Multicasting over Multiple-Access Networks

Size: px
Start display at page:

Download "Multicasting over Multiple-Access Networks"

Transcription

1 ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A

2 Outline ing oding apacity onclusions oding 5 apacity 6 onclusions

3 Wireless Network apacity ing oding apacity onclusions omputing the capacity region of an arbitrary wireless network is an extremely difficult (and unsolved) problem Even with simplifying assumptions, most results are Gupta-Kumar style scaling laws Full characterization of capacity will lead to design insights for wireless networks We will focus on multicasting over a general model that incorporates interference and show that sometimes collisions are helpful.

4 ing oding apacity onclusions One simplifying assumption is to assume our wireless network is well-represented as a graph, G = (V,E), where the users are the vertices and the labelled edges represent point-to-point channels between users In this case, we know the capacity region for: Unicast (single source, single destination): routing is sufficient (single source, multiple destinations): network coding may be necessary However, this is just a wireline network: we have made the problem too simple.

5 Previous Work ing oding apacity onclusions Since we have tools for finding the capacity region of networks modelled as graphs, we should try to incorporate wireless aspects into these graphs. Dana et al. find the multicast capacity for the case when nodes must broadcast the same information on all outgoing edges. They use a packet erasure model and assume that the erasure pattern is known at all receivers. However, they exclude the possibility of intererence. Our approach will be to add an interference componen tto the original graph model.

6 Network oding: Example ing oding apacity onclusions a b a b a b a a b b a b a b a b a b Ahlswede et al. showed that pure routing is suboptimal for multicast, mixing packets is necessary. Butterfly example: Each link has unit capacity. One network use needed to send a and b to both receivers. Routing needs more than one network use.

7 Network oding ing oding apacity onclusions Let G = (V,E) be a network where the vertices are the users and the links between users are given by the labelled, directed edges in the graph. One source must transmit messages to multiple receivers (multicasting). The multicast capacity is given by the max-flow min-cut theorem. Original achievable scheme: randomly-generated codebook at each node that randomly mixes incoming information Of course, this is not a practical solution. Ho et al. have shown that a linear solution exists so long as the field size is larger than the number of receivers.

8 Standard Multiple- ing oding bits S 1 EN1 S EN1 S 2 EN2 S EN2... S M EN S M EN M X 1 X 2 X M P Y X1X 2...X M Y DE bits DE S Ŝ 1 Ŝ 2 Ŝ Ṁ. apacity onclusions M users with possibly correlated sources, S i Must perfectly recover the sources Source encoders do distributed compression

9 ing oding apacity onclusions Assume we have an acyclic network of point-to-point and multiple-access channels. Each user is represented as a vertex in a graph with incoming and outgoing links. The output of a multiple-access channel in a single time step can be written as the weighted sum of its inputs: Y = α 1 X 1 + α 2 X α K X K + Z where α i F q \ {0}, X i F q, and Z is an iid noise process. (All multiple-access channels operate over the same finite field.) Assume there is one sender and multiple receivers. We would like to characterize the multicast capacity of any network of this form.

10 Motivating Example ing S S R1 MA R2 MA MA oding apacity onclusions Ŝ (a) Ŝ Ŝ (b) Ŝ We have converted our problem into a graph of point-to-point links. capacity given by network coding. Is this optimal?

11 Motivating Example ing oding apacity onclusions S Example: multiple-access channel performs mod-2 addition. Separation-based scheme requires > H(S) 2 and > H(S). Using the channel as part of the network code only requires > H(S) 2 and 1 + > H(S) Separation is not optimal as we can use the interference as part of our network code. Ŝ Ŝ Not that interesting without noise.

12 oding ing oding apacity onclusions P(S 1, S 2 ) S 1 S p 2 p 1 2 p 2 1 p 2 S 1 EN 1 X 1 S 2 EN 2 X 2 P Y X1,X2 Y DE U = S 1 S 2, H(U) = h B (p) Must losslessly transmit the mod-2 sum, U = S 1 S 2, across a multiple-access channel Û Sources have uniform marginals, independent when p = 1 2 S 2 looks like S 1 passed through a BS

13 Optimal Source oding: Körner-Marton ing oding apacity onclusions Then what is the optimal source code? Idea: use a linear source code. Any iid B(p) source can be compressed to the entropy rate, h B (p), with a linear code This code can be written as a matrix H u = [U(1)U(2) U(k)] w = uh Example: [1 0] = [1 0 0]

14 Optimal Source oding: Körner-Marton ing oding apacity onclusions Now use this source coding matrix at both terminals w 1 = s 1 H w 2 = s 2 H w 1 and w 2 are provided to the decoder. Neither source can be reconstructed but U comes through perfectly by decoding from the mod-2 sum of the compressed bits w = w 1 w 2 = (s 1 s 2 )H = uh Körner-Marton scheme achieves: R 1 > h B (p) R 2 > h B (p)

15 An Appropriately Matched Multiple- hannel ing oding S 1 EN 1 X 1 S 2 EN 2 X 2 W BSq Y DE Û apacity onclusions hannel takes a mod-2 sum of the inputs: Y = X 1 X 2 This is followed by a BS with crossover probability q Sum rate capacity, MA = 1 h B (q) apacity region is a simplex, time-sharing is optimal

16 Separation-Based Scheme ing oding apacity onclusions Use Körner-Marton scheme to compress U: R S1 + R S2 > 2h B (p) Then use a multiple-access channel code: R X1 + R X2 < 1 h B (q) Achieves any computation rate satisfying: κ SEP < 1 h B(q) 2h B (p) an we do better?

17 Linear hannel ode for the BS ing oding apacity onclusions Random coding does not take advantage of the channel structure We need a linear channel code and a linear source code For any BS, there is a linear channel code that can achieve capacity. Any linear channel code can be written as a generator matrix: G x = wg [ Example: [1 1 0] = [1 1] ]

18 oding ing oding apacity onclusions Theorem There exists a linear code that can approach the computation rate κ = 1 h B(q) h B (p). This is the best available computation rate for lossless transmission of U = S 1 S 2 over this channel. Achievability. hoose G for the BS and H for compressing U to entropy. Set x 1 = s 1 HG x 2 = s 2 HG After the channel, it looks as if U was jointly encoded. onverse. Relax to joint encoding of U. By the data processing inequality, I(U; Û) I(X 1, X 2 ; Y ).

19 Separation vs. Joint Source-hannel oding ing Separation Slepian Wolf oding apacity onclusions κ p Our scheme dominates separation by a factor of 2, even when the sources are independent. We can get the benefits of uncoded transmission and maintain reliable communication.

20 apacity of Finite-Field Multiple- ing oding apacity onclusions Theorem If the field size of the multiple-access channels in the network, q, is larger than the number of receivers, L, then the multicast capacity is given by the max-flow min-cut bound. Proof Sketch: We begin by transforming our multiple-access network into a purely point-to-point network. We replace each multiple-access channel with a node whose output has a capacity equal to the original sum-rate capacity. Each incoming link to the original channel is replaced with an infinite capacity link to the new node. We now need the result of Ho et al.: A linear solution for this network exists so long as the field size is larger than the number of receivers.

21 Proof Sketch ontinued ing oding apacity onclusions Each new node now performs a computation for the overall network code and sends this out on the outgoing link at the original sum-rate capacity. We duplicate each of these computations on the original multiple-access channels with computation coding. Achieves multicast capacity of transformed network, which is guaranteed to be the same or larger than our original multicast capacity.

22 Future Work ing oding apacity Incorporate random fading model. If each node knows the fading process of the nodes before it, this shouldn t really change the capacity region. Attempt to incorporate a broadcast constraint. onclusions

23 onclusions ing oding apacity onclusions Large gains are possible for reliable computation with joint source-channel codes. Very simple codes, such as linear codes can completely achieve these gains. Interference is not necessarily a hindrance to wireless communication. In certain scenarios, it can be made part of an optimal code. Techniques such as computation coding may be necessary to characterize more general networks. Unfortunately, computation capacity becomes very difficult to analyze outside of the field addition case. (Even Gaussian case not completely solved.)

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

Wireless Network Information Flow

Wireless Network Information Flow Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch

More information

A Bit of network information theory

A Bit of network information theory Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,

More information

SHANNON S source channel separation theorem states

SHANNON S source channel separation theorem states IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,

More information

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing 2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department

More information

Coding for Noisy Networks

Coding for Noisy Networks Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+

More information

Computing and Communications 2. Information Theory -Channel Capacity

Computing and Communications 2. Information Theory -Channel Capacity 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

The Reachback Channel in Wireless Sensor Networks

The Reachback Channel in Wireless Sensor Networks The Reachback Channel in Wireless Sensor Networks Sergio D Servetto School of lectrical and Computer ngineering Cornell University http://peopleececornelledu/servetto/ DIMACS /1/0 Acknowledgements An-swol

More information

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,

More information

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta

More information

Network Information Theory

Network Information Theory 1 / 191 Network Information Theory Young-Han Kim University of California, San Diego Joint work with Abbas El Gamal (Stanford) IEEE VTS San Diego 2009 2 / 191 Network Information Flow Consider a general

More information

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Scheduling in omnidirectional relay wireless networks

Scheduling in omnidirectional relay wireless networks Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science

More information

WIRELESS or wired link failures are of a nonergodic nature

WIRELESS or wired link failures are of a nonergodic nature IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4187 Robust Communication via Decentralized Processing With Unreliable Backhaul Links Osvaldo Simeone, Member, IEEE, Oren Somekh, Member,

More information

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications 1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.

More information

Efficient Codes using Channel Polarization!

Efficient Codes using Channel Polarization! Efficient Codes using Channel Polarization! Bakshi, Jaggi, and Effros! ACHIEVEMENT DESCRIPTION STATUS QUO - Practical capacity achieving schemes are not known for general multi-input multi-output channels!

More information

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code

The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June

More information

Degrees of Freedom in Multiuser MIMO

Degrees of Freedom in Multiuser MIMO Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department

More information

arxiv: v1 [cs.it] 12 Jan 2011

arxiv: v1 [cs.it] 12 Jan 2011 On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom

More information

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter On Fading Broadcast Channels with Partial Channel State Information at the Transmitter Ravi Tandon 1, ohammad Ali addah-ali, Antonia Tulino, H. Vincent Poor 1, and Shlomo Shamai 3 1 Dept. of Electrical

More information

Exploiting Interference through Cooperation and Cognition

Exploiting Interference through Cooperation and Cognition Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of

More information

Wireless Multicasting with Channel Uncertainty

Wireless Multicasting with Channel Uncertainty Wireless Multicasting with Channel Uncertainty Jie Luo ECE Dept., Colorado State Univ. Fort Collins, Colorado 80523 e-mail: rockey@eng.colostate.edu Anthony Ephremides ECE Dept., Univ. of Maryland College

More information

Rab Nawaz. Prof. Zhang Wenyi

Rab Nawaz. Prof. Zhang Wenyi Rab Nawaz PhD Scholar (BL16006002) School of Information Science and Technology University of Science and Technology of China, Hefei Email: rabnawaz@mail.ustc.edu.cn Submitted to Prof. Zhang Wenyi wenyizha@ustc.edu.cn

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function

Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

Variations on the Index Coding Problem: Pliable Index Coding and Caching

Variations on the Index Coding Problem: Pliable Index Coding and Caching Variations on the Index Coding Problem: Pliable Index Coding and Caching T. Liu K. Wan D. Tuninetti University of Illinois at Chicago Shannon s Centennial, Chicago, September 23rd 2016 D. Tuninetti (UIC)

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

Bandwidth Scaling in Ultra Wideband Communication 1

Bandwidth Scaling in Ultra Wideband Communication 1 Bandwidth Scaling in Ultra Wideband Communication 1 Dana Porrat dporrat@wireless.stanford.edu David Tse dtse@eecs.berkeley.edu Department of Electrical Engineering and Computer Sciences University of California,

More information

Opportunistic network communications

Opportunistic network communications Opportunistic network communications Suhas Diggavi School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS) Ecole Polytechnique Fédérale de Lausanne (EPFL)

More information

On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding

On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding by Zahra Faraji-Dana A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

A unified graphical approach to

A unified graphical approach to A unified graphical approach to 1 random coding for multi-terminal networks Stefano Rini and Andrea Goldsmith Department of Electrical Engineering, Stanford University, USA arxiv:1107.4705v3 [cs.it] 14

More information

ECE 4400:693 - Information Theory

ECE 4400:693 - Information Theory ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview

More information

Information Flow in Wireless Networks

Information Flow in Wireless Networks Information Flow in Wireless Networks Srikrishna Bhashyam Department of Electrical Engineering Indian Institute of Technology Madras National Conference on Communications IIT Kharagpur 3 Feb 2012 Srikrishna

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

Entropy, Coding and Data Compression

Entropy, Coding and Data Compression Entropy, Coding and Data Compression Data vs. Information yes, not, yes, yes, not not In ASCII, each item is 3 8 = 24 bits of data But if the only possible answers are yes and not, there is only one bit

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

IN RECENT years, wireless multiple-input multiple-output

IN RECENT years, wireless multiple-input multiple-output 1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang

More information

DEGRADED broadcast channels were first studied by

DEGRADED broadcast channels were first studied by 4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

Information Theory at the Extremes

Information Theory at the Extremes Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.

More information

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

On Multi-Server Coded Caching in the Low Memory Regime

On Multi-Server Coded Caching in the Low Memory Regime On Multi-Server Coded Caching in the ow Memory Regime Seyed Pooya Shariatpanahi, Babak Hossein Khalaj School of Computer Science, arxiv:80.07655v [cs.it] 0 Mar 08 Institute for Research in Fundamental

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Digital Television Lecture 5

Digital Television Lecture 5 Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during

More information

Interference management with mismatched partial channel state information

Interference management with mismatched partial channel state information Vahid et al. EURASIP Journal on Wireless Communications and Networking (2017 2017:134 DOI 10.1186/s13638-017-0917-0 RESEARCH Open Access Interference management with mismatched partial channel state information

More information

Cooperation in Wireless Networks

Cooperation in Wireless Networks Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

Energy Efficiency in Relay-Assisted Downlink

Energy Efficiency in Relay-Assisted Downlink Energy Efficiency in Relay-Assisted Downlink 1 Cellular Systems, Part I: Theoretical Framework Stefano Rini, Ernest Kurniawan, Levan Ghaghanidze, and Andrea Goldsmith Technische Universität München, Munich,

More information

Noisy Index Coding with Quadrature Amplitude Modulation (QAM)

Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 14: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 25 th, 2015 1 Previous Lecture: Source Code Generation: Lossless

More information

MOBILE data demands are on the rise at an alarming

MOBILE data demands are on the rise at an alarming IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 4581 A Relay Can Increase Degrees of Freedom in Bursty Interference Networks Sunghyun Kim, I-Hsiang Wang, and Changho Suh, Member, IEEE

More information

An Introduction to Distributed Channel Coding

An Introduction to Distributed Channel Coding An Introduction to Distributed Channel Coding Alexandre Graell i Amat and Ragnar Thobaben Department of Signals and Systems, Chalmers University of Technology, Gothenburg, Sweden School of Electrical Engineering,

More information

Overlay Systems. Results around Improved Scheme Transmission for Achievable Rates. Outer Bound. Transmission Strategy Pieces

Overlay Systems. Results around Improved Scheme Transmission for Achievable Rates. Outer Bound. Transmission Strategy Pieces Cooperation at T EE36: Lecture 3 Outline Capacity of Cognitive adios Announcements Progress reports due Feb. 9 at midnight Overview Achievable rates in Cognitive adios Better achievable scheme and upper

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich, Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and

More information

I. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0.

I. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0. 4566 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 9, SEPTEMBER 2010 The Approximate Capacity of the Many-to-One One-to-Many Gaussian Interference Channels Guy Bresler, Abhay Parekh, David N. C.

More information

Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding

Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Anthony Man-Cho So Dept. of Systems Engineering and Engineering Management The Chinese University of Hong Kong (Joint

More information

Approximately Optimal Wireless Broadcasting

Approximately Optimal Wireless Broadcasting Approximately Optimal Wireless Broadcasting Sreeram Kannan, Adnan Raja, and Pramod Viswanath Abstract We study a wireless broadcast network, where a single source reliably communicates independent messages

More information

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS WAFIC W. ALAMEDDINE A THESIS IN THE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING PRESENTED IN

More information

The Multi-way Relay Channel

The Multi-way Relay Channel The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton

More information

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE 1850 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 State Amplification Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE Abstract We consider the problem

More information

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C.

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 5, MAY 2011 2941 Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, David N C Tse, Fellow, IEEE Abstract

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

Optimized Codes for the Binary Coded Side-Information Problem

Optimized Codes for the Binary Coded Side-Information Problem Optimized Codes for the Binary Coded Side-Information Problem Anne Savard, Claudio Weidmann ETIS / ENSEA - Université de Cergy-Pontoise - CNRS UMR 8051 F-95000 Cergy-Pontoise Cedex, France Outline 1 Introduction

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department

More information

ECE Advanced Communication Theory, Spring 2007 Midterm Exam Monday, April 23rd, 6:00-9:00pm, ELAB 325

ECE Advanced Communication Theory, Spring 2007 Midterm Exam Monday, April 23rd, 6:00-9:00pm, ELAB 325 C 745 - Advanced Communication Theory, Spring 2007 Midterm xam Monday, April 23rd, 600-900pm, LAB 325 Overview The exam consists of five problems for 150 points. The points for each part of each problem

More information

Superposition Coding in the Downlink of CDMA Cellular Systems

Superposition Coding in the Downlink of CDMA Cellular Systems Superposition Coding in the Downlink of CDMA Cellular Systems Surendra Boppana and John M. Shea Wireless Information Networking Group University of Florida Feb 13, 2006 Outline of the talk Introduction

More information

Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy

Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy Aitor del Coso, Osvaldo Simeone, Yeheskel Bar-ness and Christian Ibars Centre Tecnològic de Telecomunicacions

More information

Analysis of massive MIMO networks using stochastic geometry

Analysis of massive MIMO networks using stochastic geometry Analysis of massive MIMO networks using stochastic geometry Tianyang Bai and Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical and Computer Engineering The University

More information

4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE

4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE 4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 Cooperative Sensor Networks With Misinformed Nodes Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE Abstract The

More information

Performance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband

Performance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband erformance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband Cheng Luo Muriel Médard Electrical Engineering Electrical Engineering and Computer Science, and Computer Science, Massachusetts

More information

Message Passing in Distributed Wireless Networks

Message Passing in Distributed Wireless Networks Message Passing in Distributed Wireless Networks Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08540. vaggarwa @princeton.edu Youjian Liu Department of ECEE,

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Basics of Error Correcting Codes

Basics of Error Correcting Codes Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE

More information

CONSIDER a sensor network of nodes taking

CONSIDER a sensor network of nodes taking 5660 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 Wyner-Ziv Coding Over Broadcast Channels: Hybrid Digital/Analog Schemes Yang Gao, Student Member, IEEE, Ertem Tuncel, Member,

More information

Collaborative decoding in bandwidth-constrained environments

Collaborative decoding in bandwidth-constrained environments 1 Collaborative decoding in bandwidth-constrained environments Arun Nayagam, John M. Shea, and Tan F. Wong Wireless Information Networking Group (WING), University of Florida Email: arun@intellon.com,

More information

6.450: Principles of Digital Communication 1

6.450: Principles of Digital Communication 1 6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of

More information

From Fountain to BATS: Realization of Network Coding

From Fountain to BATS: Realization of Network Coding From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving

More information

Secure Network Coding for Wiretap Networks of Type II

Secure Network Coding for Wiretap Networks of Type II 1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson arxiv:0907.3493v1 [cs.it] 20 Jul 2009 Abstract We consider the problem of securing a multicast

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4087 New Inner Outer Bounds for the Memoryless Cognitive Interference Channel Some New Capacity Results Stefano Rini, Daniela Tuninetti,

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game

More information

Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes

Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes Ahmed Douik, Mohammad S. Karim, Parastoo Sadeghi, and Sameh Sorour California Institute of Technology (Caltech), California,

More information

Degrees of Freedom of Bursty Multiple Access Channels with a Relay

Degrees of Freedom of Bursty Multiple Access Channels with a Relay Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department

More information

Receiver Design for Noncoherent Digital Network Coding

Receiver Design for Noncoherent Digital Network Coding Receiver Design for Noncoherent Digital Network Coding Terry Ferrett 1 Matthew Valenti 1 Don Torrieri 2 1 West Virginia University 2 U.S. Army Research Laboratory November 3rd, 2010 1 / 25 Outline 1 Introduction

More information

Source and Channel Coding for Quasi-Static Fading Channels

Source and Channel Coding for Quasi-Static Fading Channels Source and Channel Coding for Quasi-Static Fading Channels Deniz Gunduz, Elza Erkip Dept. of Electrical and Computer Engineering Polytechnic University, Brooklyn, NY 2, USA dgundu@utopia.poly.edu elza@poly.edu

More information

Network coding an introduction. Playing The Butterfly Lovers melody

Network coding an introduction. Playing The Butterfly Lovers melody Network coding an introduction Playing The Butterfly Lovers melody Store-and-forward conventional mode of transport Store-and-forward inherited by telecommunications Internet Store-and-forward over the

More information

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

On the Optimal Block Length for Joint Channel and Network Coding

On the Optimal Block Length for Joint Channel and Network Coding On the Optimal Block Length for Joint Channel and Network Coding Christian Koller, Martin Haenggi, Jörg Kliewer, and Daniel J. Costello, Jr. Department of Electrical Engineering, University of Notre Dame,

More information

Diversity Gain Region for MIMO Fading Multiple Access Channels

Diversity Gain Region for MIMO Fading Multiple Access Channels Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,

More information