66,845 research outputs found
How to Achieve the Capacity of Asymmetric Channels
We survey coding techniques that enable reliable transmission at rates that
approach the capacity of an arbitrary discrete memoryless channel. In
particular, we take the point of view of modern coding theory and discuss how
recent advances in coding for symmetric channels help provide more efficient
solutions for the asymmetric case. We consider, in more detail, three basic
coding paradigms.
The first one is Gallager's scheme that consists of concatenating a linear
code with a non-linear mapping so that the input distribution can be
appropriately shaped. We explicitly show that both polar codes and spatially
coupled codes can be employed in this scenario. Furthermore, we derive a
scaling law between the gap to capacity, the cardinality of the input and
output alphabets, and the required size of the mapper.
The second one is an integrated scheme in which the code is used both for
source coding, in order to create codewords distributed according to the
capacity-achieving input distribution, and for channel coding, in order to
provide error protection. Such a technique has been recently introduced by
Honda and Yamamoto in the context of polar codes, and we show how to apply it
also to the design of sparse graph codes.
The third paradigm is based on an idea of B\"ocherer and Mathar, and
separates the two tasks of source coding and channel coding by a chaining
construction that binds together several codewords. We present conditions for
the source code and the channel code, and we describe how to combine any source
code with any channel code that fulfill those conditions, in order to provide
capacity-achieving schemes for asymmetric channels. In particular, we show that
polar codes, spatially coupled codes, and homophonic codes are suitable as
basic building blocks of the proposed coding strategy.Comment: 32 pages, 4 figures, presented in part at Allerton'14 and published
in IEEE Trans. Inform. Theor
An improved rate region for the classical-quantum broadcast channel
We present a new achievable rate region for the two-user binary-input
classical-quantum broadcast channel. The result is a generalization of the
classical Marton-Gelfand-Pinsker region and is provably larger than the best
previously known rate region for classical-quantum broadcast channels. The
proof of achievability is based on the recently introduced polar coding scheme
and its generalization to quantum network information theory.Comment: 5 pages, double column, 1 figure, based on a result presented in the
Master's thesis arXiv:1501.0373
Achieving Secrecy Capacity of the Gaussian Wiretap Channel with Polar Lattices
In this work, an explicit wiretap coding scheme based on polar lattices is
proposed to achieve the secrecy capacity of the additive white Gaussian noise
(AWGN) wiretap channel. Firstly, polar lattices are used to construct
secrecy-good lattices for the mod- Gaussian wiretap channel. Then we
propose an explicit shaping scheme to remove this mod- front end and
extend polar lattices to the genuine Gaussian wiretap channel. The shaping
technique is based on the lattice Gaussian distribution, which leads to a
binary asymmetric channel at each level for the multilevel lattice codes. By
employing the asymmetric polar coding technique, we construct an AWGN-good
lattice and a secrecy-good lattice with optimal shaping simultaneously. As a
result, the encoding complexity for the sender and the decoding complexity for
the legitimate receiver are both O(N logN log(logN)). The proposed scheme is
proven to be semantically secure.Comment: Submitted to IEEE Trans. Information Theory, revised. This is the
authors' own version of the pape
Construction of Capacity-Achieving Lattice Codes: Polar Lattices
In this paper, we propose a new class of lattices constructed from polar
codes, namely polar lattices, to achieve the capacity \frac{1}{2}\log(1+\SNR)
of the additive white Gaussian-noise (AWGN) channel. Our construction follows
the multilevel approach of Forney \textit{et al.}, where we construct a
capacity-achieving polar code on each level. The component polar codes are
shown to be naturally nested, thereby fulfilling the requirement of the
multilevel lattice construction. We prove that polar lattices are
\emph{AWGN-good}. Furthermore, using the technique of source polarization, we
propose discrete Gaussian shaping over the polar lattice to satisfy the power
constraint. Both the construction and shaping are explicit, and the overall
complexity of encoding and decoding is for any fixed target error
probability.Comment: full version of the paper to appear in IEEE Trans. Communication
Interference Mitigation Through Limited Receiver Cooperation: Symmetric Case
Interference is a major issue that limits the performance in wireless
networks, and cooperation among receivers can help mitigate interference by
forming distributed MIMO systems. The rate at which receivers cooperate,
however, is limited in most scenarios. How much interference can one bit of
receiver cooperation mitigate? In this paper, we study the two-user Gaussian
interference channel with conferencing decoders to answer this question in a
simple setting. We characterize the fundamental gain from cooperation: at high
SNR, when INR is below 50% of SNR in dB scale, one-bit cooperation per
direction buys roughly one-bit gain per user until full receiver cooperation
performance is reached, while when INR is between 67% and 200% of SNR in dB
scale, one-bit cooperation per direction buys roughly half-bit gain per user.
The conclusion is drawn based on the approximate characterization of the
symmetric capacity in the symmetric set-up. We propose strategies achieving the
symmetric capacity universally to within 3 bits. The strategy consists of two
parts: (1) the transmission scheme, where superposition encoding with a simple
power split is employed, and (2) the cooperative protocol, where
quantize-binning is used for relaying.Comment: To appear in IEEE Information Theory Workshop, Taormina, October
2009. Final versio
On the Capacity of the Finite Field Counterparts of Wireless Interference Networks
This work explores how degrees of freedom (DoF) results from wireless
networks can be translated into capacity results for their finite field
counterparts that arise in network coding applications. The main insight is
that scalar (SISO) finite field channels over are analogous
to n x n vector (MIMO) channels in the wireless setting, but with an important
distinction -- there is additional structure due to finite field arithmetic
which enforces commutativity of matrix multiplication and limits the channel
diversity to n, making these channels similar to diagonal channels in the
wireless setting. Within the limits imposed by the channel structure, the DoF
optimal precoding solutions for wireless networks can be translated into
capacity optimal solutions for their finite field counterparts. This is shown
through the study of the 2-user X channel and the 3-user interference channel.
Besides bringing the insights from wireless networks into network coding
applications, the study of finite field networks over also
touches upon important open problems in wireless networks (finite SNR, finite
diversity scenarios) through interesting parallels between p and SNR, and n and
diversity.Comment: Full version of paper accepted for presentation at ISIT 201
Capacity Bounds for the -User Gaussian Interference Channel
The capacity region of the -user Gaussian interference channel (GIC) is a
long-standing open problem and even capacity outer bounds are little known in
general. A significant progress on degrees-of-freedom (DoF) analysis, a
first-order capacity approximation, for the -user GIC has provided new
important insights into the problem of interest in the high signal-to-noise
ratio (SNR) limit. However, such capacity approximation has been observed to
have some limitations in predicting the capacity at \emph{finite} SNR. In this
work, we develop a new upper-bounding technique that utilizes a new type of
genie signal and applies \emph{time sharing} to genie signals at receivers.
Based on this technique, we derive new upper bounds on the sum capacity of the
three-user GIC with constant, complex channel coefficients and then generalize
to the -user case to better understand sum-rate behavior at finite SNR. We
also provide closed-form expressions of our upper bounds on the capacity of the
-user symmetric GIC easily computable for \emph{any} . From the
perspectives of our results, some sum-rate behavior at finite SNR is in line
with the insights given by the known DoF results, while some others are not. In
particular, the well-known DoF achievable for almost all constant real
channel coefficients turns out to be not embodied as a substantial performance
gain over a certain range of the cross-channel coefficient in the -user
symmetric real case especially for \emph{large} . We further investigate the
impact of phase offset between the direct-channel coefficient and the
cross-channel coefficients on the sum-rate upper bound for the three-user
\emph{complex} GIC. As a consequence, we aim to provide new findings that could
not be predicted by the prior works on DoF of GICs.Comment: Presented in part at ISIT 2015, submitted to IEEE Transactions on
Information Theory on July 2015, and revised on January 201
- …