10,166 research outputs found
Broadcasting a Common Message with Variable-Length Stop-Feedback Codes
We investigate the maximum coding rate achievable over a two-user broadcast
channel for the scenario where a common message is transmitted using
variable-length stop-feedback codes. Specifically, upon decoding the common
message, each decoder sends a stop signal to the encoder, which transmits
continuously until it receives both stop signals. For the point-to-point case,
Polyanskiy, Poor, and Verd\'u (2011) recently demonstrated that variable-length
coding combined with stop feedback significantly increases the speed at which
the maximum coding rate converges to capacity. This speed-up manifests itself
in the absence of a square-root penalty in the asymptotic expansion of the
maximum coding rate for large blocklengths, a result a.k.a. zero dispersion. In
this paper, we show that this speed-up does not necessarily occur for the
broadcast channel with common message. Specifically, there exist scenarios for
which variable-length stop-feedback codes yield a positive dispersion.Comment: Extended version of a paper submitted to ISIT 201
Variable-Length Coding with Stop-Feedback for the Common-Message Broadcast Channel
This paper investigates the maximum coding rate over a K-user discrete memoryless broadcast channel for the sce- nario where a common message is transmitted using variable- length stop-feedback codes. Specifically, upon decoding the com- mon message, each decoder sends a stop signal to the encoder, which transmits continuously until it receives all K stop signals. We present nonasymptotic achievability and converse bounds for the maximum coding rate, which strengthen and generalize the bounds previously reported in Trillingsgaard et al. (2015) for the two-user case. An asymptotic analysis of these bounds reveal that—contrary to the point-to-point case—the second-order term in the asymptotic expansion of the maximum coding rate decays inversely proportional to the square root of the average block- length. This holds for certain nontrivial common-message broad- cast channels, such as the binary symmetric broadcast channel. Furthermore, we identify conditions under which our converse and achievability bounds are tight up to the second order. Through numerical evaluations, we illustrate that our second-order asymp- totic expansion approximates accurately the maximum coding rate and that the speed of convergence to capacity is indeed slower than for the point-to-point case
Reliable Transmission of Short Packets through Queues and Noisy Channels under Latency and Peak-Age Violation Guarantees
This work investigates the probability that the delay and the peak-age of
information exceed a desired threshold in a point-to-point communication system
with short information packets. The packets are generated according to a
stationary memoryless Bernoulli process, placed in a single-server queue and
then transmitted over a wireless channel. A variable-length stop-feedback
coding scheme---a general strategy that encompasses simple automatic repetition
request (ARQ) and more sophisticated hybrid ARQ techniques as special
cases---is used by the transmitter to convey the information packets to the
receiver. By leveraging finite-blocklength results, the delay violation and the
peak-age violation probabilities are characterized without resorting to
approximations based on large-deviation theory as in previous literature.
Numerical results illuminate the dependence of delay and peak-age violation
probability on system parameters such as the frame size and the undetected
error probability, and on the chosen packet-management policy. The guidelines
provided by our analysis are particularly useful for the design of low-latency
ultra-reliable communication systems.Comment: To appear in IEEE journal on selected areas of communication (IEEE
JSAC
Secret Communication over Broadcast Erasure Channels with State-feedback
We consider a 1-to- communication scenario, where a source transmits
private messages to receivers through a broadcast erasure channel, and the
receivers feed back strictly causally and publicly their channel states after
each transmission. We explore the achievable rate region when we require that
the message to each receiver remains secret - in the information theoretical
sense - from all the other receivers. We characterize the capacity of secure
communication in all the cases where the capacity of the 1-to- communication
scenario without the requirement of security is known. As a special case, we
characterize the secret-message capacity of a single receiver point-to-point
erasure channel with public state-feedback in the presence of a passive
eavesdropper.
We find that in all cases where we have an exact characterization, we can
achieve the capacity by using linear complexity two-phase schemes: in the first
phase we create appropriate secret keys, and in the second phase we use them to
encrypt each message. We find that the amount of key we need is smaller than
the size of the message, and equal to the amount of encrypted message the
potential eavesdroppers jointly collect. Moreover, we prove that a dishonest
receiver that provides deceptive feedback cannot diminish the rate experienced
by the honest receivers.
We also develop a converse proof which reflects the two-phase structure of
our achievability scheme. As a side result, our technique leads to a new outer
bound proof for the non-secure communication problem
Multi-user video streaming using unequal error protection network coding in wireless networks
In this paper, we investigate a multi-user video streaming system applying unequal error protection (UEP) network coding (NC) for simultaneous real-time exchange of scalable video streams among multiple users. We focus on a simple wireless scenario where users exchange encoded data packets over a common central network node (e.g., a base station or an access point) that aims to capture the fundamental system behaviour. Our goal is to present analytical tools that provide both the decoding probability analysis and the expected delay guarantees for different importance layers of scalable video streams. Using the proposed tools, we offer a simple framework for design and analysis of UEP NC based multi-user video streaming systems and provide examples of system design for video conferencing scenario in broadband wireless cellular networks
Overview of evolved Multimedia Broadcast Multicast Services (eMBMS)
MBMS was introduced as a service to optimize the dissemination of common interest multimedia content. Recently, it evolved to eMBMS based on LTE-centered flexibilities. However, launch of eMBMS over LTE may support new services e.g. pushed content for M2M services and delivery of premium content to the users enjoying secured QoS. This document primarily focusses on the rules, procedures and architecture supporting MBMS based data exchanges, which have not seen any major changes since Release 9
- …