The Capacity Region of the Strong Interference Channel With Common Information
|
|
- Anabel Bailey
- 5 years ago
- Views:
Transcription
1 The Capacity Region of the Strong Interference Channel With Common Information Ivana Maric WINLAB, Rutgers University Piscataway, NJ Roy D. Yates WINLAB, Rutgers University Piscataway, NJ Gerhard Kramer Bell Labs, Lucent Technologies Murray Hill, New Jersey Abstract Transmitter cooperation enabled by dedicated links allows for a partial message exchange between encoders. After cooperation, each encoder knows a common message partially describing the two original messages, and its own private message containing the information that the encoders were not able to exchange. We consider the interference channel with both private and common messages at the encoders. A private message at an encoder is intended for a corresponding decoder as the common message is to be received at both decoders. We derive conditions under which the capacity region of this channel coincides with the capacity region of the channel in which both private messages are required at both receivers. We show that the obtained conditions are equivalent to the strong interference conditions determined by Costa and El Gamal for the interference channel with independent messages. I. INTRODUCTION A problem in which encoders partially cooperate in a discrete memoryless channel was proposed by Willems for a multiple access channel (MAC) [1]. To model the transmitter cooperation, two communication links with finite capacities are introduced between the two encoders. The amount of information exchanged between the two transmitters is bounded by the capacities of the communication links. The proposed discrete channel model enables investigation of transmitter cooperation gains. For a Gaussian network with two transmitters and two receivers, improvements in the achievable rates due to node cooperation were demonstrated in [2] [6]. In [2], the transmitters fully cooperate by exchanging their intended messages and then jointly encode them using dirty paper coding. Other cooperation schemes were analyzed in [3] [5]. In the discrete memoryless MAC with partially cooperating encoders [1], the outcome of the cooperation is referred to as a conference. Willems determined the capacity region of this channel and thus specified the optimum conference. His result was recently extended to a compound MAC in which two decoders wish to decode messages sent from the encoders [7]. The same form of conference as in [1] was shown to remain optimal. When cooperating over the links with finite capacities, encoders obtain partial information about each other s messages. This information is referred to as the common message as it is known to both encoders after the conference. In addition, 1 This work was supported by NSF Grant NSF ANI W 1 W0 W2 ENCODER 1 ENCODER 2 Fig. 1. X1(W 1,W 0 ) p(y1,y2 x1,x2) Y1 DECODER 1 ^ ^ (W 1,W 0 (1)) ^ ^ X2 (W 2,W 0 ) Y2 (W 2,W 0 (2)) DECODER 2 Interference channel with common information. each encoder will still have independent information referred to as the private message, as this message remains unknown to the other encoder. Both common and private messages are decoded at a single decoder in the case of the MAC [1], or at both receivers in the case of a compound MAC [7]. In this paper, we consider the communication situation in which two encoders each have a private message and a common message they wish to send. Each decoder is interested in only one private message sent at the corresponding encoder. Both decoders wish to decode the common message. We refer to this channel as an interference channel with common information, denoted! ". The communication system is shown in Figure 1. Without common information, this channel reduces to the interference channel [8], [9] for which the capacity region is known in the case of strong interference [10] satisfying %'&)( + %&)(, + %&( (1) %&(- (2) for all product distributions on the inputs and. The capacity region in this case coincides with the capacity region of the two-sender, two-receiver channel in which both messages are decoded at both receivers, as determined by Ahlswede [11]. In this paper, we determine the capacity region of interference channels with a common message if %&)( /.0 %&)(, /.0 &( 1.0 (3) &(- 1.0 (4) for all joint distributions 2 %32 that factor as 3% %. We further show that this class of interference channels is same as those determined by (1) and (2) with independent $5 and $6.
2 @ II. CHANNEL MODEL AND STATEMENT OF RESULT The channel consists of finite sets ) '! and a conditional probability distribution 2 % ' - ',. Symbols % 78 9 are channel inputs and % 7: ; are the corresponding channel outputs. Each encoder, 9 )>, wishes to send a private message?a@b7dc FE"EFE/GH@)I to decoder in J channel uses. In addition, a common message?lkm7hc FE"EFE/GHKI needs to be communicated from the encoders to both decoders, as shown in Figure 1. The channel is memoryless and time-invariant in the sense that 2 % 1N O N O- P O P O Q OSRT Q OSR- U K UV U+ (5) W'XYWZ[\!X]\^Z /N O FN OT - /N O, FN O_ P O N N Od and W X W Z [\ X \ Z Yef is the channel probability distribution. We are here following the convention of dropping subscripts of probability distributions if the arguments of the distributions are lower case versions of the corresponding random variables. To simplify notation, we drop the superscript when g Indexes? K,?H and?a are independently generated at the beginning of each block of J channel uses. An encoder : /> maps the common message? K and the private into a codeword P ih?ak/? (6) P ih?ak/? 1E (7) Each decoder J. estimates the common message?lk and the private based on the received J -sequence j? K 1 j?k " ml %n8 (8) j?lks >1 j? ml %n 1E (9) An GHK)G )G J8)o2p code for the channel consists of two encoding functions h, h, two decoding functions l, l and a maximum error probability o2p u vxwy N w X N w Zz o p+qir6s't Co p N o p N 'I (10) G K G{ GB om %n}@ ~ U+KU@Y x %U K UV 'U " sent! )> E (11) A rate triple K 0 ') is achievable if, for any ƒ, there is an G K )G )GB 'J8)o p code such that o p and Ĝ ^ m>+ -ŒŽ The capacity region of the interference channel with common information is the closure of the set of all achievable rate triplets K ). The next theorem is the main result of this paper. It gives conditions under which the capacity region coincides with the capacity region of the channel in which both private messages are required at both receivers. /> E Theorem 1: For an interference channel %S, 1! " with common information satisfying %'&)( + %&)(, + %&( (12) %&(- (13) K C. K C for all product distributions on $5 and $6, the capacity region is given by CS ) ' Mm %&)( /.0 (14) Mm %$6 &)( S $5 '/.0 (15) 0 š{ rœ ž $Ÿ '$6 &)( 1 %$5 '$6 &)(.01I (16) Mm B 0 šb rœ ž $Ÿ '$6 &)( F1 $Ÿ '$6 &)( /I (17) the union is over joint distributions 3 that factor as 2 %3-42 % 3-42 % 3%, 1E (18) III. THE MAC WITH COMMON INFORMATION AND ACHIEVABILITY The interference channel with common information is closely related to a discrete channel model in which private and common messages are transmitted to a single receiver, referred to as the MAC with common information [12]. The capacity region of this channel,, was shown in [12] and [13] to be 9 - CS K ) M 0 $Ÿ &( $6 1.0 M $œ &( $ šb 0 %$5 $6 &)(.0 M K{ { %$ &)( /I (19) the union is over all 2 %32- ', that factor as 3% 3-4, S 3-42 %T,. (In [13] the convex hull operation used in [12] was shown to be unnecessary). In this paper we analyze a channel model with two receivers. When each receiver wishes to decode both private messages and the common message, the considered channel becomes a compound MAC with common information. This channel defines two MAC channels with common information one for each receiver ', u (20) Z SZ and 2 % u X/ X % 1E (21) As described in [7, Section IV], the encoding and decoding strategy proposed by Willems in [13] can be adopted for the
3 compound MAC with common information to guarantee the achievability of rates MACt, CMAC C MAC1 ª MAC2 I (22) )> satisfies the bounds (19) with ( replaced by and the union is over all %3-42 %- 3%, 3-4 ". We remark that under the conditions (12) and (13), the regions (14)-(17) and (22) are the same. Consider next the strong interference channel with common information. The achievability of the rates of Theorem 1 in the case in which both messages are required at the receivers guarantees that these rates are also achieved when a weaker constraint of decoding of a single message is imposed at the receivers. Hence the proof of achievability in Theorem 1 is immediate. We next prove the converse. IV. CONVERSE Consider a code G K /G{ /Ĝ )J8o p for the interference channel with common information. Applying Fano s inequality results in? K /?k n8 + o p ž, G K G T{ o p " q JA± 1N (23)? K )?² n} mo p x, G K Ĝ + T o p ' q JL±" N E (24) ±@ N ³ as ³ (or as o^p ³ ). It follows that?ak/? n? K )?² S nµ "?LK n? K n} T? n /?LK' JA± 1N (25)?² n} )? K mjl±" N E (26) Since conditioning cannot increase entropy, from (26) it follows that?a S n} /? K )?H?A S nµ /? K + JA±F FN E (27) To prove the converse, we will use the data processing inequality for the following Markov chains: Lemma 1: The following form Markov chains for the interference channel with a common message:?k ³ µ ')? K /?A ³ n8 (28)?A ³ 5 )? K /?k F ³ nµ (29)? K )? K ³ š /> E (30) We will need the following data processing inequality: Lemma 2: For a Markov chain? ³.+$² ³ (? &(.0 %$ &)(. 1E (31) Proof: See [14]. Applying Lemma 2 to the Markov Chains (29)- (30) and using (30) yields,? & & K? K /?k & n: " & K K & &?AK/? (32) (33)? µ n8 E (34) We first consider the bound (17) at the decoder. We have JB VK{ B?AK?? vž z? K )?H?A S? K )?H F? K )?H & n: "T?² & n} S? K )?H F vž¹? K /?k n8?a S nµ /? K )?H z?lk & n T & n?ak/? vžº? K /?k n8?a S nµ /? K )?H z? K : & n: F } & n}? K /?k F {JL± 1N JL± FN vž» z? K : & n: F } & n} S? K /?k ' : '? K )?H F {JL± 1N JL±F FN v p z?ak) & n & n?lk {JL± 1N JL± FN (35) ¼ follows from the independence of?lk)? /? ; ½ from (32) and (34); ¾F from (25) and (27); S and À' from (6). If & n?ak) + then it follows from (35) that & n?ak) (36) JB VK{ B?AK) & n & n )?AK' {JL± 1N {JL± FN?AK) ) & n T{JL± 1N {JL± FN µ ' } & n: BJL± /N BJL±" N YO )O&(- O BJA± 1N BJA± FN E (37) To prove that the bound (16) at the decoder is valid, we consider JB 0 šb?k "?² " vž z??ak??ak/??h & n:? K?² & n}? K /?k " vž¹?k n8 /? K?² n} )? K /?k " z & n?ak & n?lk)? vžº? n /?LK'? n )?AK/? z : & n:? K } & nµ? K )?H " {JL± /N {JL±" N vž» z '& n?akt & n?lk)??ak/? {JL± /N {JL± N v p z µ & n8? K T } & n} : '/? K {JL± /N {JL±" N E (38)
4 g J again ¼ follows from the independence of? K )?H /?A ; ½F from (32) and (33); ¾F from (25) and (27); S and À' from (6). Again, if (36) holds, then (38) becomes JB 0!{ µ & n8? K 5 & n: : '/? K {JL± 1N {JL±F FN µ } & n8? K T{JL± 1N {JL±F FN we have used. O $Ÿ O-$œ )O &( OT? K BJL± /N {JL±" N O )O&(- O. O BJA± 1N BJA± FN E?LK (39) FEFE"EJLE (40) The same approach as in (35) and (38) can be used to obtain JL JL JB š{ JB Ÿ Ÿ K $Ÿ O &)( OT $6 )O/.!O BJA± 1N (41) )O-&)(, )O O /. O BJA± FN (42) %$5 O$6 )O &( OT.šO {JL± /N {JL±" N (43) YO )O&( )O ŸJL± /N 5JL± FN E (44) We further can write (36) and its corresponding bound as & n )µ+ '& n Â: n n & Â: (45) & )µE (46) We can now proceed as in [10], [14] to show that the conditions (45) and (46) reduce to the per-letter conditions %$6 &)( S $Ÿ '/.0 %$5 &)( $œ /.0 $6 &)( $5 1.0 (47) $5 &)( $6 1.0 (48) to be satisfied for every distribution of the form (18). It was shown in [14] that (47) and (48) are equivalent to the strong interference conditions (1) and (2) thus proving Theorem 1. In the following, we present a more direct proof. Theorem 2: The condition 5 & n} S : )µ+ 5 & n8 µ Â: (49) is satisfied for all input distributions of the form (18) if and only if the vector version of the strong interference condition (2), given by & n + & n (50) is satisfied for all product distributions on and. Proof. To prove that (50) implies (49), we write the mutual information in (49) as 5 & n} S : )µ uã oä9 %3-5 & n} : ') We next observe that the following is a Markov chain Æ ] E (51) ²n OSR- ) OSRT OSR- ³ %$5 1N O-$6 FN O ³ ( 1N O ( N O (52) and therefore Q P P Q P P E (53) Furthermore, the same reasoning as in [13, Ç_E È,E ] shows that (6), (7) and (40) imply ³  ³, that is 2 %P 'PT S 2 %P 42 %PT S 1E (54) Since (50) holds for any input distribution on independent inputs, it follows that for all we have } & n} µ  i } & n: : ') i (55) and are independent. Inserting this bound into (51) gives the desired result. To show the other directions, we observe that since (49) holds for all input distributions of the form (54), it must also hold for  independent from. By choosing such distribution on ÂA) µ } we obtain (50). É From Theorem 2, it follows that conditions µ & n8 5 Â:+ : & n} 5 Â: when satisfied for all distributions as in (18) are equivalent to µ & n8 5 V µ & nµ 5 " satisfied for all independent inputs. Combining Theorem 2 and the Lemma in [10] we conclude that the conditions (46) and (45) reduce to the strong interference conditions (1) and (2) respectively, thus proving Theorem 1. É The equivalence of the per-letter conditions (3)-(4) and the strong interference conditions (1)-(2) relies on the fact that (3)-(4) must hold for all input distributions of the form (18). At this point, it is not clear if these conditions can be tightened to require a subset of distributions (for example only capacityachieving distributions) to satisfy the conditions (3)-(4). V. GAUSSIAN CHANNEL Consider the Gaussian interference channel in the standard form [9], [15] Y Y F, ) {Ê' (56), /,B, ) {Ê ) (57) the are independent, zero-mean, unit-variance Gaussian random variables. The code definition is the same as that given in Section II with the addition of the power constraints xá mo@1! )> E (58)
5 ¼Ò From the maximum-entropy theorem [16, Thm. Í E Î EfÏ ] it follows that Gaussian inputs are optimal in Theorem 1. We have the following result. Corollary 1: When the strong interference conditions, 1 are satisfied, the capacity region of the Gaussian strong interference channel with common information is given by CS 0 ) + M 0 ÑÐ Ò ¼So^ " (59) M ÑÐ Ó Ò½1o "Ô (60) 0 šb 0 Õ Ö rm ž 1N / Ð Ó Õ ¼So^! Ò Õ Ò½/o2 Ô (61) M K { š{ 0 rœ x Õ Ð Ø Õ oš š Õ o {> Õ " Õ Ù ¼oš ½o "Ú2I (62) the union is over all ¼)½, for ²Û¼ˆ Aܽ6, k¼, Ò½ ˆ½, and ) ). For any choice of values ¼ and ½, the fraction of power allocated to send the common message at transmitters and > is ¼So^ and ½1o2, respectively. Private messages are transmitted with the remaining powers ¼oš Ò and Ò½1o2. [10] M. H. M. Costa and A. A. E. Gamal, The capacity region of the discrete memoryless interference channel with strong interference, IEEE Trans. on Inf. Theory, vol. 33, no. 5, pp , Sept [11] R. Ahlswede, The capacity region of a channel with two senders and two receivers, Annals of Probability, vol. 2, no. 5, pp , [12] D. Slepian and J. K. Wolf, A coding theorem for multiple access channels with correlated sources, Bell Syst. Tech. J., vol. 52, pp , [13] F. M. J. Willems, Informationtheoretical results for the discrete memoryless multiple access channel, Ph.D. dissertation, Katholieke Universiteit Leuven, Belgium, Oct [14] I. Maric, R. D. Yates, and G. Kramer, The strong interference channel with common information, in Allerton Conference on Communications, Control and Computing, Sept [15] G. Kramer, Outer bounds on the capacity of gaussian interference channels, IEEE Trans. on Inf. Theory, vol. 50, no. 53, pp , Mar [16] T. Cover and J. Thomas, Elements of Information Theory. John Wiley Sons, Inc., VI. DISCUSSION Communication systems with encoders that need to send both private and common information naturally arise when encoders can partially cooperate as in [1], [7]. After such cooperation, the common information consists of two indexes each partially describing one of the two original messages. The assumption of the model that the entire common message is decoded simplifies the problem. However, a receiver interested in a message from only one encoder, as is the case in the interference channel, will be interested in only a part of the common message. Understanding such communication problems appears to be much more challenging and is the subject of our future work. REFERENCES [1] F. M. J. Willems, The discrete memoryless multiple channel with partially cooperating encoders, IEEE Trans. on Inf. Theory, vol. 29, no. 3, pp , May [2] N. Jindal, U. Mitra, and A. Goldsmith, Capacity of ad-hoc networks with node cooperation, in IEEE Int. Symp. Inf. Theory, 2004, p [3] A. Høst-Madsen, A new achievable rate for cooperative diversity based on generalized writing on dirty paper, in IEEE Int. Symp. Inf. Theory, June 2003, p [4], On the achievable rate for receiver cooperation in ad-hoc networks, in IEEE Int. Symp. Inf. Theory, June 2004, p [5], On the capacity of cooperative diversity, IEEE Trans. on Inf. Theory, submitted. [6] C. Ng and A. Goldsmith, Transmitter cooperation in ad-hoc wireless networks: Does dirty-paper coding beat relaying? in IEEE Inf. Theory Workshop, Oct [7] I. Maric, R. D. Yates, and G. Kramer, The discrete memoryless compound multiple access channel with conferencing encoders, in IEEE Int. Symp. Inf. Theory, Sept [8] H. Sato, Two user communication channels, IEEE Trans. on Inf. Theory, vol. 23, no. 3, p. 295, May [9] A. B. Carleial, Interference channels, IEEE Trans. on Inf. Theory, vol. 24, no. 1, p. 60, Jan
Block Markov Encoding & Decoding
1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,
More informationThe Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA
The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,
More informationMulti-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless
Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 28-30, 2011 Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Zhiyu Cheng, Natasha
More information5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010
5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationCapacity and Cooperation in Wireless Networks
Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate
More informationCORRELATED data arises naturally in many applications
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 54, NO. 10, OCTOBER 2006 1815 Capacity Region and Optimum Power Control Strategies for Fading Gaussian Multiple Access Channels With Common Data Nan Liu and Sennur
More informationCOOPERATION via relays that forward information in
4342 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 7, JULY 2012 Relaying in the Presence of Interference: Achievable Rates, Interference Forwarding, and Outer Bounds Ivana Marić, Member, IEEE,
More informationInterference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 5, MAY 2011 2941 Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, David N C Tse, Fellow, IEEE Abstract
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationDEGRADED broadcast channels were first studied by
4296 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 9, SEPTEMBER 2008 Optimal Transmission Strategy Explicit Capacity Region for Broadcast Z Channels Bike Xie, Student Member, IEEE, Miguel Griot,
More informationSHANNON S source channel separation theorem states
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4087 New Inner Outer Bounds for the Memoryless Cognitive Interference Channel Some New Capacity Results Stefano Rini, Daniela Tuninetti,
More informationOptimal Power Allocation over Fading Channels with Stringent Delay Constraints
1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu
More informationPower and Bandwidth Allocation in Cooperative Dirty Paper Coding
Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng 1, Nihar Jindal 2 Andrea J. Goldsmith 3, Urbashi Mitra 4 1 Stanford University/MIT, 2 Univeristy of Minnesota 3 Stanford
More informationState Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE
1850 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 State Amplification Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE Abstract We consider the problem
More informationOn Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel
On ecure ignaling for the Gaussian Multiple Access Wire-Tap Channel Ender Tekin tekin@psu.edu emih Şerbetli serbetli@psu.edu Wireless Communications and Networking Laboratory Electrical Engineering Department
More informationSymmetric Decentralized Interference Channels with Noisy Feedback
4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en
More informationState of the Cognitive Interference Channel
State of the Cognitive Interference Channel Stefano Rini, Ph.D. candidate, srini2@uic.edu Daniela Tuninetti, danielat@uic.edu Natasha Devroye, devroye@uic.edu Interference channel Tx 1 DM Cognitive interference
More informationOn the Capacity Region of the Vector Fading Broadcast Channel with no CSIT
On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,
More informationMulticasting over Multiple-Access Networks
ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity
More informationOn the Capacity Regions of Two-Way Diamond. Channels
On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of
More informationWIRELESS or wired link failures are of a nonergodic nature
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY 2011 4187 Robust Communication via Decentralized Processing With Unreliable Backhaul Links Osvaldo Simeone, Member, IEEE, Oren Somekh, Member,
More informationSHANNON showed that feedback does not increase the capacity
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2667 Feedback Capacity of the Gaussian Interference Channel to Within 2 Bits Changho Suh, Student Member, IEEE, and David N. C. Tse, Fellow,
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011 1911 Fading Multiple Access Relay Channels: Achievable Rates Opportunistic Scheduling Lalitha Sankar, Member, IEEE, Yingbin Liang, Member,
More informationDegrees of Freedom of the MIMO X Channel
Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department
More informationCONSIDER a sensor network of nodes taking
5660 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 Wyner-Ziv Coding Over Broadcast Channels: Hybrid Digital/Analog Schemes Yang Gao, Student Member, IEEE, Ertem Tuncel, Member,
More informationEfficient Multihop Broadcast for Wideband Systems
Efficient Multihop Broadcast for Wideband Systems Ivana Maric WINLAB, Rutgers University ivanam@winlab.rutgers.edu Roy Yates WINLAB, Rutgers University ryates@winlab.rutgers.edu Abstract In this paper
More informationDegrees of Freedom in Multiuser MIMO
Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department
More informationDistributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies
Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,
More informationMOST wireless communication systems employ
2582 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 Interference Networks With Point-to-Point Codes Francois Baccelli, Abbas El Gamal, Fellow, IEEE, and David N. C. Tse, Fellow, IEEE
More informationIN RECENT years, wireless multiple-input multiple-output
1936 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 6, NOVEMBER 2004 On Strategies of Multiuser MIMO Transmit Signal Processing Ruly Lai-U Choi, Michel T. Ivrlač, Ross D. Murch, and Wolfgang
More informationOn the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels
On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH
More informationError Performance of Channel Coding in Random-Access Communication
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE 2012 3961 Error Performance of Channel Coding in Random-Access Communication Zheng Wang, Student Member, IEEE, andjieluo, Member, IEEE Abstract
More informationComputing and Communications 2. Information Theory -Channel Capacity
1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication
More informationA Bit of network information theory
Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,
More informationIMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING.
IMPERIAL COLLEGE of SCIENCE, TECHNOLOGY and MEDICINE, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION THEORY. Prof. Athanassios Manikas, version Spring 22 Digital
More informationWireless Network Information Flow
Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch
More informationBounds on Achievable Rates for Cooperative Channel Coding
Bounds on Achievable Rates for Cooperative Channel Coding Ameesh Pandya and Greg Pottie Department of Electrical Engineering University of California, Los Angeles {ameesh, pottie}@ee.ucla.edu Abstract
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationExploiting Interference through Cooperation and Cognition
Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of
More informationIN recent years, there has been great interest in the analysis
2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We
More informationRab Nawaz. Prof. Zhang Wenyi
Rab Nawaz PhD Scholar (BL16006002) School of Information Science and Technology University of Science and Technology of China, Hefei Email: rabnawaz@mail.ustc.edu.cn Submitted to Prof. Zhang Wenyi wenyizha@ustc.edu.cn
More informationFrequency hopping does not increase anti-jamming resilience of wireless channels
Frequency hopping does not increase anti-jamming resilience of wireless channels Moritz Wiese and Panos Papadimitratos Networed Systems Security Group KTH Royal Institute of Technology, Stocholm, Sweden
More informationOn Coding for Cooperative Data Exchange
On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University
More informationBroadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications
1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,
More informationScheduling in omnidirectional relay wireless networks
Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science
More informationDegrees of Freedom in Adaptive Modulation: A Unified View
Degrees of Freedom in Adaptive Modulation: A Unified View Seong Taek Chung and Andrea Goldsmith Stanford University Wireless System Laboratory David Packard Building Stanford, CA, U.S.A. taek,andrea @systems.stanford.edu
More informationarxiv: v1 [cs.it] 26 Oct 2009
K-User Fading Interference Channels: The Ergodic Very Strong Case Lalitha Sanar, Jan Vondra, and H. Vincent Poor Abstract Sufficient conditions required to achieve the interference-free capacity region
More informationDiversity Gain Region for MIMO Fading Multiple Access Channels
Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,
More informationThe Multi-way Relay Channel
The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton
More informationCapacity and Optimal Resource Allocation for Fading Broadcast Channels Part I: Ergodic Capacity
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 1083 Capacity Optimal Resource Allocation for Fading Broadcast Channels Part I: Ergodic Capacity Lang Li, Member, IEEE, Andrea J. Goldsmith,
More informationCoding Techniques and the Two-Access Channel
Coding Techniques and the Two-Access Channel A.J. Han VINCK Institute for Experimental Mathematics, University of Duisburg-Essen, Germany email: Vinck@exp-math.uni-essen.de Abstract. We consider some examples
More informationWIRELESS communication channels vary over time
1326 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 Outage Capacities Optimal Power Allocation for Fading Multiple-Access Channels Lifang Li, Nihar Jindal, Member, IEEE, Andrea Goldsmith,
More informationState-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY 2013 2629 State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class Majid Nasiri Khormuji, Member, IEEE, Abbas
More informationRate Allocation for Serial Concatenated Block Codes
1 Rate Allocation for Serial Concatenated Block Codes Maja Bystrom and Robert A. Coury Abstract While serial concatenated codes were designed to provide good overall performance with reasonable system
More informationThe Reachback Channel in Wireless Sensor Networks
The Reachback Channel in Wireless Sensor Networks Sergio D Servetto School of lectrical and Computer ngineering Cornell University http://peopleececornelledu/servetto/ DIMACS /1/0 Acknowledgements An-swol
More informationOPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 6, December 06 OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL Zouhair Al-qudah Communication Engineering Department, AL-Hussein
More informationDegrees of Freedom of Bursty Multiple Access Channels with a Relay
Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department
More informationSPACE TIME coding for multiple transmit antennas has attracted
486 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 3, MARCH 2004 An Orthogonal Space Time Coded CPM System With Fast Decoding for Two Transmit Antennas Genyuan Wang Xiang-Gen Xia, Senior Member,
More informationCapacity of Two-Way Linear Deterministic Diamond Channel
Capacity of Two-Way Linear Deterministic Diamond Channel Mehdi Ashraphijuo Columbia University Email: mehdi@ee.columbia.edu Vaneet Aggarwal Purdue University Email: vaneet@purdue.edu Xiaodong Wang Columbia
More informationForwarding Strategies for Gaussian Parallel-Relay Networks
1 Forwarding Strategies or Gaussian arallelrelay Networks vana Maric Member, EEE and Roy D. Yates Member, EEE Abstract This paper investigates reliable and unreliable orwarding strategies in a parallelrelay
More informationCooperation in Wireless Networks
Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation
More informationComputing functions over wireless networks
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/
More informationCapacity Gain from Two-Transmitter and Two-Receiver Cooperation
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE, Andrea J. Goldsmith, Fellow, IEEE and Urbashi Mitra, Fellow, IEEE arxiv:0704.3644v1
More informationA unified graphical approach to
A unified graphical approach to 1 random coding for multi-terminal networks Stefano Rini and Andrea Goldsmith Department of Electrical Engineering, Stanford University, USA arxiv:1107.4705v3 [cs.it] 14
More informationAnalog network coding in the high-snr regime
Analog network coding in the high-snr regime The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Médard,
More informationOverlay Systems. Results around Improved Scheme Transmission for Achievable Rates. Outer Bound. Transmission Strategy Pieces
Cooperation at T EE36: Lecture 3 Outline Capacity of Cognitive adios Announcements Progress reports due Feb. 9 at midnight Overview Achievable rates in Cognitive adios Better achievable scheme and upper
More information4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE
4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER 2005 Cooperative Sensor Networks With Misinformed Nodes Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE Abstract The
More informationCODE division multiple access (CDMA) systems suffer. A Blind Adaptive Decorrelating Detector for CDMA Systems
1530 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 8, OCTOBER 1998 A Blind Adaptive Decorrelating Detector for CDMA Systems Sennur Ulukus, Student Member, IEEE, and Roy D. Yates, Member,
More informationBANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS
BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS Aminata A. Garba Dept. of Electrical and Computer Engineering, Carnegie Mellon University aminata@ece.cmu.edu ABSTRACT We consider
More informationTHE Shannon capacity of state-dependent discrete memoryless
1828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 5, MAY 2006 Opportunistic Orthogonal Writing on Dirty Paper Tie Liu, Student Member, IEEE, and Pramod Viswanath, Member, IEEE Abstract A simple
More informationWhen Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network
When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network Nadia Fawaz, David Gesbert Mobile Communications Department, Eurecom Institute Sophia-Antipolis, France {fawaz, gesbert}@eurecom.fr
More informationLinear time and frequency domain Turbo equalization
Linear time and frequency domain Turbo equalization Michael Tüchler, Joachim Hagenauer Lehrstuhl für Nachrichtentechnik TU München 80290 München, Germany micha,hag@lnt.ei.tum.de Abstract For coded data
More informationHamming Codes as Error-Reducing Codes
Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.
More informationOFDM Transmission Corrupted by Impulsive Noise
OFDM Transmission Corrupted by Impulsive Noise Jiirgen Haring, Han Vinck University of Essen Institute for Experimental Mathematics Ellernstr. 29 45326 Essen, Germany,. e-mail: haering@exp-math.uni-essen.de
More informationWireless Network Coding with Local Network Views: Coded Layer Scheduling
Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the
More informationEnergy Efficiency in Relay-Assisted Downlink
Energy Efficiency in Relay-Assisted Downlink 1 Cellular Systems, Part I: Theoretical Framework Stefano Rini, Ernest Kurniawan, Levan Ghaghanidze, and Andrea Goldsmith Technische Universität München, Munich,
More informationOn Fading Broadcast Channels with Partial Channel State Information at the Transmitter
On Fading Broadcast Channels with Partial Channel State Information at the Transmitter Ravi Tandon 1, ohammad Ali addah-ali, Antonia Tulino, H. Vincent Poor 1, and Shlomo Shamai 3 1 Dept. of Electrical
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 3787 Degrees of Freedom Region for an Interference Network With General Message Demands Lei Ke, Aditya Ramamoorthy, Member, IEEE, Zhengdao
More informationSNR Estimation in Nakagami Fading with Diversity for Turbo Decoding
SNR Estimation in Nakagami Fading with Diversity for Turbo Decoding A. Ramesh, A. Chockalingam Ý and L. B. Milstein Þ Wireless and Broadband Communications Synopsys (India) Pvt. Ltd., Bangalore 560095,
More informationRelay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying
013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić
More informationOn Information Theoretic Interference Games With More Than Two Users
On Information Theoretic Interference Games With More Than Two Users Randall A. Berry and Suvarup Saha Dept. of EECS Northwestern University e-ma: rberry@eecs.northwestern.edu suvarups@u.northwestern.edu
More informationFeedback via Message Passing in Interference Channels
Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of
More informationOptimization of Coded MIMO-Transmission with Antenna Selection
Optimization of Coded MIMO-Transmission with Antenna Selection Biljana Badic, Paul Fuxjäger, Hans Weinrichter Institute of Communications and Radio Frequency Engineering Vienna University of Technology
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationCooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study
Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:
More informationReflections on the Capacity Region of the Multi-Antenna Broadcast Channel Hanan Weingarten
IEEE IT SOCIETY NEWSLETTER 1 Reflections on the Capacity Region of the Multi-Antenna Broadcast Channel Hanan Weingarten Yossef Steinberg Shlomo Shamai (Shitz) whanan@tx.technion.ac.ilysteinbe@ee.technion.ac.il
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationSNR Scalability, Multiple Descriptions, and Perceptual Distortion Measures
SNR Scalability, Multiple Descriptions, Perceptual Distortion Measures Jerry D. Gibson Department of Electrical & Computer Engineering University of California, Santa Barbara gibson@mat.ucsb.edu Abstract
More informationIterative and One-shot Conferencing in Relay Channels
Iterative and One-shot onferencin in Relay hannels hris T. K. N, Ivana Maric, Andrea J. Goldsmith, Shlomo Shamai (Shitz) and Roy D. Yates Dept. of Electrical Enineerin, Stanford University, Stanford, A
More informationCausal state amplification
20 IEEE International Symposium on Information Theory Proceedings Causal state amplification Chiranjib Choudhuri, Young-Han Kim and Urbashi Mitra Abstract A problem of state information transmission over
More informationI. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0.
4566 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 9, SEPTEMBER 2010 The Approximate Capacity of the Many-to-One One-to-Many Gaussian Interference Channels Guy Bresler, Abhay Parekh, David N. C.
More informationPerformance Analysis of Maximum Likelihood Detection in a MIMO Antenna System
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 50, NO. 2, FEBRUARY 2002 187 Performance Analysis of Maximum Likelihood Detection in a MIMO Antenna System Xu Zhu Ross D. Murch, Senior Member, IEEE Abstract In
More informationHigh-Rate Non-Binary Product Codes
High-Rate Non-Binary Product Codes Farzad Ghayour, Fambirai Takawira and Hongjun Xu School of Electrical, Electronic and Computer Engineering University of KwaZulu-Natal, P. O. Box 4041, Durban, South
More informationTwo Models for Noisy Feedback in MIMO Channels
Two Models for Noisy Feedback in MIMO Channels Vaneet Aggarwal Princeton University Princeton, NJ 08544 vaggarwa@princeton.edu Gajanana Krishna Stanford University Stanford, CA 94305 gkrishna@stanford.edu
More informationData Flow 4.{1,2}, 3.2
< = = Computer Science Program, The University of Texas, Dallas Data Flow 4.{1,2}, 3.2 Batch Sequential Pipeline Systems Tektronix Case Study: Oscilloscope Formalization of Oscilloscope "systems where
More informationApproximately Optimal Wireless Broadcasting
Approximately Optimal Wireless Broadcasting Sreeram Kannan, Adnan Raja, and Pramod Viswanath Abstract We study a wireless broadcast network, where a single source reliably communicates independent messages
More informationAdaptive Resource Allocation in Wireless Relay Networks
Adaptive Resource Allocation in Wireless Relay Networks Tobias Renk Email: renk@int.uni-karlsruhe.de Dimitar Iankov Email: iankov@int.uni-karlsruhe.de Friedrich K. Jondral Email: fj@int.uni-karlsruhe.de
More informationCoding for Noisy Networks
Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+
More information