
The majority of works in distributed storage networks assume a simple network
model with a collection of identical storage nodes with the same communication
cost between the nodes. In this paper, we consider a realistic multirack
distributed data storage network and present a code design framework for this
model. Considering the cheaper data transmission within the racks, our code
construction method is able to locally repair the nodes failure within the same
rack by using only the survived nodes in the same rack. However, in the case of
severe failure patterns when the information content of the survived nodes is
not sufficient to repair the failures, other racks will participate in the
repair process. By employing the criteria of our multirack storage code, we
establish a linear programming bound on the size of the code in order to
maximize the code rate.

A major issue of locally repairable codes is their robustness. If a local
repair group is not able to perform the repair process, this will result in
increasing the repair cost. Therefore, it is critical for a locally repairable
code to have multiple repair groups. In this paper we consider robust locally
repairable coding schemes which guarantee that there exist multiple distinct
(not necessarily disjoint) alternative local repair groups for any single
failure such that the failed node can still be repaired locally even if some of
the repair groups are not available. We use linear programming techniques to
establish upper bounds on the code size of these codes. We also provide two
examples of robust locally repairable codes that are optimal regarding our
linear programming bound. Furthermore, we address the update efficiency problem
of the distributed data storage networks. Any modification on the stored data
will result in updating the content of the storage nodes. Therefore, it is
essential to minimise the number of nodes which need to be updated by any
change in the stored data. We characterise the updateefficient storage code
properties and establish the necessary conditions of existence updateefficient
locally repairable storage codes.

In wireless distributed storage systems, storage nodes are connected by
wireless channels, which are broadcast in nature. This paper exploits this
unique feature to design an efficient repair mechanism, called broadcast
repair, for wireless distributed storage systems in the presence of
multiplenode failures. Due to the broadcast nature of wireless transmission,
we advocate a new measure on repair performance called repairtransmission
bandwidth. In contrast to repair bandwidth, which measures the average number
of packets downloaded by a newcomer to replace a failed node,
repairtransmission bandwidth measures the average number of packets
transmitted by helper nodes per failed node. A fundamental study on the storage
capacity of wireless distributed storage systems with broadcast repair is
conducted by modeling the storage system as a multicast network and analyzing
the minimum cut of the corresponding information flow graph. The fundamental
tradeoff between storage efficiency and repairtransmission bandwidth is also
obtained for functional repair. The performance of broadcast repair is compared
both analytically and numerically with that of cooperative repair, the basic
repair method for wired distributed storage systems with multiplenode
failures. While cooperative repair is based on the idea of allowing newcomers
to exchange packets, broadcast repair is based on the idea of allowing a helper
to broadcast packets to all newcomers simultaneously. We show that broadcast
repair outperforms cooperative repair, offering a better tradeoff between
storage efficiency and repairtransmission bandwidth.

Existing works on building a soliton transmission system only encode
information using the imaginary part of the eigenvalue, which fails to make
full use of the signal degreeoffreedoms. Motivated by this observation, we
make the first step of encoding information using (discrete) spectral
amplitudes by proposing analytical noise models for the spectral amplitudes of
$N$solitons ($N\geq 1$). To our best knowledge, this is the first work in
building an analytical noise model for spectral amplitudes, which leads to many
interesting information theoretic questions, such as channel capacity analysis,
and has a potential of increasing the transmission rate. The noise statistics
of the spectral amplitude of a soliton are also obtained without the Gaussian
approximation.

In wireless distributed storage systems, storage nodes are connected by
wireless channels, which are broadcast in nature. This paper exploits this
unique feature to design an efficient repair mechanism, called broadcast
repair, for wireless distributed storage systems with multiplenode failures.
Since wireless channels are typically bandwidth limited, we advocate a new
measure on repair performance called repairtransmission bandwidth, which
measures the average number of packets transmitted by helper nodes per failed
node. The fundamental tradeoff between storage amount and repairtransmission
bandwidth is obtained. It is shown that broadcast repair outperforms
cooperative repair, which is the basic repair method for wired distributed
storage systems with multiplenode failures, in terms of storage efficiency and
repairtransmission bandwidth, thus yielding a better tradeoff curve.

In this work, how the noise contaminates signals propagating in an optical
fibre is discussed in the nonlinear spectral domain after applying the
nonlinear Fourier transform. Simulation results about how the soliton
parameters in the nonlinear spectral domain perturb is shown.

Private information retrieval scheme for coded data storage is considered in
this paper. We focus on the case where the size of each data record is large
and hence only the download cost (but not the upload cost for transmitting
retrieval queries) is of interest. We prove that the tradeoff between storage
cost and retrieval/download cost depends on the number of data records in the
system. We also propose a fairly general class of linear storage codes and
retrieval schemes and derive conditions under which our retrieval schemes are
errorfree and private. Tradeoffs between the storage cost and retrieval costs
are also obtained. Finally, we consider special cases when the underlying
storage code is based on an MDS code. Using our proposed method, we show that a
randomly generated retrieval scheme is indeed very likely to be private and
errorfree.

This paper presents a flexible irregular model for heterogeneous cloud
storage systems and investigates how the cost of repairing failed nodes can be
minimized. The fractional repetition code, originally designed for minimizing
repair bandwidth for homogeneous storage systems, is generalized to the
irregular fractional repetition code, which is adaptable to heterogeneous
environments. The code structure and the associated storage allocation can be
obtained by solving an integer linear programming problem. For moderate sized
networks, a heuristic algorithm is proposed and shown to be nearoptimal by
computer simulations.

We study the delay minimization in a direct multicast communication scheme
where a base station wishes to transmit a set of original packets to a group of
clients. Each of the clients already has in its cache a subset of the original
packets, and requests for all the remaining packets. The base station
communicates directly with the clients by broadcasting information to them.
Assume that bandwidths vary between the station and different clients. We
propose a method to minimize the total delay required for the base station to
satisfy requests from all clients.

Shannon's fundamental bound for perfect secrecy says that the entropy of the
secret message cannot be larger than the entropy of the secret key initially
shared by the sender and the legitimate receiver. Massey gave an information
theoretic proof of this result, however this proof does not require
independence of the key and ciphertext. By further assuming independence, we
obtain a tighter lower bound, namely that the key entropy is not less than the
logarithm of the message sample size in any cipher achieving perfect secrecy,
even if the source distribution is fixed. The same bound also applies to the
entropy of the ciphertext. The bounds still hold if the secret message has been
compressed before encryption.
This paper also illustrates that the lower bound only gives the minimum size
of the preshared secret key. When a cipher system is used multiple times, this
is no longer a reasonable measure for the portion of key consumed in each
round. Instead, this paper proposes and justifies a new measure for key
consumption rate. The existence of a fundamental tradeoff between the expected
key consumption and the number of channel uses for conveying a ciphertext is
shown. Optimal and nearly optimal secure codes are designed.

In this paper, we use entropy functions to characterise the set of
ratecapacity tuples achievable with either zero decoding error, or vanishing
decoding error, for general network coding problems. We show that when sources
are colocated, the outer bound obtained by Yeung, A First Course in Information
Theory, Section 15.5 (2002) is tight and the sets of zeroerror achievable and
vanishingerror achievable ratecapacity tuples are the same. We also
characterise the set of zeroerror and vanishingerror achievable rate capacity
tuples for network coding problems subject to linear encoding constraints,
routing constraints (where some or all nodes can only perform routing) and
secrecy constraints. Finally, we show that even for apparently simple networks,
design of optimal codes may be difficult. In particular, we prove that for the
incremental multicast problem and for the singlesource secure network coding
problem, characterisation of the achievable set is very hard and linear network
codes may not be optimal.

This paper studies properties of entropy functions that are induced by groups
and subgroups. We showed that many information theoretic properties of those
group induced entropy functions also have corresponding group theoretic
interpretations. Then we propose an extension method to find outer bound for
these group induced entropy functions.