16 research outputs found

    Techniques for unequal error protection.

    Get PDF
    Ho Man-Shing.Thesis (M.Phil.)--Chinese University of Hong Kong, 2001.Includes bibliographical references (leaves 65-66).Abstracts in English and Chinese.Acknowledgement --- p.iAbstract --- p.iiList of Abbreviation --- p.iiiChapter 1. --- Introduction --- p.1Chapter 1.1 --- Digital Communication System --- p.3Chapter 1.2 --- Thesis Organization --- p.4Chapter 2. --- Error-Correcting Codes --- p.6Chapter 2.1 --- Convolutional Codes --- p.7Chapter 2.1.1 --- Generator Polynomials --- p.8Chapter 2.1.2 --- Generator Matrix --- p.9Chapter 2.1.3 --- Circuit Diagram --- p.10Chapter 2.1.4 --- State-transition Diagram --- p.11Chapter 2.1.4 --- Trellis Diagram --- p.12Chapter 2.1.5 --- Distance property --- p.13Chapter 2.2 --- Rate-Compatible Punctured Convolutional Codes --- p.14Chapter 2.3 --- Trellis-Coded Modulation --- p.17Chapter 2.3.1 --- General Model of TCM --- p.18Chapter 2.3.2 --- Trellis Representation --- p.20Chapter 2.3.3 --- Set Partitioning --- p.21Chapter 2.3.4 --- Code Modulation --- p.23Chapter 2.4 --- Decoding Algorithm --- p.25Chapter 2.4.1 --- Viterbi Algorithm --- p.27Chapter 2.4.2 --- List Viterbi Algorithm --- p.30Chapter 3. --- Unequal-Error-Protection for Embedded Image Coder --- p.33Chapter 3.1 --- SPIHT Coder --- p.35Chapter 3.1.1 --- Progressive Image Transmission --- p.36Chapter 3.1.2 --- Set Partitioning Sorting Algorithm --- p.37Chapter 3.1.3 --- Spatial Orientation Trees --- p.38Chapter 3.2 --- System Description --- p.39Chapter 3.3 --- Code Allocation --- p.41Chapter 3.4 --- System Complexity --- p.42Chapter 3.5 --- Simulation Result --- p.43Chapter 4. --- Unequal-Error-Protection Provided by Trellis-Coded Modulation --- p.51Chapter 4.1 --- System Description --- p.52Chapter 4.2 --- Unequal Constellation --- p.53Chapter 4.3 --- Free Distance --- p.55Chapter 4.4 --- Simulation Results --- p.59Chapter 5. --- Conclusion --- p.63Bibliography --- p.6

    When all information is not created equal

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.Includes bibliographical references (p. 191-196).Following Shannon's landmark paper, the classical theoretical framework for communication is based on a simplifying assumption that all information is equally important, thus aiming to provide a uniform protection to all information. However, this homogeneous view of information is not suitable for a variety of modern-day communication scenarios such as wireless and sensor networks, video transmission, interactive systems, and control applications. For example, an emergency alarm from a sensor network needs more protection than other transmitted information. Similarly, the coarse resolution of an image needs better protection than its finer details. For such heterogeneous information, if providing a uniformly high protection level to all parts of the information is infeasible, it is desirable to provide different protection levels based on the importance of those parts. The main objective of this thesis is to extend classical information theory to address this heterogeneous nature of information. Many theoretical tools needed for this are fundamentally different from the conventional homogeneous setting. One key issue is that bits are no more a sufficient measure of information. We develop a general framework for understanding the fundamental limits of transmitting such information, calculate such fundamental limits, and provide optimal architectures for achieving these limits. Our analysis shows that even without sacrificing the data-rate from channel capacity, some crucial parts of information can be protected with exponential reliability. This research would challenge the notion that a set of homogenous bits should necessarily be viewed as a universal interface to the physical layer; this potentially impacts the design of network architectures. This thesis also develops two novel approaches for simplifying such difficult problems in information theory. Our formulations are based on ideas from graphical models and Euclidean geometry and provide canonical examples for network information theory. They provide fresh insights into previously intractable problems as well as generalize previous related results.by Shashibhushan Prataprao Borade.Ph.D

    Anytime information theory

    Get PDF
    Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.Includes bibliographical references (p. 171-175).We study the reliable communication of delay-sensitive bit streams through noisy channels. To bring the issues into sharp focus, we will focus on the specific problem of communicating the values of an unstable real-valued discrete-time Markov random process through a finite capacity noisy channel so as to have finite average squared error from end-to-end. On the source side, we give a coding theorem for such unstable processes that shows that we can achieve the rate-distortion bound even in the infinite horizon case if we are willing to tolerate bounded delays in encoding and decoding. On the channel side, we define a new parametric notion of capacity called anytime capacity that corresponds to a sense of reliable transmission that is stronger than the traditional Shannon capacity sense but is less demanding than the sense underlying zero-error capacity. We show that anytime capacity exists for memoryless channels without feedback and is connected to standard random coding error exponents. The main result of the thesis is a new source/channel separation theorem that encompasses unstable processes and establishes that the stronger notion of anytime capacity is required to be able to deal with delay-sensitive bit streams. This theorem is then applied in the control systems context to show that anytime capacity is also required to evaluate channels if we intend to use them as part of a feedback link from sensing to actuation. Finally, the theorem is used to shed light on the concept of "quality of service requirements" by examining a toy mathematical example for which we prove the absolute necessity of differentiated service without appealing to human preferences.by Anant Sahai.Ph.D

    Advanced Trends in Wireless Communications

    Get PDF
    Physical limitations on wireless communication channels impose huge challenges to reliable communication. Bandwidth limitations, propagation loss, noise and interference make the wireless channel a narrow pipe that does not readily accommodate rapid flow of data. Thus, researches aim to design systems that are suitable to operate in such channels, in order to have high performance quality of service. Also, the mobility of the communication systems requires further investigations to reduce the complexity and the power consumption of the receiver. This book aims to provide highlights of the current research in the field of wireless communications. The subjects discussed are very valuable to communication researchers rather than researchers in the wireless related areas. The book chapters cover a wide range of wireless communication topics

    Application-specific protocol architectures for wireless networks

    Get PDF
    Thesis (Ph.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.Includes bibliographical references (p. 145-154).In recent years, advances in energy-efficient design and wireless technologies have enabled exciting new applications for wireless devices. These applications span a wide range, including real-time and streaming video and audio delivery, remote monitoring using networked microsensors, personal medical monitoring, and home networking of everyday appliances. While these applications require high performance from the network, they suffer from resource constraints that do not appear in more traditional wired computing environments. In particular, wireless spectrum is scarce, often limiting the bandwidth available to applications and making the channel error-prone, and the nodes are battery-operated, often limiting available energy. My thesis is that this harsh environment with severe resource constraints requires an application-specific protocol architecture, rather than the traditional layered approach, to obtain the best possible performance. This dissertation supports this claim using detailed case studies on microsensor networks and wireless video delivery. The first study develops LEACH (Low-Energy Adaptive Clustering Hierarchy), an architecture for remote microsensor networks that combines the ideas of energy-efficient cluster-based routing and media access together with application-specific data aggregation to achieve good performance in terms of system lifetime, latency, and application-perceived quality. This approach improves system lifetime by an order of magnitude compared to general-purpose approaches when the node energy is limited. The second study develops an unequal error protection scheme for MPEG-4 compressed video delivery that adapts the level of protection applied to portions of a packet to the degree of importance of the corresponding bits. This approach obtains better application-perceived performance than current approaches for the same amount of transmission bandwidth. These two systems show that application-specific protocol architectures achieve the energy and latency efficiency and error robustness needed for wireless networks.by Wendi Beth Heinzelman.Ph.D

    Cross-Layer Resource Allocation Protocols for Multimedia CDMA Networks

    Get PDF
    The design of mechanisms to efficiently allow many users to maintain simultaneous communications while sharing the same transmission medium is a crucial step during a wireless network design. The resource allocation process needs to meet numerous requirements that are sometimes conflicting, such as high efficiency, network utilization and flexibility and good communication quality. Due to limited resources, wireless cellular networks are normally seen as having some limit on the network capacity, in terms of the maximum number of calls that may be supported. Being able to dynamically extend network operation beyond the set limit at the cost of a smooth and small increase in distortion is a valuable and useful idea because it provides the means to flexibly adjust the network to situations where it is more important to service a call rather than to guarantee the best quality. In this thesis we study designs for resource allocation in CDMA networks carrying conversational-type calls. The designs are based on a cross-layer approach where the source encoder, the channel encoder and, in some cases, the processing gains are adapted. The primary focus of the study is on optimally multiplexing multimedia sources. Therefore, we study optimal resource allocation to resolve interference-generated congestion for an arbitrary set of real-time variable-rate source encoders in a multimedia CDMA network. Importantly, we show that the problem could be viewed as the one of statistical multiplexing in source-adapted multimedia CDMA. We present analysis and optimal solutions for different system setups. The result is a flexible system that sets an efficient tradeoff between end-to-end distortion and number of users. Because in the presented cross-layer designs channel-induced errors are kept at a subjectively acceptable level, the proposed designs are able to outperform equivalent CDMA systems where capacity is increased in the traditional way, by allowing a reduction in SINR. An important application and part of this study, is the use of the proposed designs to extend operation of the CDMA network beyond a defined congestion operating point. Also, the general framework for statistical multiplexing in CDMA is used to study some issues in integrated real-time/data networks

    Lightweight mobile and wireless systems: technologies, architectures, and services

    Get PDF
    1Department of Information and Communication Systems Engineering (ICSE), University of the Aegean, 81100 Mytilene, Greece 2Department of Information Engineering and Computer Science (DISI), University of Trento, 38123 Trento, Italy 3Department of Informatics, Alexander Technological Educational Institute of Thessaloniki, Thessaloniki, 574 00 Macedonia, Greece 4Centre Tecnologic de Telecomunicacions de Catalunya (CTTC), 08860 Barcelona, Spain 5North Carolina State University (NCSU), Raleigh, NC 27695, US

    Packet prioritizing and delivering for multimedia streaming

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Proceedings of the Third International Mobile Satellite Conference (IMSC 1993)

    Get PDF
    Satellite-based mobile communications systems provide voice and data communications to users over a vast geographic area. The users may communicate via mobile or hand-held terminals, which may also provide access to terrestrial cellular communications services. While the first and second International Mobile Satellite Conferences (IMSC) mostly concentrated on technical advances, this Third IMSC also focuses on the increasing worldwide commercial activities in Mobile Satellite Services. Because of the large service areas provided by such systems, it is important to consider political and regulatory issues in addition to technical and user requirements issues. Topics covered include: the direct broadcast of audio programming from satellites; spacecraft technology; regulatory and policy considerations; advanced system concepts and analysis; propagation; and user requirements and applications
    corecore