368 research outputs found
Rate Aware Instantly Decodable Network Codes
This paper addresses the problem of reducing the delivery time of data
messages to cellular users using instantly decodable network coding (IDNC) with
physical-layer rate awareness. While most of the existing literature on IDNC
does not consider any physical layer complications and abstract the model as
equally slotted time for all users, this paper proposes a cross-layer scheme
that incorporates the different channel rates of the various users in the
decision process of both the transmitted message combinations and the rates
with which they are transmitted. The consideration of asymmetric rates for
receivers reflects more practical application scenarios and introduces a new
trade-off between the choice of coding combinations for various receivers and
the broadcasting rate for achieving shorter completion time. The completion
time minimization problem in such scenario is first shown to be intractable.
The problem is, thus, approximated by reducing, at each transmission, the
increase of an anticipated version of the completion time. The paper solves the
problem by formulating it as a maximum weight clique problem over a newly
designed rate aware IDNC (RA-IDNC) graph. The highest weight clique in the
created graph being potentially not unique, the paper further suggests a
multi-layer version of the proposed solution to improve the obtained results
from the employed completion time approximation. Simulation results indicate
that the cross-layer design largely outperforms the uncoded transmissions
strategies and the classical IDNC scheme
Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes
Consider a radio access network wherein a base-station is required to deliver
a set of order-constrained messages to a set of users over independent erasure
channels. This paper studies the delivery time reduction problem using
instantly decodable network coding (IDNC). Motivated by time-critical and
order-constrained applications, the delivery time is defined, at each
transmission, as the number of undelivered messages. The delivery time
minimization problem being computationally intractable, most of the existing
literature on IDNC propose sub-optimal online solutions. This paper suggests a
novel method for solving the problem by introducing the delivery delay as a
measure of distance to optimality. An expression characterizing the delivery
time using the delivery delay is derived, allowing the approximation of the
delivery time minimization problem by an optimization problem involving the
delivery delay. The problem is, then, formulated as a maximum weight clique
selection problem over the IDNC graph wherein the weight of each vertex
reflects its corresponding user and message's delay. Simulation results suggest
that the proposed solution achieves lower delivery and completion times as
compared to the best-known heuristics for delivery time reduction
Secret Communication over Broadcast Erasure Channels with State-feedback
We consider a 1-to- communication scenario, where a source transmits
private messages to receivers through a broadcast erasure channel, and the
receivers feed back strictly causally and publicly their channel states after
each transmission. We explore the achievable rate region when we require that
the message to each receiver remains secret - in the information theoretical
sense - from all the other receivers. We characterize the capacity of secure
communication in all the cases where the capacity of the 1-to- communication
scenario without the requirement of security is known. As a special case, we
characterize the secret-message capacity of a single receiver point-to-point
erasure channel with public state-feedback in the presence of a passive
eavesdropper.
We find that in all cases where we have an exact characterization, we can
achieve the capacity by using linear complexity two-phase schemes: in the first
phase we create appropriate secret keys, and in the second phase we use them to
encrypt each message. We find that the amount of key we need is smaller than
the size of the message, and equal to the amount of encrypted message the
potential eavesdroppers jointly collect. Moreover, we prove that a dishonest
receiver that provides deceptive feedback cannot diminish the rate experienced
by the honest receivers.
We also develop a converse proof which reflects the two-phase structure of
our achievability scheme. As a side result, our technique leads to a new outer
bound proof for the non-secure communication problem
- …