Papers
Topics
Authors
Recent
Search
2000 character limit reached

An on-demand resource allocation algorithm for a quantum network hub and its performance analysis

Published 28 May 2024 in quant-ph, cs.NI, and cs.PF | (2405.18066v1)

Abstract: To effectively support the execution of quantum network applications for multiple sets of user-controlled quantum nodes, a quantum network must efficiently allocate shared resources. We study traffic models for a type of quantum network hub called an Entanglement Generation Switch (EGS), a device that allocates resources to enable entanglement generation between nodes in response to user-generated demand. We propose an on-demand resource allocation algorithm, where a demand is either blocked if no resources are available or else results in immediate resource allocation. We model the EGS as an Erlang loss system, with demands corresponding to sessions whose arrival is modelled as a Poisson process. To reflect the operation of a practical quantum switch, our model captures scenarios where a resource is allocated for batches of entanglement generation attempts, possibly interleaved with calibration periods for the quantum network nodes. Calibration periods are necessary to correct against drifts or jumps in the physical parameters of a quantum node that occur on a timescale that is long compared to the duration of an attempt. We then derive a formula for the demand blocking probability under three different traffic scenarios using analytical methods from applied probability and queueing theory. We prove an insensitivity theorem which guarantees that the probability a demand is blocked only depends upon the mean duration of each entanglement generation attempt and calibration period, and is not sensitive to the underlying distributions of attempt and calibration period duration. We provide numerical results to support our analysis. Our work is the first analysis of traffic characteristics at an EGS system and provides a valuable analytic tool for devising performance driven resource allocation algorithms.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (47)
  1. P. Arright and L. Salvail. 2006. Blind Quantum Computation. International Journal of Quantum Information 04, 05 (2006), 883–898.
  2. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Physical review letters 70, 13 (1993), 1895.
  3. Purification of noisy entanglement and faithful teleportation via noisy channels. Physical review letters 76, 5 (1996), 722.
  4. Heralded entanglement between solid-state qubits separated by three metres. Nature 497, 7447 (April 2013), 86–90.
  5. Deployed measurement-device independent quantum key distribution and Bell-state measurements coexisting with standard internet data and networking equipment. Communications Physics 5, 1 (2022), 186. https://doi.org/10.1038/s42005-022-00964-6
  6. T. Bonald. 2006a. Insensitive Queueing Models for Communication Networks. In Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools (Pisa, Italy) (valuetools ’06). Association for Computing Machinery, New York, NY, USA, 57–es. https://doi.org/10.1145/1190095.1190168
  7. T. Bonald. 2006b. The Erlang model with non-Poisson call arrivals. ACM SIGMETRICS Performance Evaluation Review 34, 1 (2006), 276–286.
  8. Experimental quantum teleportation. Nature 390, 6660 (1997), 575–579.
  9. S. L. Braunstein and A. Mann. 1995. Measurement of the Bell operator and quantum teleportation. Physical Review A 51, 3 (1995), R1727.
  10. S. L. Braunstein and S. Pirandola. 2012. Side-Channel-Free Quantum Key Distribution. Phys. Rev. Lett. 108 (Mar 2012), 130502. Issue 13. https://doi.org/10.1103/PhysRevLett.108.130502
  11. Universal Blind Quantum Computation. In 2009 50th Annual IEEE Symposium on Foundations of Computer Science. IEEE, Atlanta, Georgia, USA, 517–526. https://doi.org/10.1109/focs.2009.36
  12. Creation of entangled states of distant atoms by interference. Phys. Rev. A 59 (Feb. 1999), 1025–1033. Issue 2.
  13. B. H. Charles and G. Brassard. 2014. Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science 560 (Dec. 2014), 7–11.
  14. Measurement-induced entanglement for excitation stored in remote atomic ensembles. Nature 438, 7069 (Dec. 2005), 828–832.
  15. Functional Quantum Nodes for Entanglement Distribution over Scalable Quantum Networks. Science 316, 5829 (June 2007), 1316–1320. https://doi.org/10.1126/science.1140300
  16. The Capacity Region of Entanglement Switching: Stability and Zero Latency. In 2022 IEEE International Conference on Quantum Computing and Engineering (QCE). IEEE, Broomfield, CO, USA, 389–399. https://doi.org/10.1109/QCE53715.2022.00060
  17. Quantum privacy amplification and the security of quantum cryptography over noisy channels. Physical review letters 77, 13 (1996), 2818.
  18. Long-distance quantum communication with atomic ensembles and linear optics. Nature 414, 6862 (Nov. 2001), 413–418.
  19. A. K. Ekert. 1991. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67 (Aug. 1991), 661–663. Issue 6. https://doi.org/10.1103/PhysRevLett.67.661
  20. A. K. Erlang. 1917. Solution of some problems in the theory of probabilities of significance in automatic telephone exchanges. Post Office Electrical Engineer’s Journal 10 (1917), 189–197.
  21. An Architecture for Control of Entanglement Generation Switches in Quantum Networks. IEEE Transactions on Quantum Engineering 4 (2023), 1–17. https://doi.org/10.1109/TQE.2023.3320047
  22. Quantum-enhanced positioning and clock synchronization. Nature 412, 6845 (2001), 417–419.
  23. Longer-Baseline Telescopes Using Quantum Repeaters. Phys. Rev. Lett. 109 (Aug 2012), 070503. Issue 7. https://doi.org/10.1103/PhysRevLett.109.070503
  24. Distributed quantum sensing in a continuous-variable entangled network. Nature Physics 16, 3 (2020), 281–284.
  25. Deterministic delivery of remote entanglement on a quantum network. Nature 558, 7709 (June 2018), 268–273. https://doi.org/10.1038/s41586-018-0200-5
  26. F. Kelly. 1997. Charging and rate control for elastic traffic. European transactions on Telecommunications 8, 1 (1997), 33–37.
  27. A quantum network of clocks. Nature Physics 10, 8 (June 2014), 582–587.
  28. Entanglement of Trapped-Ion Qubits Separated by 230 Meters. Phys. Rev. Lett. 130 (Feb. 2023), 050803. Issue 5. https://doi.org/10.1103/PhysRevLett.130.050803
  29. Verifying BQP Computations on Noisy Devices with Minimal Overhead. PRX Quantum 2 (Oct 2021), 040302. Issue 4. https://doi.org/10.1103/PRXQuantum.2.040302
  30. Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 108 (Mar 2012), 130503. Issue 13. https://doi.org/10.1103/PhysRevLett.108.130503
  31. Two-way deterministic quantum key distribution against detector-side-channel attacks. Phys. Rev. A 88 (Oct 2013), 044302. Issue 4. https://doi.org/10.1103/PhysRevA.88.044302
  32. Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 74 (Aug 2006), 022313. Issue 2. https://doi.org/10.1103/PhysRevA.74.022313
  33. Quantum interference of photon pairs from two remote trapped atomic ions. Nature Physics 3, 8 (2007), 538–541.
  34. Interferometric Bell-state analysis. Physical Review A 53, 3 (1996), R1209.
  35. Inside quantum repeaters. IEEE Journal of Selected Topics in Quantum Electronics 21, 3 (2015), 78–90.
  36. On the capacity region of a quantum switch with entanglement purification. In IEEE INFOCOM 2023-IEEE Conference on Computer Communications. IEEE, IEEE, New York, NY, USA, 1–10.
  37. Realization of a multinode quantum network of remote solid-state qubits. Science 372, 6539 (April 2021), 259–264.
  38. J. Preskill. 2018. Quantum Computing in the NISQ era and beyond. Quantum 2 (Aug. 2018), 79. https://doi.org/10.22331/q-2018-08-06-79
  39. Richard Serfozo. 1999. Introduction to Stochastic Networks. Springer, New York, NY, USA. https://doi.org/10.1007/978-1-4612-1482-3
  40. B. A. Sevast’yanov. 1957. An ergodic theorem for Markov processes and its application to telephone systems with refusals. Theory of Probability & Its Applications 2, 1 (1957), 104–112.
  41. Entangling single atoms over 33 km telecom fibre. Nature 607, 7917 (July 2022), 69–73.
  42. On the exact analysis of an idealized quantum switch. Performance Evaluation 144 (2020), 102141.
  43. On the Stochastic Analysis of a Quantum Entanglement Distribution Switch. IEEE Transactions on Quantum Engineering 2 (2021), 1–16.
  44. T. Vasantam and D. Towsley. 2022. A throughput optimal scheduling policy for a quantum switch. In Quantum Computing, Communication, and Simulation II, Philip R. Hemmer and Alan L. Migdall (Eds.), Vol. 12015. International Society for Optics and Photonics, SPIE, San Francisco, CA, USA, 1201505. https://doi.org/10.1117/12.2616950
  45. P. Walther and A. Zeilinger. 2005. Experimental realization of a photonic Bell-state analyzer. Physical Review A 72, 1 (2005), 010302.
  46. W. Whitt. 1980. Continuity of Generalized Semi-Markov Processes. Mathematics of Operations Research - MOR 5 (11 1980), 494–501. https://doi.org/10.1287/moor.5.4.494
  47. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78 (Oct 2008), 042333. Issue 4. https://doi.org/10.1103/PhysRevA.78.042333
Citations (1)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.