291 research outputs found
Generalized Degrees of Freedom of the Interference Channel with a Signal Cognitive Relay
We study the interference channel with a signal cognitive relay. A signal
cognitive relay knows the transmit signals (but not the messages) of the
sources non-causally, and tries to help them communicating with their
respective destinations. We derive upper bounds and provide achievable schemes
for this channel. These upper and lower bounds are shown to be tight from
generalized degrees of freedom point of view. As a result, a characterization
of the generalized degrees of freedom of the interference channel with a signal
cognitive relay is given.Comment: Results submitted to ISIT 2010, 19 pages, 3 figure
Sub-optimality of Treating Interference as Noise in the Cellular Uplink
Despite the simplicity of the scheme of treating interference as noise (TIN),
it was shown to be sum-capacity optimal in the Gaussian 2-user interference
channel in \cite{ShangKramerChen,MotahariKhandani,AnnapureddyVeeravalli}. In
this paper, an interference network consisting of a point-to-point channel
interfering with a multiple access channel (MAC) is considered, with focus on
the weak interference scenario. Naive TIN in this network is performed by using
Gaussian codes at the transmitters, joint decoding at the MAC receiver while
treating interference as noise, and single user decoding at the point-to-point
receiver while treating both interferers as noise. It is shown that this naive
TIN scheme is never optimal in this scenario. In fact, a scheme that combines
both time division multiple access and TIN outperforms the naive TIN scheme. An
upper bound on the sum-capacity of the given network is also derived.Comment: 5 pages, 3 figures, typos correcte
Secret-key generation from wireless channels: Mind the reflections
Secret-key generation in a wireless environment exploiting the randomness and
reciprocity of the channel gains is considered. A new channel model is proposed
which takes into account the effect of reflections (or re-radiations) from
receive antenna elements, thus capturing an physical property of practical
antennas. It turns out that the reflections have a deteriorating effect on the
achievable secret-key rate between the legitimate nodes at high
signal-to-noise-power-ratio (SNR). The insights provide guidelines in the
design and operation of communication systems using the properties of the
wireless channel to prevent eavesdropping.Comment: 6 pages, 9 figure
When Can a Relay Reduce End-to-End Communication Delay?
The impact of relaying on the latency of communication in a relay channel is
studied. Both decode-forward (DF) and amplify-forward (AF) are considered, and
are compared with the point-to-point (P2P) scheme which does not use the relay.
The question as to whether DF and AF can decrease the latency of communicating
a number of bits with a given reliability requirement is addressed. Latency
expressions for the three schemes are derived. Although both DF and AF use a
block-transmission structure which sends the information over multiple
transmission blocks, they can both achieve latencies lower that P2P. Conditions
under which this occurs are obtained. Interestingly, these conditions are more
strict when compared to the conditions under which DF and AF achieve higher
information-theoretic rates than P2P.Comment: 6 pages, 4 figure
- …