7,114 research outputs found

    Transmission Strategies for the Gaussian Parallel Relay Channel

    Get PDF
    Cooperative wireless communication has received significant attention during recent years due to several reasons. First, since the received power decreases rapidly with distance, the idea of multi-hopping is becoming of particular importance. In multi-hopped communication, the source exploits some intermediate nodes as relays. Then the source sends its message via those relays to the destination. Second, relays can emulate some kind of distributed transmit antennas to form spatial diversity and combat multi-path fading effect of the wireless channel. Parallel Relay Channel is an information theoretical model for a communication system whereby a sender aims to communicate to a receiver with the help of relay nodes. It represents the simplest model for a multi–hop wireless network and a full understanding of the limits of communication over such a channel can potentially shed light on the design of more efficient wireless networks. However, the capacity of the relay channel has been established only for few special cases and little progress has been made toward solving the general case since the early 1980s. In this dissertation, motivated by practical constraints, we study the information theoretical limits of the half-duplex Gaussian Parallel Relay channel , as well as, the transmission strategies for the parallel relay channel with bandwidth mismatch between the first and the second hops. Chapter 2 investigates the problem of communication for a network composed of two half-duplex parallel relays with additive white Gaussian noise (AWGN). There is no direct link between the source and the destination. However, the relays can communicate with each other through the channel between them. Two protocols, i.e., \emph{Simultaneous} and \emph{Successive} relaying, associated with two possible relay scheduling are proposed. The simultaneous relaying protocol is based on \emph{Broadcast-multiaccess with Common Message (BCM)} scheme. For the successive relaying protocol: (i) a \emph{Non-Cooperative} scheme based on the \emph{Dirty Paper Coding (DPC)}, and (ii) a \emph{Cooperative} scheme based on the \emph{Block Markov Encoding (BME)} are considered. The composite scheme of employing BME in \emph{at most} one relay and DPC in \emph{at least} another one is shown to achieve at least the same rate when compared to the \emph{Cooperative} and \emph{Non-Cooperative} schemes. A \emph{``Simultaneous-Successive Relaying based on Dirty paper coding scheme" (SSRD)} is also proposed. The optimum scheduling of the relays and hence the capacity of the half-duplex Gaussian parallel relay channel in the low and high signal-to-noise ratio (SNR) scenarios is derived. In the low SNR scenario, it is revealed that under certain conditions for the channel coefficients, the ratio of the achievable rate of the simultaneous relaying based on BCM to the cut-set bound tends to be 1. On the other hand, as SNR goes to infinity, it is proved that successive relaying, based on the DPC, asymptotically achieves the capacity of the network. Schein and Gallager introduced the Gaussian parallel relay channel in 2000. They proposed the Amplify-and-Forward (AF) and the Decode-and-Forward (DF) strategies for this channel. For a long time, the best known achievable rate for this channel was based on the AF and DF with time sharing (AF-DF). Recently, a Rematch-and-Forward (RF) scheme for the scenario in which different amounts of bandwidth can be assigned to the first and second hops were proposed. In chapter 3, we propose a \emph{Combined Amplify-and-Decode Forward (CADF)} scheme for the Gaussian parallel relay channel. We prove that the CADF scheme always gives a better achievable rate compared to the RF scheme, when there is a bandwidth mismatch between the first hop and the second hop. Furthermore, for the equal bandwidth case (Schein's setup), we show that the time sharing between the CADF and the DF schemes (CADF-DF) leads to a better achievable rate compared to the time sharing between the RF and the DF schemes (RF-DF) as well as the AF-DF

    Interference Channel with a Half-Duplex Out-of-Band Relay

    Full text link
    A Gaussian interference channel (IC) aided by a half-duplex relay is considered, in which the relay receives and transmits in an orthogonal band with respect to the IC. The system thus consists of two parallel channels, the IC and the channel over which the relay is active, which is referred to as Out-of-Band Relay Channel (OBRC). The OBRC is operated by separating a multiple access phase from the sources to the relay and a broadcast phase from the relay to the destinations. Conditions under which the optimal operation, in terms of the sum-capacity, entails either signal relaying and/or interference forwarding by the relay are identified. These conditions also assess the optimality of either separable or non-separable transmission over the IC and OBRC. Specifically, the optimality of signal relaying and separable coding is established for scenarios where the relay-to-destination channels set the performance bottleneck with respect to the source-to-relay channels on the OBRC. Optimality of interference forwarding and non-separable operation is also established in special cases.Comment: 5 pages, 5 figures, to appear in Proceedings of IEEE ISIT 201

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201
    • …
    corecore