Multicasting over Multiple-Access Networks
|
|
- Thomasina Harrison
- 5 years ago
- Views:
Transcription
1 ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A
2 Outline ing oding apacity onclusions oding 5 apacity 6 onclusions
3 Wireless Network apacity ing oding apacity onclusions omputing the capacity region of an arbitrary wireless network is an extremely difficult (and unsolved) problem Even with simplifying assumptions, most results are Gupta-Kumar style scaling laws Full characterization of capacity will lead to design insights for wireless networks We will focus on multicasting over a general model that incorporates interference and show that sometimes collisions are helpful.
4 ing oding apacity onclusions One simplifying assumption is to assume our wireless network is well-represented as a graph, G = (V,E), where the users are the vertices and the labelled edges represent point-to-point channels between users In this case, we know the capacity region for: Unicast (single source, single destination): routing is sufficient (single source, multiple destinations): network coding may be necessary However, this is just a wireline network: we have made the problem too simple.
5 Previous Work ing oding apacity onclusions Since we have tools for finding the capacity region of networks modelled as graphs, we should try to incorporate wireless aspects into these graphs. Dana et al. find the multicast capacity for the case when nodes must broadcast the same information on all outgoing edges. They use a packet erasure model and assume that the erasure pattern is known at all receivers. However, they exclude the possibility of intererence. Our approach will be to add an interference componen tto the original graph model.
6 Network oding: Example ing oding apacity onclusions a b a b a b a a b b a b a b a b a b Ahlswede et al. showed that pure routing is suboptimal for multicast, mixing packets is necessary. Butterfly example: Each link has unit capacity. One network use needed to send a and b to both receivers. Routing needs more than one network use.
7 Network oding ing oding apacity onclusions Let G = (V,E) be a network where the vertices are the users and the links between users are given by the labelled, directed edges in the graph. One source must transmit messages to multiple receivers (multicasting). The multicast capacity is given by the max-flow min-cut theorem. Original achievable scheme: randomly-generated codebook at each node that randomly mixes incoming information Of course, this is not a practical solution. Ho et al. have shown that a linear solution exists so long as the field size is larger than the number of receivers.
8 Standard Multiple- ing oding bits S 1 EN1 S EN1 S 2 EN2 S EN2... S M EN S M EN M X 1 X 2 X M P Y X1X 2...X M Y DE bits DE S Ŝ 1 Ŝ 2 Ŝ Ṁ. apacity onclusions M users with possibly correlated sources, S i Must perfectly recover the sources Source encoders do distributed compression
9 ing oding apacity onclusions Assume we have an acyclic network of point-to-point and multiple-access channels. Each user is represented as a vertex in a graph with incoming and outgoing links. The output of a multiple-access channel in a single time step can be written as the weighted sum of its inputs: Y = α 1 X 1 + α 2 X α K X K + Z where α i F q \ {0}, X i F q, and Z is an iid noise process. (All multiple-access channels operate over the same finite field.) Assume there is one sender and multiple receivers. We would like to characterize the multicast capacity of any network of this form.
10 Motivating Example ing S S R1 MA R2 MA MA oding apacity onclusions Ŝ (a) Ŝ Ŝ (b) Ŝ We have converted our problem into a graph of point-to-point links. capacity given by network coding. Is this optimal?
11 Motivating Example ing oding apacity onclusions S Example: multiple-access channel performs mod-2 addition. Separation-based scheme requires > H(S) 2 and > H(S). Using the channel as part of the network code only requires > H(S) 2 and 1 + > H(S) Separation is not optimal as we can use the interference as part of our network code. Ŝ Ŝ Not that interesting without noise.
12 oding ing oding apacity onclusions P(S 1, S 2 ) S 1 S p 2 p 1 2 p 2 1 p 2 S 1 EN 1 X 1 S 2 EN 2 X 2 P Y X1,X2 Y DE U = S 1 S 2, H(U) = h B (p) Must losslessly transmit the mod-2 sum, U = S 1 S 2, across a multiple-access channel Û Sources have uniform marginals, independent when p = 1 2 S 2 looks like S 1 passed through a BS
13 Optimal Source oding: Körner-Marton ing oding apacity onclusions Then what is the optimal source code? Idea: use a linear source code. Any iid B(p) source can be compressed to the entropy rate, h B (p), with a linear code This code can be written as a matrix H u = [U(1)U(2) U(k)] w = uh Example: [1 0] = [1 0 0]
14 Optimal Source oding: Körner-Marton ing oding apacity onclusions Now use this source coding matrix at both terminals w 1 = s 1 H w 2 = s 2 H w 1 and w 2 are provided to the decoder. Neither source can be reconstructed but U comes through perfectly by decoding from the mod-2 sum of the compressed bits w = w 1 w 2 = (s 1 s 2 )H = uh Körner-Marton scheme achieves: R 1 > h B (p) R 2 > h B (p)
15 An Appropriately Matched Multiple- hannel ing oding S 1 EN 1 X 1 S 2 EN 2 X 2 W BSq Y DE Û apacity onclusions hannel takes a mod-2 sum of the inputs: Y = X 1 X 2 This is followed by a BS with crossover probability q Sum rate capacity, MA = 1 h B (q) apacity region is a simplex, time-sharing is optimal
16 Separation-Based Scheme ing oding apacity onclusions Use Körner-Marton scheme to compress U: R S1 + R S2 > 2h B (p) Then use a multiple-access channel code: R X1 + R X2 < 1 h B (q) Achieves any computation rate satisfying: κ SEP < 1 h B(q) 2h B (p) an we do better?
17 Linear hannel ode for the BS ing oding apacity onclusions Random coding does not take advantage of the channel structure We need a linear channel code and a linear source code For any BS, there is a linear channel code that can achieve capacity. Any linear channel code can be written as a generator matrix: G x = wg [ Example: [1 1 0] = [1 1] ]
18 oding ing oding apacity onclusions Theorem There exists a linear code that can approach the computation rate κ = 1 h B(q) h B (p). This is the best available computation rate for lossless transmission of U = S 1 S 2 over this channel. Achievability. hoose G for the BS and H for compressing U to entropy. Set x 1 = s 1 HG x 2 = s 2 HG After the channel, it looks as if U was jointly encoded. onverse. Relax to joint encoding of U. By the data processing inequality, I(U; Û) I(X 1, X 2 ; Y ).
19 Separation vs. Joint Source-hannel oding ing Separation Slepian Wolf oding apacity onclusions κ p Our scheme dominates separation by a factor of 2, even when the sources are independent. We can get the benefits of uncoded transmission and maintain reliable communication.
20 apacity of Finite-Field Multiple- ing oding apacity onclusions Theorem If the field size of the multiple-access channels in the network, q, is larger than the number of receivers, L, then the multicast capacity is given by the max-flow min-cut bound. Proof Sketch: We begin by transforming our multiple-access network into a purely point-to-point network. We replace each multiple-access channel with a node whose output has a capacity equal to the original sum-rate capacity. Each incoming link to the original channel is replaced with an infinite capacity link to the new node. We now need the result of Ho et al.: A linear solution for this network exists so long as the field size is larger than the number of receivers.
21 Proof Sketch ontinued ing oding apacity onclusions Each new node now performs a computation for the overall network code and sends this out on the outgoing link at the original sum-rate capacity. We duplicate each of these computations on the original multiple-access channels with computation coding. Achieves multicast capacity of transformed network, which is guaranteed to be the same or larger than our original multicast capacity.
22 Future Work ing oding apacity Incorporate random fading model. If each node knows the fading process of the nodes before it, this shouldn t really change the capacity region. Attempt to incorporate a broadcast constraint. onclusions
23 onclusions ing oding apacity onclusions Large gains are possible for reliable computation with joint source-channel codes. Very simple codes, such as linear codes can completely achieve these gains. Interference is not necessarily a hindrance to wireless communication. In certain scenarios, it can be made part of an optimal code. Techniques such as computation coding may be necessary to characterize more general networks. Unfortunately, computation capacity becomes very difficult to analyze outside of the field addition case. (Even Gaussian case not completely solved.)
Information flow over wireless networks: a deterministic approach
Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory
More informationWireless Network Information Flow
Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch
More informationA Bit of network information theory
Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,
More informationSHANNON S source channel separation theorem states
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,
More informationOn Optimum Communication Cost for Joint Compression and Dispersive Information Routing
2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department
More informationCoding for Noisy Networks
Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+
More informationComputing and Communications 2. Information Theory -Channel Capacity
1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationThe Reachback Channel in Wireless Sensor Networks
The Reachback Channel in Wireless Sensor Networks Sergio D Servetto School of lectrical and Computer ngineering Cornell University http://peopleececornelledu/servetto/ DIMACS /1/0 Acknowledgements An-swol
More informationThe Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA
The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,
More informationRouting versus Network Coding in Erasure Networks with Broadcast and Interference Constraints
Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta
More informationNetwork Information Theory
1 / 191 Network Information Theory Young-Han Kim University of California, San Diego Joint work with Abbas El Gamal (Stanford) IEEE VTS San Diego 2009 2 / 191 Network Information Flow Consider a general
More information5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010
5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationScheduling in omnidirectional relay wireless networks
Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science
More informationWIRELESS or wired link failures are of a nonergodic nature
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4187 Robust Communication via Decentralized Processing With Unreliable Backhaul Links Osvaldo Simeone, Member, IEEE, Oren Somekh, Member,
More informationBroadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications
1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationOn the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge
On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.
More informationEfficient Codes using Channel Polarization!
Efficient Codes using Channel Polarization! Bakshi, Jaggi, and Effros! ACHIEVEMENT DESCRIPTION STATUS QUO - Practical capacity achieving schemes are not known for general multi-input multi-output channels!
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationDegrees of Freedom in Multiuser MIMO
Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department
More informationarxiv: v1 [cs.it] 12 Jan 2011
On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom
More informationOn Fading Broadcast Channels with Partial Channel State Information at the Transmitter
On Fading Broadcast Channels with Partial Channel State Information at the Transmitter Ravi Tandon 1, ohammad Ali addah-ali, Antonia Tulino, H. Vincent Poor 1, and Shlomo Shamai 3 1 Dept. of Electrical
More informationExploiting Interference through Cooperation and Cognition
Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of
More informationWireless Multicasting with Channel Uncertainty
Wireless Multicasting with Channel Uncertainty Jie Luo ECE Dept., Colorado State Univ. Fort Collins, Colorado 80523 e-mail: rockey@eng.colostate.edu Anthony Ephremides ECE Dept., Univ. of Maryland College
More informationRab Nawaz. Prof. Zhang Wenyi
Rab Nawaz PhD Scholar (BL16006002) School of Information Science and Technology University of Science and Technology of China, Hefei Email: rabnawaz@mail.ustc.edu.cn Submitted to Prof. Zhang Wenyi wenyizha@ustc.edu.cn
More informationOn the Capacity Regions of Two-Way Diamond. Channels
On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of
More informationOptimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function
Optimal Coded Information Network Design and Management via Improved Characterizations of the Binary Entropy Function John MacLaren Walsh & Steven Weber Department of Electrical and Computer Engineering
More informationBlock Markov Encoding & Decoding
1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,
More informationVariations on the Index Coding Problem: Pliable Index Coding and Caching
Variations on the Index Coding Problem: Pliable Index Coding and Caching T. Liu K. Wan D. Tuninetti University of Illinois at Chicago Shannon s Centennial, Chicago, September 23rd 2016 D. Tuninetti (UIC)
More informationComputing functions over wireless networks
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationBandwidth Scaling in Ultra Wideband Communication 1
Bandwidth Scaling in Ultra Wideband Communication 1 Dana Porrat dporrat@wireless.stanford.edu David Tse dtse@eecs.berkeley.edu Department of Electrical Engineering and Computer Sciences University of California,
More informationOpportunistic network communications
Opportunistic network communications Suhas Diggavi School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS) Ecole Polytechnique Fédérale de Lausanne (EPFL)
More informationOn Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding
On Non-Binary Constellations for Channel-Encoded Physical Layer Network Coding by Zahra Faraji-Dana A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree
More informationOn the Capacity Region of the Vector Fading Broadcast Channel with no CSIT
On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,
More informationA unified graphical approach to
A unified graphical approach to 1 random coding for multi-terminal networks Stefano Rini and Andrea Goldsmith Department of Electrical Engineering, Stanford University, USA arxiv:1107.4705v3 [cs.it] 14
More informationECE 4400:693 - Information Theory
ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview
More informationInformation Flow in Wireless Networks
Information Flow in Wireless Networks Srikrishna Bhashyam Department of Electrical Engineering Indian Institute of Technology Madras National Conference on Communications IIT Kharagpur 3 Feb 2012 Srikrishna
More informationOn the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels
On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH
More informationEntropy, Coding and Data Compression
Entropy, Coding and Data Compression Data vs. Information yes, not, yes, yes, not not In ASCII, each item is 3 8 = 24 bits of data But if the only possible answers are yes and not, there is only one bit
More informationScaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous
More informationA Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast
ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang
More informationIN RECENT years, wireless multiple-input multiple-output
1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang
More informationDEGRADED broadcast channels were first studied by
4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,
More informationIN recent years, there has been great interest in the analysis
2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We
More informationInformation Theory at the Extremes
Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.
More informationReliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points
Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu
More informationOn Multi-Server Coded Caching in the Low Memory Regime
On Multi-Server Coded Caching in the ow Memory Regime Seyed Pooya Shariatpanahi, Babak Hossein Khalaj School of Computer Science, arxiv:80.07655v [cs.it] 0 Mar 08 Institute for Research in Fundamental
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationDigital Television Lecture 5
Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during
More informationInterference management with mismatched partial channel state information
Vahid et al. EURASIP Journal on Wireless Communications and Networking (2017 2017:134 DOI 10.1186/s13638-017-0917-0 RESEARCH Open Access Interference management with mismatched partial channel state information
More informationCooperation in Wireless Networks
Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More informationEnergy Efficiency in Relay-Assisted Downlink
Energy Efficiency in Relay-Assisted Downlink 1 Cellular Systems, Part I: Theoretical Framework Stefano Rini, Ernest Kurniawan, Levan Ghaghanidze, and Andrea Goldsmith Technische Universität München, Munich,
More informationNoisy Index Coding with Quadrature Amplitude Modulation (QAM)
Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian
More informationCommunication Theory II
Communication Theory II Lecture 14: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 25 th, 2015 1 Previous Lecture: Source Code Generation: Lossless
More informationMOBILE data demands are on the rise at an alarming
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 4581 A Relay Can Increase Degrees of Freedom in Bursty Interference Networks Sunghyun Kim, I-Hsiang Wang, and Changho Suh, Member, IEEE
More informationAn Introduction to Distributed Channel Coding
An Introduction to Distributed Channel Coding Alexandre Graell i Amat and Ragnar Thobaben Department of Signals and Systems, Chalmers University of Technology, Gothenburg, Sweden School of Electrical Engineering,
More informationOverlay Systems. Results around Improved Scheme Transmission for Achievable Rates. Outer Bound. Transmission Strategy Pieces
Cooperation at T EE36: Lecture 3 Outline Capacity of Cognitive adios Announcements Progress reports due Feb. 9 at midnight Overview Achievable rates in Cognitive adios Better achievable scheme and upper
More informationCommunication Theory II
Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding
More informationJoint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,
Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and
More informationI. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0.
4566 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 9, SEPTEMBER 2010 The Approximate Capacity of the Many-to-One One-to-Many Gaussian Interference Channels Guy Bresler, Abhay Parekh, David N. C.
More informationPhysical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding
Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Anthony Man-Cho So Dept. of Systems Engineering and Engineering Management The Chinese University of Hong Kong (Joint
More informationApproximately Optimal Wireless Broadcasting
Approximately Optimal Wireless Broadcasting Sreeram Kannan, Adnan Raja, and Pramod Viswanath Abstract We study a wireless broadcast network, where a single source reliably communicates independent messages
More informationENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS WAFIC W. ALAMEDDINE A THESIS IN THE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING PRESENTED IN
More informationThe Multi-way Relay Channel
The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton
More informationState Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE
1850 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 State Amplification Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE Abstract We consider the problem
More informationInterference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 5, MAY 2011 2941 Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, David N C Tse, Fellow, IEEE Abstract
More informationOn the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing
1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result
More informationOptimized Codes for the Binary Coded Side-Information Problem
Optimized Codes for the Binary Coded Side-Information Problem Anne Savard, Claudio Weidmann ETIS / ENSEA - Université de Cergy-Pontoise - CNRS UMR 8051 F-95000 Cergy-Pontoise Cedex, France Outline 1 Introduction
More informationSymmetric Decentralized Interference Channels with Noisy Feedback
4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationOn Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel
On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department
More informationECE Advanced Communication Theory, Spring 2007 Midterm Exam Monday, April 23rd, 6:00-9:00pm, ELAB 325
C 745 - Advanced Communication Theory, Spring 2007 Midterm xam Monday, April 23rd, 600-900pm, LAB 325 Overview The exam consists of five problems for 150 points. The points for each part of each problem
More informationSuperposition Coding in the Downlink of CDMA Cellular Systems
Superposition Coding in the Downlink of CDMA Cellular Systems Surendra Boppana and John M. Shea Wireless Information Networking Group University of Florida Feb 13, 2006 Outline of the talk Introduction
More informationSpace-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy
Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy Aitor del Coso, Osvaldo Simeone, Yeheskel Bar-ness and Christian Ibars Centre Tecnològic de Telecomunicacions
More informationAnalysis of massive MIMO networks using stochastic geometry
Analysis of massive MIMO networks using stochastic geometry Tianyang Bai and Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical and Computer Engineering The University
More information4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE
4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 Cooperative Sensor Networks With Misinformed Nodes Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE Abstract The
More informationPerformance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband
erformance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband Cheng Luo Muriel Médard Electrical Engineering Electrical Engineering and Computer Science, and Computer Science, Massachusetts
More informationMessage Passing in Distributed Wireless Networks
Message Passing in Distributed Wireless Networks Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08540. vaggarwa @princeton.edu Youjian Liu Department of ECEE,
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationBasics of Error Correcting Codes
Basics of Error Correcting Codes Drawing from the book Information Theory, Inference, and Learning Algorithms Downloadable or purchasable: http://www.inference.phy.cam.ac.uk/mackay/itila/book.html CSE
More informationCONSIDER a sensor network of nodes taking
5660 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 Wyner-Ziv Coding Over Broadcast Channels: Hybrid Digital/Analog Schemes Yang Gao, Student Member, IEEE, Ertem Tuncel, Member,
More informationCollaborative decoding in bandwidth-constrained environments
1 Collaborative decoding in bandwidth-constrained environments Arun Nayagam, John M. Shea, and Tan F. Wong Wireless Information Networking Group (WING), University of Florida Email: arun@intellon.com,
More information6.450: Principles of Digital Communication 1
6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of
More informationFrom Fountain to BATS: Realization of Network Coding
From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving
More informationSecure Network Coding for Wiretap Networks of Type II
1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson arxiv:0907.3493v1 [cs.it] 20 Jul 2009 Abstract We consider the problem of securing a multicast
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4087 New Inner Outer Bounds for the Memoryless Cognitive Interference Channel Some New Capacity Results Stefano Rini, Daniela Tuninetti,
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game
More informationDelivery Time Reduction for Order-Constrained Applications using Binary Network Codes
Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes Ahmed Douik, Mohammad S. Karim, Parastoo Sadeghi, and Sameh Sorour California Institute of Technology (Caltech), California,
More informationDegrees of Freedom of Bursty Multiple Access Channels with a Relay
Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department
More informationReceiver Design for Noncoherent Digital Network Coding
Receiver Design for Noncoherent Digital Network Coding Terry Ferrett 1 Matthew Valenti 1 Don Torrieri 2 1 West Virginia University 2 U.S. Army Research Laboratory November 3rd, 2010 1 / 25 Outline 1 Introduction
More informationSource and Channel Coding for Quasi-Static Fading Channels
Source and Channel Coding for Quasi-Static Fading Channels Deniz Gunduz, Elza Erkip Dept. of Electrical and Computer Engineering Polytechnic University, Brooklyn, NY 2, USA dgundu@utopia.poly.edu elza@poly.edu
More informationNetwork coding an introduction. Playing The Butterfly Lovers melody
Network coding an introduction Playing The Butterfly Lovers melody Store-and-forward conventional mode of transport Store-and-forward inherited by telecommunications Internet Store-and-forward over the
More informationSuperimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationOn the Optimal Block Length for Joint Channel and Network Coding
On the Optimal Block Length for Joint Channel and Network Coding Christian Koller, Martin Haenggi, Jörg Kliewer, and Daniel J. Costello, Jr. Department of Electrical Engineering, University of Notre Dame,
More informationDiversity Gain Region for MIMO Fading Multiple Access Channels
Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,
More information