Wireless Network Information Flow

Size: px
Start display at page:

Download "Wireless Network Information Flow"

Transcription

1 Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL URL: September 9th 2008

2 Motivation Wireless characteristics State of knowledge Network communication challenges Information flow over shared networks Unicast, multicast, multiple unicast (multicommodity flow). Significant progress for graphs (routing, network coding etc). Less understood for flows over wireless networks. Network data compression: Motivation sensor networks. Some successes in side-information coding: Slepian-Wolf, Wyner Ziv etc. Many unresolved questions: istributed source coding, multiple description coding. Question: How can we make progress to fundamentally characterize flow of information over networks?

3 Motivation Wireless characteristics State of knowledge Key distinctions between wired and wireless channels Broadcast: Transmit signal potentially received by multiple receivers.

4 Motivation Wireless characteristics State of knowledge Key distinctions between wired and wireless channels Broadcast: Transmit signal potentially received by multiple receivers. Multiple access: Transmitted signals mix at the receivers.

5 Motivation Wireless characteristics State of knowledge Key distinctions between wired and wireless channels Broadcast: Transmit signal potentially received by multiple receivers. Multiple access: Transmitted signals mix at the receivers. High dynamic range: Large range in relative signal strengths.

6 Motivation Wireless characteristics State of knowledge Key distinctions between wired and wireless channels Broadcast: Transmit signal potentially received by multiple receivers. Multiple access: Transmitted signals mix at the receivers. High dynamic range: Large range in relative signal strengths. Implications: Complex signal interactions at different signal levels.

7 Motivation Wireless characteristics State of knowledge Key distinctions between wired and wireless channels Broadcast: Transmit signal potentially received by multiple receivers. Multiple access: Transmitted signals mix at the receivers. High dynamic range: Large range in relative signal strengths. Implications: Complex signal interactions at different signal levels. Interacting signals from nodes contain information (not to be treated as noise).

8 Motivation Wireless characteristics State of knowledge Key distinctions between wired and wireless channels Broadcast: Transmit signal potentially received by multiple receivers. Multiple access: Transmitted signals mix at the receivers. High dynamic range: Large range in relative signal strengths. Implications: Complex signal interactions at different signal levels. Interacting signals from nodes contain information (not to be treated as noise). Question: Can we develop cooperative mechanisms to utilize signal interaction?

9 Gaussian point-to-point channel Motivation Wireless characteristics State of knowledge Message Tx x[t] Channel h z[t] Rx ecoded message NOISY POINT TO POINT CHANNEL (SHANNON, 1948) y[t] = hx[t] + z[t] Linear channel model and additive noise model. Transmit power constraint: E[ x 2 ] P Gaussian channel due to noise z[t] N(0, 1). Capacity: C = 1 2 log(1 + h 2 P).

10 Motivation Wireless characteristics State of knowledge Gaussian multiple access channel Message 1 Tx 1 h 1 x [t] 1 z[t] ecoded messages 1,2 Message 2 Tx 2 h 2 x [t] 2 y[t] Rx MULTIPLE ACCESS CHANNEL: Ahlswede Liao (1971) y[t] = h 1 x 1 [t] + h 2 x 2 [t] + z[t] Linear signal interaction model. Transmit power constraint: E[ x i 2 ] P i, i = 1, 2 Gaussian channel due to noise z[t] N(0, 1). R log(1 + h 1 2 P 1 ) R log(1 + h 2 2 P 2 ) R 1 + R log(1 + h 1 2 P 1 + h 2 2 P 2 )

11 Gaussian broadcast channel Motivation Wireless characteristics State of knowledge Messages 1,2 Tx x[t] h 1 z [t] 1 y [t] 1 ecoded message 1 Rx 1 h 2 z [t] 2 y [t] 2 ecoded message 2 Rx 2 BROACAST CHANNEL: Cover (1972) y 1 [t] = h 1 x[t] + z 1 [t], y 2 [t] = h 2 x[t] + z 2 [t] Common transmit signal x[t], different channels. Transmit power constraint: E[ x 2 ] P. R log(1 + h 1 2 θp 1 + h 1 2 (1 θ)p ) R 2 1 Rate region region for h 1 h 2 2 log(1 + h 2 2 (1 θ)p)

12 Motivation Wireless characteristics State of knowledge Signal interaction: Gaussian wireless networks Source 1 Receiver 1 Source 2 Receiver 2 y j [t] = i H ij x i [t] + z j [t] Broadcast because transmission x i is heard by all receivers. Multiple access because transmitted signals from all nodes mix linearly at the receiver j. ynamic range depends on relative strengths of H ij.

13 Motivation Wireless characteristics State of knowledge Signal interaction: Gaussian wireless networks Source 1 Receiver 1 Source 2 Receiver 2 y j [t] = i H ij x i [t] + z j [t] Broadcast because transmission x i is heard by all receivers. Multiple access because transmitted signals from all nodes mix linearly at the receiver j. ynamic range depends on relative strengths of H ij. Question: Can we characterize capacity of such networks?

14 Motivation Wireless characteristics State of knowledge Gaussian network capacity: unresolved Relay Source Sink RELAY CHANNEL: Cover, El Gamal (1979)

15 Motivation Wireless characteristics State of knowledge Gaussian network capacity: unresolved Relay Message 1 ecode message 1 Tx 1 Rx 1 Source Sink Message 2 Tx 2 ecode message 2 Rx 2 RELAY CHANNEL: Cover, El Gamal (1979) INTERFERENCE CHANNEL: Han Kobayashi (1981)

16 Motivation Wireless characteristics State of knowledge Gaussian network capacity: unresolved Relay Message 1 ecode message 1 Tx 1 Rx 1 Source Sink Message 2 Tx 2 ecode message 2 Rx 2 RELAY CHANNEL: Cover, El Gamal (1979) INTERFERENCE CHANNEL: Han Kobayashi (1981) Question: Thirty years have gone by... How can we make progress from here?

17 Simplify the model Focus on signal interaction not noise Philosophy eterministic model through examples Observation: Success of network coding was through examination of flow on wireline networks, a special deterministic channel.

18 Simplify the model Focus on signal interaction not noise Philosophy eterministic model through examples Observation: Success of network coding was through examination of flow on wireline networks, a special deterministic channel. Idea: Many wireless systems are interference rather than noise limited. Use deterministic channel model to focus on signal interaction and not noise.

19 Simplify the model Focus on signal interaction not noise Philosophy eterministic model through examples Observation: Success of network coding was through examination of flow on wireline networks, a special deterministic channel. Idea: Hope: Many wireless systems are interference rather than noise limited. Use deterministic channel model to focus on signal interaction and not noise. eterministic models more tractable. Use insight to obtain approximate characterizations for noisy (Gaussian) networks.

20 Simplify the model Focus on signal interaction not noise Philosophy eterministic model through examples Observation: Success of network coding was through examination of flow on wireline networks, a special deterministic channel. Idea: Hope: Many wireless systems are interference rather than noise limited. Use deterministic channel model to focus on signal interaction and not noise. eterministic models more tractable. Use insight to obtain approximate characterizations for noisy (Gaussian) networks. Question: Can we develop relevant models and analyze networks with deterministic signal interactions to get the insights?

21 Approximate characterizations Philosophy eterministic model through examples Philosophy: Gain insight into central difficulties of problem by identifying underlying deterministic structures. Goal: Use the insight of underlying problem to get (provable) approximate characterization for noisy problem. Underlying problem should be characterized exactly to give insight into solution structure for general case. Universal approximation: Approximation should depend only on the problem structure and not on parameters (like channel gains, SNRs etc.). Question: Can we identify the appropriate underlying problems and use them to get provable (universal) approximations.

22 Overall agenda Philosophy eterministic model through examples Introduce deterministic channel model. Motivate the utility of deterministic model with examples. evelop achievable rates for general deterministic relay networks Characterizations for linear finite field deterministic models.

23 Overall agenda Philosophy eterministic model through examples Introduce deterministic channel model. Motivate the utility of deterministic model with examples. evelop achievable rates for general deterministic relay networks Characterizations for linear finite field deterministic models. Connection to wireless networks: Use insights on achievability of deterministic networks to obtain approximate characterization of noisy relay networks.

24 Example 1: Point-to-point link Philosophy eterministic model through examples Gaussian eterministic y = 2 α/2 x + z A B Capacity is log(1 + 2 α ) α log 2 assuming unit variance noise. Receiver observes α most significant bits of transmitted signal. Number of levels received shows scale of channel strength. Scale important when signals interact in broadcast and multiple access.

25 Philosophy eterministic model through examples Example 2: Multiple access channel ETERMINISTIC MOEL Rx GAUSSIAN MOEL B 1 R 2 y = 2 α1/2 x α2/2 x 2 + z. n 2 log(1 + SNR 2 ) B 2 Mod 2 addition log(1 + SNR 1 ) n 1 R 1

26 Philosophy eterministic model through examples Example 3: Scalar broadcast channel Tx GAUSSIAN MOEL ETERMINISTIC MOEL A 1 S y 1 = 2 α1/2 x + z 1, y 2 = 2 α2/2 x + z 2 R 2 A 2 n 2 log(1 + SNR 2 ) Approximation of 1 bit log(1 + SNR 1 ) n 1 R 1

27 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R S

28 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R R S S ETERMINISTIC MOEL

29 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R R S S Source cut = 3 bits ETERMINISTIC MOEL

30 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R R S S ETERMINISTIC MOEL estination cut = 3 bits

31 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R R S S ETERMINISTIC MOEL

32 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R R S S ETERMINISTIC MOEL

33 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R R S S ETERMINISTIC MOEL

34 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R R S S ETERMINISTIC MOEL Cut-set bound achievable. ecode and forward is optimal.

35 Philosophy eterministic model through examples Relay channel: deterministic approximation GAUSSIAN RELAY CHANNEL R S R S gap h R 2 / h S h SR 2 / h S Result: Gap from cut-set less than 1 bit, on average much less. ETERMINISTIC MOEL Cut-set bound achievable. ecode and forward is optimal.

36 iamond network Philosophy eterministic model through examples Gaussian A h SA1 h A1 S h SA2 h A2 B

37 iamond network Philosophy eterministic model through examples eterministic Cut value = 3 Gaussian A A S h SA1 h A1 S h SA2 h A2 B B

38 iamond network Philosophy eterministic model through examples eterministic Gaussian A Cut value = 3 A h SA1 h A1 S S h SA2 h A2 B B

39 iamond network Philosophy eterministic model through examples Gaussian eterministic Cut value = 6 A A h SA1 h A1 S S h SA2 h A2 B B

40 iamond network Philosophy eterministic model through examples Gaussian A eterministic A Cut value = 3 h SA1 h A1 S S h SA2 h A2 B B

41 iamond network Philosophy eterministic model through examples eterministic Gaussian A A h SA1 h A1 S S h SA2 h A2 B Result: Gap from cut-set less 1 bit. Cut-set bound achievable. Partial decode-forward is optimal. B

42 Two-layer network Philosophy eterministic model through examples Gaussian eterministic A 1 h A1 B 1 B 1 S h S,A1 h S,A2 h A1 B 2 h A2 B 1 h B1 hb2 A 2 h A2 B B 2 2

43 Two-layer network Philosophy eterministic model through examples Gaussian eterministic A 1 h A1 B 1 B 1 h S,A1 h B1 A1 B1 h A1 B 2 S h S,A2 h A2 B 1 hb2 S A 2 h A2 B B 2 2 A2 B2 Cut-set bound achievable. Linear map and forward is optimal.

44 Two-layer network Philosophy eterministic model through examples Gaussian eterministic A 1 h A1 B 1 B 1 h S,A1 h B1 A1 B1 h A1 B 2 S h S,A2 h A2 B 1 hb2 S A 2 h A2 B B 2 2 Result: Gap from cut-set less than constant number of bits. A2 Cut-set bound achievable. Linear map and forward is optimal. B2

45 Questions Philosophy eterministic model through examples Is the cut-set bound achievable for the deterministic model in arbitrary networks?

46 Questions Philosophy eterministic model through examples Is the cut-set bound achievable for the deterministic model in arbitrary networks? What is the structure of the optimal strategy?

47 Questions Philosophy eterministic model through examples Is the cut-set bound achievable for the deterministic model in arbitrary networks? What is the structure of the optimal strategy? Can we use insight from deterministic analysis to get approximately optimal strategy for Gaussian networks?

48 Algebraic representation Philosophy eterministic model through examples S A1 b 1 y 1 2 b 2 y 2 b y 3 3 b y 4 4 b 5 y 5 S = 6 4 A2 B1 B c 1 c 2 c 3 c 4 c 5 S is shift matrix of size q = max i,j n i,j. y B1 = y 1 y 2 y 3 y 4 y 5 = 0 0 b 1 b 2 b c 1 c 2 = S5 3 x A1 S 5 2 x A2 = S 5 3 b S 5 2 c

49 Generalizations Linear finite field model Philosophy eterministic model through examples Channel from i to j is described by channel matrix G ij operating over F 2. Received signal at node j: y j [t] = N G ij x i [t] i=1 Special case: our model given in examples G ij = S q α ij General deterministic network: y[t] = G(x 1 [t],..., x N [t]) Observation: Wireline networks are a special case.

50 Information-theoretic cut-set Cut-set upper bound Results: deterministic model Results: Gaussian model A1 B1 S A2 B2 Cut: Separates S from Ω Λ Ω c Cut transfer matrix G Ω,Ω c: Transfer function from nodes in Ω to Ω c.

51 Cutset upper bound Cut-set upper bound Results: deterministic model Results: Gaussian model General relay network: C relay C = max min I(X Ω ; Y Ω c X Ω c) p(x 1,...,x N ) Ω

52 Cutset upper bound Cut-set upper bound Results: deterministic model Results: Gaussian model General relay network: C relay C = General deterministic relay network: C relay C = max min I(X Ω ; Y Ω c X Ω c) p(x 1,...,x N ) Ω max min H(Y Ω c X Ω c) p(x 1,...,x N ) Ω

53 Cutset upper bound Cut-set upper bound Results: deterministic model Results: Gaussian model General relay network: C relay C = General deterministic relay network: C relay C = max min I(X Ω ; Y Ω c X Ω c) p(x 1,...,x N ) Ω max min H(Y Ω c X Ω c) p(x 1,...,x N ) Ω Linear finite field network: Optimal input distribution x 1,..., x N independent and uniform C relay C = min Ω rank(g Ω,Ω c) where G Ω,Ω c is the transfer matrix X Ω Y Ω c.

54 Cut-set upper bound Results: deterministic model Results: Gaussian model Main results: eterministic relay networks Theorem (Avestimehr, iggavi and Tse, 2007) Given a general deterministic relay network (with broadcast and multiple access), we can achieve all rates R upto Multicast information flow: Qmax min H(Y Ω c X Ω c) i p(x i ) Ω Theorem (Avestimehr, iggavi and Tse, 2007) Given a general deterministic relay network (with broadcast and multiple access), we can achieve all rates R from S multicasting to all destinations up to, Qmax min min H(Y Ω c X Ω c) i V p(x i) Ω Λ

55 Application Linear deterministic models Cut-set upper bound Results: deterministic model Results: Gaussian model Corollary (Avestimehr, iggavi and Tse, 2007) Given a linear finite-field relay network (with broadcast and multiple access), the capacity C of such a relay network is given by, Multicast information flow: C = min Ω Λ rank(g Ω,Ω c). Corollary (Avestimehr, iggavi and Tse, 2007) Given a linear finite-field relay network (with broadcast and multiple access), the multicast capacity C of such a relay network is given by, C = min min Ω Λ rank(g Ω,Ω c).

56 Cut-set upper bound Results: deterministic model Results: Gaussian model Consequences: eterministic Relay Networks General deterministic networks: Cutset upper bound was C relay max p(x 1,...,x N ) min Ω H(Y Ω c X Ω c) = achievable if optimum was product distribution. Linear finite field model: Cutset upper bound was C relay min Ω rank(g Ω,Ω c) = cutset bound achievable For wireline graph model rank(g Ω,Ω c) is number of links crossing the cut. Observation: We have a generalization of Ford-Fulkerson max-flow min-cut theorem to linear finite field relay networks with broadcast and multiple access.

57 Cut-set upper bound Results: deterministic model Results: Gaussian model Main results: Gaussian relay networks Theorem (Avestimehr, iggavi and Tse, 2007) Given a Gaussian relay network, G, we can achieve all rates R up to C κ. Therefore the capacity of this network satisfies C κ C C, where C is the cut-set upper bound on the capacity of G, and κ is a constant independent of channel gains. Theorem (Multicast information flow) Given a Gaussian relay network, G, we can achieve all multicast rates R up to C mcast κ, i.e., for C mcast = min C, C mcast κ C C mcast

58 Ingredients and insights Cut-set upper bound Results: deterministic model Results: Gaussian model Main steps: Gaussian strategy Relay operation: Quantize received signal at noise-level. Relay function: Random mapping from received quantized signal to transmitted signal. Handle unequal (multiple) paths between nodes like inter-symbol interference. Consequences: With probabilistic method we demonstrate min-cut achievability for linear deterministic networks. Gaussian networks constant gap independent of SNR operating point. Engineering insight of (almost) optimal coding strategies.

59 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Achievability program: eterministic networks Layered (equal path) networks S A 1 B 1 Lengths of ALL paths from source to destination are the same. Broadcast and multiple access for general deterministic functions. A 2 B 2

60 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Achievability program: eterministic networks Layered (equal path) networks S A 1 B 1 Lengths of ALL paths from source to destination are the same. Broadcast and multiple access for general deterministic functions. A 2 B 2 Illustrate analysis through equal path network.

61 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Achievability program: eterministic networks Layered (equal path) networks S A 1 B 1 Lengths of ALL paths from source to destination are the same. Broadcast and multiple access for general deterministic functions. A 2 B 2 Illustrate analysis through equal path network. Extend to unequal path networks through time-expansion.

62 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Achievability: eterministic networks Map each message into random codeword of length T symbols. Each relay randomly independently maps its received signal onto transmit codewords = transmit distributions independent across relays. x j = f j (y j ) Strategy similar to network coding for wireline graphs (Ahlswede et al 2000). For linear deterministic network, simplification in relay function: x j = F j y j where F j is randomly chosen matrix.

63 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Achievability: eterministic networks Y = B 1 G X SA S 1 X = F A A Y Y A A X A = F A Y A X S A1 A2 Y = G A2 X G A X B B S B1 B2 Y = B 1 G SA X S 2 X = F B Y A B Y B 2 X = F Y B B B 2 2 2

64 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Linear deterministic networks: relay strategy Key simplification for staged networks: In equal path networks all nodes in a stage are transmitting information about same message.

65 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Linear deterministic networks: relay strategy Key simplification for staged networks: In equal path networks all nodes in a stage are transmitting information about same message. Time Block 1 A A 1 2 W 3 W 2 W 1 S B 1 B 2

66 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Linear deterministic networks: relay strategy Key simplification for staged networks: In equal path networks all nodes in a stage are transmitting information about same message. Time Block 2 A A 1 2 W 3 W 2 W 1 S B 1 B 2

67 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Linear deterministic networks: relay strategy Key simplification for staged networks: In equal path networks all nodes in a stage are transmitting information about same message. Time Block 3 A A 1 2 W 3 W 2 W 1 S B 1 B 2 Implication: Focus on message w = W 1, which passes through layer l at block time l.

68 eterministic layered network General deterministic network Gaussian layered network Compound relay networks : Layered (equal path) deterministic networks Focus on one message w of RT bits. P {error} 2 RT P {w w } istinguishablity: Nodes that receive distinct signals under w and w can disambiguate between them = received signals under two message distinct or y j y j when j can distinguish. P w w = X Ω P Nodes in Ω can distinguish w, w and nodes in Ω c cannot {z } P where Ω is a source-destination separation cut.

69 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Linear deterministic networks: Confusability analysis Key idea: Nodes in Ω c (w, w ), will transmit same codeword/signal under both w, w. Consequence: Error event being analyzed when y Ω c = y Ωc, i.e., Can distinguish A 1 Ω Can distinguish A 2 Ω G Ω,Ω cx Ω = G Ω,Ω cx Ω G Ω,Ω c (x Ω x Ω ) = 0 G Ω,Ω c S Ω Cannot distinguish B 1 Ω c Transmits same signal under w, w Ω c Cannot distinguish B 2 Ω c For x j = F j y j with F j uniform i.i.d. random matrix over F 2, we need, (. F j yj y ) j } {{ } z j. = G Ω,Ω cz = 0 j Ω.

70 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Confusability analysis: Linear deterministic networks ) Since F j is a uniform i.i.d. matrix over F 2, z j = F j (y j y j is uniform vector over F q 2, due to y j y j for j Ω. Therefore z is a uniform vector over F q Ω 2 and we are calculating its probability of being in null space of G Ω,Ω c. This probability is: 2 T rank(g Ω,Ω c), i.e., P {Ω(w, w ) = Ω} = 2 T rank(g Ω,Ω c) Hence for linear deterministic layered networks taking union bound, P {error} 2 RT Ω 2 T rank(g Ω,Ω c) Implication: R < min Ω rank(g Ω,Ω c) is achievable.

71 Large deviations result eterministic layered network General deterministic network Gaussian layered network Compound relay networks When y j = f(x 1,...,x N ) for general deterministic functions, we need a more sophisticated error calculation. Basic large-deviations result: If a T -length sequence is generated i.i.d. according to probability law q the probability that its emperical behavior is like that of sequence generated as p is given by: P(q p) = 2 T(p q), where (p q) is the relative entropy given by: (p q) = u p(u) log p(u) q(u) For q = p(x)p(y), p = p(x, y) this probability is 2 TI(X;Y) since (p q) = u p(u) log p(u) q(u) = p(x, y) log x,y p(x, y) = I(X; Y) p(x)p(y) }{{} mutual information.

72 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Confusability analysis: eterministic networks Can distinguish A 1 Ω Can distinguish A 2 Ω S Ω Ω c Cannot distinguish Transmits same signal under B 1 Ω c w, w Cannot distinguish B 2 Ω c

73 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Confusability analysis: eterministic networks Can distinguish A 1 Ω Can distinguish A 2 Ω S Ω Ω c Cannot distinguish Transmits same signal under B 1 Ω c w, w Cannot distinguish B 2 Ω c Consequence: Error for e.g., when w codewords generated like p(x B1, y B2 )p(x A1 ), are jointly typical with y B2, occurs with probability 2 T E E = (p(x B1, y B2, x A1 ) p(x B1, y B2 )p(x A1 ) = I(X A1 ; Y B2, X B1 ) = I(X A1 ; X B1 ) +I(X A1 ; Y B2 X B1 ) }{{} 0

74 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Confusability analysis: eterministic networks Continuing this way we get P 2 T[I(X S;Y B1 )+I(X A1 ;Y B2 X B1 )+I(X A2 ;Y X B2 )] = 2 TH(Y Ω c X Ω c) because we have a layered network and using Markov relationship.

75 eterministic layered network General deterministic network Gaussian layered network Compound relay networks Confusability analysis: eterministic networks Continuing this way we get P 2 T[I(X S;Y B1 )+I(X A1 ;Y B2 X B1 )+I(X A2 ;Y X B2 )] = 2 TH(Y Ω c X Ω c) because we have a layered network and using Markov relationship. Implication: For layered networks an achievable rate is R < Qmax min H(Y Ω c X Ω c) i p(x i ) Ω

76 General deterministic networks eterministic layered network General deterministic network Gaussian layered network Compound relay networks Unequal path networks = message synchronization lost. Approach: Consider time-expanded network over K blocks. Observation: Time-expanded network is an equal path network for (super) message of KRT bits. Convert multi-letter achievable rate to single-letter using submodularity of entropy. Observation: Time-expansion was needed in network coding for cyclic networks, but in our case it is useful even in acyclic networks.

77 eterministic layered network General deterministic network Gaussian layered network Compound relay networks General networks: Time expansion S kq t 1 kq t 2 kq t 3 t k 2 kq t k 1 kq t k kq S 1 A 1 kq α 1 α 2 α 3 α4 S 2 A 2 kq S 3 A 3 S k 2 A k 2 S k 1 A k 1 S k A k h SA A h A B 1 α 5 B 2 B 3 B k 2 B k 1 B k S h AB k 2 k 1 k r 1 kq kq r 2 kq r 3 r k 2 r k 1 r k kq kq kq kq kq h SB B h B Create a virtual node for every time-block = new network is layered = previous results apply. Many cuts in time-expanded network, not a cut in original network. Only horizontal cuts matter using submodularity of entropy.

78 Gaussian coding strategy eterministic layered network General deterministic network Gaussian layered network Compound relay networks Encoding Each relay quantizes received signal to noise-level distortion. Each relay independently randomly maps quantized signal to a Gaussian transmit signal satisfying power constraints. Caution: This is not a compress-forward strategy since we are not trying to reconstruct any of the quantized outputs. ecoding estination finds all the messages w that are jointly typical with received quantized sequence. Note: The relays do not decode any part of the message.

79 Typicality and typical sequences Important tool in information theory eterministic layered network General deterministic network Gaussian layered network Compound relay networks Typical sequence: For i.i.d. generated sequence u 1,..., u T is typical with respect to probability measure p if, 1 T log p(u 1,...,u T ) = 1 T t log p(u t ) T H(U) Jointly typical sequences: Sequences {(u t, v t } generated i.i.d. are jointly typical if individually they are typical and 1 T log p(u 1,..., u T, v 1,..., v T ) = 1 T t log p(u t, v t ) T H(U, V) Facts: For i.i.d. generated sequences, the probability of getting atypical sequence is exponentially small. All typical sequences are asymptotically equally likely.

80 Ingredients of analysis Perturbation of deterministic case eterministic layered network General deterministic network Gaussian layered network Compound relay networks w ball w ball Can distinguish w, w ŷ A1 A 1 Ω B 1 Ω Cannot distinguish w, w w ball ŷ A2 S w Ω ball A 2 Ω c B 2 Ω c Ω c Typicality Message w multiple transmitted signals. Message jointly typical (quantized) signal, any plausible sequence that is typical with it.

81 Ingredients of analysis Perturbation of deterministic case eterministic layered network General deterministic network Gaussian layered network Compound relay networks S Ω Can distinguish w, w Cannot distinguish w, w A 1 Ω B 1 Ω A 2 Ω c B 2 Ω c Ω c w ball ŷ w ball Error events estination quantized signal typical with w and w = cannot distinguish between them. signals. istinguishablity: Nodes that are not jointly typical with both w and w. ivide network into nodes that can and cannot distinguish w, w = defines a source-destination separation cut.

82 Ingredients of analysis Perturbation of deterministic case Can distinguish w, w eterministic layered network General deterministic network Gaussian layered network Compound relay networks w ball w ball A 1 Ω B 1 Ω ŷ B1 S Ω A 2 Ω c B 2 Ω c Ω c w ball w ball Cannot distinguish w, w ŷ B2 Putting it together: For particular plausible signal under w is confusable with probability: P 2 T»I(X Ω ;ŶΩ c X Ω c ) Union bound: P X(w T ) 2 {z } 2 Tγ»I(X Ω ;ŶΩ c X Ω c )»I(X 2 T Ω ;ŶΩ c X Ω c ) γ

83 Finishing touches eterministic layered network General deterministic network Gaussian layered network Compound relay networks Components of gap: κ = β + γ + δ Lose β bits due to noise-level quantization. Lose γ bits due to transmit list. Lose δ bits for independent distribution beamforming loss. Layered general networks: Time expansion and single-letterization like in deterministic case. Implication: For cut-set bound C, C κ C C

84 Compound relay networks eterministic layered network General deterministic network Gaussian layered network Compound relay networks Compound model: Channel realizations from a set h i,j H i,j, unknown to sender. Observations: Theorem Relay strategy does not depend on the channel realization. Overall network from source to destination behaves like a compound channel. Utilize point-to-point compound channel ideas get approximate characterization for compound network. Given a compound Gaussian relay network the capacity C cn satisfies C cn κ C cn C cn, where C cn = max p({xj } j V ) inf h H min Ω Λ I(Y Ω c; X Ω X Ω c).

85 Relay networks: Open questions and extensions Š#/,% 0/,94%#(.)15% Extensions: Outage set behavior for full duplex networks. of half-duplex systems with fixed transmit fractions. Ergodic channel variations. Open questions: -M trade-off for channel dependent half-duplex systems. Tightening gap to cut-set bound. Use deterministic model directly to get Gaussian result.

86 Extensions of deterministic approach Š#/,% 0/,94%#(.)15% Interference channel: Successfully used to generate approximate characterization (Bresler and Tse, 2007), K -user interference channel: Used to demonstrate new phenomenon of interference alignment (Bresler-Tse, 2007, Jafar 2007). Relay-interference networks: Extension of multiple unicast to wireless networks (Mohajer, iggavi, Fragouli and Tse, 2008). Wireless network secrecy: Used to demonstrate secrecy over networks (iggavi, Perron and Telatar, 2008). Network data compression: Identify correct multi-terminal lossless structures to get approximation to multiple-description data compression (Tian, Mohajer and iggavi, 2007).

87 Program: Hope: Focus on underlying deterministic coding problem. Obtain exact characterization this is a central challenge. Use insight to obtain approximate characterization of noisy problem. The program will yield insight to network flow problems. Exposes the central difficulties, solution insights and new schemes? Approximations may be sufficient for engineering practice. In this talk: Obtained approximate max-flow min-cut characterization for noisy relay networks. Papers/preprints:

A Bit of network information theory

A Bit of network information theory Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Coding for Noisy Networks

Coding for Noisy Networks Coding for Noisy Networks Abbas El Gamal Stanford University ISIT Plenary, June 2010 A. El Gamal (Stanford University) Coding for Noisy Networks ISIT Plenary, June 2010 1 / 46 Introduction Over past 40+

More information

Interference: An Information Theoretic View

Interference: An Information Theoretic View Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

Scheduling in omnidirectional relay wireless networks

Scheduling in omnidirectional relay wireless networks Scheduling in omnidirectional relay wireless networks by Shuning Wang A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Applied Science

More information

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying 013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić

More information

Computing and Communications 2. Information Theory -Channel Capacity

Computing and Communications 2. Information Theory -Channel Capacity 1896 1920 1987 2006 Computing and Communications 2. Information Theory -Channel Capacity Ying Cui Department of Electronic Engineering Shanghai Jiao Tong University, China 2017, Autumn 1 Outline Communication

More information

Information Flow in Wireless Networks

Information Flow in Wireless Networks Information Flow in Wireless Networks Srikrishna Bhashyam Department of Electrical Engineering Indian Institute of Technology Madras National Conference on Communications IIT Kharagpur 3 Feb 2012 Srikrishna

More information

Approximately Optimal Wireless Broadcasting

Approximately Optimal Wireless Broadcasting Approximately Optimal Wireless Broadcasting Sreeram Kannan, Adnan Raja, and Pramod Viswanath Abstract We study a wireless broadcast network, where a single source reliably communicates independent messages

More information

Network Information Theory

Network Information Theory 1 / 191 Network Information Theory Young-Han Kim University of California, San Diego Joint work with Abbas El Gamal (Stanford) IEEE VTS San Diego 2009 2 / 191 Network Information Flow Consider a general

More information

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter On Fading Broadcast Channels with Partial Channel State Information at the Transmitter Ravi Tandon 1, ohammad Ali addah-ali, Antonia Tulino, H. Vincent Poor 1, and Shlomo Shamai 3 1 Dept. of Electrical

More information

Opportunistic network communications

Opportunistic network communications Opportunistic network communications Suhas Diggavi School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS) Ecole Polytechnique Fédérale de Lausanne (EPFL)

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels

Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Lizhong Zheng and David Tse Department of EECS, U.C. Berkeley Feb 26, 2002 MSRI Information Theory Workshop Wireless Fading Channels

More information

Cooperation in Wireless Networks

Cooperation in Wireless Networks Cooperation in Wireless Networks Ivana Marić and Ron Dabora Stanford 15 September 2008 Ivana Marić and Ron Dabora Cooperation in Wireless Networks 1 Objectives The case for cooperation Types of cooperation

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Variations on the Index Coding Problem: Pliable Index Coding and Caching

Variations on the Index Coding Problem: Pliable Index Coding and Caching Variations on the Index Coding Problem: Pliable Index Coding and Caching T. Liu K. Wan D. Tuninetti University of Illinois at Chicago Shannon s Centennial, Chicago, September 23rd 2016 D. Tuninetti (UIC)

More information

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 28-30, 2011 Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Zhiyu Cheng, Natasha

More information

Degrees of Freedom of Bursty Multiple Access Channels with a Relay

Degrees of Freedom of Bursty Multiple Access Channels with a Relay Fifty-third Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 29 - October 2, 205 Degrees of Freedom of Bursty Multiple Access Channels with a Relay Sunghyun im and Changho Suh Department

More information

DELAY CONSTRAINED MULTIMEDIA COMMUNICATIONS: COMPARING SOURCE-CHANNEL APPROACHES FOR QUASI-STATIC FADING CHANNELS. A Thesis

DELAY CONSTRAINED MULTIMEDIA COMMUNICATIONS: COMPARING SOURCE-CHANNEL APPROACHES FOR QUASI-STATIC FADING CHANNELS. A Thesis DELAY CONSTRAINED MULTIMEDIA COMMUNICATIONS: COMPARING SOURCE-CHANNEL APPROACHES FOR QUASI-STATIC FADING CHANNELS A Thesis Submitted to the Graduate School of the University of Notre Dame in Partial Fulfillment

More information

arxiv: v1 [cs.it] 12 Jan 2011

arxiv: v1 [cs.it] 12 Jan 2011 On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom

More information

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010 Interference Channels With Correlated Receiver Side Information Nan Liu, Member, IEEE, Deniz Gündüz, Member, IEEE, Andrea J.

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

Dynamic QMF for Half-Duplex Relay Networks

Dynamic QMF for Half-Duplex Relay Networks ynamic QMF for Half-uple Relay Networks Ayfer Özgür tanford University aozgur@stanford.edu uhas iggavi UCLA suhas@ee.ucla.edu Abstract The value of relay nodes to enhance the error performance versus rate

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

The Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay

The Degrees of Freedom of Full-Duplex. Bi-directional Interference Networks with and without a MIMO Relay The Degrees of Freedom of Full-Duplex 1 Bi-directional Interference Networks with and without a MIMO Relay Zhiyu Cheng, Natasha Devroye, Tang Liu University of Illinois at Chicago zcheng3, devroye, tliu44@uic.edu

More information

Feedback via Message Passing in Interference Channels

Feedback via Message Passing in Interference Channels Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of

More information

Exploiting Interference through Cooperation and Cognition

Exploiting Interference through Cooperation and Cognition Exploiting Interference through Cooperation and Cognition Stanford June 14, 2009 Joint work with A. Goldsmith, R. Dabora, G. Kramer and S. Shamai (Shitz) The Role of Wireless in the Future The Role of

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing

On Optimum Communication Cost for Joint Compression and Dispersive Information Routing 2010 IEEE Information Theory Workshop - ITW 2010 Dublin On Optimum Communication Cost for Joint Compression and Dispersive Information Routing Kumar Viswanatha, Emrah Akyol and Kenneth Rose Department

More information

On Information Theoretic Interference Games With More Than Two Users

On Information Theoretic Interference Games With More Than Two Users On Information Theoretic Interference Games With More Than Two Users Randall A. Berry and Suvarup Saha Dept. of EECS Northwestern University e-ma: rberry@eecs.northwestern.edu suvarups@u.northwestern.edu

More information

Uplink Multicell Processing with Limited Backhaul via Successive Interference Cancellation

Uplink Multicell Processing with Limited Backhaul via Successive Interference Cancellation Globecom - Communication Theory Symposium Uplin Multicell Processing with Limited Bachaul via Successive Interference Cancellation Lei Zhou and Wei Yu Department of Electrical and Computer Engineering,

More information

Analog network coding in the high-snr regime

Analog network coding in the high-snr regime Analog network coding in the high-snr regime The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Médard,

More information

Rab Nawaz. Prof. Zhang Wenyi

Rab Nawaz. Prof. Zhang Wenyi Rab Nawaz PhD Scholar (BL16006002) School of Information Science and Technology University of Science and Technology of China, Hefei Email: rabnawaz@mail.ustc.edu.cn Submitted to Prof. Zhang Wenyi wenyizha@ustc.edu.cn

More information

Role of a Relay in Bursty Multiple Access Channels

Role of a Relay in Bursty Multiple Access Channels 1 Role of a Relay in Bursty Multiple Access Channels Sunghyun Kim, Member, IEEE, Soheil Mohajer, Member, IEEE, and Changho Suh, Member, IEEE arxiv:1604.04961v1 [cs.it] 18 Apr 2016 Abstract We investigate

More information

Interference Management in Wireless Networks

Interference Management in Wireless Networks Interference Management in Wireless Networks Aly El Gamal Department of Electrical and Computer Engineering Purdue University Venu Veeravalli Coordinated Science Lab Department of Electrical and Computer

More information

A unified graphical approach to

A unified graphical approach to A unified graphical approach to 1 random coding for multi-terminal networks Stefano Rini and Andrea Goldsmith Department of Electrical Engineering, Stanford University, USA arxiv:1107.4705v3 [cs.it] 14

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

From Wireless Network Coding to Matroids. Rico Zenklusen

From Wireless Network Coding to Matroids. Rico Zenklusen From Wireless Network Coding to Matroids Rico Zenklusen A sketch of my research areas/interests Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications

More information

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta

More information

ECE 4400:693 - Information Theory

ECE 4400:693 - Information Theory ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 1: Introduction & Overview Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Information Theory 1 / 26 Outline 1 Course Information 2 Course Overview

More information

The Multi-way Relay Channel

The Multi-way Relay Channel The Multi-way Relay Channel Deniz Gündüz, Aylin Yener, Andrea Goldsmith, H. Vincent Poor Department of Electrical Engineering, Stanford University, Stanford, CA Department of Electrical Engineering, Princeton

More information

Degrees of Freedom in Multiuser MIMO

Degrees of Freedom in Multiuser MIMO Degrees of Freedom in Multiuser MIMO Syed A Jafar Electrical Engineering and Computer Science University of California Irvine, California, 92697-2625 Email: syed@eceuciedu Maralle J Fakhereddin Department

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C.

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 5, MAY 2011 2941 Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, David N C Tse, Fellow, IEEE Abstract

More information

SHANNON S source channel separation theorem states

SHANNON S source channel separation theorem states IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 9, SEPTEMBER 2009 3927 Source Channel Coding for Correlated Sources Over Multiuser Channels Deniz Gündüz, Member, IEEE, Elza Erkip, Senior Member,

More information

Efficiency and detectability of random reactive jamming in wireless networks

Efficiency and detectability of random reactive jamming in wireless networks Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering

More information

IN recent years, there has been great interest in the analysis

IN recent years, there has been great interest in the analysis 2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We

More information

Degrees of Freedom of Wireless X Networks

Degrees of Freedom of Wireless X Networks Degrees of Freedom of Wireless X Networks 1 Viveck R. Cadambe, Syed A. Jafar Center for Pervasive Communications and Computing Electrical Engineering and Computer Science University of California Irvine,

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

Practical Cooperative Coding for Half-Duplex Relay Channels

Practical Cooperative Coding for Half-Duplex Relay Channels Practical Cooperative Coding for Half-Duplex Relay Channels Noah Jacobsen Alcatel-Lucent 600 Mountain Avenue Murray Hill, NJ 07974 jacobsen@alcatel-lucent.com Abstract Simple variations on rate-compatible

More information

An Introduction to Distributed Channel Coding

An Introduction to Distributed Channel Coding An Introduction to Distributed Channel Coding Alexandre Graell i Amat and Ragnar Thobaben Department of Signals and Systems, Chalmers University of Technology, Gothenburg, Sweden School of Electrical Engineering,

More information

Problem Sheet 1 Probability, random processes, and noise

Problem Sheet 1 Probability, random processes, and noise Problem Sheet 1 Probability, random processes, and noise 1. If F X (x) is the distribution function of a random variable X and x 1 x 2, show that F X (x 1 ) F X (x 2 ). 2. Use the definition of the cumulative

More information

Chapter Number. Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks

Chapter Number. Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks Chapter Number Parameter Estimation Over Noisy Communication Channels in Distributed Sensor Networks Thakshila Wimalajeewa 1, Sudharman K. Jayaweera 1 and Carlos Mosquera 2 1 Dept. of Electrical and Computer

More information

Receiver Design for Noncoherent Digital Network Coding

Receiver Design for Noncoherent Digital Network Coding Receiver Design for Noncoherent Digital Network Coding Terry Ferrett 1 Matthew Valenti 1 Don Torrieri 2 1 West Virginia University 2 U.S. Army Research Laboratory November 3rd, 2010 1 / 25 Outline 1 Introduction

More information

Communication Theory II

Communication Theory II Communication Theory II Lecture 13: Information Theory (cont d) Ahmed Elnakib, PhD Assistant Professor, Mansoura University, Egypt March 22 th, 2015 1 o Source Code Generation Lecture Outlines Source Coding

More information

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels

Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels IET Communications Research Article Minimum number of antennas and degrees of freedom of multiple-input multiple-output multi-user two-way relay X channels ISSN 1751-8628 Received on 28th July 2014 Accepted

More information

Information Theory: the Day after Yesterday

Information Theory: the Day after Yesterday : the Day after Yesterday Department of Electrical Engineering and Computer Science Chicago s Shannon Centennial Event September 23, 2016 : the Day after Yesterday IT today Outline The birth of information

More information

ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks

ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks Salman Avestimehr In collaboration with Navid Naderializadeh ITA 2/10/14 D2D Communication Device-to-Device (D2D) communication

More information

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network Meghana Bande, Venugopal V. Veeravalli ECE Department and CSL University of Illinois at Urbana-Champaign Email: {mbande,vvv}@illinois.edu

More information

Data Rate and Throughput Analysis of Cooperative Cognitive Radio Under a Collision Model

Data Rate and Throughput Analysis of Cooperative Cognitive Radio Under a Collision Model Data Rate and Throughput Analysis of Cooperative Cognitive Radio Under a Collision Model Seyed Hossein Seyedmehdi and Ben Liang Department of Electrical and Computer Engineering University of Toronto,

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Guaranteeing Secrecy in Wireless Networks using Artificial Noise

Guaranteeing Secrecy in Wireless Networks using Artificial Noise Guaranteeing Secrecy in Wireless Networks using Artificial Noise Submitted by: Satashu Goel Department of Electrical and Computer Engineering Advisor: Professor Rohit Negi Department of Electrical and

More information

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:

More information

SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication

SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication SIGNALS AND SYSTEMS LABORATORY 13: Digital Communication INTRODUCTION Digital Communication refers to the transmission of binary, or digital, information over analog channels. In this laboratory you will

More information

On Event Signal Reconstruction in Wireless Sensor Networks

On Event Signal Reconstruction in Wireless Sensor Networks On Event Signal Reconstruction in Wireless Sensor Networks Barış Atakan and Özgür B. Akan Next Generation Wireless Communications Laboratory Department of Electrical and Electronics Engineering Middle

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA

The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University,

More information

Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy

Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy Space-Time Coded Cooperative Multicasting with Maximal Ratio Combining and Incremental Redundancy Aitor del Coso, Osvaldo Simeone, Yeheskel Bar-ness and Christian Ibars Centre Tecnològic de Telecomunicacions

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

EE303: Communication Systems

EE303: Communication Systems EE303: Communication Systems Professor A. Manikas Chair of Communications and Array Processing Imperial College London An Overview of Fundamentals: Channels, Criteria and Limits Prof. A. Manikas (Imperial

More information

Generalized Signal Alignment For MIMO Two-Way X Relay Channels

Generalized Signal Alignment For MIMO Two-Way X Relay Channels Generalized Signal Alignment For IO Two-Way X Relay Channels Kangqi Liu, eixia Tao, Zhengzheng Xiang and Xin Long Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China Emails:

More information

Communications Theory and Engineering

Communications Theory and Engineering Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 TDMA, FDMA, CDMA (cont d) and the Capacity of multi-user channels Code Division

More information

CONSIDER a sensor network of nodes taking

CONSIDER a sensor network of nodes taking 5660 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 9, SEPTEMBER 2011 Wyner-Ziv Coding Over Broadcast Channels: Hybrid Digital/Analog Schemes Yang Gao, Student Member, IEEE, Ertem Tuncel, Member,

More information

Yale University Department of Computer Science

Yale University Department of Computer Science LUX ETVERITAS Yale University Department of Computer Science Secret Bit Transmission Using a Random Deal of Cards Michael J. Fischer Michael S. Paterson Charles Rackoff YALEU/DCS/TR-792 May 1990 This work

More information

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications 1 Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications Shaofeng Zou, Student Member, IEEE, Yingbin Liang, Member, IEEE, Lifeng Lai, Member, IEEE, H. Vincent Poor, Fellow,

More information

Minimax Universal Sampling for Compound Multiband Channels

Minimax Universal Sampling for Compound Multiband Channels ISIT 2013, Istanbul July 9, 2013 Minimax Universal Sampling for Compound Multiband Channels Yuxin Chen, Andrea Goldsmith, Yonina Eldar Stanford University Technion Capacity of Undersampled Channels Point-to-point

More information

State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class

State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY 2013 2629 State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class Majid Nasiri Khormuji, Member, IEEE, Abbas

More information

Causal state amplification

Causal state amplification 20 IEEE International Symposium on Information Theory Proceedings Causal state amplification Chiranjib Choudhuri, Young-Han Kim and Urbashi Mitra Abstract A problem of state information transmission over

More information

1162 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 4, APRIL 2015

1162 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 4, APRIL 2015 116 IEEE TRANSACTIONS ON COMMUNICATIONS VOL. 63 NO. 4 APRIL 15 Outage Analysis for Coherent Decode-Forward Relaying Over Rayleigh Fading Channels Ahmad Abu Al Haija Student Member IEEE andmaivusenior Member

More information

CorteXlab: research. opportunities. Jean-Marie Gorce

CorteXlab: research. opportunities. Jean-Marie Gorce CorteXlab: research opportunities Jean-Marie Gorce jean-marie.gorce@insa-lyon.fr CorteXlab inauguration Tuesday, October 28, 2014 Which theoretical framework? EM theory Information theory Queuing theory

More information

Collaborative decoding in bandwidth-constrained environments

Collaborative decoding in bandwidth-constrained environments 1 Collaborative decoding in bandwidth-constrained environments Arun Nayagam, John M. Shea, and Tan F. Wong Wireless Information Networking Group (WING), University of Florida Email: arun@intellon.com,

More information

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE 1850 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 State Amplification Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE Abstract We consider the problem

More information

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling On Achieving Local View Capacity Via Maximal Independent Graph Scheduling Vaneet Aggarwal, A. Salman Avestimehr and Ashutosh Sabharwal Abstract If we know more, we can achieve more. This adage also applies

More information

SHANNON showed that feedback does not increase the capacity

SHANNON showed that feedback does not increase the capacity IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2667 Feedback Capacity of the Gaussian Interference Channel to Within 2 Bits Changho Suh, Student Member, IEEE, and David N. C. Tse, Fellow,

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

TWO-WAY communication between two nodes was first

TWO-WAY communication between two nodes was first 6060 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015 On the Capacity Regions of Two-Way Diamond Channels Mehdi Ashraphijuo, Vaneet Aggarwal, Member, IEEE, and Xiaodong Wang, Fellow,

More information

Fundamentals of Digital Communication

Fundamentals of Digital Communication Fundamentals of Digital Communication Network Infrastructures A.A. 2017/18 Digital communication system Analog Digital Input Signal Analog/ Digital Low Pass Filter Sampler Quantizer Source Encoder Channel

More information

The Wireless Data Crunch: Motivating Research in Wireless Communications

The Wireless Data Crunch: Motivating Research in Wireless Communications The Wireless Data Crunch: Motivating Research in Wireless Communications Stephen Hanly CSIRO-Macquarie University Chair in Wireless Communications stephen.hanly@mq.edu.au Wireless Growth Rate Cooper s

More information

6.450: Principles of Digital Communication 1

6.450: Principles of Digital Communication 1 6.450: Principles of Digital Communication 1 Digital Communication: Enormous and normally rapidly growing industry, roughly comparable in size to the computer industry. Objective: Study those aspects of

More information

Bounds on Achievable Rates for Cooperative Channel Coding

Bounds on Achievable Rates for Cooperative Channel Coding Bounds on Achievable Rates for Cooperative Channel Coding Ameesh Pandya and Greg Pottie Department of Electrical Engineering University of California, Los Angeles {ameesh, pottie}@ee.ucla.edu Abstract

More information

4. Which of the following channel matrices respresent a symmetric channel? [01M02] 5. The capacity of the channel with the channel Matrix

4. Which of the following channel matrices respresent a symmetric channel? [01M02] 5. The capacity of the channel with the channel Matrix Send SMS s : ONJntuSpeed To 9870807070 To Recieve Jntu Updates Daily On Your Mobile For Free www.strikingsoon.comjntu ONLINE EXMINTIONS [Mid 2 - dc] http://jntuk.strikingsoon.com 1. Two binary random

More information

Capacity and Cooperation in Wireless Networks

Capacity and Cooperation in Wireless Networks Capacity and Cooperation in Wireless Networks Chris T. K. Ng and Andrea J. Goldsmith Stanford University Abstract We consider fundamental capacity limits in wireless networks where nodes can cooperate

More information

Multiuser Information Theory and Wireless Communications. Professor in Charge: Toby Berger Principal Lecturer: Jun Chen

Multiuser Information Theory and Wireless Communications. Professor in Charge: Toby Berger Principal Lecturer: Jun Chen Multiuser Information Theory and Wireless Communications Professor in Charge: Toby Berger Principal Lecturer: Jun Chen Where and When? 1 Good News No homework. No exam. 2 Credits:1-2 One credit: submit

More information

Two Models for Noisy Feedback in MIMO Channels

Two Models for Noisy Feedback in MIMO Channels Two Models for Noisy Feedback in MIMO Channels Vaneet Aggarwal Princeton University Princeton, NJ 08544 vaggarwa@princeton.edu Gajanana Krishna Stanford University Stanford, CA 94305 gkrishna@stanford.edu

More information