Editing Routing Entanglement in the Quantum Internet
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 55: | Line 55: | ||
<!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --> | <!-- Mathematical step-wise protocol algorithm helpful to write a subroutine. --> | ||
* All of the three protocols below assume that time is slotted and each memory can hold a qubit perfectly for <math>T \geq 1</math> time slot | * All of the three protocols below assume that time is slotted and each memory can hold a qubit perfectly for <math>T \geq 1</math> time slot. After this time the stored qubit completely decoheres. | ||
* Each time slot <math>t</math>, <math>t=1,2,... </math> is divided into 2 phases: | * Each time slot <math>t</math>, <math>t=1,2,... </math> is divided into 2 phases: | ||
* '''External Phase:''' | * '''External Phase:''' | ||
** Each of the <math>S(e)</math> pairs of memories across and edge <math>e</math> attempts to establish an EPR pair. | ** Each of the <math>S(e)</math> pairs of memories across and edge <math>e</math> attempts to establish an EPR pair. | ||
*:- An entanglement attempt across any one of the <math>S(e)</math> parallel links across edge <math>e</math> succeeds with probability <math>p_0(e) \sim \eta(e)</math>, where <math>\eta(e) \sim e^{-\alpha L_e}</math> | *:- An entanglement attempt across any one of the <math>S(e)</math> parallel links across edge <math>e</math> succeeds with probability <math>p_0(e) \sim \eta(e)</math>, where <math>\eta(e) \sim e^{-\alpha L_e}</math> is the transmissivity of a lossy optical channel of length <math>L(e)</math>. | ||
*:- The probability that one or more ebits are established across an edge <math>e</math> is <math>p(e)=1-(1-p_0)^{S(e)}</math>. | *:- The probability that one or more ebits are established across an edge <math>e</math> is <math>p(e)=1-(1-p_0)^{S(e)}</math>. | ||
*:- Assuming <math>S(e)=S,</math> give us <math>p(e)=p,</math> <math>\forall e \in E</math>. | *:- Assuming <math>S(e)=S,</math> give us <math>p(e)=p,</math> <math>\forall e \in E</math>. | ||
** Using two-way classical communication over | ** Using two-way classical communication over edge <math>e(u, v)</math>, neighboring repeater nodes <math>u, v</math> learn which of the S(e) parallel links (if any) succeeded in the external phase, in a given time slot. | ||
* '''Internal Phase:''' | * '''Internal Phase:''' | ||
Line 68: | Line 68: | ||
*:- These BSM attempts are called internal links, i.e., links between memories internal to a repeater node. | *:- These BSM attempts are called internal links, i.e., links between memories internal to a repeater node. | ||
*:- Each of these internal-link attempts succeed with probability <math>q</math>. | *:- Each of these internal-link attempts succeed with probability <math>q</math>. | ||
At the end of one time-slot a along a path comprising of <math>k</math> edges (and thus <math>(k-1)</math> repeater nodes) one ebit is successfully shared between the end points of the path with probability <math>p^k q^{k-1}</math>. | At the end of one time-slot a along a path comprising of <math>k</math> edges (and thus <math>(k-1)</math> repeater nodes) one ebit is successfully shared between the end points of the path with probability <math>p^k q^{k-1}</math>. | ||
Line 93: | Line 94: | ||
## <math>G_{m+1}</math> = <math>G_m -</math> all external and internal links of <math>S_m</math>. | ## <math>G_{m+1}</math> = <math>G_m -</math> all external and internal links of <math>S_m</math>. | ||
## <math>m = m + 1.</math> | ## <math>m = m + 1.</math> | ||
====Protocol for Entanglement Routing with Local Link-state Information==== | ====Protocol for Entanglement Routing with Local Link-state Information==== | ||
Line 101: | Line 103: | ||
After the External Phase | After the External Phase | ||
# For every repeater except <math>A_1</math> and <math>B_1</math>: <br /> Let <math>u</math> be the node of this iteration. | # For every repeater except <math>A_1</math> and <math>B_1</math>: <br /> Let <math>u</math> be the node of this iteration. | ||
## If less than one of the neighboring external links is successful: <br /> | ## If less than one of the neighboring external links is successful: <br />no internal links are attempted since this repeater node can not be part of a path from <math>A_1</math> to <math>B_1</math>. | ||
## | ## If two or more neighboring external links are successful: <br /> Let <math>v</math> be the node linked to <math>u</math> with the smallest <math>d_{A_1}</math> and <math>w</math> be the node linked to <math>u</math> with the smallest <math>d_{B_1}</math>. <br /> Attempt a BSM on node <math>u</math> on the memories connected to <math>v</math> and <math>w</math>. | ||
### | ### If four neighboring external links are successful: <br /> Attempt a BSM on node <math>u</math> on the remaining memories disconsidering the two memories from the previous step. | ||
===Protocol for Simultaneous Entanglement Flows with Link-state Information=== | ===Protocol for Simultaneous Entanglement Flows with Link-state Information=== | ||
Line 141: | Line 144: | ||
# [https://www.nature.com/articles/s41534-019-0139-x Pant et al. (2019)] | # [https://www.nature.com/articles/s41534-019-0139-x Pant et al. (2019)] | ||
<div style='text-align: right;'>''*contributed by Lucas Arenstein''</div> | |||
<div style='text-align: right;'>'' | |||