32 research outputs found
Capacity Bounds for a Class of Interference Relay Channels
The capacity of a class of Interference Relay Channels (IRC) -the Injective
Semideterministic IRC where the relay can only observe one of the sources- is
investigated. We first derive a novel outer bound and two inner bounds which
are based on a careful use of each of the available cooperative strategies
together with the adequate interference decoding technique. The outer bound
extends Telatar and Tse's work while the inner bounds contain several known
results in the literature as special cases. Our main result is the
characterization of the capacity region of the Gaussian class of IRCs studied
within a fixed number of bits per dimension -constant gap. The proof relies on
the use of the different cooperative strategies in specific SNR regimes due to
the complexity of the schemes. As a matter of fact, this issue reveals the
complex nature of the Gaussian IRC where the combination of a single coding
scheme for the Gaussian relay and interference channel may not lead to a good
coding scheme for this problem, even when the focus is only on capacity to
within a constant gap over all possible fading statistics.Comment: 23 pages, 6 figures. Submitted to IEEE Transactions on Information
Theory (revised version
Capacity of a Class of Deterministic Relay Channels
The capacity of a class of deterministic relay channels with the transmitter
input X, the receiver output Y, the relay output Y_1 = f(X, Y), and a separate
communication link from the relay to the receiver with capacity R_0, is shown
to be
C(R_0) = \max_{p(x)} \min \{I(X;Y)+R_0, I(X;Y, Y_1) \}.
Thus every bit from the relay is worth exactly one bit to the receiver. Two
alternative coding schemes are presented that achieve this capacity. The first
scheme, ``hash-and-forward'', is based on a simple yet novel use of random
binning on the space of relay outputs, while the second scheme uses the usual
``compress-and-forward''. In fact, these two schemes can be combined together
to give a class of optimal coding schemes. As a corollary, this relay capacity
result confirms a conjecture by Ahlswede and Han on the capacity of a channel
with rate-limited state information at the decoder in the special case when the
channel state is recoverable from the channel input and the output.Comment: 17 pages, submitted to IEEE Transactions on Information Theor
Capacity of a Class of State-Dependent Orthogonal Relay Channels
The class of orthogonal relay channels in which the orthogonal channels
connecting the source terminal to the relay and the destination, and the relay
to the destination, depend on a state sequence, is considered. It is assumed
that the state sequence is fully known at the destination while it is not known
at the source or the relay. The capacity of this class of relay channels is
characterized, and shown to be achieved by the partial
decode-compress-and-forward (pDCF) scheme. Then the capacity of certain binary
and Gaussian state-dependent orthogonal relay channels are studied in detail,
and it is shown that the compress-and-forward (CF) and
partial-decode-and-forward (pDF) schemes are suboptimal in general. To the best
of our knowledge, this is the first single relay channel model for which the
capacity is achieved by pDCF, while pDF and CF schemes are both suboptimal.
Furthermore, it is shown that the capacity of the considered class of
state-dependent orthogonal relay channels is in general below the cut-set
bound. The conditions under which pDF or CF suffices to meet the cut-set bound,
and hence, achieve the capacity, are also derived.Comment: This paper has been accepted by IEEE Transactions on Information
Theor
Cooperative Binning for Semi-deterministic Channels with Non-causal State Information
The capacity of the semi-deterministic relay channel (SD-RC) with non-causal
channel state information (CSI) only at the encoder and decoder is
characterized. The capacity is achieved by a scheme based on
cooperative-bin-forward. This scheme allows cooperation between the transmitter
and the relay without the need to decode a part of the message by the relay.
The transmission is divided into blocks and each deterministic output of the
channel (observed by the relay) is mapped to a bin. The bin index is used by
the encoder and the relay to choose the cooperation codeword in the next
transmission block. In causal settings the cooperation is independent of the
state. In \emph{non-causal} settings dependency between the relay's
transmission and the state can increase the transmission rates. The encoder
implicitly conveys partial state information to the relay. In particular, it
uses the states of the next block and selects a cooperation codeword
accordingly and the relay transmission depends on the cooperation codeword and
therefore also on the states. We also consider the multiple access channel with
partial cribbing as a semi-deterministic channel. The capacity region of this
channel with non-causal CSI is achieved by the new scheme. Examining the result
in several cases, we introduce a new problem of a point-to-point (PTP) channel
where the state is provided to the transmitter by a state encoder.
Interestingly, even though the CSI is also available at the receiver, we
provide an example which shows that the capacity with non-causal CSI at the
state encoder is strictly larger than the capacity with causal CSI
Wiretap and Gelfand-Pinsker Channels Analogy and its Applications
An analogy framework between wiretap channels (WTCs) and state-dependent
point-to-point channels with non-causal encoder channel state information
(referred to as Gelfand-Pinker channels (GPCs)) is proposed. A good sequence of
stealth-wiretap codes is shown to induce a good sequence of codes for a
corresponding GPC. Consequently, the framework enables exploiting existing
results for GPCs to produce converse proofs for their wiretap analogs. The
analogy readily extends to multiuser broadcasting scenarios, encompassing
broadcast channels (BCs) with deterministic components, degradation ordering
between users, and BCs with cooperative receivers. Given a wiretap BC (WTBC)
with two receivers and one eavesdropper, an analogous Gelfand-Pinsker BC (GPBC)
is constructed by converting the eavesdropper's observation sequence into a
state sequence with an appropriate product distribution (induced by the
stealth-wiretap code for the WTBC), and non-causally revealing the states to
the encoder. The transition matrix of the state-dependent GPBC is extracted
from WTBC's transition law, with the eavesdropper's output playing the role of
the channel state. Past capacity results for the semi-deterministic (SD) GPBC
and the physically-degraded (PD) GPBC with an informed receiver are leveraged
to furnish analogy-based converse proofs for the analogous WTBC setups. This
characterizes the secrecy-capacity regions of the SD-WTBC and the PD-WTBC, in
which the stronger receiver also observes the eavesdropper's channel output.
These derivations exemplify how the wiretap-GP analogy enables translating
results on one problem into advances in the study of the other
Communication Sécurisée et Coopération dans les Réseaux sans Fil avec Interférences and of their Inverter
In this thesis, we conduct an information-theoretic study on two important aspects of wireless communications: the improvement of data throughput in interference-limited networks by means of cooperation between users and the strengthening of the security of transmissions with the help of feedback.In the first part of the thesis, we focus on the simplest model that encompasses interference and cooperation, the Interference Relay Channel (IRC). Our goal is to characterize within a fixed number of bits the capacity region of the Gaussian IRC, independent of any channel conditions. To do so, we derive a novel outer bound and two inner bounds. Specifically, the outer bound is obtained thanks to a nontrivial extension we propose of the injective semideterministic class of channels, originally derived by Telatar and Tse for the Interference Channel (IC).In the second part of the thesis, we investigate the Wiretap Channel with Generalized Feedback (WCGF) and our goal is to provide a general transmission strategy that encompasses the existing results for different feedback models found in the literature. To this end, we propose two different inner bounds on the capacity of the memoryless WCGF. We first derive an inner bound that is based on the use of joint source-channel coding, which introduces time dependencies between the feedback outputs and the channel inputs through different time blocks. We then introduce a second inner bound where the feedback link is used to generate a key that encrypts the message partially or completely.Dans cette thèse, nous menons une étude dans le cadre de la théorie de l'information sur deux questions importantes de la communication sans fil : l'amélioration du débit de données dans les réseaux avec interférence grâce à la coopération entre utilisateurs et le renforcement de la sécurité des transmissions à l'aide d'un signal de rétroaction.Dans la première partie de la thèse, nous nous concentrons sur le modèle le plus simple qui intègre à la fois l'interférence et la coopération, le canal à relais et interférence ou IRC (Interference Relay Channel). Notre objectif est de caractériser dans un nombre fixe de bits la région de capacité du IRC gaussien. À cette fin, nous dérivons une nouvelle limite supérieure de la capacité et deux stratégies de transmission. La limite supérieure est notamment obtenue grâce à une extension non triviale que nous proposons, de la classe de canaux semi-déterministe et injective à l'origine dérivée par Telatar et Tse pour le canal à interférence.Dans la seconde partie, nous étudions le canal avec espion et rétroaction généralisée ou WCGF (Wiretap Channel with Generalized Feedback). Notre objectif est de développer une stratégie de transmission générale qui englobe les résultats existants pour les différents modèles de rétroaction trouvés dans la littérature. À cette fin, nous proposons deux stratégies de transmission différentes sur la capacité du WCGF sans mémoire. Nous dérivons d'abord une stratégie qui est basée sur le codage source-canal conjoint. Nous introduisons ensuite une seconde stratégie où le signal de rétroaction est utilisé pour générer une clé secrète qui permet de chiffrer le message partiellement ou totalement