An information-theoretic view of network management

被引:39
作者
Ho, T
Médard, M
Koetter, R
机构
[1] Bell Labs, Murray Hill, NJ 07974 USA
[2] MIT, Informat & Decis Syst Lab, Cambridge, MA 02139 USA
[3] Univ Illinois, Coordinated Sci Lab, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
graph theory; network coding; network management; network restoration; Shannon theory;
D O I
10.1109/TIT.2005.844062
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present an information-theoretic framework for network management for recovery from nonergodic link failures. Building on recent work in the field of network coding, we describe the input-output relations of network nodes in terms of network codes. This very general concept of network behavior as a code provides a way to quantify essential management information as that needed to switch among different codes (behaviors) for different ceiver-based and network-wide, and consider two formulations for quantifying network management. The first is a centralized formulation where network behavior is described by an overall code determining the behavior of every node, and the management requirement is taken as the logarithm of the number of such codes that the network may switch among. For this formulation, we give bounds, many of which are tight, on management requirements for various network connection problems in terms of basic parameters such as the number of source processes and the number of links in a minimum source-receiver cut. Our results include a lower bound for arbitrary connections and an upper bound for multitransmitter multicast connections, for linear receiver-based and network-wide recovery from all single link failures. The second is a node-based formulation where the management requirement is taken as the summ over all nodes of the logarithm of the number of different behaviors fro each node. We show that the minimum node-based requirement for failures of links adjacent to a single receiver is achieved with receiver-based schemes.
引用
收藏
页码:1295 / 1312
页数:18
相关论文
共 26 条
[1]   Network information flow [J].
Ahlswede, R ;
Cai, N ;
Li, SYR ;
Yeung, RW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1204-1216
[2]  
AKAUCHI H, 1990, P IEEE GLOBECOM, V1
[3]  
[Anonymous], P IEEE ICC
[4]  
BAREZZANI M, 1992, P IEEE INT C COMM CH, V2
[5]  
Cai N, 2002, PROCEEDINGS OF 2002 IEEE INFORMATION THEORY WORKSHOP, P119, DOI 10.1109/ITW.2002.1115432
[6]  
ELLINAS G, 1996, P IEEE GLOBECOM LOND
[7]  
ELLINAS G, IN PRESS IEEE J SEL
[8]  
FRISANCO T, 1997, P ICC, V1, P293
[9]   Dynamic bandwidth-allocation and path-restoration in SONET self-healing networks [J].
Gersht, A ;
Kheradpir, S ;
Shulman, A .
IEEE TRANSACTIONS ON RELIABILITY, 1996, 45 (02) :321-331
[10]  
GROVER WD, 1991, CR901901 TEL CAN