270 research outputs found

    Lecture Notes on Network Information Theory

    Full text link
    These lecture notes have been converted to a book titled Network Information Theory published recently by Cambridge University Press. This book provides a significantly expanded exposition of the material in the lecture notes as well as problems and bibliographic notes at the end of each chapter. The authors are currently preparing a set of slides based on the book that will be posted in the second half of 2012. More information about the book can be found at http://www.cambridge.org/9781107008731/. The previous (and obsolete) version of the lecture notes can be found at http://arxiv.org/abs/1001.3404v4/

    On Cooperative Multiple Access Channels with Delayed CSI at Transmitters

    Full text link
    We consider a cooperative two-user multiaccess channel in which the transmission is controlled by a random state. Both encoders transmit a common message and, one of the encoders also transmits an individual message. We study the capacity region of this communication model for different degrees of availability of the states at the encoders, causally or strictly causally. In the case in which the states are revealed causally to both encoders but not to the decoder we find an explicit characterization of the capacity region in the discrete memoryless case. In the case in which the states are revealed only strictly causally to both encoders, we establish inner and outer bounds on the capacity region. The outer bound is non-trivial, and has a relatively simple form. It has the advantage of incorporating only one auxiliary random variable. We then introduce a class of cooperative multiaccess channels with states known strictly causally at both encoders for which the inner and outer bounds agree; and so we characterize the capacity region for this class. In this class of channels, the state can be obtained as a deterministic function of the channel inputs and output. We also study the model in which the states are revealed, strictly causally, in an asymmetric manner, to only one encoder. Throughout the paper, we discuss a number of examples; and compute the capacity region of some of these examples. The results shed more light on the utility of delayed channel state information for increasing the capacity region of state-dependent cooperative multiaccess channels; and tie with recent progress in this framework.Comment: 54 pages. To appear in IEEE Transactions on Information Theory. arXiv admin note: substantial text overlap with arXiv:1201.327

    Universal Quantization for Separate Encodings and Joint Decoding of Correlated Sources

    Full text link
    We consider the multi-user lossy source-coding problem for continuous alphabet sources. In a previous work, Ziv proposed a single-user universal coding scheme which uses uniform quantization with dither, followed by a lossless source encoder (entropy coder). In this paper, we generalize Ziv's scheme to the multi-user setting. For this generalized universal scheme, upper bounds are derived on the redundancies, defined as the differences between the actual rates and the closest corresponding rates on the boundary of the rate region. It is shown that this scheme can achieve redundancies of no more than 0.754 bits per sample for each user. These bounds are obtained without knowledge of the multi-user rate region, which is an open problem in general. As a direct consequence of these results, inner and outer bounds on the rate-distortion achievable region are obtained.Comment: 24 pages, 1 figur

    Asynchronous Joint Source-Channel Communication: An Information-Theoretic Perspective

    Get PDF
    Due to the increasing growth and demand for wireless communication services, new techniques and paradigms are required for the development of next generation systems and networks. As a first step to better differentiate between various options to develop future systems, one should consider fundamental theoretical problems and limitations in present systems and networks. Hence, some common ground between network information theory and mobile/wireless medium techniques should be explicitly addressed to better understand future generation trends. Among practical limitations, a major challenge, which is inherent and due to the physics of many mobile/wireless setups, is the problem of asynchronism between different nodes and/or clients in a wireless network. Although analytically convenient, the assumption of full synchronization between the end terminals in a network is usually difficult to justify. Thus, finding fundamental limits for communication systems under different types of asynchronism is essential to tackle real world problems. In this thesis, we study information theoretic limits that various multiuser wireless communication systems encounter under time or phase asynchronism between different nodes. In particular, we divide our research into two categories: phase asynchronous and time asynchronous systems. In the first part of this thesis, we consider several multiuser networks with phase fading communication links, i.e., all of the channels introduce phase shifts to the transmitted signals. We assume that the phase shifts are unknown to the transmitters as a practical assumption which results in a phase asynchronism between transmitter sides and receiver sides. We refer to these communication systems as phase incoherent (PI) communication systems and study the problem of communicating arbitrarily correlated sources over them. Specifically, we are interested in solving the general problem of joint source-channel coding over PI networks. To this end, we first present a lemma which is very useful in deriving necessary conditions for reliable communication of the sources over PI channels. Then, for each channel and under specific gain conditions, we derive sufficient conditions based on separate source and channel coding and show that the necessary and sufficient conditions match. Therefore, we are able to present and prove several separation theorems for channels under study under specific gain conditions. In the second part of this thesis, we consider time asynchronism in networks. In particular, we consider a multiple access channel with a relay as a general setup to model many wireless networks in which the transmitters are time asynchronous in the sense that they cannot operate at the same exact time. Based on the realistic assumption of a time offset between the transmitters, we again consider the problem of communicating arbitrarily correlated sources over such a time-asynchronous multiple access relay channel (TA-MARC). We first derive a general necessary condition for reliable communication. Then, by the use of separate source and channel coding and under specific gain conditions, we show that the derived sufficient conditions match with the general necessary condition for reliable communications. Consequently, we present a separation theorem for this class of networks under specific gain conditions. We then specialize our results to a two-user interference channel with time asynchronism between the encoders

    Rate-Distortion-Based Physical Layer Secrecy with Applications to Multimode Fiber

    Full text link
    Optical networks are vulnerable to physical layer attacks; wiretappers can improperly receive messages intended for legitimate recipients. Our work considers an aspect of this security problem within the domain of multimode fiber (MMF) transmission. MMF transmission can be modeled via a broadcast channel in which both the legitimate receiver's and wiretapper's channels are multiple-input-multiple-output complex Gaussian channels. Source-channel coding analyses based on the use of distortion as the metric for secrecy are developed. Alice has a source sequence to be encoded and transmitted over this broadcast channel so that the legitimate user Bob can reliably decode while forcing the distortion of wiretapper, or eavesdropper, Eve's estimate as high as possible. Tradeoffs between transmission rate and distortion under two extreme scenarios are examined: the best case where Eve has only her channel output and the worst case where she also knows the past realization of the source. It is shown that under the best case, an operationally separate source-channel coding scheme guarantees maximum distortion at the same rate as needed for reliable transmission. Theoretical bounds are given, and particularized for MMF. Numerical results showing the rate distortion tradeoff are presented and compared with corresponding results for the perfect secrecy case.Comment: 30 pages, 5 figures, accepted to IEEE Transactions on Communication
    • …
    corecore