2.1. Previous Results: Subspace Metric Codes
We begin with previous results about subspace metric codes, which were proposed by Koetter and Kschischang [
7]. It is necessary to introduce the previous results of subspace metric codes, since our works are based on them.
In the “noncoherent” model, the transmitter and receiver are assumed to have no knowledge of the channel transfer matrix. Let
be a finite field with
q elements. We use
to denote the set of all
matrices over
. In the error free case, the transmission model can be characterized as
, where
is a full rank random matrix (the channel transfer matrix),
is the transmitted matrix whose rows can be considered as source packets [
11] and
is the received matrix whose rows can be considered as received packets.
Since the receiver does not know , he only knows that the rows of and span the same subspace. Then, he can correctly recover the transmitted space when no error occurs, if we regard space spanned by the rows of as a codeword.
However, the transmitted space will be a subspace of the received space by the receiver when an insertion error occurs, whereas the receiver will receive a subspace of the transmitted space when a deletion occurs [
7].
can be regarded as an
n-dimensional vector space over
. Let
denote the set of all subspaces of
, forming the
n-order projective space over
[
17]. A subspace metric code
is a nonempty set of subspaces of
, where each codeword is a vector space spanned by the rows of a message matrix. Let
be two subspaces; the subspace distance between them is defined as
, where
is the dimension of
U. The minimum distance of code
is defined as
. If:
then a minimum distance decoder will produce the transmitted space from the received space, where
t and
ρ denote the maximum number of deletion and insertion errors induced by the channel, respectively. Deletion is actually the packets lost, and insertion error is equivalent to malicious attack.
In this paper, we only consider the constant dimension codes, where the dimensions of all codewords in are the same. Let denote the set of all k-dimensional subspaces of the n-dimensional vector space . This means that constant dimension code is a subset of . The normalized weight is defined as , where k is the dimension of codewords. The rate of the code is defined as .
In [
7], Koetter and Kschischang obtained the Singleton-type bound of the subspace codes and constructed a Singleton bound-achieving code using the linearized polynomial. We refer to this code as the K-K code in the following. The Singleton-type bound is shown in the following lemma.
Lemma 1 (Corollary 10 of [
7]).
Let be a collection of subspaces in ,
with normalized minimum distance .
The rate of is bounded by:
where is the normalized weight and approaches zero as n grows. They also mentioned that, for the decoder, the effects of insertion and deletion are equivalent in constant dimension codes. Furthermore, there may be an intersection between the insertion subspace and the transmitted subspace, which would possibly decrease the number of deletions seen by the receiver. In other words, the negative impact brought by simple deletion is not less than the negative impact caused by deletion and insertion simultaneously. Next, we will discuss the case of only deletions.
Observe that a subspace
is received at the receiver; the minimum distance decoder will decode
to
, if the distance between
and
is minimal among all of the codewords in
,
i.e.,
We define the operation of deletions as mapping
. For a given
k-dimensional subspace
V,
produces a random
-dimensional subspace of
V, where
. We say that a code is capable of correcting
τ deletions, if it can correct
τ deletions using the decoding criterion in (3). We refer to such a code as a
τ-deletion-correcting code, and its minimum distance must satisfy:
Let be the received subspace and be any other codeword in , then ; it follows that . If the condition (4) could be satisfied, then , the minimum distance decoder will produce the transmitted subspace V from the received subspace.
Remark 1. Since Condition (4) coincides with Condition (1), a τ-deletion-correcting code can correct t deletions and ρ insertions, if . Thus, it is sufficient for us to focus on deletion-correcting codes, because for this reason, all our results below for deletion hold for deletion and insertion, as well.
An -deletion-correcting code over is a k-dimensional subspace code over with M codewords whose maximum deletion-correcting capability is τ. The rate of code is .
Definition 1. A rate R is said to be -asymptotically achievable if, for all and sufficiently large n, there exists an -deletion-correcting code, such that , where and .
The network model of [
7] is multicast, which is actually a point-to-point communication channel with just one sender and one receiver. In next subsection, we will extend the model to broadcast, which consists of one sender and
m receivers.
2.2. Network Model
We are motivated by a real-time media distribution system based on heterogeneous wireless networks, where end users are individual intelligent terminals, such as tablets, smart phones and computers. These intelligent terminals access the network with heterogeneous link capacities. The difference of link capacities may be caused by different access ways (e.g., WLAN and mobile network) or the instability of their links.
We assume that the media can be divided into different priority levels corresponding to the link capacity of receivers. The higher priority level guarantees the basic media quality, and the lower priority level corresponds to detailed information about media. Let be a collection of m message sets with ordered priority, where the index indicates the priority level, and the smaller index corresponds to the higher-priority level. Without loss of generality, we assume there are m receivers in the network, each of which has a different level of link capacity. Let be the ordered set of receivers, where the index indicates the link capacity; the smaller index corresponds to the higher link capacity.
The media is encoded into packets that can be sent to the network. For arbitrary , the receiver downloads the packets with its link capacity constraint. Although there exist some packets lost and errors in its link, can recover the messages with priority levels . Therefore, with respect to the receiver with lower link capacity, the receiver with higher link capacity can obtain more detailed information, and it can get clearer vision effects by decoding its received packets.
For simplicity of presentation, we focus the discussion on the network with two receivers nodes
. The extension to an arbitrary number of receivers is straightforward. This model can be regarded as a combinatorial version of the asymmetric two-output broadcast channel [
18] in projective space. We show it in
Figure 1. The media is divided into two priority level message sets
and
. The receiver
has a higher link capacity than
. This means that the receiver
can recover both messages
and
; meanwhile, the receiver
can only decode the message
during the transmission. We assume that a message pair
is encoded into a codeword with
k packets. Let
and
be the numbers of errors occurring at the link of receiver
and
, respectively. Receiver
and
can collect
and
independent packets with no error, respectively. We assume that
,
i.e., the receiver
can receive more correct packets than
.
Figure 1.
Asymmetric two-output broadcast channel.
Figure 1.
Asymmetric two-output broadcast channel.
Our aim is to design a code with which the receivers can decode their messages correctly as long as they received and independent packets with no error, respectively. Meanwhile, we are interested in the achievable rate region of the code. Although both deletion and insertion errors should be considered, it is sufficient to consider deletion error according to Remark 1.
Let
and
be two message sets, where
has higher level priority. The message pair
is encoded into codeword
of
by encoding mapping. Then, the codeword will be transmitted to the network. Due to the packets lost, the receiver
can receive a
-dimensional subspace
, and the receiver
can receive a
-dimensional subspace
. If the codewords satisfy some conditions, the messages
and
i can be decoded correctly at
and
, respectively. The conditions will be discussed at the end of
Section 4.1. In this case, the receiver
can recover messages
i and
j. Meanwhile, the receiver
can only recover message
i. Next, we formally state the definition of such code.
Definition 2. Let and be the two receiver nodes of an acyclic single source network; the corresponding numbers of errors occurring at the link of receiver and are and , respectively, . A constant dimension code is called an -BECNC (broadcast error-correcting network code), if it satisfies that the two receivers can correct errors of and , respectively. The cardinalities of the two corresponding message sets are and .
We are interested in the maximum number of message set pairs , when the dimension and the maximum numbers of correctable errors are given. Sometimes, the asymptotic rate pairs are also interesting.
The asymptotic rate pair is defined as , where .
Definition 3. A rate pair of non-negative real numbers is said to be -asymptotically achievable if, for all and sufficiently large n, there exists an -BECNC, such that , where and . The asymptotically-achievable rate region is the set of all asymptotically-achievable rate pairs.