2,665 research outputs found
Lattices from Codes for Harnessing Interference: An Overview and Generalizations
In this paper, using compute-and-forward as an example, we provide an
overview of constructions of lattices from codes that possess the right
algebraic structures for harnessing interference. This includes Construction A,
Construction D, and Construction (previously called product
construction) recently proposed by the authors. We then discuss two
generalizations where the first one is a general construction of lattices named
Construction subsuming the above three constructions as special cases
and the second one is to go beyond principal ideal domains and build lattices
over algebraic integers
Polar Coding Schemes for Cooperative Transmission Systems
: In this thesis, a serially-concatenated coding scheme with a polar code as the outer code and a low density generator matrix (LDGM) code as the inner code is firstly proposed. It is shown that that the proposed scheme provides a method to improve significantly the low convergence of polar codes and the high error floor of LDGM codes while keeping the advantages of both such as the low encoding and decoding complexity. The bit error rate results show that the proposed scheme by reasonable design have the potential to approach a performance close to the capacity limit and avoid error floor effectively. Secondly, a novel transmission protocol based on polar coding is proposed for the degraded half-duplex relay channel. In the proposed protocol, the relay only needs to forward a part of the decoded source message that the destination needs according to the exquisite nested structure of polar codes. It is proved that the scheme can achieve the capacity of the half-duplex relay channel while enjoying low encoding/decoding complexity. By modeling the practical system, we verify that the proposed scheme outperforms the conventional scheme designed by low-density parity-check codes by simulations. Finally, a generalized partial information relaying protocol is proposed for degraded multiple-relay networks with orthogonal receiver components (MRN-ORCs). In such a protocol, each relay node decodes the received source message with the help of partial information from previous nodes and re-encodes part of the decoded message for transmission to satisfy the decoding requirements for the following relay node or the destination node. For the design of polar codes, the nested structures are constructed based on this protocol and the information sets corresponding to the partial messages forwarded are also calculated. It is proved that the proposed scheme achieves the theoretical capacity of the degraded MRN-ORCs while still retains the low-complexity feature of polar codes
Short-Packet Downlink Transmission with Non-Orthogonal Multiple Access
This work introduces downlink non-orthogonal multiple access (NOMA) into
short-packet communications. NOMA has great potential to improve fairness and
spectral efficiency with respect to orthogonal multiple access (OMA) for
low-latency downlink transmission, thus making it attractive for the emerging
Internet of Things. We consider a two-user downlink NOMA system with finite
blocklength constraints, in which the transmission rates and power allocation
are optimized. To this end, we investigate the trade-off among the transmission
rate, decoding error probability, and the transmission latency measured in
blocklength. Then, a one-dimensional search algorithm is proposed to resolve
the challenges mainly due to the achievable rate affected by the finite
blocklength and the unguaranteed successive interference cancellation. We also
analyze the performance of OMA as a benchmark to fully demonstrate the benefit
of NOMA. Our simulation results show that NOMA significantly outperforms OMA in
terms of achieving a higher effective throughput subject to the same finite
blocklength constraint, or incurring a lower latency to achieve the same
effective throughput target. Interestingly, we further find that with the
finite blocklength, the advantage of NOMA relative to OMA is more prominent
when the effective throughput targets at the two users become more comparable.Comment: 15 pages, 9 figures. This is a longer version of a paper to appear in
IEEE Transactions on Wireless Communications. Citation Information: X. Sun,
S. Yan, N. Yang, Z. Ding, C. Shen, and Z. Zhong, "Short-Packet Downlink
Transmission with Non-Orthogonal Multiple Access," IEEE Trans. Wireless
Commun., accepted to appear [Online]
https://ieeexplore.ieee.org/document/8345745
Analysis of a Cooperative Strategy for a Large Decentralized Wireless Network
This paper investigates the benefits of cooperation and proposes a relay
activation strategy for a large wireless network with multiple transmitters. In
this framework, some nodes cooperate with a nearby node that acts as a relay,
using the decode-and-forward protocol, and others use direct transmission. The
network is modeled as an independently marked Poisson point process and the
source nodes may choose their relays from the set of inactive nodes. Although
cooperation can potentially lead to significant improvements in the performance
of a communication pair, relaying causes additional interference in the
network, increasing the average noise that other nodes see. We investigate how
source nodes should balance cooperation vs. interference to obtain reliable
transmissions, and for this purpose we study and optimize a relay activation
strategy with respect to the outage probability. Surprisingly, in the high
reliability regime, the optimized strategy consists on the activation of all
the relays or none at all, depending on network parameters. We provide a simple
closed-form expression that indicates when the relays should be active, and we
introduce closed form expressions that quantify the performance gains of this
scheme with respect to a network that only uses direct transmission.Comment: Updated version. To appear in IEEE Transactions on Networkin
D11.2 Consolidated results on the performance limits of wireless communications
Deliverable D11.2 del projecte europeu NEWCOM#The report presents the Intermediate Results of N# JRAs on Performance Limits of Wireless Communications and highlights the fundamental issues that have been investigated by the WP1.1. The report illustrates the Joint Research Activities (JRAs) already identified during the first year of the project which are currently ongoing. For each activity there is a description, an illustration of the adherence and relevance with the identified fundamental open issues, a short presentation of the preliminary results, and a roadmap for the joint research work in the next year. Appendices for each JRA give technical details on the scientific activity in each JRA.Peer ReviewedPreprin
A New Coding Paradigm for the Primitive Relay Channel
We consider the primitive relay channel, where the source sends a message to
the relay and to the destination, and the relay helps the communication by
transmitting an additional message to the destination via a separate channel.
Two well-known coding techniques have been introduced for this setting:
decode-and-forward and compress-and-forward. In decode-and-forward, the relay
completely decodes the message and sends some information to the destination;
in compress-and-forward, the relay does not decode, and it sends a compressed
version of the received signal to the destination using Wyner-Ziv coding. In
this paper, we present a novel coding paradigm that provides an improved
achievable rate for the primitive relay channel. The idea is to combine
compress-and-forward and decode-and-forward via a chaining construction. We
transmit over pairs of blocks: in the first block, we use compress-and-forward;
and in the second block, we use decode-and-forward. More specifically, in the
first block, the relay does not decode, it compresses the received signal via
Wyner-Ziv, and it sends only part of the compression to the destination. In the
second block, the relay completely decodes the message, it sends some
information to the destination, and it also sends the remaining part of the
compression coming from the first block. By doing so, we are able to strictly
outperform both compress-and-forward and decode-and-forward. Note that the
proposed coding scheme can be implemented with polar codes. As such, it has the
typical attractive properties of polar coding schemes, namely, quasi-linear
encoding and decoding complexity, and error probability that decays at
super-polynomial speed. As a running example, we take into account the special
case of the erasure relay channel, and we provide a comparison between the
rates achievable by our proposed scheme and the existing upper and lower
bounds.Comment: 10 pages, 4 figures, in Proc. of ISIT'18 (short version) and in
Algorithms (full version
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …