60 research outputs found
On Approximating the Sum-Rate for Multiple-Unicasts
We study upper bounds on the sum-rate of multiple-unicasts. We approximate
the Generalized Network Sharing Bound (GNS cut) of the multiple-unicasts
network coding problem with independent sources. Our approximation
algorithm runs in polynomial time and yields an upper bound on the joint source
entropy rate, which is within an factor from the GNS cut. It
further yields a vector-linear network code that achieves joint source entropy
rate within an factor from the GNS cut, but \emph{not} with
independent sources: the code induces a correlation pattern among the sources.
Our second contribution is establishing a separation result for vector-linear
network codes: for any given field there exist networks for which
the optimum sum-rate supported by vector-linear codes over for
independent sources can be multiplicatively separated by a factor of
, for any constant , from the optimum joint entropy
rate supported by a code that allows correlation between sources. Finally, we
establish a similar separation result for the asymmetric optimum vector-linear
sum-rates achieved over two distinct fields and
for independent sources, revealing that the choice of field
can heavily impact the performance of a linear network code.Comment: 10 pages; Shorter version appeared at ISIT (International Symposium
on Information Theory) 2015; some typos correcte
TDMA is Optimal for All-unicast DoF Region of TIM if and only if Topology is Chordal Bipartite
The main result of this work is that an orthogonal access scheme such as TDMA
achieves the all-unicast degrees of freedom (DoF) region of the topological
interference management (TIM) problem if and only if the network topology graph
is chordal bipartite, i.e., every cycle that can contain a chord, does contain
a chord. The all-unicast DoF region includes the DoF region for any arbitrary
choice of a unicast message set, so e.g., the results of Maleki and Jafar on
the optimality of orthogonal access for the sum-DoF of one-dimensional convex
networks are recovered as a special case. The result is also established for
the corresponding topological representation of the index coding problem
Alignment based Network Coding for Two-Unicast-Z Networks
In this paper, we study the wireline two-unicast-Z communication network over
directed acyclic graphs. The two-unicast-Z network is a two-unicast network
where the destination intending to decode the second message has apriori side
information of the first message. We make three contributions in this paper:
1. We describe a new linear network coding algorithm for two-unicast-Z
networks over directed acyclic graphs. Our approach includes the idea of
interference alignment as one of its key ingredients. For graphs of a bounded
degree, our algorithm has linear complexity in terms of the number of vertices,
and polynomial complexity in terms of the number of edges.
2. We prove that our algorithm achieves the rate-pair (1, 1) whenever it is
feasible in the network. Our proof serves as an alternative, albeit restricted
to two-unicast-Z networks over directed acyclic graphs, to an earlier result of
Wang et al. which studied necessary and sufficient conditions for feasibility
of the rate pair (1, 1) in two-unicast networks.
3. We provide a new proof of the classical max-flow min-cut theorem for
directed acyclic graphs.Comment: The paper is an extended version of our earlier paper at ITW 201
Degrees of freedom of wireless interference network
Wireless communication systems are different from the wired systems mainly in three aspects: fading, broadcast, and superposition. Wireless communication networks, and multi-user communication networks in general, have not been well understood from the information-theoretic perspective: the capacity limits of many multi-user networks are not known. For example, the capacity region of a two-user single-antenna interference channel is still not known, though recent result can bound the region up to a constant value. Characterizing the capacity limits of multi-user multiple-input multiple-output (MIMO) interference network is usually even more difficult than the single antenna setup.
To alleviate the difficulty in studying such networks, the concept of degrees of freedom (DoF) has been adopted, which captures the first order behavior of the capacities or capacity regions. One important technique developed recently for quantifying the DoF of multi-user networks is the so-called interference alignment. The purpose of interference alignment is to design the transmit signals structurally so that the interference signals from multiple interferers are aligned to reduce the signal dimensions occupied by interference.
In this thesis, we mainly study two problems related to DoF and interference alignment: 1) DoF region of MIMO full interference channel (FIC) and Z interference channel (ZIC) with reconfigurable antennas, and 2) the DoF region of an interference network with general message demands.
For the first problem, we derive the outer bound on the DoF region and show that it is achievable via time-sharing or beamforming except for one special case. As to this particular special case, we develop a systematic way of constructing the DoF-achieving nulling and beamforming matrices. Our results reveal the potential benefit of using the reconfigurable antenna in MIMO FIC and ZIC. In addition, the achievability scheme has an interesting space-frequency interpretation.
For the second problem, we derive the DoF region of a single antenna interference network with general message demands, which includes the multiple unicasts and multiple multicasts as special cases. We perform interference alignment using multiple base vectors and align the interference at each receiver to its largest interferer. Furthermore, we show that the DoF region is determined by a subset of receivers, and the DoF region can be achieved by considering a smaller number of interference alignment constraints so as to reduce the number of time expansion.
Finally, as a related research topic, we also include a result on the average throughput of a MIMO interference channel with single-user detector at receivers and without channel state information at transmitters. We present a piecewise linear approximation of the channel throughput under weak, moderate and strong interference regimes. Based on that we determine the optimal number of streams that a transmitter should use for different interference levels
Doctor of Philosophy
dissertationWe develop a novel framework for friend-to-friend (f2f) distributed services (F3DS) by which applications can easily offer peer-to-peer (p2p) services among social peers with resource sharing governed by approximated levels of social altruism. Our frame- work differs significantly from typical p2p collaboration in that it provides a founda- tion for distributed applications to cooperate based on pre-existing trust and altruism among social peers. With the goal of facilitating the approximation of relative levels of altruism among social peers within F3DS, we introduce a new metric: SocialDistance. SocialDistance is a synthetic metric that combines direct levels of altruism between peers with an altruism decay for each hop to approximate indirect levels of altruism. The resulting multihop altruism levels are used by F3DS applications to proportion and prioritize the sharing of resources with other social peers. We use SocialDistance to implement a novel flash file/patch distribution method, SocialSwarm. SocialSwarm uses the SocialDistance metric as part of its resource allocation to overcome the neces- sity of (and inefficiency created by) resource bartering among friends participating in a BitTorrent swarm. We find that SocialSwarm achieves an average file download time reduction of 25% to 35% in comparison with standard BitTorrent under a variety of configurations and conditions, including file sizes, maximum SocialDistance, as well as leech and seed counts. The most socially connected peers yield up to a 47% decrease in download completion time in comparison with average nonsocial BitTorrent swarms. We also use the F3DS framework to implement novel malware detection application- F3DS Antivirus (F3AV)-and evaluate it on the Amazon cloud. We show that with f2f sharing of resources, F3AV achieves a 65% increase in the detection rate of 0- to 1-day-old malware among social peers as compared to the average of individual scanners. Furthermore, we show that F3AV provides the greatest diversity of mal- ware scanners (and thus malware protection) to social hubs-those nodes that are positioned to provide strategic defense against socially aware malware
Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications
From its introduction to its quindecennial, network coding has built a strong reputation for enhancing packet recovery and achieving maximum information flow in both wired and wireless networks. Traditional studies focused on optimizing the throughput of the system by proposing elaborate schemes able to reach the network capacity. With the shift toward distributed computing on mobile devices, performance and complexity become both critical factors that affect the efficiency of a coding strategy. Instantly decodable network coding presents itself as a new paradigm in network coding that trades off these two aspects. This paper review instantly decodable network coding schemes by identifying, categorizing, and evaluating various algorithms proposed in the literature. The first part of the manuscript investigates the conventional centralized systems, in which all decisions are carried out by a central unit, e.g., a base-station. In particular, two successful approaches known as the strict and generalized instantly decodable network are compared in terms of reliability, performance, complexity, and packet selection methodology. The second part considers the use of instantly decodable codes in a device-to-device communication network, in which devices speed up the recovery of the missing packets by exchanging network coded packets. Although the performance improvements are directly proportional to the computational complexity increases, numerous successful schemes from both the performance and complexity viewpoints are identified
- …