This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
In the era of big data [1], the amount of data is growing at a doubling rate annually. The way of data processing has been shifted from the centralized data processing to the distributed data processing. However, in distributed applications, not all devices are reliable. Some devices may fail to work, or the performance of the devices is not consistent. In any task of data processing, there will be some unreliable devices whose computing speed is slower than the average speed, which are called stragglers [2, 3]. For example, in a data center of Facebook, more than 100 nodes may fail per day [4, 5]. The completion time of data processing is constrained by the slowest working node. Therefore, how to deal with stragglers becomes a challenge for data processing. To solve this problem, network coding techniques have been developed, and the code with combination property (CP) is proposed:
In distributed systems, linear code is adopted in most of the coding technologies, but linear code involves a lot of multiplication and division operations, which greatly increase the complexity of coding and decoding. For the sake of low computation complexity, a kind of CP-ZD code [18–20] with CP is proposed, which combines shift-and-addition (SA) and zigzag decoding (ZD) [21]. However, for the case where one element takes part in the encoding only once when constructing an encoded packet, the overhead is as high as square of the parameters’ number (
Multidimensional encoding/modulation promises high data rate [18, 19], which has been used as promising technique in communication [20] and distributed systems [22, 23]. As a result, to further reduce the overhead, based on the idea of multidimensional encoding/modulation, we propose the idea of one element taking part in the encoding process multiple times when constructing one encoded packet. Using the properties of the code based on Cauchy matrix in finite field, we design a framework of one element taking part in the encoding process multiple times for constructing an encoded packet. The overhead of this coding framework reduces from square to logarithmic with respect to the parameter. Specifically, the idea that one element takes part in the encoding only once in each encoded packet can be interpreted as each source packet being treated as an element and occurring at most once in a coded packet. Similarly, the idea that one element takes part in the encoding process multiple times when constructing one encoded packet is that each source packet occurs multiple times in an encoded packet, which is added to its own multiple distinct shifts.
2. Preliminary
2.1. Definition of Cauchy Matrix
Given
Similarly, a Cauchy matrix over a finite field is defined as follows: let
(1)
(2)
(3)
It is straightforward to obtain the following theorem from the construction rules of the Cauchy matrix:
Theorem 1.
When
In other words, every submatrix of the Cauchy matrix is invertible.
2.2. The Arithmetic Operation in Finite Fields
Finite field is a field with a finite number of elements, for example,
The primitive polynomial is essentially a polynomial that cannot be factored. When a finite field determines its primitive polynomials, the arithmetic operations in that field are also determined. In general, the primitive polynomial of a field can be obtained by looking up the table, and the primitive polynomial of a field is not unique. Take the finite field
Table 1
Table of common primitive polynomials.
Finite field | Primitive polynomial |
The addition and subtraction operation [22] of finite fields are the XOR operation in polynomial calculation. The rule for adding and subtracting is to XOR coefficients of the same order in two polynomials, and there is no difference between the two operations, such as
Table 2
0 | - | 1 |
1 | 0 | 2 |
2 | 1 | 4 |
3 | 3 | 3 |
4 | 2 | 6 |
5 | 6 | 7 |
6 | 4 | 5 |
7 | 5 | - |
If the multiplication and division operations are performed on the
and the division operation is as follows:
2.3. Transformation from Field
Field
The conversion rule for field
Step 1.
Initialize the set as
Step 2.
Multiply the last element of the set by
Step 3.
Continue Step 2 until there are
To better understand the above steps, let us elaborate on a simple example:
Example 1.
Suppose
According to Step 3, we can end the enumeration.
Table 3
Transformation of
Generating element | Polynomial form | Numerical form |
0 | 0 | 0 |
1 | 1 | |
2 | ||
3 |
2.4. Mathematical Model
We want to construct
For
Combined with the systematic packets and parity packets, the final coding expression is shown in the following formula:
The exponent of the element in
3. Encoding Design
The encoding framework that one element takes part in the encoding process multiple times when constructing one encoded packet based on Cauchy matrix is mainly constructed in three steps, and the detailed rules are as follows:
Step 1.
Determine the size of the finite field and the dimension of the Cauchy matrix according to the relation of coding parameters
According to the relation of
If for
(1)
(2)
(3)
Then, the elements in
Step 2.
Convert the numeric form of elements in the coding matrix to polynomial form.
Through the arithmetic operation in finite fields and the transformation from field
In particular, the exponent of
Step 3.
Determine the shift matrix combined with the systematic code.
[figure(s) omitted; refer to PDF]
Combined with the systematic code, a coding matrix
In order to better understand the design rules that one element takes part in the encoding process multiple times, we will walk through the coding steps with a concrete example.
Example 2.
If
Step 1.
We have
Step 2.
Through the arithmetic operations in the finite field, the addition operation is converted to the XOR operation, for example,
Through the transformation from field
Step 3.
By vertically concatenating 5 systematic codes, we can obtain the coding matrix
4. Properties of the Code Based on Cauchy Matrix
4.1. CP Property
Before we prove the CP property of the code, we will introduce the properties and lemmas mentioned in the proof.
Isomorphism property: the mathematical idea of isomorphism is to establish a one-to-one mapping of two sets that have the same properties associated with operations. For example, assuming that the sets
Lemma 2.
Any square submatrix of
Proof.
According to Section 3, matrix
CP property: Any
Proof.
First, we use a mathematical model to solve the above coding and decoding problems. The Cauchy matrix
According to the mathematical model of Section 2.4, in the finite field
Based on the polynomial form of
Based on the above model, satisfying CP property is equivalent to the invertibility of
In
To sum up,
Example 3.
Following Example 2, if
4.2. Zigzag Decodability (ZD) Property
The ZD property of one element which takes part in the encoding process multiple times when constructing one encoded packet can be proved by experiment that it cannot be fully zigzag decodable. Starting from the experiment, we set several groups of parameters to obtain the probability of zigzag decodability of one element which takes part in the encoding process multiple times. Through experimental simulation, we set several sets of parameters
Table 4
Success/failure for different
Success | Failure | Total | |
8 | 2 | 10 | |
46 | 9 | 56 | |
405 | 90 | 495 | |
2408 | 595 | 3003 |
It can be seen from Figure 2 that the encoding framework that one element takes part in the encoding process multiple times when constructing one encoded packet based on the Cauchy matrix has about 80% probability of ZD decoding, which means that there is about 20% probability that zigzag decoding will not be possible. The following two examples illustrate the case that the encoding framework is able or unable to perform zigzag decoding.
[figure(s) omitted; refer to PDF]
Example 4.
Following Example 2 where
[figure(s) omitted; refer to PDF]
Example 5.
Following Example 2 where
[figure(s) omitted; refer to PDF]
5. Performance Analysis
In the case of one element takes part in the encoding only once in shift-and-addition encoding, the overhead of several existing CP-ZD codes is the square of
In general, compared with the encoding framework of one element taking part in the encoding only once in shift-and-addition, the encoding framework of elements’ multiparticipation based on the Cauchy matrix has a good constraint on the overhead and can reduce the overhead from the existing square level to the logarithmic level. However, it has some losses in ZD properties and cannot guarantee ZD decoding.
6. Conclusions
Aiming at the problem of high overhead in CP-ZD codes, in this paper, we design a coding framework based on the idea of elements taking part in encoding multiple times in constructing an encoded packet based on Cauchy matrix and shift-and-addition. It is proved here that the framework has CP properties, but not completely with ZD properties. Experimental results show that the ZD decoding rate of this code is about 80%. However, the overhead is
7. Future Works
The new coding framework proposed in this paper satisfies the CP property, but not the ZD property. At present, there is no mature encoding framework with one element taking part in encoding process multiple times. Aiming at the idea of elements taking part in encoding multiple times, it is obviously of prospective academic and application value to design a feasible ZD decoding framework. What is more, it is also necessary to study the closed form expression of CP-ZD code, which can be used to describe the necessary and sufficient conditions of CP-ZD code that elements taking part in encoding process multiple times.
Acknowledgments
This study was supported by the National Key Research and Development Program under Grant 2019YFB1803305, the Natural Science Foundation of China (62071304), the Natural Science Foundation of Guangdong Province (2020A1515010381), the Basic Research Foundation of Shenzhen City (20200826152915001), the Guangdong Basic and Applied Basic Research Foundation (2022A1515011219), the Natural Science Foundation of Shenzhen City (JCYJ20190808120415286), and the Natural Science Foundation of Shenzhen University (00002501).
[1] M. Chen, S. Mao, Y. Liu, "Big data: a survey," Mobile networks & Applications, vol. 19 no. 2, pp. 171-209, DOI: 10.1007/s11036-013-0489-0, 2014.
[2] J. Dean, L. A. Barroso, "The tail at scale," Communications of the ACM, vol. 56 no. 2, pp. 74-80, DOI: 10.1145/2408776.2408794, 2013.
[3] P. Soto, J. Li, "Straggler-free coding for concurrent matrix multiplications," 2020 IEEE International Symposium on Information Theory (ISIT), pp. 3017-3021, DOI: 10.1109/ISIT44484.2020.9174239, .
[4] K. V. Rashmi, N. B. Shah, D. Gu, H. Kuang, D. Borthakur, K. Ramchandran, "A solution to the network challenges of data recovery in erasure-coded distributed storage systems: a study on the Facebook warehouse cluster," 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 13), .
[5] M. Sathiamoorthy, M. Asteris, D. Papailiopoulos, A. G. Dimakis, R. Vadali, S. Chen, D. Borthakur, "XORing elephants," Proceedings of the VLDB Endowment, vol. 6 no. 5, pp. 325-336, DOI: 10.14778/2535573.2488339, 2013.
[6] A. G. Dimakis, K. Ramchandran, Y. Wu, C. Suh, "A survey on network codes for distributed storage," IEEE Journal on Selected Areas in Communications, vol. 99 no. 3, pp. 476-489, 2011.
[7] D. S. Papailiopoulos, J. Luo, A. G. Dimakis, C. Huang, J. Li, "Simple regenerating codes: network coding for cloud storage," Proceedings - IEEE INFOCOM, pp. 2801-2805, DOI: 10.1109/INFCOM.2012.6195703, .
[8] V. R. Cadambe, S. A. Jafar, H. Maleki, K. Ramchandran, C. Suh, "Asymptotic interference alignment for optimal repair of MDS codes in distributed storage," IEEE Transactions on Information Theory, vol. 59 no. 5, pp. 2974-2987, DOI: 10.1109/TIT.2013.2237752, 2013.
[9] P. K. Akulakrishna, J. Lakshmi, S. Nandy, "Efficient storage of big-data for real-time GPS applications," IEEE Fourth International Conference on Big Data & Cloud Computing,DOI: 10.1109/BDCloud.2014.49, .
[10] Y. Aikebaier, T. E. Yang, M. Takizawa, "Energy-efficient computation models for distributed systems," International Conference on Network-Based Information Systems, pp. 423-431, DOI: 10.1109/NBiS.2009.61, .
[11] S. Li, M. A. Maddah-Ali, A. S. Avestimehr, "Coding for distributed fog computing," IEEE Communications Magazine, vol. 55 no. 4, pp. 34-40, DOI: 10.1109/MCOM.2017.1600894, 2017.
[12] A. Severinson, A. G. I Amat, E. Rosnes, "Block-diagonal coding for distributed computing with straggling servers," 2017 IEEE Information Theory Workshop (ITW), pp. 464-468, DOI: 10.1109/ITW.2017.8277957, .
[13] A. B. Das, L. Tang, A. Ramamoorthy, "C3LES: codes for coded computation that leverage stragglers," 2018 IEEE Information Theory Workshop (ITW),DOI: 10.1109/ITW.2018.8613321, .
[14] T. Baharav, K. Lee, O. Ocal, K. Ramchandran, "Straggler-proofing massive-scale distributed matrix multiplication with D-dimensional product codes," 2018 IEEE International Symposium on Information Theory (ISIT), pp. 1993-1997, DOI: 10.1109/ISIT.2018.8437549, .
[15] M. Dai, Z. Zheng, S. Zhang, H. Wang, X. Lin, "SAZD: a low computational load coded distributed computing framework for IoT systems," IEEE Internet of Things Journal, vol. 7 no. 4, pp. 3640-3649, DOI: 10.1109/JIOT.2020.2974045, 2020.
[16] L. Chen, R. Zhao, K. He, Z. Zhao, L. Fan, "Intelligent ubiquitous computing for future UAV-enabled MEC network systems," Cluster Computing, vol. 25 no. 4, 2022.
[17] M. Dai, A. Xu, Q. Huang, Z. Zhang, X. Lin, "Vertical federated DNN training," Physical Communication, vol. 49,DOI: 10.1016/j.phycom.2021.101465, 2021.
[18] J. Li, S. Dang, Y. Yan, Y. Peng, S. al-Rubaye, A. Tsourdos, "Generalized quadrature spatial modulation and its application to vehicular networks with NOMA," IEEE Transactions on Intelligent Transportation Systems, vol. 22 no. 7, pp. 4030-4039, DOI: 10.1109/TITS.2020.3006482, 2021.
[19] X. Pei, Y. Chen, M. Wen, H. Yu, E. Panayirci, H. V. Poor, "Next-generation multiple access based on NOMA with power level modulation," IEEE Journal on Selected Areas in Communications, vol. 40 no. 4, pp. 1072-1083, DOI: 10.1109/JSAC.2022.3143240, 2022.
[20] M. Wen, Q. Li, K. J. Kim, D. López-Pérez, O. A. Dobre, H. V. Poor, P. Popovski, T. A. Tsiftsis, "Private 5G networks: concepts, architectures, and research landscape," IEEE Journal of Selected Topics in Signal Processing, vol. 16 no. 1,DOI: 10.1109/JSTSP.2021.3137669, 2022.
[21] S. Gollakota, D. Katabi, "Zigzag decoding: combating hidden terminals in wireless networks," ACM SIGCOMM Computer Communication Review, vol. 38 no. 4, pp. 159-170, DOI: 10.1145/1402946.1402977, 2008.
[22] L. Zhang, W. Zhou, J. Xia, C. Gao, F. Zhu, C. Fan, J. Ou, "DQN-based mobile edge computing for smart internet of vehicle," EURASIP Journal on Advances in Signal Processing, vol. 2022,DOI: 10.1186/s13634-022-00876-1, 2022.
[23] J. Lu, L. Chen, J. Xia, F. Zhu, M. Tang, C. Fan, J. Ou, "Analytical offloading design for mobile edge computing-based smart internet of vehicle," EURASIP Journal on Advances in Signal Processing, vol. 2022,DOI: 10.1186/s13634-022-00867-2, 2022.
[24] H. Hou, Y. S. Han, "Cauchy MDS array codes with efficient decoding method," 2016. http://arxiv.org/abs/1611.09968
[25] J. S. Plank, "A tutorial on Reed–Solomon coding for fault-tolerance in raid-like systems," Software: Practice and Experience, vol. 27 no. 9, pp. 995-1012, DOI: 10.1002/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.0.CO;2-6, 1997.
[26] J. Bloemer, M. Kalfane, R. Karp, M. Karpinski, M. Luby, D. Zuckerman, An XOR-based erasure-resilient coding scheme, 1999.
[27] M. Dai, C. W. Sung, H. Wang, X. Gong, Z. Lu, "A new zigzag-decodable code with efficient repair in wireless distributed storage," IEEE Transactions on Mobile Computing, vol. 16 no. 5, pp. 1218-1230, DOI: 10.1109/TMC.2016.2591537, 2017.
[28] N. Jacobson, Basic Algebra I, 1985.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2022 Mingjun Dai et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In distributed computing/storage/machine learning system, the method of encoding and decoding combing shift-and-addition (SA) and zigzag decoding (ZD) is proposed to solve the problem of high computational complexity. However, in each encoded packet, one element takes part in the encoding only once, so the obtained overhead is extremely high. In this work, based on the idea of multidimensional encoding/modulation, we propose to employ one element of the encoding process multiple times when constructing one encoded packet based on the Cauchy matrix, thereby leveraging the favourable properties of the code based on Cauchy matrix. The overhead is reduced from square to logarithmic in certain parameters. Compared with the overhead of the existing square computational complexity, it is greatly reduced.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 College of Electronic and Information Engineering, Shenzhen University, 518000 Shenzhen, China
2 College of Mathematics and Statistics, Shenzhen University, 518000 Shenzhen, China
3 Institute of Computer Science, Warsaw University of Technology, 00-665 Warsaw, Poland