96 research outputs found

    Broadcast Channels with Cooperating Decoders

    Full text link
    We consider the problem of communicating over the general discrete memoryless broadcast channel (BC) with partially cooperating receivers. In our setup, receivers are able to exchange messages over noiseless conference links of finite capacities, prior to decoding the messages sent from the transmitter. In this paper we formulate the general problem of broadcast with cooperation. We first find the capacity region for the case where the BC is physically degraded. Then, we give achievability results for the general broadcast channel, for both the two independent messages case and the single common message case.Comment: Final version, to appear in the IEEE Transactions on Information Theory -- contains (very) minor changes based on the last round of review

    Lecture Notes on Network Information Theory

    Full text link
    These lecture notes have been converted to a book titled Network Information Theory published recently by Cambridge University Press. This book provides a significantly expanded exposition of the material in the lecture notes as well as problems and bibliographic notes at the end of each chapter. The authors are currently preparing a set of slides based on the book that will be posted in the second half of 2012. More information about the book can be found at http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/

    Key Agreement over Wiretap Models with Non-Causal Side Information

    Get PDF
    The security of information is an indispensable element of a communication system when transmitted signals are vulnerable to eavesdropping. This issue is a challenging problem in a wireless network as propagated signals can be easily captured by unauthorized receivers, and so achieving a perfectly secure communication is a desire in such a wiretap channel. On the other hand, cryptographic algorithms usually lack to attain this goal due to the following restrictive assumptions made for their design. First, wiretappers basically have limited computational power and time. Second, each authorized party has often access to a reasonably large sequence of uniform random bits concealed from wiretappers. To guarantee the security of information, Information Theory (IT) offers the following two approaches based on physical-layer security. First, IT suggests using wiretap (block) codes to securely and reliably transmit messages over a noisy wiretap channel. No confidential common key is usually required for the wiretap codes. The secrecy problem investigates an optimum wiretap code that achieves the secrecy capacity of a given wiretap channel. Second, IT introduces key agreement (block) codes to exchange keys between legitimate parties over a wiretap model. The agreed keys are to be reliable, secure, and (uniformly) random, at least in an asymptotic sense, such that they can be finally employed in symmetric key cryptography for data transmission. The key agreement problem investigates an optimum key agreement code that obtains the key capacity of a given wiretap model. In this thesis, we study the key agreement problem for two wiretap models: a Discrete Memoryless (DM) model and a Gaussian model. Each model consists of a wiretap channel paralleled with an authenticated public channel. The wiretap channel is from a transmitter, called Alice, to an authorized receiver, called Bob, and to a wiretapper, called Eve. The Probability Transition Function (PTF) of the wiretap channel is controlled by a random sequence of Channel State Information (CSI), which is assumed to be non-causally available at Alice. The capacity of the public channel is C_P₁∈[0,∞) in the forward direction from Alice to Bob and C_P₂∈[0,∞) in the backward direction from Bob to Alice. For each model, the key capacity as a function of the pair (C_P₁, C_P₂) is denoted by C_K(C_P₁, C_P₂). We investigate the forward key capacity of each model, i.e., C_K(C_P₁, 0) in this thesis. We also study the key generation over the Gaussian model when Eve's channel is less noisy than Bob's. In the DM model, the wiretap channel is a Discrete Memoryless State-dependent Wiretap Channel (DM-SWC) in which Bob and Eve each may also have access to a sequence of Side Information (SI) dependent on the CSI. We establish a Lower Bound (LB) and an Upper Bound (UB) on the forward key capacity of the DM model. When the model is less noisy in Bob's favor, another UB on the forward key capacity is derived. The achievable key agreement code is asymptotically optimum as C_P₁→ ∞. For any given DM model, there also exists a finite capacity C⁰_P₁, which is determined by the DM-SWC, such that the forward key capacity is achievable if C_P₁≄ C⁰_P₁. Moreover, the key generation is saturated at capacity C_P₁= C⁰_P₁, and thus increasing the public channel capacity beyond C⁰_P₁ makes no improvement on the forward key capacity of the DM model. If the CSI is fully known at Bob in addition to Alice, C⁰_P₁=0, and so the public channel has no contribution in key generation when the public channel is in the forward direction. The achievable key agreement code of the DM model exploits both a random generator and the CSI as resources for key generation at Alice. The randomness property of channel states can be employed for key generation, and so the agreed keys depend on the CSI in general. However, a message is independent of the CSI in a secrecy problem. Hence, we justify that the forward key capacity can exceed both the main channel capacity and the secrecy capacity of the DM-SWC. In the Gaussian model, the wiretap channel is a Gaussian State-dependent Wiretap Channel (G-SWC) with Additive White Gaussian Interference (AWGI) having average power Λ. For simplicity, no side information is assumed at Bob and Eve. Bob's channel and Eve's channel suffer from Additive White Gaussian Noise (AWGN), where the correlation coefficient between noise of Bob's channel and that of Eve's channel is given by ϱ. We prove that the forward key capacity of the Gaussian model is independent of ϱ. Moreover, we establish that the forward key capacity is positive unless Eve's channel is less noisy than Bob's. We also prove that the key capacity of the Gaussian model vanishes if the G-SWC is physically degraded in Eve's favor. However, we justify that obtaining a positive key capacity is feasible even if Eve's channel is less noisy than Bob's according to our achieved LB on the key capacity for case (C_P₁, C_P₂)→ (∞, ∞). Hence, the key capacity of the Gaussian model is a function of ϱ. In this thesis, an LB on the forward key capacity of the Gaussian model is achieved. For a fixed Λ, the achievable key agreement code is optimum for any C_P₁∈[0,∞) in both low Signal-to-Interference Ratio (SIR) and high SIR regimes. We show that the forward key capacity is asymptotically independent of C_P₁ and Λ as the SIR goes to infinity, and thus the public channel and the interference have negligible contributions in key generation in the high SIR regime. On the other hand, the forward key capacity is a function of C_P₁ and Λ in the low SIR regime. Contributions of the interference and the public channel in key generation are significant in the low SIR regime that will be illustrated by simulations. The proposed key agreement code asymptotically achieves the forward key capacity of the Gaussian model for any SIR as C_P₁→ ∞. Hence, C_K(∞,0) is calculated, and it is suggested as a UB on C_K(C_P₁,0). Using simulations, we also compute the minimum required C_P₁ for which the forward key capacity is upper bounded within a given tolerance. The achievable key agreement code is designed based on a generalized version of the Dirty Paper Coding (DPC) in which transmitted signals are correlated with the CSI. The correlation coefficient is to be determined by C_P₁. In contrast to the DM model, the LB on the forward key capacity of a Gaussian model is a strictly increasing function of C_P₁ according to our simulations. This fact is an essential difference between this model and the DM model. For C_P₁=0 and a fixed Λ, the forward key capacity of the Gaussian model exceeds the main channel capacity of the G-SWC in the low SIR regime. By simulations, we show that the interference enhances key generation in the low SIR regime. In this regime, we also justify that the positive effect of the interference on the (forward) key capacity is generally more than its positive effect on the secrecy capacity of the G-SWC, while the interference has no influence on the main channel capacity of the G-SWC

    Multiaccess and fading in communication networks

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.Includes bibliographical references (p. 159-163).This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Two fundamental issues in the design of wireless communication networks are the interference among multiple users and the time-varying nature of the fading wireless channel. We apply fundamental techniques in information theory and queueing theory to gain insights into the structure of these problems. In a terrestrial cellular or space network, multi-user interference arises naturally as different users in the same cell or region attempt to transmit to the base station or satellite at the same time and in the same frequency range. We first examine the impact of this interference on the design of error correction codes for reliable data transmission. At the physical layer of the wireless network, the phenomenon of multi-user interference is captured by the multiaccess (many-to-one) channel model. The set of all data rates at which reliable communication can take place over this channel is characterized via information theory by the so-called multiaccess capacity region. A basic problem is developing coding schemes of relatively low complexity to achieve all rates in this capacity region. By exploiting the underlying geometrical structure of the capacity region, we develop a method of reducing the multi-user coding problem to a set of single-user coding problems using the ideas of time-sharing and successive decoding. Next, we investigate the effect of multi-user interference on higher-layer quality-of-service issues such as packet delay. Under certain conditions of symmetry, we find that the structure of the multiaccess capacity region can again be used to obtain a "load-balancing" queue control strategy which minimizes average packet delay for Poisson data sources.(cont.) Due to the mobility of users and constantly changing multipath environments, wireless channels are inherently time-varying, or fading. Any sensible design of wireless networks must take into account the nature of this fading and the ability of the system to track channel variations. We consider a wireless system in which a single user sends time-sensitive data over a slowly varying channel. Information regarding the state of the channel is fed back with some delay to the transmitter, while the receiver decodes messages within some fixed and finite amount of time. Under these conditions, we demonstrate a provably optimal transmission strategy which maximizes the average data rate reliably sent across the wireless channel. The strategy is based on the information-theoretic idea of "successive refinement," whereby the decoder decodes at different rates according to the observed channel state.by Edmund Meng Yeh.Ph.D

    Multicast and Broadcast in wireless OFDM systems

    Get PDF
    Le systĂšme OFDM (Orthogonal Frequency Division Multiplexing) utilise plusieurs sous-porteuses pour transmettre de l information. ComparĂ© Ă  un schĂ©ma mono-porteuse, la modulation multi-porteuses OFDM permet d obtenir facilement des rĂ©glages optimaux (au sens de la capacitĂ© de Shannon) pour une transmission Ă  haut dĂ©bit sur un canal sĂ©lectif en frĂ©quence. En ce sens, on peut alors garantir une transmission fiable et une meilleure gestion de l'Ă©nergie utilisĂ©e. Lors de la transmission avec une modulation OFDM, les sous-porteuses utilisent des canaux diffĂ©rents qui n ont pas forcement la mĂȘme attĂ©nuation. Allouer le mĂȘme niveau de puissance Ă  chaque sous-porteuse ne garantit pas une capacitĂ© optimale dans une liaison point Ă  point. Une allocation dynamique de la puissance (c est-Ă -dire attribuer diffĂ©rents niveaux de puissance aux sous-porteuses en fonction du canal) donne de meilleures performances. Par contre, dans une situation de diffusion (broadcast), l Ă©metteur ne connaĂźt pas les canaux vers tous les utilisateurs, et la meilleure stratĂ©gie consiste Ă  Ă©mettre avec la mĂȘme puissance sur toutes les sous-porteuses. Cette thĂšse a pour objectif d explorer les situations intermĂ©diaires, et de proposer les outils d allocation de puissance appropriĂ©s. Cette situation intermĂ©diaire est appelĂ©e multicast , ou multidiffusion : l Ă©metteur envoie les signaux vers un nombre fini (pas trop grand) d utilisateurs, dont il connaĂźt les paramĂštres de canaux, et il peut adapter son Ă©mission Ă  cette connaissance des canaux. On est donc dans une situation intermĂ©diaire entre le point Ă  point et la diffusion . L objectif final de ce travail est d Ă©valuer le gain apportĂ© par la connaissance des canaux en situation de multicast par rapport Ă  la mĂȘme communication effectuĂ©e comme si on Ă©tait en diffusion. Bien Ă©videmment, quand le nombre de destinataires est trĂšs grand, les gains seront nĂ©gligeables, car le signal rencontre un nombre trĂšs Ă©levĂ© de canaux, et une allocation de puissance uniforme sera quasi optimale. Quand le nombre est trĂšs faible, on sera proche du point Ă  point et les gains devraient ĂȘtre sensibles. Nous proposons des outils pour quantifier ces amĂ©liorations dans les cas de systĂšmes ayant une antenne Ă  l'Ă©mission et une antenne Ă  la rĂ©ception, dit SISO (Single Input Single Output) et de systĂšmes avec plusieurs antennes, dits MIMO (Multiple Input Multiple Output). Les Ă©tapes nĂ©cessaires pour rĂ©aliser ce travail sont : 1) En supposant une connaissance prĂ©alable de l Ă©tat des canaux (entre station de base et terminaux), mettre en Ɠuvre les outils de la thĂ©orie de l'information pour effectuer l allocation de puissance et Ă©valuer les capacitĂ©s des systĂšmes Ă©tudiĂ©s. 2) Pour le systĂšme multi-utilisateur SISO-OFDM, nous proposons un algorithme d'allocation de puissance sur chaque sous porteuse dans une situation de multicast. 3) Pour le systĂšme multi-utilisateur MIMO-OFDM, nous proposons un algorithme qui exploite les caractĂ©ristiques du prĂ©codage "zero forcing". L'objectif est alors de partager la puissance disponible entre toutes les sous-porteuses et toutes les antennes. 4) Enfin, dans une derniĂšre Ă©tape nous nous intĂ©ressons Ă  une conception efficace de la situation de diffusion, afin de dĂ©terminer Ă  l aide d outils de gĂ©omĂ©trie stochastique quelle zone peut ĂȘtre couverte afin qu un pourcentage donnĂ© d utilisateurs reçoivent une quantitĂ© d information dĂ©terminĂ©e Ă  l avance. Ceci permet de dĂ©terminer la zone de couverture sans mettre en Ɠuvre des simulations intensives. La combinaison de ces outils permet un choix efficace des situations qui relĂšvent de la diffusion , du multicast et du point Ă  point .The OFDM (Orthogonal Frequency Division Multiplexing) system uses multiple sub-carriers for data transmission. Compared to the single-carrier scheme, the OFDM technique allows optimal settings for high data rate transmission over a frequency selective channel (from the Shannon s capacity point of view). We can, by this way, ensure reliable communication and efficient energy use. When we use OFDM, the sub-carriers use different channels with different attenuations as well. The equal power allocation on each sub-carrier does not ensure an optimal capacity in a peer to peer link. Dynamic power allocation (i.e., assign different amount of power to subcarriers according to the channel) gives better results, assuming that the channel state information is available at the transmitter. Nevertheless, the transmitter does not know the channels to all users when broadcast transmission are used, and the best strategy is to transmit with the same power on all subcarriers. This thesis aims to explore the intermediate situations, and propose appropriate power allocation tools. This intermediate situation is called "multicast": the transmitter, which knows the channel parameters, sends signals to a finite number of users, and it can adapt the transmission using this knowledge. It is an intermediate position between the "peer to peer" and the "broadcast. The goal of this work is to evaluate the gain brought by the knowledge of the channel state information in multicast situation beside the broadcast situation. Obviously, when the number of receivers is very large, the gain will not be appreciable because the signal found on its path a very large number of channels, and a uniform power allocation is near optimal. When the number of users is very low, we will be close to the peer to peer transmission and gains should be more appreciable. We propose some tools to quantify these improvements in the case where the systems have one antenna at the transmitter and the receiver, this case named SISO (Single Input Single Output). We also propose those tools on systems with multiple antennas, called MIMO (Multiple Input Multiple Output). The steps required to do this work are: 1) Assuming that the channel state information of the users are known at the base station, we implement tools, using information theory, to perform power allocation and evaluate the capacities of the systems under study. 2) For multi-user SISO-OFDM scheme, we propose a power allocation algorithm on each subcarrier on multicast situation. 3) For multi-user MIMO-OFDM, we propose an algorithm that exploits the characteristics of the "zero forcing" precoding. The objective is to share the available power among all subcarriers and all antennas. 4) Finally, in a last step we focus on an efficient design of the broadcast situation. We use tools from stochastic geometry to determine which area can be covered, with the aim that a percentage of users can receive a predetermined amount of information. This determines the coverage area without implementing long period simulations. The combination of these tools allows an effective choice between the situations that fall under the "broadcast", "multicast" and "peer to peer" transmissions.PARIS11-SCD-Bib. Ă©lectronique (914719901) / SudocSudocFranceF

    Proceedings of the Second International Mobile Satellite Conference (IMSC 1990)

    Get PDF
    Presented here are the proceedings of the Second International Mobile Satellite Conference (IMSC), held June 17-20, 1990 in Ottawa, Canada. Topics covered include future mobile satellite communications concepts, aeronautical applications, modulation and coding, propagation and experimental systems, mobile terminal equipment, network architecture and control, regulatory and policy considerations, vehicle antennas, and speech compression

    Proceedings of the Fifth International Mobile Satellite Conference 1997

    Get PDF
    Satellite-based mobile communications systems provide voice and data communications to users over a vast geographic area. The users may communicate via mobile or hand-held terminals, which may also provide access to terrestrial communications services. While previous International Mobile Satellite Conferences have concentrated on technical advances and the increasing worldwide commercial activities, this conference focuses on the next generation of mobile satellite services. The approximately 80 papers included here cover sessions in the following areas: networking and protocols; code division multiple access technologies; demand, economics and technology issues; current and planned systems; propagation; terminal technology; modulation and coding advances; spacecraft technology; advanced systems; and applications and experiments

    A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS

    Get PDF
    There has been growing interests in using optical code division multiple access (OCDMA) systems for the next generation high-speed optical fiber networks. The advantage of spectral amplitude coding (SAC-OCDMA) over conventional OCDMA systems is that, when using appropriate detection technique, the multiple access interference (MAI) can totally be canceled. The motivation of this research is to develop new code families to enhance the overall performance of optical OCDMA systems. Four aspects are tackled in this research. Firstly, a comprehensive discussion takes place on all important aspects of existing codes from advantages and disadvantages point of view. Two algorithms are proposed to construct several code families namely Vector Combinatorial (VC). Secondly, a new detection technique based on exclusive-OR (XOR) logic is developed and compared to the reported detection techniques. Thirdly, a software simulation for SAC OCDMA system with the VC families using a commercial optical system, Virtual Photonic Instrument, “VPITM TransmissionMaker 7.1” is conducted. Finally, an extensive investigation to study and characterize the VC-OCDMA in local area network (LAN) is conducted. For the performance analysis, the effects of phase-induced intensity noise (PIIN), shot noise, and thermal noise are considered simultaneously. The performances of the system compared to reported systems were characterized by referring to the signal to noise ratio (SNR), the bit error rate (BER) and the effective power (Psr). Numerical results show that, an acceptable BER of 10−9 was achieved by the VC codes with 120 active users while a much better performance can be achieved when the effective received power Psr > -26 dBm. In particular, the BER can be significantly improved when the VC optimal channel spacing width is carefully selected; best performance occurs at a spacing bandwidth between 0.8 and 1 nm. The simulation results indicate that VC code has a superior performance compared to other reported codes for the same transmission quality. It is also found that for a transmitted power at 0 dBm, the BER specified by eye diagrams patterns are 10-14 and 10-5 for VC and Modified Quadratic Congruence (MQC) codes respectively
    • 

    corecore