Lattice Coding for the Two-way Two-relay Channel

Size: px
Start display at page:

Download "Lattice Coding for the Two-way Two-relay Channel"

Transcription

1 01 IEEE International Symposium on Information Theory Lattice Coding for the Two-way Two-relay Channel Yiwei Song Natasha Devroye University of Illinois at Chicago Chicago IL ysong uicedu Huai-Rong Shao Chiu Ngo Samsung Electronics US R&D Center SISA) San Jose CA 951 hrshao Abstract We develop a novel lattice coding scheme for the Two-way Two-relay Channel: 1 where Node 1 and communicate with each other through two relay nodes and Each node only communicates with its neighboring nodes The key technical contribution is the lattice-based achievability strategy where each relay is able to remove the noise while decoding the sum of several signals in a Block Markov strategy and then re-encode the signal into another lattice codeword using the so-called Re-distribution Transform This allows nodes further down the line to again decode sums of lattice codewords The symmetric rate achieved by the proposed lattice coding scheme is within 1 log bit/hz/s of the symmetric rate capacity I INTRODUCTION Lattice codes may be viewed as linear codes in Euclidean space: the sum of two lattice codewords is again a codeword This group property is exploited in additive white Gaussian noise AWGN) relay networks such as [1] [] [] [] where it has been shown that lattice codes may sometimes outperform iid random codes particularly when interested in decoding a linear combination of the received codewords One such example is the AWGN Two-way Relay channel where two users communicate with each other through a relay node [] [] If the two users employ lattice codewords the relay node may decode the sum of the codewords from both users directly at higher rates than decoding them individually It is then sufficient for the relay to broadcast this sum of codewords to both users since each user knowing the sum and its own message may determine the other desired message ast work Beyond their use in the Two-way Relay Channel nested lattice codes have been shown to be capacity achieving in the point-to-point Gaussian channel [5] the Gaussian Multiple-access Channel [] Broadcast Channel [6] and to achieve the same rates as those achieved by iid Gaussian codes in the Decode-and-Forward rate and Compress-and- Forward rates [1] of the Relay Channel [7] Lattice codes have also been shown to be useful in the Compute-and-Forward framework for decoding linear equations of codewords of [] The Two-way Two-relay Channel: 1 where Nodes 1 and exchange information through the relay nodes and is related to [8] which considers the throughput of iid random code-based Amplify-and-Forward and Decodeand-Forward approaches for this channel model or the iid random coding based schemes of [9] where there are also links between all nodes This model is also different from that in ortions of this work were performed at Samsung Electronics US R&D Center during Yiwei Song s summer internship in 01 [10] where a two-way relay channel with two parallel rather than sequential as in this work) relays are considered Contributions The proposed scheme for the Two-way Two-relay Channel 1 may be seen as a generalization of the lattice based scheme of [] [] for the Two-way Relay Channel 1 However this generalization is not straightforward as the multiple relays need to repeatedly be able to decode the sum of codewords One may enable this by having the relays use lattice codewords as well something not required in the Two-way Relay Channel The scheme includes multiple Block Markov phases where the end users send new messages encoded by lattice codewords and the relays decode a combination of lattice codewords The relays then perform a Re-distribution Transform on the decoded lattice codeword combinations and broadcast the resulting lattice codewords The novelty of our scheme lies in this Redistribution Transform which enables both messages to fully utilize the relays power Furthermore all decoders are lattice decoders more computationally efficient than joint typicality decoders) and only a single nested lattice pair is needed II RELIMINARIES ON LATTICE CODES AND NOTATION Our notation for nested) lattice codes for transmission over AWGN channels follows that of [6] [11] An n-dimensional lattice Λ is a discrete subgroup of Euclidean space R n with Euclidean norm under vector addition We use bold x to denote column vectors x T to denote the transpose of x and 0 denote the all zeros vector All vectors lie in R n unless otherwise stated all logarithms are base and Nµ σ ) denotes a Gaussian random variable or vector) of mean µ and variance σ Further define or note that The nearest neighbor lattice quantizer of Λ as : Qx) = arg min λ Λ x λ ; The mod Λ operation as x mod Λ := x Qx); The Voronoi region of Λ as V := {x : Qx) = 0} which is of volume V := VolV) The second moment per dimension of a uniform distribution over V as σ Λ) := 1 V 1 n V x dx; For any s R n αs mod Λ)) mod Λ = αs) mod Λ α Z 1) βs mod Λ) = βs) mod βλ β R ) The definitions of Rogers and oltyrev good lattices are in [1]; we will not need these definitions explicitly Rather we will use the results derived from lattices with these properties /1/$ IEEE 11

2 01 IEEE International Symposium on Information Theory 1 Y 1 = X + Z 1 Y = X 1 + X + Z Y = X + X + Z Y = X + Z Fig 1 A Nested lattice codes The Gaussian Two-way Two-relay Channel Model Consider two lattices Λ and Λ c such that Λ Λ c with fundamental regions V V c of volumes V V c respectively; Λ Λ c ) is termed a nested lattice pair Here Λ is termed the coarse lattice which is a sublattice of Λ c the fine lattice and hence V V c When transmitting over the AWGN channel using the set C ΛcV = {Λ c VΛ)} as codebook the coding rate R is R = 1 n log C Λ cv = 1 n log V V c Nested lattice pairs satisfying certain properties were shown to be capacity achieving for the AWGN channel [5] In this work we only need one good nested lattice pair Λ Λ c in which Λ is both Rogers good and oltyrev good and Λ c is oltyrev good see definitions in [1]) The existence of such a pair may be guaranteed by [5]; and may be generated by Construction A [5] [] which maps the codebook of a linear block code over a finite field into real lattice points Then as described in [1] one may construct a one-to-one mapping 1:1) denoted by φ ) which maps an element in the finite field w F prime = {0 1 1} to a point in n-dimension real space t C ΛcV: t = φw) and w = φ 1 t) B Technical lemmas The following lemmas proven in [1] are needed in the proposed two-way lattice based scheme Let t ai and t bi C ΛcV be generated from w ai and w bi F prime as t ai = φw ai ) t bi = φw bi ) Furthermore let α α i β i Z such α α that i β i / Z and θ R We use and to denote modulo addition multiplication and subtraction over the finite field F prime Lemma 1 There exists a 1:1 mapping between v = i α iθt ai + i β iθt bi ) mod θλ and u = i α iw ai i β iw bi Lemma There exists a 1:1 mapping between α w and w Lemma If w ai and w bi are uniformly distributed over F prime then i α iθt ai + i β iθt bi ) mod θλ is uniformly distributed over {θλ c VθΛ)} III CHANNEL MODEL In the Gaussian Two-way Two-relay Channel Node 1 and exchange messages w a w b of respective rates R a R b through multiple full-duplex relays Node and ) and multiple hops as shown in Figure 1 Each node can only communicate with its neighboring nodes The channel model may be expressed as all bold symbols are n dimensional) Y 1 = X + Z 1 Y = X 1 + X + Z Y = X + X + Z Y = X + Z where Z i i {1 }) is an iid Gaussian noise vector with variance N i : Z i N0 N i I) and the input X i is subject to the transmit power constraint i : 1 n EXT i X i) i Standard definitions of achievable rate regions for the pairs R a R b ) are omitted due to space constraints; see [1] We first need the following tangential result which forms the basis for our Two-way Two-Relay Channel achievability scheme IV LATTICE CODES IN THE BC HASE OF THE TWO-WAY RELAY CHANNEL The work [] [] introduces a two-phase lattice scheme for the Gaussian Two-way Relay Channel 1 where nodes 1 and exchange information through node : the Multiple-access Channel MAC) phase and the Broadcast Channel BC) phase In the MAC phase if the codewords are from nested lattice codebooks the relay may decode the sum of the two codewords directly without decoding them individually This is sufficient as then in the BC phase the relay may broadcast the sum of the codewords to both users who may determine the other message using knowledge of their own transmitted message In the scheme of [] The relay re-encodes the decoded sum into a codeword from an iid random codebook in [] and a lattice codebook in [] In extending the schemes of [] [] to multiple relays we would want to use lattice codebooks in the BC phase as in [] This would for example allow the signal sent by Node to be aligned with Node s transmitted signal aligned is used to mean that the two codebooks are nested) in the Two-way Two-relay Channel: 1 and hence enable the decoding of the sum of codewords again at Node However the scheme of [] is only applicable to channels in which the SNR from the users to the relay are symmetric ie 1 = In this case the relay can simply broadcast the decoded and possibly scaled) sum of codewords sum without re-encoding it Thus before tackling the Two-way Two-relay channel we first devise a lattice-coding scheme for the BC phase in the Twoway Relay Channel with arbitrary uplink SNRs 1 In the Two-way Relay Channel [] Nodes 1 and exchange messages through the relay Node with channel model: Y 1 = X + Z 1 Y = X 1 + X + Z Y = X + Z where Z i i {1 }) is an iid Gaussian noise vector with variance N i : Z i N0 N i I) and the input X i is subject to the transmit power constraint i : 1 n EXT i X i) i Definitions of achievability are as in [1] We devise an achievability scheme which uses lattice codes in both the MAC phase and BC phase For simplicity to demonstrate the central idea of a lattice-based BC phase which is going to be used in the Two-way Two-relay Channel we do not use dithers nor MMSE scaling as in [5] [] [] We assume that 1 = p and = p where p R and N Z In the next section we incorporate arbitrary power Dithers and MMSE scaling allows one to go from achieving rates proportional to logsnr) to log1 + SNR) However we initially forgo the 1+ term for simplicity and so as not to clutter the main idea with additional dithers and MMSE scaling 11

3 01 IEEE International Symposium on Information Theory constraints by first truncating the powers to have the desired form; we show that even with this sub-optimal truncation constant gap-to-capacity results are possible We focus on the symmetric rate ie when the rates of the two messages are identical Codebook generation: Consider the messages w a w b F prime where = [ nrsym ] where R sym is the symmetric coding rate and [ ] denotes rounding to the nearest prime Nodes 1 and send the codewords X 1 = Npt a = Npφw a ) and X = pt b = pφw b ) where φ ) is defined in Section II-A with the nested lattices Λ Λ c Notice that their codebooks are scaled versions of the codebook C ΛcV The symmetric coding rate is then R sym := 1 n log V V c In the MAC phase the relay receives Y = X 1 + X + Z and decodes Npt a + pt b ) mod NpΛ with arbitrarily low probability of error as n with rate constraints 1 according to [1 Lemma ] We note that the first rate constant is redundant as 1 ; we are including it in the theorem statement for intuition so as to make it easier to understand the proofs of the main theorems in Section V In the BC phase if mimicking the steps of [] the relay simply broadcasts the scaled version of Npt a +pt b ) mod NpΛ: ) Np Npta + pt b) mod NpΛ) = t a + N t b mod [ )] 1 + [ Λ R a R b < min 1 1 we would achieve the rate log ] + [ )] for the 1 + [ direction and the rate log N ] + for the 1 1 direction While the rate constraint for the direction is as large as expected the rate constraint for the is achievable using lattice codes direction 1 does not fully utilize the power at the relay ie the codeword t b appears to use only the power /N rather than the full power One would thus want to somehow transform the decoded sum Npt a +pt b ) mod NpΛ such that in accordance with Theorem 6 both t a and t b of the transformed signal would be uniformly distributed over V roof: Λ) Notice that the relay can only nested lattice pair Λ Λ c operate on Npt a + pt b ) mod NpΛ rather than Npt a and pt b individually Re-distribution Transform: To alleviate this problem we propose the following Re-distribution Transform operation which consists of three steps: F prime 1) multiply the decoded signal by N to obtain NNpt a + pt b ) mod NpΛ) ) then perform mod Λ to obtain NNpt a + pt b ) mod NpΛ) mod Λ = pt a + Npt b ) mod NpΛ according to the operation rule in 1) and finally ) re-scale the signal to be of second moment as Np pt a + Npt b ) mod NpΛ) = N t a + t b ) mod in block i Node and send X i Λ according to ) Notice that N t a + t b ) mod Λ is uniformly distributed over { Λ c V Λ)} by Lemma The relay broadcasts X = N t a + t b ) mod Λ Notice that N t a + t b ) mod Λ is uniformly distributed over { Λ c V Λ)} and so its coding rate is R sym Node 1 and Node receive Y 1 = X + Z 1 and Y = X + Z respectively and according to [1 Lemma 5] may decode N t a + t b ) mod Λ at rate ] + ] + Nodes 1 and then map the decoded N R t a + R t b ) mod R Λ to Nw a w b by Lemma 1 With side information w a Node 1 may then determine w b ; likewise with side information w b Node obtains Nw a and w a by Lemma We note that for the single relay Two-way Relay Channel we achieve lower rates than those in [] [] We are describing it here to explain the intuition behind the scheme which will be used for multiple relays the goal of this work) Section V V TWO-WAY TWO-RELAY CHANNEL We first consider the full-duplex Two-way Two-relay channel where every node transmits and receives at the same time Theorem For the channel model described in Section III if 1 = p = M q = p and = q where p q R + and M N Z + the following rate region N )] ) + We again note that some terms are redundant but are included to allow for a simple easily generalizable expression Codebook generation: We consider the good with corresponding codebook C ΛcV = {Λ c V} and two messages w a w b F prime in which = [ nrsym ] R sym is the coding rate) The codewords associated with the messages w a and w b are t a = φw a ) and t b = φw b ) where the mapping φ ) from to C ΛcV R n is defined in Section II-A Encoding and decoding steps: We use a Block Markov Encoding/Decoding scheme where Node 1 and transmit a new message w ai and w bi respectively at the beginning of block i To satisfy the transmit power constraints Node 1 and send the scaled codewords X 1i = pt ai = pφw ai ) {pλ c VpΛ)} and X i = qt bi = qφw bi ) {qλ c VqΛ)} respectively and X i and Node j j {1 }) receives Y ji in block i The procedure of the first few blocks the initialization steps) are described and then a generalization is made We note that in general the coding rates R a for w a and R b for w b may be different as long as R sym = maxr a R b ) since we may always send dummy messages to make the two coding rates equal ) 11

4 01 IEEE International Symposium on Information Theory Block 1: Block : 1 = p = M q = p = q 1 pt a1 pt a1 qtb1 pt a Mqt a1 Nptb1 qt b pt a + Npt b1) mod NpΛ qt b + Mqt a1) mod MqΛ qt b1 Block : pt a Mqt a + NMqt b1) mod MqΛ Npt b + MNpt a1) mod NpΛ qt b w b1 pt a + Npt b + MNpt a1) mod NpΛ qt b + Mqt a + NMqt b1) mod MqΛ w a1 Block : pt Mqt a + NMqt a b+ NM qt a1) mod MqΛ Npt b + MNpt a+ M pt b1) mod NpΛ qt b Block 5: w b pt a + Npt b + MNpt a +M pt b1) mod NpΛ qt b + Mqt a + NMqt b+ NM qt a1) mod MqΛ w a pt a5 Mqt a + NMqt b + NM qt a + M qt b1) mod MqΛ Npt b + MNpt a + M pt b +M pt a1) mod NpΛ qt b5 w b pt a5 + Npt b + MNpt a + M pt b +M pt a1) mod NpΛ qt b5 + Mqt a + NMqt b + NM qt a + M qt b1) mod MqΛ w a Block i: pt ai Mqt ai 1) + NMqt bi ) + NM qt ai ) + + N i 1)/ M i 1)/ qt b1) mod MqΛ Npt bi 1) + MNpt ai ) + M pt bi ) + + M i 1)/ N i 1)/ pt a1) mod NpΛ qt bi w bi ) pt ai + Npt bi 1) + MNpt ai ) + +M i 1)/ N i 1)/ pt a1) mod NpΛ qt bi + Mqt ai 1) + NMqt bi ) + +N i 1)/ M i 1)/ qt b1) mod MqΛ w ai ) Fig Multi-phase Block Markov achievability strategy for Theorem Block 1: Codewords X 11 = pt a1 and X 1 = qt b1 sent from Nodes 1 and to Nodes and may be decoded if resp 1 ) 5) according to [1 Lemma 5] Block : Node 1 and send new codewords X 1 = pt a and X = qt b while Node and broadcast X = Mqt a1 and X = Npt b1 received in the last block Note they are scaled to fully utilize the transmit power = M q and = p Node receives Y = X 1 + X + Z and decodes pt a + Npt b1 ) mod NpΛ if ) and 6) Node decodes qt b + Mqt a1 ) mod MqΛ if 5) and 7) Block : Encoding: Node 1 and send new codewords as in the previous blocks Node further processes its decoded codewords combination according to the three steps of the Re-distribution Transform from previous block as Npt a + Npt b1 ) mod NpΛ)) mod NpΛ =Npt a + pt b1 ) mod NpΛ and scales this to utilize the full transmit power = M q as Mq Np Npt a + pt b1 ) mod NpΛ = Mqt a + NMqt b1 ) mod MqΛ It then broadcasts X = Mqt a + NMqt b1 ) mod MqΛ Notice that since Mqt a + NMqt b1 ) mod MqΛ {MqΛ c VMqΛ)} according to Lemma its coding rate is R sym Similarly Node broadcasts X = Npt b + MNpt a1 ) mod NpΛ again at coding rate R sym Decoding: At the end of this block Node is able to decode pt a + Npt b + MNpt a1 ) mod NpΛ with rate constraints ) and 6) according to [1 Lemma ] and Node decodes qt b + Mqt a + NMqt b1 ) mod MqΛ if 7) and 5) Node 1 decodes Mqt a +NMqt b1 ) mod MqΛ sent by Node as in the point-to-point channel with rate constraint 8) 115

5 01 IEEE International Symposium on Information Theory according to Lemma [1 Lemma 5] From the decoded Mqt a + NMqt b1 ) mod MqΛ it obtains w a Nw b1 Lemma 1) With its own information w a Node 1 can then obtain N w b1 = w a Nw b1 w a which may be mapped to w b1 since is a prime number Lemma ) Notice = [ nrsym ] as n so N = [ nr N ] and / Z Similarly Node can decode w a1 with rate constraint 9) Block and 5 proceed similarly as shown in Figure Block i: To generalize in Block i assume i is odd) Encoding: Node 1 and send new messages X 1i = pt ai and X i = qt bi resp Node and broadcast X i = Mqt ai 1) + NMqt bi ) + NM qt ai ) + M qt bi ) + + N i 1)/ M i 1)/ qt b1 ) X i = Npt bi 1) + MNpt ai ) + M pt bi ) + M pt ai ) + + M i 1)/ N i 1)/ pt a1 ) mod MqΛ mod NpΛ Decoding: Node 1 decodes the codeword from Node with rate constraint 8) [1 Lemma 5]) and maps it to w ai 1) Nw bi ) NMw ai ) Mw bi ) N i 1)/ M i 1)/ 1 w b1 Lemma 1) With its own messages w ai i) and the messages it decoded previously {w b1 w b w bi ) } Node 1 can obtain N w bi ) and determine w bi ) accordingly Lemma ) Similarly Node can decode w ai ) subject to rate constraint 9) Re-distribution Transform: In block i Node decodes pt ai + Npt bi 1) + MNpt ai ) + M pt bi ) + M pt ai ) + + M i 1)/ N i 1)/ pt a1 ) mod NpΛ from the received Y i = X 1i + X i + Z i subject to ) and 6) [1 Lemma ]) It then uses the Redistribution Transform to obtain Npt ai + Npt bi 1) + MNpt ai ) + + M i 1)/ N i 1)/ pt a1 mod NpΛ)) mod NpΛ = Npt ai + pt bi 1) + M pt ai ) + + M i 1)/ N i 1)/+1 pt a1 mod NpΛ and scales Mq it to utilize the full transmit power: Np Npt ai + pt bi 1) + M pt ai ) + + M i 1)/ N i 1)/+1 pt a1 mod NpΛ) = Mqt ai + NMqt bi 1) + NM qt ai ) + + N i 1)/ M i 1)/+1 qt a1 mod MqΛ This signal will be transmitted in the next block i+1 Node performs similar operations decoding qt bi + Mqt ai 1) + NMqt bi ) + + N i 1)/ M i 1)/ qt b1 mod MqΛ subject to constraints 7) and 5) and transforms it into Npt bi + MNpt ai 1) +M pt bi ) + +M i 1)/ N i 1)/+1 pt b1 mod MqΛ which is transmitted in the next block Combining all rate constraints we obtain [ 1 min 1 [ 1 N )] ) + For i even we have analogous steps with slightly different indices as may be extrapolated from the difference between Block and 5 in Fig Assuming there are I blocks in total the final achievable rate is I I R sym which as I approaches R sym We may achieve the same region for the permuted powers: Lemma 5 The rates of Theorem may also be achieved when 1 = p = p and/or = q = M q roof: The proof is shown in [1] Theorem and Lemma 5 both hold for powers for which 1 / and/or / are either the squares of integers or the reciprocal of the squares of integers However these scenarios do not cover general power constraints with arbitrary ratios We next present an achievable rate region for arbitrary powers: Theorem 6 For the Two-way Two-relay Channel with arbitrary transmit power constraints any rates satisfying [ 1 [ R a R b < max min i i 1 = or 1 =M or M N for some N M Z + and i {1 } are achievable This rate region for R a = R b is within 1 log bit/hz/s per user from the symmetric rate capacity roof: The proof is shown in [1] The half-duplex case and extensions to more than two relays are also discussed in [1] REFERENCES [1] Y Song and N Devroye Lattice codes for the gaussian relay channel: Decode-and-forward and compress-and-forward abs/ [] B Nazer and M Gastpar Compute-and-forward: Harnessing interference through structured codes IEEE Trans Inf Theory vol 57 no 10 pp [] W Nam S Y Chung and Y Lee Capacity of the Gaussian Two-Way Relay Channel to Within 1/ Bit IEEE Trans Inf Theory vol 56 no 11 pp Nov 010 [] M Wilson K Narayanan H fister and A Sprintson Joint physical layer coding and network coding for bi-directional relaying IEEE Trans Inf Theory vol 56 no 11 pp Nov 010 [5] U Erez and R Zamir Achieving 1 log1 + SNR) on the AWGN channel with lattice encoding and decoding IEEE Trans Inf Theory vol 50 no 10 pp 9 1 Oct 00 [6] R Zamir S Shamai and U Erez Nested Linear/Lattice codes for structured multiterminal binning IEEE Trans Inf Theory vol 8 no 6 pp [7] T M Cover and A El Gamal Capacity theorems for the relay channel IEEE Trans Inf Theory vol 5 no 5 pp Sep 1979 [8] opovski and H Yomo Bi-directional amplification of throughput in a wireless multi-hop network in roc IEEE Veh Technol Conf - Spring Melbourne May 006 pp [9] S Kim N Devroye and V Tarokh A class of bi-directional multi-relay protocols in roc IEEE Int Symp Inf Theory Seoul Jun 009 pp 9 5 [10] J ooniah and L-L Xie An achievable rate region for the two-way two-relay channel in roc IEEE Int Symp Inf Theory Jul 008 pp 89 9 [11] W Nam S-Y Chung and Y Lee Nested lattice codes for gaussian relay networks with interference IEEE Trans Inf Theory vol 57 no 1 pp Dec 011 [1] Y Song N Devroye H Shao and N Chiu Lattice coding for the two-way two-relay channel ) 116

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 28-30, 2011 Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Zhiyu Cheng, Natasha

More information

The Multi-way Relay Channel

The Multi-way Relay Channel The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

TWO-WAY communication between two nodes was first

TWO-WAY communication between two nodes was first 6060 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015 On the Capacity Regions of Two-Way Diamond Channels Mehdi Ashraphijuo, Vaneet Aggarwal, Member, IEEE, and Xiaodong Wang, Fellow,

More information

Scheduling in omnidirectional relay wireless networks

Scheduling in omnidirectional relay wireless networks Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

Approaching the Capacity of the Multi-Pair Bidirectional Relay Network via a Divide and Conquer Strategy

Approaching the Capacity of the Multi-Pair Bidirectional Relay Network via a Divide and Conquer Strategy Approaching the Capacity of the Multi-Pair Bidirectional elay Network via a Divide and Conquer Strategy Salman Avestimehr Cornell In collaboration with: Amin Khajehnejad (Caltech), Aydin Sezgin (UC Irvine)

More information

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,

More information

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.

More information

Improved Throughput Scaling in Wireless Ad Hoc Networks With Infrastructure

Improved Throughput Scaling in Wireless Ad Hoc Networks With Infrastructure Improved Throughput Scaling in Wireless Ad Hoc Networks With Infrastructure Won-Yong Shin, Sang-Woon Jeon, Natasha Devroye, Mai H. Vu, Sae-Young Chung, Yong H. Lee, and Vahid Tarokh School of Electrical

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy

Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy Aitor del Coso, Osvaldo Simeone, Yeheskel Bar-ness and Christian Ibars Centre Tecnològic de Telecomunicacions

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Degrees of Freedom of the MIMO X Channel

Degrees of Freedom of the MIMO X Channel Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department

More information

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels IET Communications Research Article Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels ISSN 1751-8628 Received on 28th July 2014 Accepted

More information

Analog network coding in the high-snr regime

Analog network coding in the high-snr regime Analog network coding in the high-snr regime The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Médard,

More information

Generalized Signal Alignment For MIMO Two-Way X Relay Channels

Generalized Signal Alignment For MIMO Two-Way X Relay Channels Generalized Signal Alignment For IO Two-Way X Relay Channels Kangqi Liu, eixia Tao, Zhengzheng Xiang and Xin Long Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China Emails:

More information

A class of Bi-directional multi-relay protocols

A class of Bi-directional multi-relay protocols 1 A class of Bi-directional multi-relay protocols ang Joon Kim, Natasha Devroye, and Vahid Tarokh Astract In a i-directional relay channel, two nodes wish to exchange independent messages over a shared

More information

Capacity of Two-Way Linear Deterministic Diamond Channel

Capacity of Two-Way Linear Deterministic Diamond Channel Capacity of Two-Way Linear Deterministic Diamond Channel Mehdi Ashraphijuo Columbia University Email: mehdi@ee.columbia.edu Vaneet Aggarwal Purdue University Email: vaneet@purdue.edu Xiaodong Wang Columbia

More information

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes

Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Physical-Layer Network Coding Using GF(q) Forward Error Correction Codes Weimin Liu, Rui Yang, and Philip Pietraski InterDigital Communications, LLC. King of Prussia, PA, and Melville, NY, USA Abstract

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

arxiv: v1 [cs.it] 12 Jan 2011

arxiv: v1 [cs.it] 12 Jan 2011 On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom

More information

Physical Layer Network Coding with Multiple Antennas

Physical Layer Network Coding with Multiple Antennas This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 00 proceedings Physical Layer Network Coding with Multiple Antennas

More information

CONSIDER a sensor network of nodes taking

CONSIDER a sensor network of nodes taking 5660 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 Wyner-Ziv Coding Over Broadcast Channels: Hybrid Digital/Analog Schemes Yang Gao, Student Member, IEEE, Ertem Tuncel, Member,

More information

An Orthogonal Relay Protocol with Improved Diversity-Multiplexing Tradeoff

An Orthogonal Relay Protocol with Improved Diversity-Multiplexing Tradeoff SUBMITTED TO IEEE TRANS. WIRELESS COMMNS., NOV. 2009 1 An Orthogonal Relay Protocol with Improved Diversity-Multiplexing Tradeoff K. V. Srinivas, Raviraj Adve Abstract Cooperative relaying helps improve

More information

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE 1850 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 State Amplification Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE Abstract We consider the problem

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017

KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 Jurnal Ilmiah KURSOR Menuju Solusi Teknologi Informasi Vol. 9, No. 1, Juli 2017 ISSN 0216 0544 e-issn 2301 6914 OPTIMAL RELAY DESIGN OF ZERO FORCING EQUALIZATION FOR MIMO MULTI WIRELESS RELAYING NETWORKS

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

Coding for Noisy Networks

Coding for Noisy Networks Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C.

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 5, MAY 2011 2941 Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, David N C Tse, Fellow, IEEE Abstract

More information

Power Allocation for Three-Phase Two-Way Relay Networks with Simultaneous Wireless Information and Power Transfer

Power Allocation for Three-Phase Two-Way Relay Networks with Simultaneous Wireless Information and Power Transfer Power Allocation for Three-Phase Two-Way Relay Networks with Simultaneous Wireless Information and Power Transfer Shahab Farazi and D. Richard Brown III Worcester Polytechnic Institute 100 Institute Rd,

More information

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying 013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

Proportional Fair Scheduling for Wireless Communication with Multiple Transmit and Receive Antennas 1

Proportional Fair Scheduling for Wireless Communication with Multiple Transmit and Receive Antennas 1 Proportional Fair Scheduling for Wireless Communication with Multiple Transmit and Receive Antennas Taewon Park, Oh-Soon Shin, and Kwang Bok (Ed) Lee School of Electrical Engineering and Computer Science

More information

On the Optimum Power Allocation in the One-Side Interference Channel with Relay

On the Optimum Power Allocation in the One-Side Interference Channel with Relay 2012 IEEE Wireless Communications and etworking Conference: Mobile and Wireless etworks On the Optimum Power Allocation in the One-Side Interference Channel with Relay Song Zhao, Zhimin Zeng, Tiankui Zhang

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

I. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0.

I. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0. 4566 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 9, SEPTEMBER 2010 The Approximate Capacity of the Many-to-One One-to-Many Gaussian Interference Channels Guy Bresler, Abhay Parekh, David N. C.

More information

Approximately Optimal Wireless Broadcasting

Approximately Optimal Wireless Broadcasting Approximately Optimal Wireless Broadcasting Sreeram Kannan, Adnan Raja, and Pramod Viswanath Abstract We study a wireless broadcast network, where a single source reliably communicates independent messages

More information

Degrees of Freedom in Multiuser MIMO

Degrees of Freedom in Multiuser MIMO Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department

More information

Practical Cooperative Coding for Half-Duplex Relay Channels

Practical Cooperative Coding for Half-Duplex Relay Channels Practical Cooperative Coding for Half-Duplex Relay Channels Noah Jacobsen Alcatel-Lucent 600 Mountain Avenue Murray Hill, NJ 07974 jacobsen@alcatel-lucent.com Abstract Simple variations on rate-compatible

More information

Unquantized and Uncoded Channel State Information Feedback on Wireless Channels

Unquantized and Uncoded Channel State Information Feedback on Wireless Channels Unquantized and Uncoded Channel State Information Feedback on Wireless Channels Dragan Samardzija Wireless Research Laboratory Bell Labs, Lucent Technologies 79 Holmdel-Keyport Road Holmdel, NJ 07733,

More information

Physical Network Coding in Two Way Wireless Relay Channels

Physical Network Coding in Two Way Wireless Relay Channels Physical Network oding in Two Way Wireless Relay hannels Petar Popovski and Hiroyuki Yomo Department of Electronic Systems, Aalborg University Niels Jernes Vej 1, DK-90 Aalborg, Denmark Email: {petarp,

More information

Delay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel

Delay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel Delay Tolerant Cooperation in the Energy Harvesting Multiple Access Channel Onur Kaya, Nugman Su, Sennur Ulukus, Mutlu Koca Isik University, Istanbul, Turkey, onur.kaya@isikun.edu.tr Bogazici University,

More information

On Information Theoretic Interference Games With More Than Two Users

On Information Theoretic Interference Games With More Than Two Users On Information Theoretic Interference Games With More Than Two Users Randall A. Berry and Suvarup Saha Dept. of EECS Northwestern University e-ma: rberry@eecs.northwestern.edu suvarups@u.northwestern.edu

More information

Orthogonal vs Non-Orthogonal Multiple Access with Finite Input Alphabet and Finite Bandwidth

Orthogonal vs Non-Orthogonal Multiple Access with Finite Input Alphabet and Finite Bandwidth Orthogonal vs Non-Orthogonal Multiple Access with Finite Input Alphabet and Finite Bandwidth J. Harshan Dept. of ECE, Indian Institute of Science Bangalore 56, India Email:harshan@ece.iisc.ernet.in B.

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL

OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 6, December 06 OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL Zouhair Al-qudah Communication Engineering Department, AL-Hussein

More information

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1.

EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code. 1 Introduction. 2 Extended Hamming Code: Encoding. 1. EE 435/535: Error Correcting Codes Project 1, Fall 2009: Extended Hamming Code Project #1 is due on Tuesday, October 6, 2009, in class. You may turn the project report in early. Late projects are accepted

More information

On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding

On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding by Zahra Faraji-Dana A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree

More information

Feedback via Message Passing in Interference Channels

Feedback via Message Passing in Interference Channels Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of

More information

Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers

Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers 1 Secure Degrees of Freedom of the Gaussian MIMO Wiretap and MIMO Broadcast Channels with Unknown Eavesdroppers Mohamed Amir and Tamer Khattab Electrical Engineering, Qatar University Email: mohamed.amir@qu.edu.qa,

More information

Two Models for Noisy Feedback in MIMO Channels

Two Models for Noisy Feedback in MIMO Channels Two Models for Noisy Feedback in MIMO Channels Vaneet Aggarwal Princeton University Princeton, NJ 08544 vaggarwa@princeton.edu Gajanana Krishna Stanford University Stanford, CA 94305 gkrishna@stanford.edu

More information

Interference Mitigation in MIMO Interference Channel via Successive Single-User Soft Decoding

Interference Mitigation in MIMO Interference Channel via Successive Single-User Soft Decoding Interference Mitigation in MIMO Interference Channel via Successive Single-User Soft Decoding Jungwon Lee, Hyukjoon Kwon, Inyup Kang Mobile Solutions Lab, Samsung US R&D Center 491 Directors Pl, San Diego,

More information

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications 1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,

More information

Frequency hopping does not increase anti-jamming resilience of wireless channels

Frequency hopping does not increase anti-jamming resilience of wireless channels Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networed Systems Security Group KTH Royal Institute of Technology, Stocholm, Sweden

More information

Performance of Limited Feedback Schemes for Downlink OFDMA with Finite Coherence Time

Performance of Limited Feedback Schemes for Downlink OFDMA with Finite Coherence Time Performance of Limited Feedback Schemes for Downlink OFDMA with Finite Coherence Time Jieying Chen, Randall A. Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern

More information

Throughput Analysis of the Two-way Relay System with Network Coding and Energy Harvesting

Throughput Analysis of the Two-way Relay System with Network Coding and Energy Harvesting IEEE ICC 7 Green Communications Systems and Networks Symposium Throughput Analysis of the Two-way Relay System with Network Coding and Energy Harvesting Haifeng Cao SIST, Shanghaitech University Shanghai,,

More information

An Introduction to Distributed Channel Coding

An Introduction to Distributed Channel Coding An Introduction to Distributed Channel Coding Alexandre Graell i Amat and Ragnar Thobaben Department of Signals and Systems, Chalmers University of Technology, Gothenburg, Sweden School of Electrical Engineering,

More information

MULTIPATH fading could severely degrade the performance

MULTIPATH fading could severely degrade the performance 1986 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 53, NO. 12, DECEMBER 2005 Rate-One Space Time Block Codes With Full Diversity Liang Xian and Huaping Liu, Member, IEEE Abstract Orthogonal space time block

More information

Transmit Power Allocation for BER Performance Improvement in Multicarrier Systems

Transmit Power Allocation for BER Performance Improvement in Multicarrier Systems Transmit Power Allocation for Performance Improvement in Systems Chang Soon Par O and wang Bo (Ed) Lee School of Electrical Engineering and Computer Science, Seoul National University parcs@mobile.snu.ac.r,

More information

arxiv: v1 [cs.it] 26 Oct 2009

arxiv: v1 [cs.it] 26 Oct 2009 K-User Fading Interference Channels: The Ergodic Very Strong Case Lalitha Sanar, Jan Vondra, and H. Vincent Poor Abstract Sufficient conditions required to achieve the interference-free capacity region

More information

Protocol Coding for Two-Way Communications with Half-Duplex Constraints

Protocol Coding for Two-Way Communications with Half-Duplex Constraints Protocol Coding for Two-Way Communications with Half-Duplex Constraints Petar Popovski and Osvaldo Simeone Department of Electronic Systems, Aalborg University, Denmark CWCSPR, ECE Dept., NJIT, USA Email:

More information

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Shanshan Wu, Wenguang Mao, and Xudong Wang UM-SJTU Joint Institute, Shanghai Jiao Tong University, Shanghai, China Email:

More information

The throughput analysis of different IR-HARQ schemes based on fountain codes

The throughput analysis of different IR-HARQ schemes based on fountain codes This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 008 proceedings. The throughput analysis of different IR-HARQ schemes

More information

Information Theoretic Analysis of Cognitive Radio Systems

Information Theoretic Analysis of Cognitive Radio Systems Information Theoretic Analysis of Cognitive Radio Systems Natasha Devroye 1, Patrick Mitran 1, Masoud Sharif 2, Saeed Ghassemzadeh 3, and Vahid Tarokh 1 1 Division of Engineering and Applied Sciences,

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4087 New Inner Outer Bounds for the Memoryless Cognitive Interference Channel Some New Capacity Results Stefano Rini, Daniela Tuninetti,

More information

THE use of balanced codes is crucial for some information

THE use of balanced codes is crucial for some information A Construction for Balancing Non-Binary Sequences Based on Gray Code Prefixes Elie N. Mambou and Theo G. Swart, Senior Member, IEEE arxiv:70.008v [cs.it] Jun 07 Abstract We introduce a new construction

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network Meghana Bande, Venugopal V. Veeravalli ECE Department and CSL University of Illinois at Urbana-Champaign Email: {mbande,vvv}@illinois.edu

More information

International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS)

International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

Error exponents for two-hop Gaussian multiple source-destination relay channels

Error exponents for two-hop Gaussian multiple source-destination relay channels . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 0 Vol. 55 No. : 38 359 doi: 0.007/s3-0-36- Error exponents for two-hop Gaussian multiple source-destination relay channels DENG PanLiang,3,LIUYuanAn,3,XIEGang,3,

More information

SHANNON showed that feedback does not increase the capacity

SHANNON showed that feedback does not increase the capacity IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2667 Feedback Capacity of the Gaussian Interference Channel to Within 2 Bits Changho Suh, Student Member, IEEE, and David N. C. Tse, Fellow,

More information

Multiple Input Multiple Output Dirty Paper Coding: System Design and Performance

Multiple Input Multiple Output Dirty Paper Coding: System Design and Performance Multiple Input Multiple Output Dirty Paper Coding: System Design and Performance Zouhair Al-qudah and Dinesh Rajan, Senior Member,IEEE Electrical Engineering Department Southern Methodist University Dallas,

More information

Enhancing Uplink Throughput via Local Base Station Cooperation

Enhancing Uplink Throughput via Local Base Station Cooperation Enhancing Uplink Throughput via Local Base Station Cooperation O. Simeone (),O.Somekh (),H.V.oor () ands.shamai(shitz) (3) () CWCSR, New Jersey Institute of Technology, Newark, NJ 070, USA () Dept. of

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class

State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY 2013 2629 State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class Majid Nasiri Khormuji, Member, IEEE, Abbas

More information

CORRELATED data arises naturally in many applications

CORRELATED data arises naturally in many applications IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 10, OCTOBER 2006 1815 Capacity Region and Optimum Power Control Strategies for Fading Gaussian Multiple Access Channels With Common Data Nan Liu and Sennur

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

A Bit of network information theory

A Bit of network information theory Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,

More information

Generalized PSK in space-time coding. IEEE Transactions On Communications, 2005, v. 53 n. 5, p Citation.

Generalized PSK in space-time coding. IEEE Transactions On Communications, 2005, v. 53 n. 5, p Citation. Title Generalized PSK in space-time coding Author(s) Han, G Citation IEEE Transactions On Communications, 2005, v. 53 n. 5, p. 790-801 Issued Date 2005 URL http://hdl.handle.net/10722/156131 Rights This

More information

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques 1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink

More information

Time division multiplexing The block diagram for TDM is illustrated as shown in the figure

Time division multiplexing The block diagram for TDM is illustrated as shown in the figure CHAPTER 2 Syllabus: 1) Pulse amplitude modulation 2) TDM 3) Wave form coding techniques 4) PCM 5) Quantization noise and SNR 6) Robust quantization Pulse amplitude modulation In pulse amplitude modulation,

More information

Aligned Interference Neutralization and the Degrees of Freedom of the Interference Channel

Aligned Interference Neutralization and the Degrees of Freedom of the Interference Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 7, JULY 2012 4381 Aligned Interference Neutralization and the Degrees of Freedom of the 2 2 2 Interference Channel Tiangao Gou, Student Member, IEEE,

More information

Dynamic Resource Allocation for Multi Source-Destination Relay Networks

Dynamic Resource Allocation for Multi Source-Destination Relay Networks Dynamic Resource Allocation for Multi Source-Destination Relay Networks Onur Sahin, Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn, New York, USA Email: osahin0@utopia.poly.edu,

More information

Exploiting Interference through Cooperation and Cognition

Exploiting Interference through Cooperation and Cognition Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of

More information

arxiv: v2 [cs.it] 29 Mar 2014

arxiv: v2 [cs.it] 29 Mar 2014 1 Spectral Efficiency and Outage Performance for Hybrid D2D-Infrastructure Uplink Cooperation Ahmad Abu Al Haija and Mai Vu Abstract arxiv:1312.2169v2 [cs.it] 29 Mar 2014 We propose a time-division uplink

More information

Capacity and Cooperation in Wireless Networks

Capacity and Cooperation in Wireless Networks Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate

More information

When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network

When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network Nadia Fawaz, David Gesbert Mobile Communications Department, Eurecom Institute Sophia-Antipolis, France {fawaz, gesbert}@eurecom.fr

More information

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department

More information

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:

More information

Interference: An Information Theoretic View

Interference: An Information Theoretic View Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

Non-memoryless Analog Network Coding in Two-Way Relay Channel

Non-memoryless Analog Network Coding in Two-Way Relay Channel Non-memoryless Analog Network Coding in Two-Way Relay Channel Shengli Zhang, Soung-Chang Liew, Qingfeng Zhou, Lu Lu, Hui Wang Department of Communicaton Engineering, Shenzhen University, China Department

More information