Network Information Theory
|
|
- Tabitha Shaw
- 5 years ago
- Views:
Transcription
1 1 / 191 Network Information Theory Young-Han Kim University of California, San Diego Joint work with Abbas El Gamal (Stanford) IEEE VTS San Diego 2009
2 2 / 191 Network Information Flow Consider a general networked information processing system: Source Network Node Sources: data, speech, music, images, video, sensor data Nodes: handsets, base stations, servers, sensor nodes Network: wired, wireless, or hybrid
3 3 / 191 Network Information Flow Each node observes some sources, wishes to obtain descriptions of other sources, or to compute function/make decision based on them
4 4 / 191 Network Information Flow Each node observes some sources, wishes to obtain descriptions of other sources, or to compute function/make decision based on them To achieve goal, the nodes communicate and perform local computing
5 5 / 191 Network Information Flow Each node observes some sources, wishes to obtain descriptions of other sources, or to compute function/make decision based on them To achieve goal, the nodes communicate and perform local computing Information flow questions: What are the necessary and sufficient conditions on information flow? What are the optimal coding schemes/techniques to achieve them?
6 6 / 191 Network Information Flow Each node observes some sources, wishes to obtain descriptions of other sources, or to compute function/make decision based on them To achieve goal, the nodes communicate and perform local computing Information flow questions: What are the necessary and sufficient conditions on information flow? What are the optimal coding schemes/techniques to achieve them? Shannon answered these questions for point-point-communication Ford Fulkerson and Elias Feinstein Shannon answered them for noiseless unicast network
7 7 / 191 Noiseless Unicast Network Consider a noiseless network modeled by directed graph (N, E) with link capacities C jk bits/transmission 2 j C jk k M 1 C 12 C 14 4 N M C 13 3 Source node 1 wishes to send message M to destination node N What is the capacity (highest transmission rate)?
8 Max-Flow Min-Cut Theorem 2 S j S c C jk k C 12 M 1 C 14 4 N M C 13 3 Max-flow min-cut theorem (Ford Fulkerson 1956, Elias Feinstein Shannon 1956) where C(S) is capacity of cut S C = min S N:1 S,N S c C(S) bits/transmission, 8 / 191
9 Max-Flow Min-Cut Theorem 2 S j S c C jk k C 12 M 1 C 14 4 N M C 13 3 Max-flow min-cut theorem (Ford Fulkerson 1956, Elias Feinstein Shannon 1956) where C(S) is capacity of cut S C = min S N:1 S,N S c C(S) bits/transmission, Capacity is achieved error-free using only forwarding 9 / 191
10 10 / 191 Noisy Communication Channel Consider a point-to-point communication channel modeled by a discrete memoryless channel (X, p(y x), Y) M X p(y x) Y M Sender X wishes to send a message M to receiver Y
11 11 / 191 Noisy Communication Channel Consider a point-to-point communication channel modeled by a discrete memoryless channel (X, p(y x), Y) M X p(y x) Y M Sender X wishes to send a message M to receiver Y Cannot in general achieve error-free transmission Need sophisticated coding to achieve nonzero rate with arbitrarily small probability of error
12 12 / 191 Channel Capacity Setup (Shannon 1948): M X n Y n Encoder p(y x) Decoder M (2 nr,n) block code consists of: Encoder: Assigns codeword x n (m) to each message m [1 : 2 nr ] Decoder: Assigns estimate m [1 : 2 nr ] to each received sequences y n
13 13 / 191 Channel Capacity Setup (Shannon 1948): M X n Y n Encoder p(y x) Decoder M (2 nr,n) block code consists of: Encoder: Assigns codeword x n (m) to each message m [1 : 2 nr ] Decoder: Assigns estimate m [1 : 2 nr ] to each received sequences y n Assume M picked at random from [1 : 2 nr ]
14 14 / 191 Channel Capacity Setup (Shannon 1948): M X n Y n Encoder p(y x) Decoder M (2 nr,n) block code consists of: Encoder: Assigns codeword x n (m) to each message m [1 : 2 nr ] Decoder: Assigns estimate m [1 : 2 nr ] to each received sequences y n Assume M picked at random from [1 : 2 nr ] Average probability of error: P (n) e = P{ M M}
15 15 / 191 Channel Capacity Setup (Shannon 1948): M X n Y n Encoder p(y x) Decoder M (2 nr,n) block code consists of: Encoder: Assigns codeword x n (m) to each message m [1 : 2 nr ] Decoder: Assigns estimate m [1 : 2 nr ] to each received sequences y n Assume M picked at random from [1 : 2 nr ] Average probability of error: P (n) e = P{ M M} Rate R achievable if there exists sequence of codes with P (n) e 0
16 16 / 191 Channel Capacity Setup (Shannon 1948): M X n Y n Encoder p(y x) Decoder M (2 nr,n) block code consists of: Encoder: Assigns codeword x n (m) to each message m [1 : 2 nr ] Decoder: Assigns estimate m [1 : 2 nr ] to each received sequences y n Assume M picked at random from [1 : 2 nr ] Average probability of error: P (n) e = P{ M M} Rate R achievable if there exists sequence of codes with P (n) e 0 What is the capacity (highest transmission rate)?
17 17 / 191 Channel Capacity Setup (Shannon 1948): M X n Y n Encoder p(y x) Decoder M Channel coding theorem (Shannon 1948) where C = max p(x) I(X;Y) bits/transmission, I(X;Y) = E X,Y log p(x,y) p(x)p(y) is the mutual information between X and Y
18 18 / 191 Shannon s Point-to-Point Information Theory Channel coding theorem Capacity C = maxi(x;y): maximum rate of reliable data transmission
19 19 / 191 Shannon s Point-to-Point Information Theory Channel coding theorem Capacity C = maxi(x;y): maximum rate of reliable data transmission Lossless source coding theorem Entropy H(X): minimum rate of lossless compression
20 20 / 191 Shannon s Point-to-Point Information Theory Channel coding theorem Capacity C = maxi(x;y): maximum rate of reliable data transmission Lossless source coding theorem Entropy H(X): minimum rate of lossless compression Lossy source coding theorem Rate-distortion function R(D) = min I(X; p( x x): E(d(X, X)) D X): minimum rate of lossy compression at distortion D
21 21 / 191 Shannon s Point-to-Point Information Theory Channel coding theorem Capacity C = maxi(x;y): maximum rate of reliable data transmission Lossless source coding theorem Entropy H(X): minimum rate of lossless compression Lossy source coding theorem Rate-distortion function R(D) = min p( x x): E(d(X, X)) D I(X; X): minimum rate of lossy compression at distortion D Separation theorem It suffices to perform source coding and channel coding separately (a standard digital interface between the source and the channel)
22 22 / 191 From Wired to Wireless Networks These results have been at foundation of wired, static information age
23 23 / 191 From Wired to Wireless Networks These results have been at foundation of wired, static information age Model of network as point-to-point links, dumb nodes fails to capture important aspects of emerging wireless, dynamic information age
24 24 / 191 From Wired to Wireless Networks These results have been at foundation of wired, static information age Model of network as point-to-point links, dumb nodes fails to capture important aspects of emerging wireless, dynamic information age The wireless channel is inherently a shared, broadcast medium, naturally allowing for multicasting, but creating complex tradeoffs between competition and cooperation
25 25 / 191 From Wired to Wireless Networks These results have been at foundation of wired, static information age Model of network as point-to-point links, dumb nodes fails to capture important aspects of emerging wireless, dynamic information age The wireless channel is inherently a shared, broadcast medium, naturally allowing for multicasting, but creating complex tradeoffs between competition and cooperation Emerging applications demand very high data rates, are highly interactive, and distributed
26 26 / 191 Network Information Theory Network information theory extends Shannon s point-to-point communication results and max-flow min-cut theorem to noisy network models with: Multiple sources and destinations Broadcasting Interference Relaying
27 27 / 191 Network Information Theory Network information theory extends Shannon s point-to-point communication results and max-flow min-cut theorem to noisy network models with: Multiple sources and destinations Broadcasting Interference Relaying Goal of the theory Establish limits and tradeoffs on network information flow Find optimal coding techniques, protocols, and network architecture
28 28 / 191 Network Information Theory Network information theory extends Shannon s point-to-point communication results and max-flow min-cut theorem to noisy network models with: Multiple sources and destinations Broadcasting Interference Relaying Goal of the theory Establish limits and tradeoffs on network information flow Find optimal coding techniques, protocols, and network architecture Although a general theory is yet to be developed, several beautiful and potentially useful results have been established
29 29 / 191 Outline: State of the Theory 1 Single-hop Networks 2 Multi-hop Networks 3 Extensions and Applications
30 30 / 191 Single-hop Networks Single-round one-way communication (each node is either a transmitter or a receiver but not both) Independent messages over noiseless channels
31 31 / 191 Single-hop Networks Single-round one-way communication (each node is either a transmitter or a receiver but not both) Independent messages over noiseless channels Independent messages over noisy channels (capacity region)
32 32 / 191 Single-hop Networks Single-round one-way communication (each node is either a transmitter or a receiver but not both) Independent messages over noiseless channels Independent messages over noisy channels (capacity region)
33 33 / 191 Multiple Access Channel M 1 M 2 X 1 X 2 p(y x 1,x 2 ) Y ( M 1, M 2 )
34 34 / 191 Multiple Access Channel M 1 M 2 X 1 X 2 p(y x 1,x 2 ) Y ( M 1, M 2 ) Capacity region (Ahlswede 1971, Liao 1972) Union of pentagons R 1 I(X 1 ;Y X 2,Q), R 2 I(X 2 ;Y X 1,Q), R 1 +R 2 I(X 1,X 2 ;Y Q) R 2 over all p(q)p(x 1 q)p(x 2 q) R 1
35 35 / 191 Multiple Access Channel M 1 M 2 X 1 X 2 p(y x 1,x 2 ) Y ( M 1, M 2 ) Capacity region (Ahlswede 1971, Liao 1972) Union of pentagons R 1 I(X 1 ;Y X 2,Q), R 2 I(X 2 ;Y X 1,Q), R 1 +R 2 I(X 1,X 2 ;Y Q) R 2 over all p(q)p(x 1 q)p(x 2 q) R 1 Can be generalized to any number of transmitters
36 36 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y
37 37 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y Capacity region (Cover, Wyner 1975) R 1 C(S 1 ), R 2 C(S 2 ), R 1 +R 2 C(S 1 +S 2 ), R 2 C(S 2 ) C S 2 S 1 +1 C(S): AWGN capacity with SNR S C S 1 S 2 +1 C(S 1 ) R 1
38 38 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y Capacity region (Cover, Wyner 1975) R 1 C(S 1 ), R 2 C(S 2 ), R 1 +R 2 C(S 1 +S 2 ), R 2 C(S 2 ) C S 2 S 1 +1 Treating other signal as noise C(S): AWGN capacity with SNR S C S 1 S 2 +1 C(S 1 ) R 1
39 39 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y Capacity region (Cover, Wyner 1975) R 1 C(S 1 ), R 2 C(S 2 ), R 1 +R 2 C(S 1 +S 2 ), R 2 C(S 2 ) C S 2 S 1 +1 TDMA C(S): AWGN capacity with SNR S C S 1 S 2 +1 C(S 1 ) R 1
40 40 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y Capacity region (Cover, Wyner 1975) R 1 C(S 1 ), R 2 C(S 2 ), R 1 +R 2 C(S 1 +S 2 ), R 2 C(S 2 ) C S 2 S 1 +1 TDMA with power control C(S): AWGN capacity with SNR S C S 1 S 2 +1 C(S 1 ) R 1
41 41 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y Capacity region (Cover, Wyner 1975) R 1 C(S 1 ), R 2 C(S 2 ), R 1 +R 2 C(S 1 +S 2 ), R 2 C(S 2 ) C S 2 S 1 +1 Successive cancellation C(S): AWGN capacity with SNR S Successive cancellation Decode X 2 from Y = g 2 X 2 +g 1 X 1 +Z Decode X 1 from Y = g 1 X 1 +Z C S 1 S 2 +1 C(S 1 ) R 1
42 42 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y Capacity region (Cover, Wyner 1975) R 1 C(S 1 ), R 2 C(S 2 ), R 1 +R 2 C(S 1 +S 2 ), R 2 C(S 2 ) C S 2 S 1 +1 Successive cancellation C(S): AWGN capacity with SNR S Successive cancellation Decode X 2 from Y = g 2 X 2 +g 1 X 1 +Z Decode X 1 from Y = g 1 X 1 +Z C S 1 S 2 +1 C(S 1 ) R 1
43 43 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y Capacity region (Cover, Wyner 1975) R 1 C(S 1 ), R 2 C(S 2 ), R 1 +R 2 C(S 1 +S 2 ), R 2 C(S 2 ) C S 2 S 1 +1 Time sharing C(S): AWGN capacity with SNR S Successive cancellation Decode X 2 from Y = g 2 X 2 +g 1 X 1 +Z Decode X 1 from Y = g 1 X 1 +Z C S 1 S 2 +1 C(S 1 ) R 1
44 44 / 191 Successive Cancellation AWGN-MAC: Y = g 1 X 1 +g 2 X 2 +Z Z: WGN(1) X j : power constraint P g j : channel gain (SNR S j = g 2 j P) X 1 X 2 g 1 g 2 Z Y Capacity region (Cover, Wyner 1975) R 1 C(S 1 ), R 2 C(S 2 ), R 1 +R 2 C(S 1 +S 2 ), R 2 C(S 2 ) C S 2 S 1 +1 Time sharing C(S): AWGN capacity with SNR S C S 1 S 2 +1 C(S 1 ) Successive cancellation Decode X 2 from Y = g 2 X 2 +g 1 X 1 +Z Decode X 1 from Y = g 1 X 1 +Z 3GPP HSPA, EV-DO rev A (Hou Smee Pfister Tomasin 2006) R 1
45 45 / 191 Degraded Broadcast Channel (M 1,M 2 ) X p(y 1,y 2 x) Y 1 Y 2 M 1 M 2 Suppose the channel is degraded (Y 1 has a better channel than Y 2 ) Capacity region (Cover 1972, Bergmans 1973, Gallager 1974) Union of rectangles R 1 I(X;Y 1 U), R 2 I(U;Y 2 ) R 2 over all p(u,x) R 1 Can be generalized to any number of (degraded) receivers The problem is open for a general nondegraded broadcast channel
46 46 / 191 Superposition Coding low rate X(m 1,m 2 ) X(m 1,m 2 ) high rate
47 47 / 191 Superposition Coding cloud center U(m 2 ) X(m 1,m 2 ) cloud
48 48 / 191 Superposition Coding cloud center U(m 2 ) X(m 1,m 2 ) cloud Z 1 N(0,N 1 ) AWGN-BC: Y 1 = X +Z 1, Y 2 = X +Z 2 Degraded: N 1 N 2 X Y 1 Y 2 Z 2 N(0,N 2 )
49 49 / 191 Superposition Coding cloud center U(m 2 ) X(m 1,m 2 ) cloud Z 1 N(0,N 1 ) AWGN-BC: Y 1 = X +Z 1, Y 2 = X +Z 2 Degraded: N 1 N 2 Transmit X(m 1,m 2 ) = V(m 1 )+U(m 2 ) X Y 1 Y 2 Z 2 N(0,N 2 )
50 50 / 191 Superposition Coding cloud center U(m 2 ) X(m 1,m 2 ) cloud Z 1 N(0,N 1 ) AWGN-BC: Y 1 = X +Z 1, Y 2 = X +Z 2 Degraded: N 1 N 2 Transmit X(m 1,m 2 ) = V(m 1 )+U(m 2 ) The worse receiver decodes U(m 2 ) from Y 2 = U +V +Z 2 X Y 1 Y 2 Z 2 N(0,N 2 )
51 51 / 191 Superposition Coding cloud center U(m 2 ) X(m 1,m 2 ) cloud Z 1 N(0,N 1 ) AWGN-BC: Y 1 = X +Z 1, Y 2 = X +Z 2 Degraded: N 1 N 2 Transmit X(m 1,m 2 ) = V(m 1 )+U(m 2 ) The worse receiver decodes U(m 2 ) from Y 2 = U +V +Z 2 The better receiver uses successive cancellation: First decode U(m 2 ) from Y 1 = U +V +Z 1 Then decode V(m 1 ) from Y 1 = V +Z 1 X Y 1 Y 2 Z 2 N(0,N 2 )
52 52 / 191 Superposition Coding cloud center U(m 2 ) X(m 1,m 2 ) cloud Z 1 N(0,N 1 ) AWGN-BC: Y 1 = X +Z 1, Y 2 = X +Z 2 Degraded: N 1 N 2 Transmit X(m 1,m 2 ) = V(m 1 )+U(m 2 ) The worse receiver decodes U(m 2 ) from Y 2 = U +V +Z 2 The better receiver uses successive cancellation: First decode U(m 2 ) from Y 1 = U +V +Z 1 Then decode V(m 1 ) from Y 1 = V +Z 1 Hierarchical modulation: DVB-T, 3GPP2 UMB X Y 1 Y 2 Z 2 N(0,N 2 )
53 53 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 Capacity region is not known in general
54 54 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 Capacity region is not known in general Basic coding techniques Interference as noise (ignore it) R 2 C(S 2 ) C S 2 I 1 +1? C S 1 I 2 +1 C(S 1) R 1
55 55 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 Capacity region is not known in general Basic coding techniques Interference as noise (ignore it) TDMA (avoid it) R 2 C(S 2 ) C S 2 I 1 +1? C S 1 I 2 +1 C(S 1) R 1
56 56 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 R 2 Capacity region is not known in general Basic coding techniques Interference as noise (ignore it) TDMA (avoid it) Interference as signal (decode it) C(S 2 ) C S 2 I 1 +1? C S 1 I 2 +1 C(S 1) R 1
57 57 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 R 2 Capacity region is not known in general Basic coding techniques Interference as noise (ignore it) TDMA (avoid it) Interference as signal (decode it) C(S 2 ) C S 2 I 1 +1 C S 1 I 2 +1 C(S 1) R 1
58 58 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 R 2 Capacity region is not known in general Basic coding techniques Interference as noise (ignore it) TDMA (avoid it) Interference as signal (decode it) Han Kobayashi rate splitting (1981) (M 10,M 11 ) (M 20,M 22 ) X 1 X 2 p(y 1,y 2 x 1,x 2 ) C(S 2 ) C S 2 I 1 +1 Y 1 Y 2 C S 1 I 2 +1 C(S 1) R 1
59 59 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 R 2 Capacity region is not known in general Basic coding techniques Interference as noise (ignore it) TDMA (avoid it) Interference as signal (decode it) Han Kobayashi rate splitting (1981) (M 10,M 11 ) (M 20,M 22 ) X 1 X 2 p(y 1,y 2 x 1,x 2 ) C(S 2 ) C S 2 I 1 +1 R 1 C S 1 C(S 1) I 2 +1 Y 1 ( M 10, M 11, M 20 ) Y 2 ( M 20, M 22, M 10 )
60 60 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 R 2 Capacity region is not known in general Basic coding techniques Interference as noise (ignore it) TDMA (avoid it) Interference as signal (decode it) Han Kobayashi rate splitting (1981) (M 10,M 11 ) (M 20,M 22 ) X 1 X 2 p(y 1,y 2 x 1,x 2 ) C(S 2 ) C S 2 I 1 +1 R 1 C S 1 C(S 1) I 2 +1 Y 1 ( M 10, M 11, M 20 ) Y 2 ( M 20, M 22, M 10 ) Best known coding scheme (includes all the above) Optimal within 1/2 bit from the capacity region (Etkin Tse Wang 2008)
61 61 / 191 Interference Channel M 1 M 2 X 1 X 2 p(y 1,y 2 x 1,x 2 ) Y 1 Y 2 M 1 M 2 R 2 Capacity region is not known in general Basic coding techniques Interference as noise (ignore it) TDMA (avoid it) Interference as signal (decode it) Han Kobayashi rate splitting (1981) (M 10,M 11 ) (M 20,M 22 ) X 1 X 2 p(y 1,y 2 x 1,x 2 ) C(S 2 ) C S 2 I 1 +1 R 1 C S 1 C(S 1) I 2 +1 Y 1 ( M 10, M 11, M 20 ) Y 2 ( M 20, M 22, M 10 ) Best known coding scheme (includes all the above) Optimal within 1/2 bit from the capacity region (Etkin Tse Wang 2008) Interference alignment (Cadambe Jafar 2008)
62 62 / 191 Channels with State p(s) M X p(y x, s) Y M
63 63 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel)
64 64 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel) Jamming (arbitrarily varying channel)
65 65 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel) Jamming (arbitrarily varying channel) Channel fading
66 66 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel) Jamming (arbitrarily varying channel) Channel fading Write-Once-Memory (WOM)
67 67 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel) Jamming (arbitrarily varying channel) Channel fading Write-Once-Memory (WOM) Memory with defects
68 68 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel) Jamming (arbitrarily varying channel) Channel fading Write-Once-Memory (WOM) Memory with defects Host image in digital watermarking
69 69 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel) Jamming (arbitrarily varying channel) Channel fading Write-Once-Memory (WOM) Memory with defects Host image in digital watermarking Feedback from the receiver
70 70 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel) Jamming (arbitrarily varying channel) Channel fading Write-Once-Memory (WOM) Memory with defects Host image in digital watermarking Feedback from the receiver Finite state channels (p(y i,s i x i,s i 1 ))
71 71 / 191 Channels with State p(s) M X p(y x, s) Y M Channel state models: Uncertainty about channel (compound channel) Jamming (arbitrarily varying channel) Channel fading Write-Once-Memory (WOM) Memory with defects Host image in digital watermarking Feedback from the receiver Finite state channels (p(y i,s i x i,s i 1 )) Known interference
72 72 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y
73 73 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state:
74 74 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state: C = C(P/(1 +Q))
75 75 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state: C = C(P/(1 +Q)) If the decoder knows the state:
76 76 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state: C = C(P/(1 +Q)) If the decoder knows the state: C SI D = C(P)
77 77 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state: C = C(P/(1 +Q)) If the decoder knows the state: C SI D = C(P) Writing on dirty paper (Costa 1983) If the encoder knows the state:
78 78 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state: C = C(P/(1 +Q)) If the decoder knows the state: C SI D = C(P) Writing on dirty paper (Costa 1983) If the encoder knows the state: C SI E = C(P)
79 79 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state: C = C(P/(1 +Q)) If the decoder knows the state: C SI D = C(P) Writing on dirty paper (Costa 1983) If the encoder knows the state: C SI E = C(P) Key idea: precoding (cf. Tomlinson Harashima precoding, lattice coding)
80 80 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state: C = C(P/(1 +Q)) If the decoder knows the state: C SI D = C(P) Writing on dirty paper (Costa 1983) If the encoder knows the state: C SI E = C(P) Key idea: precoding (cf. Tomlinson Harashima precoding, lattice coding) Digital watermarking (Moulin O Sullivan 2003)
81 81 / 191 Writing on Dirty Paper S N(0,Q) Z N(0,1) X Y If nobody knows the state: C = C(P/(1 +Q)) If the decoder knows the state: C SI D = C(P) Writing on dirty paper (Costa 1983) If the encoder knows the state: C SI E = C(P) Key idea: precoding (cf. Tomlinson Harashima precoding, lattice coding) Digital watermarking (Moulin O Sullivan 2003) MIMO broadcast channels
82 Dirty Paper Coding for MIMO Broadcast Channel Z 1 M 1 X 1 (M 1 ) G 1 Y 1 M 1 X M 2 X 2 (X 1,M 2 ) G 2 Y 2 M 2 Z 2 Encoding: X = X 1 +X 2 Regular encoding: X 1 (M 1 ) Dirty paper encoding: X 2 (X 1,M 2 ) 82 / 191
83 Dirty Paper Coding for MIMO Broadcast Channel Z 1 M 1 X 1 (M 1 ) G 1 Y 1 M 1 X M 2 X 2 (X 1,M 2 ) G 2 Y 2 M 2 Z 2 Encoding: X = X 1 +X 2 Regular encoding: X 1 (M 1 ) Dirty paper encoding: X 2 (X 1,M 2 ) Decoding at receiver 1: Y 1 = X 1 +X 2 +Z 1 83 / 191
84 84 / 191 Dirty Paper Coding for MIMO Broadcast Channel Z 1 M 1 X 1 (M 1 ) G 1 Y 1 M 1 X M 2 X 2 (X 1,M 2 ) G 2 Y 2 M 2 Z 2 Encoding: X = X 1 +X 2 Regular encoding: X 1 (M 1 ) Dirty paper encoding: X 2 (X 1,M 2 ) Decoding at receiver 1: Y 1 = X 1 +X 2 +Z 1 Decoding at receiver 2: Y 2 = X 2 +X 1 +Z 2
85 85 / 191 Dirty Paper Coding for MIMO Broadcast Channel Z 1 M 1 X 1 (M 1 ) G 1 Y 1 M 1 X M 2 X 2 (X 1,M 2 ) G 2 Y 2 M 2 Z 2 Encoding: X = X 1 +X 2 Regular encoding: X 1 (M 1 ) Dirty paper encoding: X 2 (X 1,M 2 ) Decoding at receiver 1: Y 1 = X 1 +X 2 +Z 1 Decoding at receiver 2: Y 2 = X 2 +X 1 +Z 2 State information (interference) X 1 at the transmitter Effective channel: Y 2 = X 2 +Z 2
86 86 / 191 Dirty Paper Coding for MIMO Broadcast Channel Z 1 M 1 X 1 (M 1 ) G 1 Y 1 M 1 X M 2 X 2 (X 1,M 2 ) G 2 Y 2 M 2 Z 2 Encoding: X = X 1 +X 2 Regular encoding: X 1 (M 1 ) Dirty paper encoding: X 2 (X 1,M 2 ) Decoding at receiver 1: Y 1 = X 1 +X 2 +Z 1 Decoding at receiver 2: Y 2 = X 2 +X 1 +Z 2 State information (interference) X 1 at the transmitter Effective channel: Y 2 = X 2 +Z 2 Optimal (Weingarten Steinberg Shamai 2006, Mohseni Cioffi 2006)
87 87 / 191 Dirty Paper Coding for MIMO Broadcast Channel Z 1 M 1 X 1 (M 1 ) G 1 Y 1 M 1 X M 2 X 2 (X 1,M 2 ) G 2 Y 2 M 2 Z 2 Encoding: X = X 1 +X 2 Regular encoding: X 1 (M 1 ) Dirty paper encoding: X 2 (X 1,M 2 ) Decoding at receiver 1: Y 1 = X 1 +X 2 +Z 1 Decoding at receiver 2: Y 2 = X 2 +X 1 +Z 2 State information (interference) X 1 at the transmitter Effective channel: Y 2 = X 2 +Z 2 Optimal (Weingarten Steinberg Shamai 2006, Mohseni Cioffi 2006) Special case of Marton s coding scheme (1979) for the general BC
88 88 / 191 Single-hop Networks Single-round one-way communication (each node is either a transmitter or a receiver but not both) Independent messages over noiseless channels Independent messages over noisy channels (capacity region) Correlated sources over noiseless channels (rate distortion region)
89 89 / 191 Single-hop Networks Single-round one-way communication (each node is either a transmitter or a receiver but not both) Independent messages over noiseless channels Independent messages over noisy channels (capacity region) Correlated sources over noiseless channels (rate distortion region)
90 90 / 191 Distributed Lossless Source Coding X 1 X 2 Encoder Encoder M 1 Decoder ( X 1, X 2 ) M 2 Sources are separately encoded and transmitted to a common decoder
91 91 / 191 Distributed Lossless Source Coding X 1 X 2 Encoder Encoder M 1 Decoder ( X 1, X 2 ) M 2 Sources are separately encoded and transmitted to a common decoder With cooperation, the sum rate R 1 +R 2 = H(X 1,X 2 ) is optimal
92 92 / 191 Distributed Lossless Source Coding X 1 X 2 Encoder Encoder M 1 Decoder ( X 1, X 2 ) M 2 Sources are separately encoded and transmitted to a common decoder With cooperation, the sum rate R 1 +R 2 = H(X 1,X 2 ) is optimal Can we achieve the same rate with distributed encoders?
93 93 / 191 Distributed Lossless Source Coding X 1 X 2 Encoder Encoder M 1 Decoder ( X 1, X 2 ) M 2 Sources are separately encoded and transmitted to a common decoder Slepian Wolf theorem (1973) The optimal rate region R 1 H(X 1 X 2 ), R 2 H(X 2 X 1 ), R 1 +R 2 H(X 1,X 2 ) R 2 H(X 2 ) H(X 2 X 1 ) H(X 1 X 2 ) H(X 1 ) R 1 Hashing-based compression: rsync
94 Distributed Lossless Source Coding X 1 X 2 Encoder Encoder M 1 Decoder ( X 1, X 2 ) M 2 Sources are separately encoded and transmitted to a common decoder Slepian Wolf theorem (1973) The optimal rate region R 1 H(X 1 X 2 ), R 2 H(X 2 X 1 ), R 1 +R 2 H(X 1,X 2 ) R 2 H(X 2 ) H(X 2 X 1 ) H(X 1 X 2 ) H(X 1 ) R 1 Hashing-based compression: rsync Distributed lossy source coding (Berger Tung 1978) 94 / 191
95 95 / 191 Multiple Description Coding Encoder M 1 Decoder ( X 1,D 1 ) X Decoder ( X 0,D 0 ) Encoder M 2 Decoder ( X 2,D 2 ) Streaming with packet loss or QoS
96 96 / 191 Multiple Description Coding Encoder M 1 Decoder ( X 1,D 1 ) X Decoder ( X 0,D 0 ) Encoder M 2 Decoder ( X 2,D 2 ) Streaming with packet loss or QoS
97 97 / 191 Multiple Description Coding Encoder M 1 Decoder ( X 1,D 1 ) X Decoder ( X 0,D 0 ) Encoder M 2 Decoder ( X 2,D 2 ) Streaming with packet loss or QoS Rate distortion region is not known in general
98 98 / 191 Multiple Description Coding Encoder M 1 Decoder ( X 1,D 1 ) X Decoder ( X 0,D 0 ) Encoder M 2 Streaming with packet loss or QoS Rate distortion region is not known in general Successive refinement Multi-layer video coding Interlaced GIF
99 99 / 191 Multiple Description Coding Encoder M 1 Decoder ( X 1,D 1 ) X Decoder ( X 0,D 0 ) Encoder M 2 Streaming with packet loss or QoS Rate distortion region is not known in general Successive refinement Multi-layer video coding Interlaced GIF
100 100 / 191 Multiple Description Coding Encoder M 1 Decoder ( X 1,D 1 ) X Decoder ( X 0,D 0 ) Encoder M 2 Streaming with packet loss or QoS Rate distortion region is not known in general Successive refinement Multi-layer video coding Interlaced GIF
101 101 / 191 Multiple Description Coding Encoder M 1 Decoder ( X 1,D 1 ) X Decoder ( X 0,D 0 ) Encoder M 2 Streaming with packet loss or QoS Rate distortion region is not known in general Successive refinement Multi-layer video coding Interlaced GIF
102 102 / 191 Multiple Description Coding Encoder M 1 Decoder ( X 1,D 1 ) X Decoder ( X 0,D 0 ) Encoder M 2 Streaming with packet loss or QoS Rate distortion region is not known in general Successive refinement Multi-layer video coding Interlaced GIF
103 103 / 191 Single-hop Networks Single-round one-way communication (each node is either a transmitter or a receiver but not both) Independent messages over noiseless channels Independent messages over noisy channels (capacity region) Correlated sources over noiseless channels (rate distortion region) Correlated sources over noisy channels
104 104 / 191 Joint Source Channel Coding Measurement collection over sensor networks U 1 U 2 X 1 X 2 p(y x 1,x 2 ) Y (Û 1,Û 2 )
105 105 / 191 Joint Source Channel Coding Measurement collection over sensor networks U 1 U 2 X 1 X 2 p(y x 1,x 2 ) Y (Û 1,Û 2 ) Broadcasting multi-layer video (U 1,U 2 ) X p(y 1,y 2 x) Y 1 Y 2 Û 1 Û 2
106 106 / 191 Joint Source Channel Coding Measurement collection over sensor networks U 1 U 2 X 1 X 2 p(y x 1,x 2 ) Y (Û 1,Û 2 ) Broadcasting multi-layer video (U 1,U 2 ) X p(y 1,y 2 x) Y 1 Y 2 Û 1 Û 2 Sufficient and necessary conditions for reliable transmission
107 107 / 191 Joint Source Channel Coding Measurement collection over sensor networks U 1 U 2 X 1 X 2 p(y x 1,x 2 ) Y (Û 1,Û 2 ) Broadcasting multi-layer video (U 1,U 2 ) X p(y 1,y 2 x) Y 1 Y 2 Û 1 Û 2 Sufficient and necessary conditions for reliable transmission Problem open in general
108 108 / 191 Joint Source Channel Coding Measurement collection over sensor networks U 1 U 2 X 1 X 2 p(y x 1,x 2 ) Y (Û 1,Û 2 ) Broadcasting multi-layer video (U 1,U 2 ) X p(y 1,y 2 x) Y 1 Y 2 Û 1 Û 2 Sufficient and necessary conditions for reliable transmission Problem open in general Source channel separation is suboptimal: joint source channel coding
109 109 / 191 Joint Source Channel Coding Measurement collection over sensor networks U 1 U 2 X 1 X 2 p(y x 1,x 2 ) Y (Û 1,Û 2 ) Broadcasting multi-layer video (U 1,U 2 ) X p(y 1,y 2 x) Y 1 Y 2 Û 1 Û 2 Sufficient and necessary conditions for reliable transmission Problem open in general Source channel separation is suboptimal: joint source channel coding Common randomness between distributed sources
110 110 / 191 Multi-hop Networks Multi-round two-way communication (relaying and interaction) (each node can be both a transmitter and a receiver)
111 111 / 191 Multi-hop Networks Multi-round two-way communication (relaying and interaction) (each node can be both a transmitter and a receiver) Independent messages over noiseless networks
112 112 / 191 Noiseless Single-Source Network Consider noiseless network modeled by graph (N, E) 2 j M j M 1 C 12 C 14 4 N M N C 13 3 M k Node 1 wishes to multicast M to set of destination nodes D k
113 113 / 191 Noiseless Single-Source Network Consider noiseless network modeled by graph (N, E) 2 j M j M 1 C 12 C 14 4 N M N C 13 3 M k Node 1 wishes to multicast M to set of destination nodes D Cutset upper bound C min j D min S N,1 S,j S c C(S) k
114 114 / 191 Noiseless Single-Source Network Consider noiseless network modeled by graph (N, E) 2 j M j M 1 C 12 C 14 4 N M N C 13 3 M k Node 1 wishes to multicast M to set of destination nodes D Cutset upper bound C min j D min S N,1 S,j S c C(S) Achieved via forwarding if D = {N} or D = [2 : N] k
115 115 / 191 Noiseless Single-Source Network Consider noiseless network modeled by graph (N, E) 2 j M j M 1 C 12 C 14 4 N M N C 13 3 M k Node 1 wishes to multicast M to set of destination nodes D Cutset upper bound C min j D min S N,1 S,j S c C(S) Achieved via forwarding if D = {N} or D = [2 : N] In general cutset bound is not achievable by forwarding k
116 116 / 191 Butterfly network Assume C jk = 1 for all links 2 6 M 6 M 1 M 1 M 1 (M 1,M 2 ) 4 5 (M 1,M 2 ) M 2 M 2 (M 1,M 2 ) 3 7 M 7
117 117 / 191 Butterfly network Assume C jk = 1 for all links 2 6 M 6 M 1 M 1 M 1 (M 1,M 2 ) 4 5 (M 1,M 2 ) M 2 M 2 (M 1,M 2 ) 3 7 M 7 Cutset bound C 2
118 118 / 191 Butterfly network Assume C jk = 1 for all links 2 6 M 6 M 1 M 1 M 1 (M 1,M 2 ) 4 5 (M 1,M 2 ) M 2 M 2 (M 1,M 2 ) 3 7 M 7 Cutset bound C 2 Forwarding rate R 1
119 119 / 191 Butterfly network Can achieve cutset bound, i.e., C = 2 2 M 1 6 M 6 M 1 M 1 M 1 M 1 M M 1 M 2 M 2 M 2 M 1 M 2 M M 7
120 120 / 191 Butterfly network Can achieve cutset bound, i.e., C = 2 2 M 1 6 M 6 M 1 M 1 M 1 M 1 M M 1 M 2 M 2 M 2 M 1 M 2 M M 7 Network coding theorem (Ahlswede Cai Li Yeung 2000) Cutset bound is always achievable for noiseless multicast network
121 121 / 191 Butterfly network Can achieve cutset bound, i.e., C = 2 2 M 1 6 M 6 M 1 M 1 M 1 M 1 M M 1 M 2 M 2 M 2 M 1 M 2 M M 7 Network coding theorem (Ahlswede Cai Li Yeung 2000) Cutset bound is always achievable for noiseless multicast network Linear network coding (Koetter Medard 2003)
122 122 / 191 Butterfly network Can achieve cutset bound, i.e., C = 2 2 M 1 6 M 6 M 1 M 1 M 1 M 1 M M 1 M 2 M 2 M 2 M 1 M 2 M M 7 Network coding theorem (Ahlswede Cai Li Yeung 2000) Cutset bound is always achievable for noiseless multicast network Linear network coding (Koetter Medard 2003) XORs in the air (Katti Rahul Hu Katabi Medard Crowcroft 2006)
123 Noiseless Multi-source Multicast Network Consider noiseless network modeled by graph (N, E) M 2 2 j ( M 1j, M 2j, M 3j ) C 12 M 1 1 C 14 4 N ( M 1N, M 2N, M 3N ) C 13 k M 3 3 ( M 1k, M 2k, M 3k ) Source nodes wish to send their messages to destination nodes D 123 / 191
124 Noiseless Multi-source Multicast Network Consider noiseless network modeled by graph (N, E) M 2 2 j ( M 1j, M 2j, M 3j ) C 12 M 1 1 C 14 4 N ( M 1N, M 2N, M 3N ) C 13 k M 3 3 ( M 1k, M 2k, M 3k ) Source nodes wish to send their messages to destination nodes D Again capacity coincides with cutset bound and achieved via network coding (Dana Gowaikar Palanki Hassibi Effros 2006) 124 / 191
125 Noiseless Multi-source Multicast Network Consider noiseless network modeled by graph (N, E) M 2 2 j ( M 1j, M 2j, M 3j ) C 12 M 1 1 C 14 4 N ( M 1N, M 2N, M 3N ) C 13 k M 3 3 ( M 1k, M 2k, M 3k ) Source nodes wish to send their messages to destination nodes D Again capacity coincides with cutset bound and achieved via network coding (Dana Gowaikar Palanki Hassibi Effros 2006) Capacity region of the general nonmulticast network is not known 125 / 191
126 126 / 191 Multi-hop Networks Multi-round two-way communication (relaying and interaction) (each node can be both a transmitter and a receiver) Independent messages over noiseless networks
127 127 / 191 Multi-hop Networks Multi-round two-way communication (relaying and interaction) (each node can be both a transmitter and a receiver) Independent messages over noiseless networks Independent messages over noisy networks
128 128 / 191 Relay Channel Y 2 X 2 M X 1 p(y 2,y 3 x 1,x 2 ) Y 3 M Sender X 1 wishes to send message M to receiver Y 3 with help of relay Capacity is not known in general
129 129 / 191 Relay Channel Y 2 X 2 M X 1 p(y 2,y 3 x 1,x 2 ) Y 3 M Sender X 1 wishes to send message M to receiver Y 3 with help of relay Capacity is not known in general Cutset upper bound (Cover El Gamal 1979) C max p(x,x1 )min I(X,X 1 ;Y),I(X;Y,Y 1 X 1 ) X 1 Y 1 : X 1 X Y X Y
130 130 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 M X 1 Y 3 M
131 131 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 M X 1 Y 3 M Direct transmission (no interface)
132 132 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 M X 1 Y 3 M Direct transmission (no interface) Decode forward (digital digital interface)
133 133 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 M X 1 Y 3 M Direct transmission (no interface) Decode forward (digital digital interface)
134 134 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 M X 1 Y 3 M Direct transmission (no interface) Decode forward (digital digital interface)
135 135 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 Ŷ 2 M X 1 Y 3 M Direct transmission (no interface) Decode forward (digital digital interface) Compress forward (analog digital interface)
136 136 / 191 Basic Relaying Techniques (Cover El Gamal 1979) αy 2 M X 1 Y 3 M Direct transmission (no interface) Decode forward (digital digital interface) Compress forward (analog digital interface) Amplify forward (analog analog interface)
137 137 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 M X 1 Y 3 M Direct transmission (no interface) Decode forward (digital digital interface) Compress forward (analog digital interface) Amplify forward (analog analog interface) Partial decode forward (direct transmission + decode forward)
138 138 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 M X 1 Y 3 M Direct transmission (no interface) Decode forward (digital digital interface) Compress forward (analog digital interface) Amplify forward (analog analog interface) Partial decode forward (direct transmission + decode forward) Partial decode forward + compress forward
139 139 / 191 Basic Relaying Techniques (Cover El Gamal 1979) Y 2 :X 2 M X 1 Y 3 M Direct transmission (no interface) Decode forward (digital digital interface) Compress forward (analog digital interface) Amplify forward (analog analog interface) Partial decode forward (direct transmission + decode forward) Partial decode forward + compress forward Linear relaying
140 140 / 191 Interactive Communication M 1 Y i 1 Encoder 1 X 1i p(y x 1,x 2 ) Y i Decoder ( M 1, M 2 ) M 2 Encoder 2 Y i 1 X 2i Free, noiseless, instantaneous output feedback
141 141 / 191 Interactive Communication M 1 Y i 1 Encoder 1 X 1i p(y x 1,x 2 ) Y i Decoder ( M 1, M 2 ) M 2 Encoder 2 Y i 1 X 2i Free, noiseless, instantaneous output feedback First step towards two-way communication
142 142 / 191 Role of Feedback in Communication Iterative refinement: Simpler coding (Schalkwijk Kailath 1966, Horstein 1963, Weldon 1963, Shayevitz Feder 2009)
143 143 / 191 Role of Feedback in Communication Iterative refinement: Simpler coding (Schalkwijk Kailath 1966, Horstein 1963, Weldon 1963, Shayevitz Feder 2009) Feedback can greatly improve the decoding error probability ARQ, hybrid ARQ
144 144 / 191 Role of Feedback in Communication Iterative refinement: Simpler coding (Schalkwijk Kailath 1966, Horstein 1963, Weldon 1963, Shayevitz Feder 2009) Feedback can greatly improve the decoding error probability ARQ, hybrid ARQ Feedback can increase the capacity of channels with memory (Butman 1969, Kim 2010) Channel state feedback (block fading)
145 145 / 191 Role of Feedback in Communication Iterative refinement: Simpler coding (Schalkwijk Kailath 1966, Horstein 1963, Weldon 1963, Shayevitz Feder 2009) Feedback can greatly improve the decoding error probability ARQ, hybrid ARQ Feedback can increase the capacity of channels with memory (Butman 1969, Kim 2010) Channel state feedback (block fading) Feedback can enlarge the capacity region of multi-user channels (Gaarder Wolf 1975, Cover Leung 1981, Ozarow 1984) Coherent cooperation among transmitters Common state information multicast
146 146 / 191 Role of Feedback in Communication Iterative refinement: Simpler coding (Schalkwijk Kailath 1966, Horstein 1963, Weldon 1963, Shayevitz Feder 2009) Feedback can greatly improve the decoding error probability ARQ, hybrid ARQ Feedback can increase the capacity of channels with memory (Butman 1969, Kim 2010) Channel state feedback (block fading) Feedback can enlarge the capacity region of multi-user channels (Gaarder Wolf 1975, Cover Leung 1981, Ozarow 1984) Coherent cooperation among transmitters Common state information multicast Noisy feedback (Kim Lapidoth Weissman 2008, 2009)
147 147 / 191 Two-Way Channel M 1 X 1 X M p(y 2 2 1,y 2 x 1,x 2 ) M 2 Y 1 Y 2 M 1 Each node wishes to send a message to the other node
148 148 / 191 Two-Way Channel M 1 X 1 X M p(y 2 2 1,y 2 x 1,x 2 ) M 2 Y 1 Y 2 M 1 Each node wishes to send a message to the other node First multi-user channel model (Shannon 1961)
149 149 / 191 Two-Way Channel M 1 X 1 X M p(y 2 2 1,y 2 x 1,x 2 ) M 2 Y 1 Y 2 M 1 Each node wishes to send a message to the other node First multi-user channel model (Shannon 1961) Capacity region of the general TWC is not known
150 150 / 191 Two-Way Channel M 1 X 1 X M p(y 2 2 1,y 2 x 1,x 2 ) M 2 Y 1 Y 2 M 1 Each node wishes to send a message to the other node First multi-user channel model (Shannon 1961) Capacity region of the general TWC is not known Binary multiplier channel (Shannon Blackwell 1961) X 1 = X 2 = {0,1} and Y 1 = Y 2 = Y = X 1 X 2 X 1 {0,1} X 2 {0,1} Y {0,1} Y {0,1}
151 151 / 191 Noisy Multicast Network M j (X j,y j ) M (X 1,Y 1 ) p(y 1,...,y N x 1,...,x N ) (X N,Y N ) M N Node 1 wishes to send message M to subset of receivers Y j, j D
152 152 / 191 Noisy Multicast Network M j (X j,y j ) M (X 1,Y 1 ) p(y 1,...,y N x 1,...,x N ) (X N,Y N ) M N Node 1 wishes to send message M to subset of receivers Y j, j D Capacity is not known in general
153 153 / 191 Cutset Upper Bound S S c (X j,y j ) M (X 1,Y 1 ) p(y 1,...,y N x 1,...,x N ) (X N,Y N ) Cutset upper bound (El Gamal 1981) C max p(x N ) min j D min S:1 S,j S ci(x(s);y(sc ) X(S c ))
154 154 / 191 Cutset Upper Bound S S c (X j,y j ) M (X 1,Y 1 ) p(y 1,...,y N x 1,...,x N ) (X N,Y N ) Cutset upper bound (El Gamal 1981) C max p(x N ) min j D min S:1 S,j S ci(x(s);y(sc ) X(S c )) Tight for noiseless multicast network (network coding theorem)
155 155 / 191 Network Decode Forward Decode forward for relay can be extended to noisy multicast networks Network decode forward lower bound (Aref 1980) C max min j [2:N] I(Xj 1 ;Y j X N j ) p(x N )
156 156 / 191 Network Decode Forward Decode forward for relay can be extended to noisy multicast networks Network decode forward lower bound (Aref 1980) C max min j [2:N] I(Xj 1 ;Y j X N j ) p(x N ) Compare to Cutset upper bound (simpler form) C max min j [2:N] I(Xj 1 ;Y N j X N j ) p(x N )
157 157 / 191 Network Decode Forward Decode forward for relay can be extended to noisy multicast networks Network decode forward lower bound (Aref 1980) Compare to C max min j [2:N] I(Xj 1 ;Y j X N j ) p(x N ) Cutset upper bound (simpler form) C max min j [2:N] I(Xj 1 ;Y N j X N j ) p(x N ) Both bounds coincide for broadcasting (D = [2 : N]) over acyclic networks
158 158 / 191 Network Decode Forward Decode forward for relay can be extended to noisy multicast networks Network decode forward lower bound (Aref 1980) C max min j [2:N] I(Xj 1 ;Y j X N j ) p(x N ) One Laptop per Child, wireless mesh networks (multi-hop)
159 159 / 191 Network Decode Forward Decode forward for relay can be extended to noisy multicast networks Network decode forward lower bound (Aref 1980) C max min j [2:N] I(Xj 1 ;Y j X N j ) p(x N ) One Laptop per Child, wireless mesh networks (multi-hop) Routing becomes the main issue
160 160 / 191 Network Compress Forward Compress forward for relay can be extended to noisy networks Network compress forward lower bound (El Gamal Kim 2009) C maxmin j D min S:1 S,j S c I(X(S);Ŷ(Sc ),Y j X(S c )) I(Y(S);Ŷ(S) X N,Ŷ(S c ),Y j ), where the maximum is over N k=1 p(x k)p(ŷ k y k,x k )
161 161 / 191 Network Compress Forward Compress forward for relay can be extended to noisy networks Network compress forward lower bound (El Gamal Kim 2009) C maxmin j D min S:1 S,j S c I(X(S);Ŷ(Sc ),Y j X(S c )) I(Y(S);Ŷ(S) X N,Ŷ(S c ),Y j ), where the maximum is over N k=1 p(x k)p(ŷ k y k,x k ) Compare to Cutset upper bound (El Gamal 1981) C max p(x N ) min j Dmin S:1 S,j S c I(X(S);Y(S c ) X(S c ))
162 162 / 191 Network Compress Forward Compress forward for relay can be extended to noisy networks Network compress forward lower bound (El Gamal Kim 2009) C maxmin j D min S:1 S,j S c I(X(S);Ŷ(Sc ),Y j X(S c )) I(Y(S);Ŷ(S) X N,Ŷ(S c ),Y j ), where the maximum is over N k=1 p(x k)p(ŷ k y k,x k ) Both bounds coincide for Noiseless network (Ahlswede Cai Li Yeung 2000) Deterministic network with broadcast but no interference (Aref 1980, Ratnakar Kramer 2006) Linear finite-field deterministic network (Avestimehr Diggavi Tse 2009) Wireless erasure network (Dana Gowaikar Palanki Hassibi Effros 2006)
163 163 / 191 Noisy Multi-source Multicast Network M j (X j,y j ) M 1 (X 1,Y 1 ) p(y 1,...,y N x 1,...,x N ) (X 2,Y 2 ) M 2
164 164 / 191 Noisy Multi-source Multicast Network M j (X j,y j ) M 1 (X 1,Y 1 ) p(y 1,...,y N x 1,...,x N ) (X 2,Y 2 ) M 2 Network compress forward generalizes to this case (Lim Kim El Gamal Chung 2010) Single-source multicast network results generalize to multi-source
165 165 / 191 Noisy Multi-source Multicast Network M j (X j,y j ) M 1 (X 1,Y 1 ) p(y 1,...,y N x 1,...,x N ) (X 2,Y 2 ) M 2 Network compress forward generalizes to this case (Lim Kim El Gamal Chung 2010) Single-source multicast network results generalize to multi-source Network compress forward Noisy network coding
166 166 / 191 Wireless Network As a model for wireless networks, consider the AWGN network: Y k = g jk X j +Z k j g jk : channel gain X j : power constraint P Z k : WGN noise
167 167 / 191 Wireless Network As a model for wireless networks, consider the AWGN network: Y k = g jk X j +Z k j g jk : channel gain X j : power constraint P Z k : WGN noise In general, it is extremely hard to find the capacity region, even for simple networks (interference channel, relay channel)
168 168 / 191 Wireless Network As a model for wireless networks, consider the AWGN network: Y k = g jk X j +Z k j g jk : channel gain X j : power constraint P Z k : WGN noise In general, it is extremely hard to find the capacity region, even for simple networks (interference channel, relay channel) Two approaches Bounds on the capacity (eg., network compress forward bound) Scaling laws
169 169 / 191 Wireless Network Scaling Law How does capacity scale in the number of users? N-user MAC: C(N) = O(log(N)) N-user IC: C(N) =?
170 170 / 191 Wireless Network Scaling Law How does capacity scale in the number of users? N-user MAC: C(N) = O(log(N)) N-user IC: C(N) =? 1 2 Random network approach (Gupta Kumar 2000) Randomly placed nodes Study typical behavior of most networks N
171 171 / 191 Wireless Network Scaling Law How does capacity scale in the number of users? N-user MAC: C(N) = O(log(N)) N-user IC: C(N) =? 1 2 Random network approach (Gupta Kumar 2000) Randomly placed nodes Study typical behavior of most networks N Wireless network information theory Effect of the path loss Relaying vs. direct transmission Interference management Protocols and architecture for large wireless networks
172 172 / 191 Wireless Network Scaling Law How does capacity scale in the number of users? N-user MAC: C(N) = O(log(N)) N-user IC: C(N) =? 1 2 Random network approach (Gupta Kumar 2000) Randomly placed nodes Study typical behavior of most networks N Wireless network information theory Effect of the path loss Relaying vs. direct transmission Interference management Protocols and architecture for large wireless networks Wireless ad-hoc networks (Smartdust, RFID)
173 173 / 191 Multi-hop Networks Multi-round two-way communication (relaying and interaction) (each node can be both a transmitter and a receiver) Independent messages over noiseless networks Independent messages over noisy networks Correlated sources over noiseless networks
174 174 / 191 Multi-hop Networks Multi-round two-way communication (relaying and interaction) (each node can be both a transmitter and a receiver) Independent messages over noiseless networks Independent messages over noisy networks Correlated sources over noiseless networks Correlated sources over noisy networks
175 175 / 191 Source Networks Multiple descriptions network 2 X 2 j X j X 1 R 12 R 14 4 N X N R 13 X 4 k 3 X 3 X k
176 176 / 191 Source Networks Multiple descriptions network 2 X 2 j X j X 1 R 12 R 14 4 N X N R 13 X 4 k 3 X 3 X k Two-way source coding M X l (X 1,M l 1 ) 1 X 2 Node1 M Node2 X l+1 (X 2,M l ) 2 X 1
177 177 / 191 Extensions and Applications Communication for computing X 1 X 2 Encoder Encoder M 1 Decoder ĝ(x 1,X 2 ) M 2 Distributed function computation (Orlitsky Roche 2001) communication complexity (Yao 1979) Distributed consensus (gossip) Sensor networks
178 178 / 191 Extensions and Applications Communication for computing Information theoretic secrecy M X p(y, z x) Y Z M I(M;Z) 0 Wiretap channel Distributed key generation Physical layer security
179 179 / 191 Extensions and Applications Communication for computing Information theoretic secrecy Asynchronous communication: M 1l Encoder 1 X 1i Delayd 1 X 1,i d1 p(y x 1,x 2 ) Y i ( M 11, M 2l ) Decoder M 2l Encoder 2 X 2i Delayd 2 X 2,i d2 Asynchronous multiple access Random packet arrivals
180 180 / 191 Network Information Theory Fundamental limits of information flow over networks Coding techniques, protocols, and system architectures
181 181 / 191 Network Information Theory Fundamental limits of information flow over networks Coding techniques, protocols, and system architectures Exciting challenges Many open problems Unification of information theory (statics) and network theory (dynamics) Implementation ideas to bridge the theory and practice
182 182 / 191 Network Information Theory Fundamental limits of information flow over networks Coding techniques, protocols, and system architectures Exciting challenges Many open problems Unification of information theory (statics) and network theory (dynamics) Implementation ideas to bridge the theory and practice Beginning to have impacts on practice
183 183 / 191 To Learn More Lecture Notes on Network Information Theory Top-down organization: background, single-hop, multi-hop, extensions
184 184 / 191 To Learn More Lecture Notes on Network Information Theory Top-down organization: background, single-hop, multi-hop, extensions Comprehensive coverage of key results: 24 chapters, slides
185 185 / 191 To Learn More Lecture Notes on Network Information Theory Top-down organization: background, single-hop, multi-hop, extensions Comprehensive coverage of key results: 24 chapters, slides Balanced introduction of new techniques and models
186 186 / 191 To Learn More Lecture Notes on Network Information Theory Top-down organization: background, single-hop, multi-hop, extensions Comprehensive coverage of key results: 24 chapters, slides Balanced introduction of new techniques and models Unified approach to coding theorems
Coding for Noisy Networks
Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+
More informationExploiting Interference through Cooperation and Cognition
Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of
More informationA Bit of network information theory
Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,
More informationInformation flow over wireless networks: a deterministic approach
Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory
More informationWireless Network Information Flow
Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch
More informationMulticasting over Multiple-Access Networks
ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity
More informationCooperation in Wireless Networks
Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation
More informationInterference: An Information Theoretic View
Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationMulti-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless
Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 28-30, 2011 Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Zhiyu Cheng, Natasha
More informationRab Nawaz. Prof. Zhang Wenyi
Rab Nawaz PhD Scholar (BL16006002) School of Information Science and Technology University of Science and Technology of China, Hefei Email: rabnawaz@mail.ustc.edu.cn Submitted to Prof. Zhang Wenyi wenyizha@ustc.edu.cn
More informationRouting versus Network Coding in Erasure Networks with Broadcast and Interference Constraints
Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta
More informationMultiuser Information Theory and Wireless Communications. Professor in Charge: Toby Berger Principal Lecturer: Jun Chen
Multiuser Information Theory and Wireless Communications Professor in Charge: Toby Berger Principal Lecturer: Jun Chen Where and When? 1 Good News No homework. No exam. 2 Credits:1-2 One credit: submit
More informationInformation Flow in Wireless Networks
Information Flow in Wireless Networks Srikrishna Bhashyam Department of Electrical Engineering Indian Institute of Technology Madras National Conference on Communications IIT Kharagpur 3 Feb 2012 Srikrishna
More informationAnalog network coding in the high-snr regime
Analog network coding in the high-snr regime The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Médard,
More informationState-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY 2013 2629 State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class Majid Nasiri Khormuji, Member, IEEE, Abbas
More informationSHANNON showed that feedback does not increase the capacity
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2667 Feedback Capacity of the Gaussian Interference Channel to Within 2 Bits Changho Suh, Student Member, IEEE, and David N. C. Tse, Fellow,
More informationComputing functions over wireless networks
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/
More informationCapacity and Cooperation in Wireless Networks
Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate
More informationCoding Techniques and the Two-Access Channel
Coding Techniques and the Two-Access Channel A.J. Han VINCK Institute for Experimental Mathematics, University of Duisburg-Essen, Germany email: Vinck@exp-math.uni-essen.de Abstract. We consider some examples
More informationVariations on the Index Coding Problem: Pliable Index Coding and Caching
Variations on the Index Coding Problem: Pliable Index Coding and Caching T. Liu K. Wan D. Tuninetti University of Illinois at Chicago Shannon s Centennial, Chicago, September 23rd 2016 D. Tuninetti (UIC)
More informationScheduling in omnidirectional relay wireless networks
Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science
More informationOn Optimum Communication Cost for Joint Compression and Dispersive Information Routing
2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department
More informationComputing and Communications 2. Information Theory -Channel Capacity
1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication
More informationCausal state amplification
20 IEEE International Symposium on Information Theory Proceedings Causal state amplification Chiranjib Choudhuri, Young-Han Kim and Urbashi Mitra Abstract A problem of state information transmission over
More informationBroadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications
1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,
More informationPhysical Layer Security for Wireless Networks
Physical Layer Security for Wireless Networks Şennur Ulukuş Department of ECE University of Maryland ulukus@umd.edu Joint work with Shabnam Shafiee, Nan Liu, Ersen Ekrem, Jianwei Xie and Pritam Mukherjee.
More informationError Correcting Codes for Cooperative Broadcasting
San Jose State University SJSU ScholarWorks Faculty Publications Electrical Engineering 11-30-2010 Error Correcting Codes for Cooperative Broadcasting Robert H. Morelos-Zaragoza San Jose State University,
More informationState Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE
1850 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 State Amplification Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE Abstract We consider the problem
More informationDegrees of Freedom of Bursty Multiple Access Channels with a Relay
Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department
More informationChapter 10. User Cooperative Communications
Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a
More informationOpportunistic network communications
Opportunistic network communications Suhas Diggavi School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS) Ecole Polytechnique Fédérale de Lausanne (EPFL)
More informationDegrees of Freedom of the MIMO X Channel
Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department
More informationState of the Cognitive Interference Channel
State of the Cognitive Interference Channel Stefano Rini, Ph.D. candidate, srini2@uic.edu Daniela Tuninetti, danielat@uic.edu Natasha Devroye, devroye@uic.edu Interference channel Tx 1 DM Cognitive interference
More informationSPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE
Int. J. Chem. Sci.: 14(S3), 2016, 794-800 ISSN 0972-768X www.sadgurupublications.com SPECTRUM SHARING IN CRN USING ARP PROTOCOL- ANALYSIS OF HIGH DATA RATE ADITYA SAI *, ARSHEYA AFRAN and PRIYANKA Information
More informationBlock Markov Encoding & Decoding
1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,
More informationOn the Capacity Regions of Two-Way Diamond. Channels
On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of
More informationInformation Theoretic Security: Fundamentals and Applications
Information Theoretic Security: Fundamentals and Applications Ashish Khisti University of Toronto IPSI Seminar Nov 25th 23 Ashish Khisti (University of Toronto) / 35 Layered Architectures Layered architecture
More informationOpportunities, Constraints, and Benefits of Relaying in the Presence of Interference
Opportunities, Constraints, and Benefits of Relaying in the Presence of Interference Peter Rost, Gerhard Fettweis Technische Universität Dresden, Vodafone Chair Mobile Communications Systems, 01069 Dresden,
More informationECE 4400:693 - Information Theory
ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview
More information5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010
5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.
More informationDegrees of Freedom in Multiuser MIMO
Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationOverlay Systems. Results around Improved Scheme Transmission for Achievable Rates. Outer Bound. Transmission Strategy Pieces
Cooperation at T EE36: Lecture 3 Outline Capacity of Cognitive adios Announcements Progress reports due Feb. 9 at midnight Overview Achievable rates in Cognitive adios Better achievable scheme and upper
More informationPower and Bandwidth Allocation in Cooperative Dirty Paper Coding
Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng 1, Nihar Jindal 2 Andrea J. Goldsmith 3, Urbashi Mitra 4 1 Stanford University/MIT, 2 Univeristy of Minnesota 3 Stanford
More informationAn Introduction to Distributed Channel Coding
An Introduction to Distributed Channel Coding Alexandre Graell i Amat and Ragnar Thobaben Department of Signals and Systems, Chalmers University of Technology, Gothenburg, Sweden School of Electrical Engineering,
More informationA two-round interactive receiver cooperation scheme for multicast channels
016 IEEE 54th Allerton Conference on Communication, Control and Computing Allerton, Iowa (USA), Sept. 016 DOI: 10.1109/ALLERTON.016.78599 A two-round interactive receiver cooperation scheme for multicast
More informationBreaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective
Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective Naroa Zurutuza - EE360 Winter 2014 Introduction Cognitive Radio: Wireless communication system that intelligently
More informationSHANNON S source channel separation theorem states
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,
More informationOptimal Power Allocation over Fading Channels with Stringent Delay Constraints
1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu
More informationCoding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.
Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18
More informationCommunication Theory II
Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationRelay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying
013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić
More informationCooperative Strategies and Capacity Theorems for Relay Networks
بسم الرحمن الرحيم King Fahd University of Petroleum and Minerals College of Engineering Sciences Department of Electrical Engineering Graduate Program Cooperative Strategies and Capacity Theorems for Relay
More informationSymmetric Decentralized Interference Channels with Noisy Feedback
4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en
More informationMinimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels
IET Communications Research Article Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels ISSN 1751-8628 Received on 28th July 2014 Accepted
More informationThe Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA
The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,
More informationBoosting reliability over AWGN networks with average power constraints and noiseless feedback
Boosting reliability over AWGN networks with average power constraints and noiseless feedback Anant Sahai, Stark C. Draper, and Michael Gastpar Department of EECS, University of California, Berkeley, CA,
More informationReflections on the Capacity Region of the Multi-Antenna Broadcast Channel Hanan Weingarten
IEEE IT SOCIETY NEWSLETTER 1 Reflections on the Capacity Region of the Multi-Antenna Broadcast Channel Hanan Weingarten Yossef Steinberg Shlomo Shamai (Shitz) whanan@tx.technion.ac.ilysteinbe@ee.technion.ac.il
More informationSimple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.
18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/
More informationTWO-WAY communication between two nodes was first
6060 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015 On the Capacity Regions of Two-Way Diamond Channels Mehdi Ashraphijuo, Vaneet Aggarwal, Member, IEEE, and Xiaodong Wang, Fellow,
More informationCapacity-Achieving Rateless Polar Codes
Capacity-Achieving Rateless Polar Codes arxiv:1508.03112v1 [cs.it] 13 Aug 2015 Bin Li, David Tse, Kai Chen, and Hui Shen August 14, 2015 Abstract A rateless coding scheme transmits incrementally more and
More informationOn the Feasibility and Performance of CDMA with Interference Cancellation
On the Feasibility and Performance of CDMA with Interference Cancellation Jack Keil Wolf QUALCOMM Incorporated Plenary Session ISSSTA 2006 August 29, 2006 Acknowledgements This presentation is based upon
More informationLecture 8 Multi- User MIMO
Lecture 8 Multi- User MIMO I-Hsiang Wang ihwang@ntu.edu.tw 5/7, 014 Multi- User MIMO System So far we discussed how multiple antennas increase the capacity and reliability in point-to-point channels Question:
More informationPunctured vs Rateless Codes for Hybrid ARQ
Punctured vs Rateless Codes for Hybrid ARQ Emina Soljanin Mathematical and Algorithmic Sciences Research, Bell Labs Collaborations with R. Liu, P. Spasojevic, N. Varnica and P. Whiting Tsinghua University
More informationPractical Cooperative Coding for Half-Duplex Relay Channels
Practical Cooperative Coding for Half-Duplex Relay Channels Noah Jacobsen Alcatel-Lucent 600 Mountain Avenue Murray Hill, NJ 07974 jacobsen@alcatel-lucent.com Abstract Simple variations on rate-compatible
More informationInformation Theory: the Day after Yesterday
: the Day after Yesterday Department of Electrical Engineering and Computer Science Chicago s Shannon Centennial Event September 23, 2016 : the Day after Yesterday IT today Outline The birth of information
More informationDiversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels
Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Lizhong Zheng and David Tse Department of EECS, U.C. Berkeley Feb 26, 2002 MSRI Information Theory Workshop Wireless Fading Channels
More informationFeedback via Message Passing in Interference Channels
Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of
More informationarxiv: v1 [cs.it] 12 Jan 2011
On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom
More informationA unified graphical approach to
A unified graphical approach to 1 random coding for multi-terminal networks Stefano Rini and Andrea Goldsmith Department of Electrical Engineering, Stanford University, USA arxiv:1107.4705v3 [cs.it] 14
More informationCapacity Gain from Two-Transmitter and Two-Receiver Cooperation
Capacity Gain from Two-Transmitter and Two-Receiver Cooperation Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE, Andrea J. Goldsmith, Fellow, IEEE and Urbashi Mitra, Fellow, IEEE arxiv:0704.3644v1
More informationInterference Alignment. Extensions. Basic Premise. Capacity and Feedback. EE360: Lecture 11 Outline Cross-Layer Design and CR. Feedback in Networks
EE360: Lecture 11 Outline Cross- Design and Announcements HW 1 posted, due Feb. 24 at 5pm Progress reports due Feb. 29 at midnight (not Feb. 27) Interference alignment Beyond capacity: consummating unions
More informationDistributed Source Coding: A New Paradigm for Wireless Video?
Distributed Source Coding: A New Paradigm for Wireless Video? Christine Guillemot, IRISA/INRIA, Campus universitaire de Beaulieu, 35042 Rennes Cédex, FRANCE Christine.Guillemot@irisa.fr The distributed
More informationWhen Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network
When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network Nadia Fawaz, David Gesbert Mobile Communications Department, Eurecom Institute Sophia-Antipolis, France {fawaz, gesbert}@eurecom.fr
More informationUplink Multicell Processing with Limited Backhaul via Successive Interference Cancellation
Globecom - Communication Theory Symposium Uplin Multicell Processing with Limited Bachaul via Successive Interference Cancellation Lei Zhou and Wei Yu Department of Electrical and Computer Engineering,
More informationOn the Capacity Region of the Vector Fading Broadcast Channel with no CSIT
On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,
More informationPerformance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks
Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:
More informationphotons photodetector t laser input current output current
6.962 Week 5 Summary: he Channel Presenter: Won S. Yoon March 8, 2 Introduction he channel was originally developed around 2 years ago as a model for an optical communication link. Since then, a rather
More informationApproaching the Capacity of the Multi-Pair Bidirectional Relay Network via a Divide and Conquer Strategy
Approaching the Capacity of the Multi-Pair Bidirectional elay Network via a Divide and Conquer Strategy Salman Avestimehr Cornell In collaboration with: Amin Khajehnejad (Caltech), Aydin Sezgin (UC Irvine)
More informationCollaborative decoding in bandwidth-constrained environments
1 Collaborative decoding in bandwidth-constrained environments Arun Nayagam, John M. Shea, and Tan F. Wong Wireless Information Networking Group (WING), University of Florida Email: arun@intellon.com,
More informationCommunications Theory and Engineering
Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 TDMA, FDMA, CDMA (cont d) and the Capacity of multi-user channels Code Division
More informationInformation Theory at the Extremes
Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.
More informationCross-Layer Design and CR
EE360: Lecture 11 Outline Cross-Layer Design and CR Announcements HW 1 posted, due Feb. 24 at 5pm Progress reports due Feb. 29 at midnight (not Feb. 27) Interference alignment Beyond capacity: consummating
More informationThe Multi-way Relay Channel
The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationComments on unknown channels
Comments on unknown channels Kristen Woyach, Kate Harrison, Gireeja Ranade and Anant Sahai Wireless Foundations, EECS, UC Berkeley {kwoyach, harriska, gireeja, sahai}@eecsberkeleyedu Abstract The idea
More informationDegrees of Freedom of Wireless X Networks
Degrees of Freedom of Wireless X Networks 1 Viveck R. Cadambe, Syed A. Jafar Center for Pervasive Communications and Computing Electrical Engineering and Computer Science University of California Irvine,
More informationAn Overlaid Hybrid-Duplex OFDMA System with Partial Frequency Reuse
An Overlaid Hybrid-Duplex OFDMA System with Partial Frequency Reuse Jung Min Park, Young Jin Sang, Young Ju Hwang, Kwang Soon Kim and Seong-Lyun Kim School of Electrical and Electronic Engineering Yonsei
More informationCooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates
Cooperative Broadcast for Maximum Network Lifetime Ivana Maric and Roy Yates Wireless Multihop Network Broadcast N nodes Source transmits at rate R Messages are to be delivered to all the nodes Nodes can
More informationSpace-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy
Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy Aitor del Coso, Osvaldo Simeone, Yeheskel Bar-ness and Christian Ibars Centre Tecnològic de Telecomunicacions
More informationCommunication Theory II
Communication Theory II Lecture 14: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 25 th, 2015 1 Previous Lecture: Source Code Generation: Lossless
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationPerformance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel
Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Sara Viqar 1, Shoab Ahmed 2, Zaka ul Mustafa 3 and Waleed Ejaz 4 1, 2, 3 National University
More informationDiversity Gain Region for MIMO Fading Multiple Access Channels
Diversity Gain Region for MIMO Fading Multiple Access Channels Lihua Weng, Sandeep Pradhan and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor,
More informationThe Wireless Data Crunch: Motivating Research in Wireless Communications
The Wireless Data Crunch: Motivating Research in Wireless Communications Stephen Hanly CSIRO-Macquarie University Chair in Wireless Communications stephen.hanly@mq.edu.au Wireless Growth Rate Cooper s
More informationThe Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay
The Degrees of Freedom of Full-Duplex 1 Bi-directional Interference Networks with and without a MIMO Relay Zhiyu Cheng, Natasha Devroye, Tang Liu University of Illinois at Chicago zcheng3, devroye, tliu44@uic.edu
More informationDigital Television Lecture 5
Digital Television Lecture 5 Forward Error Correction (FEC) Åbo Akademi University Domkyrkotorget 5 Åbo 8.4. Error Correction in Transmissions Need for error correction in transmissions Loss of data during
More information