4,480 research outputs found
Covert Bits Through Queues
We consider covert communication using a queuing timing channel in the
presence of a warden. The covert message is encoded using the inter-arrival
times of the packets, and the legitimate receiver and the warden observe the
inter-departure times of the packets from their respective queues. The
transmitter and the legitimate receiver also share a secret key to facilitate
covert communication. We propose achievable schemes that obtain non-zero covert
rate for both exponential and general queues when a sufficiently high rate
secret key is available. This is in contrast to other channel models such as
the Gaussian channel or the discrete memoryless channel where only
covert bits can be sent over channel uses, yielding
a zero covert rate.Comment: To appear at IEEE CNS, October 201
Bits Through Bufferless Queues
This paper investigates the capacity of a channel in which information is
conveyed by the timing of consecutive packets passing through a queue with
independent and identically distributed service times. Such timing channels are
commonly studied under the assumption of a work-conserving queue. In contrast,
this paper studies the case of a bufferless queue that drops arriving packets
while a packet is in service. Under this bufferless model, the paper provides
upper bounds on the capacity of timing channels and establishes achievable
rates for the case of bufferless M/M/1 and M/G/1 queues. In particular, it is
shown that a bufferless M/M/1 queue at worst suffers less than 10% reduction in
capacity when compared to an M/M/1 work-conserving queue.Comment: 8 pages, 3 figures, accepted in 51st Annual Allerton Conference on
Communication, Control, and Computing, University of Illinois, Monticello,
Illinois, Oct 2-4, 201
Queue-Architecture and Stability Analysis in Cooperative Relay Networks
An abstraction of the physical layer coding using bit pipes that are coupled
through data-rates is insufficient to capture notions such as node cooperation
in cooperative relay networks. Consequently, network-stability analyses based
on such abstractions are valid for non-cooperative schemes alone and
meaningless for cooperative schemes. Motivated from this, this paper develops a
framework that brings the information-theoretic coding scheme together with
network-stability analysis. This framework does not constrain the system to any
particular achievable scheme, i.e., the relays can use any cooperative coding
strategy of its choice, be it amplify/compress/quantize or any
alter-and-forward scheme. The paper focuses on the scenario when coherence
duration is of the same order of the packet/codeword duration, the channel
distribution is unknown and the fading state is only known causally. The main
contributions of this paper are two-fold: first, it develops a low-complexity
queue-architecture to enable stable operation of cooperative relay networks,
and, second, it establishes the throughput optimality of a simple network
algorithm that utilizes this queue-architecture.Comment: 16 pages, 1 figur
Bits through queues with feedback
In their paper Anantharam and Verd\'u showed that feedback does not
increase the capacity of a queue when the service time is exponentially
distributed. Whether this conclusion holds for general service times has
remained an open question which this paper addresses.
Two main results are established for both the discrete-time and the
continuous-time models. First, a sufficient condition on the service
distribution for feedback to increase capacity under FIFO service policy.
Underlying this condition is a notion of weak feedback wherein instead of the
queue departure times the transmitter is informed about the instants when
packets start to be served. Second, a condition in terms of output entropy rate
under which feedback does not increase capacity. This condition is general in
that it depends on the output entropy rate of the queue but explicitly depends
neither on the queue policy nor on the service time distribution. This
condition is satisfied, for instance, by queues with LCFS service policies and
bounded service times
Stability of Scheduled Message Communication over Degraded Broadcast Channels
We consider scheduled message communication over a discrete memoryless
degraded broadcast channel. The framework we consider here models both the
random message arrivals and the subsequent reliable communication by suitably
combining techniques from queueing theory and information theory. The channel
from the transmitter to each of the receivers is quasi-static, flat, and with
independent fades across the receivers. Requests for message transmissions are
assumed to arrive according to an i.i.d. arrival process. Then, (i) we derive
an outer bound to the region of message arrival vectors achievable by the class
of stationary scheduling policies, (ii) we show for any message arrival vector
that satisfies the outerbound, that there exists a stationary
``state-independent'' policy that results in a stable system for the
corresponding message arrival process, and (iii) under two asymptotic regimes,
we show that the stability region of nat arrival rate vectors has
information-theoretic capacity region interpretation.Comment: 5 pages, Submitted to 2006 International Symposium on Information
Theor
Adaptive Resource Control in 2-hop Ad-Hoc Networks
This paper presents a simple resource control\ud
mechanism with traffic scheduling for 2-hop ad-hoc networks, in\ud
which the Request-To-Send (RTS) packet is utilized to deliver\ud
feedback information. With this feedback information, the\ud
Transmission Opportunity (TXOP) limit of the sources can be\ud
controlled to balance the traffic. Furthermore, a bottleneck\ud
transmission scheduling scheme is introduced to provide fairness\ud
between local and forwarding flows. The proposed mechanism is\ud
modeled and evaluated using the well-known 20-sim dynamic\ud
system simulator. Experimental results show that a fairer and\ud
more efficient bandwidth utilization can be achieved than\ud
without the feedback mechanism. The use of the structured and\ud
formalized control-theoretical modeling framework has as\ud
advantage that results can be obtained in a fast and efficient way
- …