λ = k / n , and the normalized deletion-correcting capabilities are μ 1 = τ 1 / k , μ 2 = τ 2 / k . Then, ( R 1 , R 2 ) is an achievable rate pair for the [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC.
Proof. The theorem can be proven by specifying the K-K codes to our construction.☐

5. Exactly Attained Codes

So far, the asymptotically-achievable rate region of BECNC is obtained by using K-K codes in our construction. However, the K-K codes achieve the Singleton-type bound in Equation (33) asymptotically, which requires the dimension of ground space n sufficiently large. In this section, we study the case when our outer bound can be attained exactly.
Proposition 2. For an [ n , k , ( M 1 , M 2 ) , ( τ 1 , τ 2 ) ] -BECNC, our outer bound could be achieved at ( M 1 , M 2 ) , if there exists an ( n , k , M , τ ) -code for single-user communication, such that:
M = n k - τ k k - τ .
The proof of this proposition will be given later.
The q-analog Steiner structure [19] could be used in the construction that was presented in Section 4.3, which does not require the size of n. We will state it in detail in the following.
A collection S P q ( n , k ) is called a q-analog Steiner structure S [ t , k , n ] q if the elements of S are k-dimensional subspaces (called blocks), and each element from P q ( n , t ) is contained in exactly one block from S . S [ t , n , n ] q and S [ t , t , n ] q exist, but these are trivial. Until recently, the only known nontrivial Steiner structures S [ 1 , k , n ] q exist when k divides n. The problem of the existence of a Steiner structure with various parameters is still open. We do not concentrate on the existence of the q-analog Steiner structure in this paper. The constructions and properties of the q-analog Steiner structure are further discussed in [20].
We assume that there exists a q-Steiner structure S [ t , k , n ] q . This structure could be considered as a k-dimensional subspace code C over F q n with deletion-correcting capability τ = k - t , where each block of S [ t , k , n ] q is a codeword of C . Since a codeword V produces a random ( k - τ ) -dimensional subspace of V by the operation D τ , the definition of the q-Steiner structure guarantees that each ( k - τ ) -dimensional subspace corresponds to exactly one k-dimensional subspace in C , i.e., every ( k - τ ) -dimensional subspace can be correctly decoded into a transmitted subspace. The number of codewords of a q-Steiner structure S [ t , k , n ] q is given by the number of blocks in S .
Lemma 5 ([19]) The total number of blocks in an S [ t , k , n ] q is:
n t k t .
Then, the q-Steiner structure S [ k - τ , k , n ] q could be regarded as an ( n , k , M , τ ) -code, which satisfies Condition (37). Since the size of the codewords is:
M = | S [ k - τ , k , n ] q | = n k - τ k k - τ .
Proof of Proposition 2. Similar to the proof of Proposition 1. We could substitute the q-Steiner structure S [ k - τ 2 , x , n ] q and S [ k - τ 1 , k , x ] q for C x and C in the construction in Section 4.3, respectively. The numbers of codewords are:
M 2 = | S [ k - τ 1 , k , x ] q | = x k - τ 1 k k - τ 1 ,
M 1 = | S [ k - τ 2 , x , n ] q | = n k - τ 2 x k - τ 2 ,
which coincide with Equation (13) and Equation (14) when the equalities hold. That is, the rate pair ( M 1 , M 2 ) in Theorem 2 is exactly attained.
Note that, because of the number of the known q-Steiner structure is very limited, the exactly attained codes of BECNC cannot achieve all of the points in the rate region of Theorem 1. It will be of interest to study the existence of the q-Steiner structure.

6. Extension

In this section, we will extend the asymptotically-achievable rate region to more than two receivers. Consider the model depicted in Section 2.2; we can obtain the asymptotically-achievable rate region of the m-tuple coding rates ( R 1 , R 2 , , R m ) .
Theorem 4. The asymptotically-achievable rate region of an [ n , k , ( M 1 , M 2 , , M m ) , ( τ 1 , τ 2 , , τ m ) ] -BECNC with corresponding error correcting-capabilities τ 1 , τ 2 , , τ m over field F q consists of rates ( R 1 , R 2 , , R m ) of non-negative numbers that satisfy the inequalities,
R 1 0 , R 2 0 , , R m 0
R 1 ( 1 - μ 1 ) ( λ 1 - λ ) ,
R 2 ( 1 - μ 2 ) ( λ 2 - λ 1 ) ,
R m ( 1 - μ m ) ( 1 - λ m - 1 ) ,
where x 1 , , x m - 1 are auxiliary variables, such that k x 1 x m - 1 n . The normalized weights are λ i = x i / n , λ = k / n , i = 1 , , m - 1 , and the normalized error-correcting capabilities are μ i = τ i / k , i = 1 , , m .
The proof can refer to the steps from the proofs of Theorem 1, where we leave it for the readers as an exercise.

7. Conclusion

In this paper, we propose a network model based on a real-time media distribution system, where the receivers have different link capacities due to packets lost or a fault in intermediate nodes. To solve the transmission problem in our model, we provide the broadcast error-correcting network codes (BECNC), which are based on subspace metric codes. Then, we present the asymptotically-achievable rate region for BECNC. In the proof part, we show the outer bound of the achievable rate region, followed by a code construction. We prove that the outer bound is asymptotically achieved by specifying K-K codes in our construction. Meanwhile, the outer bound is exactly attained by using the q-analog Steiner structure in our construction. Since the number of the known q-analog Steiner structure is limited, the outer bound can be attained exactly in some points. The research on the existence and construction of q-analog Steiner structures may be interesting. Although K-K codes require the dimension of ground space n sufficiently large and the known q-analog Steiner structure is limited, the theoretical rate region given in this paper has certain practical significance. In the future, if we could find the “good” codes, this outer bound could be attained exactly at all points.

Acknowledgments

The authors thank Harout Aydinian for pointing out the existence of [16] and sending its copy. The authors are grateful for the financial support by the National Natural Science Foundation of China (Nos. 61271174 and 61301178) and Huawei Technologies Co., Ltd, China.

Author Contributions

Feng Cai performed the research with the theoretical proof and wrote the manuscript. Ning Cai guided the research and provided the idea for proving the outer bound of the asymptotically-achievable rate region. Wangmei Guo made a critical contribution to revising the manuscript, including the English correction. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

A. Appendix

A.1. Proof of Lemma 4

We prove by induction on l. Let Y ( l ) be a y ( l ) -dimensional subspace in the proof of the l-th level shadow.
From Lemma 3, we know the lemma holds in the case of l = 1 .
We assume that the lemma holds when l = s , then we can get that ( s ) F y ( s ) k - s by assumption.
Next, we consider the case of l = s + 1 . Let ( s ) F W k - s and let y ( s + 1 ) k - s be the positive integer represented by ( s ) F = y ( s + 1 ) k - s . By the assumption when l = s , we can get that y ( s + 1 ) y ( s ) , then ( s ) F = y ( s + 1 ) k - s is well defined since Gaussian coefficient n k is monotone increasing with n. By Lemma 3, the size of the shadow of ( s ) F satisfies that ( s + 1 ) F y ( s + 1 ) ( k - s ) - 1 = y ( s + 1 ) k - ( s + 1 ) .
We now focus on the equality. Again the proof proceeds by induction on l.
In case of l = 1 , from Lemma 3, if the equality holds, then y ( 1 ) Z + and F = Y ( 1 ) k , where Y ( 1 ) is a y ( 1 ) -dimensional subspace of W.
We assume that the equality holds when l = s , then we can get that
( s ) F = y ( s ) k - s ,
then y ( s ) Z + and F = Y ( s ) k , where Y ( s ) is a y ( s ) -dimensional subspace of W.
In the case of l = s + 1 , from Lemma 3, if equality holds, ( s ) F = ( s + 1 ) F = y ( s + 1 ) k - s - 1 , then y ( s + 1 ) Z + and ( s ) F = Y ( s + 1 ) k - s , where Y ( s + 1 ) is a y ( s + 1 ) -dimensional subspace of W. We know that ( s ) F is consisted of all ( k - s )-dimensional subspaces of Y ( s + 1 ) , and ( s ) F = y ( s + 1 ) k - s . Comparing with Equation (46), we get y ( s ) k - s = y ( s + 1 ) k - s , hence y ( s ) = y ( s + 1 ) . By induction, y ( 1 ) = = y ( s ) = y ( s + 1 ) = = y is constant.
This completes the proof.

A.2. Proof of Corollary 1

Let F = x k , x y . Then by Lemma 4, ( l ) F x k - l = x k - l x k F y k - l y k F , since
x k - l x k = ( q k - 1 ) ( q k - 1 - 1 ) ( q k - l + 1 - 1 ) ( q x - ( k - l ) - 1 ) ( q x - ( k - l ) - 1 - 1 ) ( q x - k + 1 - 1 )
is a decreasing function of x.

References

  1. Ahlswede, R.; Cai, N.; Li, S.-Y.R.; Yeung, R.W. Network information flow. IEEE Trans. Inf. Theory 2000, 46, 1204–1216. [Google Scholar] [CrossRef]
  2. Li, S.-Y.R.; Yeung, R.W.; Cai, N. Linear network coding. IEEE Trans. Inf. Theory 2003, 49, 371–381. [Google Scholar] [CrossRef]
  3. Jaggi, S.; Sanders, P.; Chou, P.A.; Effros, M.; Egner, S.; Jain, K.; Tolhuizen, L.M.G.M. Polynomial time algorithms for multicast network code construction. IEEE Trans. Inf. Theory 2005, 51, 1973–1982. [Google Scholar] [CrossRef]
  4. Ho, T.; Médard, M.; Koetter, R.; Karger, D.R.; Effros, M.; Shi, J.; Leong, B. A random linear network coding approach to multicast. IEEE Trans. Inf. Theory 2006, 52, 4413–4430. [Google Scholar] [CrossRef]
  5. Yeung, R.W.; Cai, N. Network error correction, I: Basic concepts and upper bounds. Commun. Inf. Syst. 2006, 6, 19–35. [Google Scholar]
  6. Cai, N.; Yeung, R.W. Network error correction, II: Lower bounds. Commun. Inf. Syst. 2006, 6, 37–54. [Google Scholar] [CrossRef]
  7. Koetter, R.; Kschischang, F.R. Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 2008, 54, 3579–3591. [Google Scholar] [CrossRef]
  8. Etzion, T.; Vardy, A. Error-Correcting codes in projective space. IEEE Trans. Inf. Theory 2011, 57, 1165–1173. [Google Scholar] [CrossRef]
  9. Xia, S.-T.; Fu, F.-W. Johnson type bounds on constant dimension codes. Des. Codes Cryptogr. 2009, 50, 163–172. [Google Scholar] [CrossRef]
  10. Gadouleau, M.; Yan, Z. Packing and covering properties of subspace codes for error control in random linear network coding. IEEE Trans. Inf. Theory 2010, 56, 2097–2108. [Google Scholar] [CrossRef]
  11. Chou, P.A.; Wu, Y.; Chou, P.; Jain, K. Practical network coding. In Proceedings of 41st Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 1–3 October 2003.
  12. Wang, M.; Li, B. How Practical is Network Coding? In Proceedings of 14th IEEE International Workshop on Quality of Service, New Haven, CT, USA, 19–21 June 2006; pp. 274–278.
  13. Kruskal, J.B. The number of simplices in a complex. In Mathematical Optimization Techniques; Bellman, R., Ed.; Birkhäuser: Boston, MA, USA, 1963; p. 251. [Google Scholar]
  14. Katona, G. A theorem of finite sets. In Classic Papers in Combinatorics; Birkhäuser: Boston, MA, USA, 1987; pp. 381–401. [Google Scholar]
  15. Lovász, L. Combinatorial Problems and Exercises, 2nd ed.; American Mathematical Society: Providence, RI, USA, 1993. [Google Scholar]
  16. Chowdhury, A.; Patkós, B. Shadows and intersections in vector spaces. J. Combin. Theory Ser. A 2010, 117, 1095–1106. [Google Scholar] [CrossRef]
  17. Van Lint, J.H.; Wilson, R.M. A Course in Combinatorics, 2nd ed.; Cambridge University Press: Cambridge, UK, 2001. [Google Scholar]
  18. Csiszár, I.; Körner, J. Information Theory: Coding Theorems for Discrete Memoryless Systems, 2nd ed.; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
  19. Schwartz, M.; Etzion, T. Codes and anticodes in the Grassman graph. J. Combin. Theory Ser. A 2002, 97, 27–42. [Google Scholar] [CrossRef]
  20. Etzion, T.; Vardy, A. On q-Analogs of Steiner ystems and covering designs. Adv. Math. Commun. 2011, 5, 161–176. [Google Scholar]

Share and Cite

MDPI and ACS Style

Cai, F.; Cai, N.; Guo, W. Subspace Coding for Networks with Different Level Messages. Entropy 2015, 17, 6462-6480. https://doi.org/10.3390/e17096462

AMA Style

Cai F, Cai N, Guo W. Subspace Coding for Networks with Different Level Messages. Entropy. 2015; 17(9):6462-6480. https://doi.org/10.3390/e17096462

Chicago/Turabian Style

Cai, Feng, Ning Cai, and Wangmei Guo. 2015. "Subspace Coding for Networks with Different Level Messages" Entropy 17, no. 9: 6462-6480. https://doi.org/10.3390/e17096462

Article Metrics

Back to TopTop