2,920 research outputs found
Capacity Bounds for a Class of Diamond Networks
A class of diamond networks are studied where the broadcast component is
modelled by two independent bit-pipes. New upper and low bounds are derived on
the capacity which improve previous bounds. The upper bound is in the form of a
max-min problem, where the maximization is over a coding distribution and the
minimization is over an auxiliary channel. The proof technique generalizes
bounding techniques of Ozarow for the Gaussian multiple description problem
(1981), and Kang and Liu for the Gaussian diamond network (2011). The bounds
are evaluated for a Gaussian multiple access channel (MAC) and the binary adder
MAC, and the capacity is found for interesting ranges of the bit-pipe
capacities
Zero-error communication over adder MAC
Adder MAC is a simple noiseless multiple-access channel (MAC), where if users
send messages , then the receiver receives with addition over . Communication over the
noiseless adder MAC has been studied for more than fifty years. There are two
models of particular interest: uniquely decodable code tuples, and -codes.
In spite of the similarities between these two models, lower bounds and upper
bounds of the optimal sum rate of uniquely decodable code tuple asymptotically
match as number of users goes to infinity, while there is a gap of factor two
between lower bounds and upper bounds of the optimal rate of -codes.
The best currently known -codes for are constructed using
random coding. In this work, we study variants of the random coding method and
related problems, in hope of achieving -codes with better rate. Our
contribution include the following. (1) We prove that changing the underlying
distribution used in random coding cannot improve the rate. (2) We determine
the rate of a list-decoding version of -codes achieved by the random
coding method. (3) We study several related problems about R\'{e}nyi entropy.Comment: An updated version of author's master thesi
Sign-Compute-Resolve for Random Access
We present an approach to random access that is based on three elements:
physical-layer network coding, signature codes and tree splitting. Upon
occurrence of a collision, physical-layer network coding enables the receiver
to decode the sum of the information that was transmitted by the individual
users. For each user this information consists of the data that the user wants
to communicate as well as the user's signature. As long as no more than
users collide, their identities can be recovered from the sum of their
signatures. A splitting protocol is used to deal with the case that more than
users collide. We measure the performance of the proposed method in terms
of user resolution rate as well as overall throughput of the system. The
results show that our approach significantly increases the performance of the
system even compared to coded random access, where collisions are not wasted,
but are reused in successive interference cancellation.Comment: Accepted for presentation at 52nd Annual Allerton Conference on
Communication, Control, and Computin
Random Access Channel Coding in the Finite Blocklength Regime
Consider a random access communication scenario over a channel whose
operation is defined for any number of possible transmitters. Inspired by the
model recently introduced by Polyanskiy for the Multiple Access Channel (MAC)
with a fixed, known number of transmitters, we assume that the channel is
invariant to permutations on its inputs, and that all active transmitters
employ identical encoders. Unlike Polyanskiy, we consider a scenario where
neither the transmitters nor the receiver know which transmitters are active.
We refer to this agnostic communication setup as the Random Access Channel, or
RAC. Scheduled feedback of a finite number of bits is used to synchronize the
transmitters. The decoder is tasked with determining from the channel output
the number of active transmitters () and their messages but not which
transmitter sent which message. The decoding procedure occurs at a time
depending on the decoder's estimate of the number of active transmitters,
, thereby achieving a rate that varies with the number of active
transmitters. Single-bit feedback at each time , enables all
transmitters to determine the end of one coding epoch and the start of the
next. The central result of this work demonstrates the achievability on a RAC
of performance that is first-order optimal for the MAC in operation during each
coding epoch. While prior multiple access schemes for a fixed number of
transmitters require simultaneous threshold rules, the proposed
scheme uses a single threshold rule and achieves the same dispersion.Comment: Presented at ISIT18', submitted to IEEE Transactions on Information
Theor
Functional-Decode-Forward for the General Discrete Memoryless Two-Way Relay Channel
We consider the general discrete memoryless two-way relay channel, where two
users exchange messages via a relay, and propose two functional-decode-forward
coding strategies for this channel. Functional-decode-forward involves the
relay decoding a function of the users' messages rather than the individual
messages themselves. This function is then broadcast back to the users, which
can be used in conjunction with the user's own message to decode the other
user's message. Via a numerical example, we show that functional-decode-forward
with linear codes is capable of achieving strictly larger sum rates than those
achievable by other strategies
Sign-Compute-Resolve for Tree Splitting Random Access
We present a framework for random access that is based on three elements:
physical-layer network coding (PLNC), signature codes and tree splitting. In
presence of a collision, physical-layer network coding enables the receiver to
decode, i.e. compute, the sum of the packets that were transmitted by the
individual users. For each user, the packet consists of the user's signature,
as well as the data that the user wants to communicate. As long as no more than
K users collide, their identities can be recovered from the sum of their
signatures. This framework for creating and transmitting packets can be used as
a fundamental building block in random access algorithms, since it helps to
deal efficiently with the uncertainty of the set of contending terminals. In
this paper we show how to apply the framework in conjunction with a
tree-splitting algorithm, which is required to deal with the case that more
than K users collide. We demonstrate that our approach achieves throughput that
tends to 1 rapidly as K increases. We also present results on net data-rate of
the system, showing the impact of the overheads of the constituent elements of
the proposed protocol. We compare the performance of our scheme with an upper
bound that is obtained under the assumption that the active users are a priori
known. Also, we consider an upper bound on the net data-rate for any PLNC based
strategy in which one linear equation per slot is decoded. We show that already
at modest packet lengths, the net data-rate of our scheme becomes close to the
second upper bound, i.e. the overhead of the contention resolution algorithm
and the signature codes vanishes.Comment: This is an extended version of arXiv:1409.6902. Accepted for
publication in the IEEE Transactions on Information Theor
Reliable Physical Layer Network Coding
When two or more users in a wireless network transmit simultaneously, their
electromagnetic signals are linearly superimposed on the channel. As a result,
a receiver that is interested in one of these signals sees the others as
unwanted interference. This property of the wireless medium is typically viewed
as a hindrance to reliable communication over a network. However, using a
recently developed coding strategy, interference can in fact be harnessed for
network coding. In a wired network, (linear) network coding refers to each
intermediate node taking its received packets, computing a linear combination
over a finite field, and forwarding the outcome towards the destinations. Then,
given an appropriate set of linear combinations, a destination can solve for
its desired packets. For certain topologies, this strategy can attain
significantly higher throughputs over routing-based strategies. Reliable
physical layer network coding takes this idea one step further: using
judiciously chosen linear error-correcting codes, intermediate nodes in a
wireless network can directly recover linear combinations of the packets from
the observed noisy superpositions of transmitted signals. Starting with some
simple examples, this survey explores the core ideas behind this new technique
and the possibilities it offers for communication over interference-limited
wireless networks.Comment: 19 pages, 14 figures, survey paper to appear in Proceedings of the
IEE
Hash-and-Forward Relaying for Two-Way Relay Channel
This paper considers a communication network comprised of two nodes, which
have no mutual direct communication links, communicating two-way with the aid
of a common relay node (RN), also known as separated two-way relay (TWR)
channel.
We first recall a cut-set outer bound for the set of rates in the context of
this network topology assuming full-duplex transmission capabilities. Then, we
derive a new achievable rate region based on hash-and-forward (HF) relaying
where the RN does not attempt to decode but instead hashes its received signal,
and show that under certain channel conditions it coincides with Shannon's
inner-bound for the two-way channel [1]. Moreover, for binary adder TWR channel
with additive noise at the nodes and the RN we provide a detailed capacity
achieving coding scheme based on structure codes.Comment: 5 pages, 2 figures, submitted to the IEEE ISIT'11 conferenc
- β¦