186 research outputs found

    Block-Fading Channels with Delayed CSIT at Finite Blocklength

    Get PDF
    In many wireless systems, the channel state information at the transmitter (CSIT) can not be learned until after a transmission has taken place and is thereby outdated. In this paper, we study the benefits of delayed CSIT on a block-fading channel at finite blocklength. First, the achievable rates of a family of codes that allows the number of codewords to expand during transmission, based on delayed CSIT, are characterized. A fixed-length and a variable-length characterization of the rates are provided using the dependency testing bound and the variable-length setting introduced by Polyanskiy et al. Next, a communication protocol based on codes with expandable message space is put forth, and numerically, it is shown that higher rates are achievable compared to coding strategies that do not benefit from delayed CSIT.Comment: Extended version of a paper submitted to ISIT'1

    Downlink Transmission of Short Packets: Framing and Control Information Revisited

    Full text link
    Cellular wireless systems rely on frame-based transmissions. The frame design is conventionally based on heuristics, consisting of a frame header and a data part. The frame header contains control information that provides pointers to the messages within the data part. In this paper, we revisit the principles of frame design and show the impact of the new design in scenarios that feature short data packets which are central to various 5G and Internet of Things applications. We treat framing for downlink transmission in an AWGN broadcast channel with K users, where the sizes of the messages to the users are random variables. Using approximations from finite blocklength information theory, we establish a framework in which a message to a given user is not necessarily encoded as a single packet, but may be grouped with the messages to other users and benefit from the improved efficiency of longer codes. This requires changes in the way control information is sent, and it requires that the users need to spend power decoding other messages, thereby increasing the average power consumption. We show that the common heuristic design is only one point on a curve that represents the trade-off between latency and power consumption.Comment: 10 page

    Broadcasting a Common Message with Variable-Length Stop-Feedback Codes

    Get PDF
    We investigate the maximum coding rate achievable over a two-user broadcast channel for the scenario where a common message is transmitted using variable-length stop-feedback codes. Specifically, upon decoding the common message, each decoder sends a stop signal to the encoder, which transmits continuously until it receives both stop signals. For the point-to-point case, Polyanskiy, Poor, and Verd\'u (2011) recently demonstrated that variable-length coding combined with stop feedback significantly increases the speed at which the maximum coding rate converges to capacity. This speed-up manifests itself in the absence of a square-root penalty in the asymptotic expansion of the maximum coding rate for large blocklengths, a result a.k.a. zero dispersion. In this paper, we show that this speed-up does not necessarily occur for the broadcast channel with common message. Specifically, there exist scenarios for which variable-length stop-feedback codes yield a positive dispersion.Comment: Extended version of a paper submitted to ISIT 201

    Information-Theoretic Aspects of Low-Latency Communications

    Get PDF

    Blahut-Arimoto Algorithm and Code Design for Action-Dependent Source Coding Problems

    Get PDF
    The source coding problem with action-dependent side information at the decoder has recently been introduced to model data acquisition in resource-constrained systems. In this paper, an efficient algorithm for numerical computation of the rate-distortion-cost function for this problem is proposed, and a convergence proof is provided. Moreover, a two-stage code design based on multiplexing is put forth, whereby the first stage encodes the actions and the second stage is composed of an array of classical Wyner-Ziv codes, one for each action. Specific coding/decoding strategies are designed based on LDGM codes and message passing. Through numerical examples, the proposed code design is shown to achieve performance close to the lower bound dictated by the rate-distortion-cost function.Comment: Extended version of a paper submitted to ISI

    5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View

    Get PDF
    The grand objective of 5G wireless technology is to support three generic services with vastly heterogeneous requirements: enhanced mobile broadband (eMBB), massive machine-type communications (mMTC), and ultra-reliable low-latency communications (URLLC). Service heterogeneity can be accommodated by network slicing, through which each service is allocated resources to provide performance guarantees and isolation from the other services. Slicing of the Radio Access Network (RAN) is typically done by means of orthogonal resource allocation among the services. This work studies the potential advantages of allowing for non-orthogonal sharing of RAN resources in uplink communications from a set of eMBB, mMTC and URLLC devices to a common base station. The approach is referred to as Heterogeneous Non-Orthogonal Multiple Access (H-NOMA), in contrast to the conventional NOMA techniques that involve users with homogeneous requirements and hence can be investigated through a standard multiple access channel. The study devises a communication-theoretic model that accounts for the heterogeneous requirements and characteristics of the three services. The concept of reliability diversity is introduced as a design principle that leverages the different reliability requirements across the services in order to ensure performance guarantees with non-orthogonal RAN slicing. This study reveals that H-NOMA can lead, in some regimes, to significant gains in terms of performance trade-offs among the three generic services as compared to orthogonal slicing.Comment: Submitted to IEE

    Short Packet Structure for Ultra-Reliable Machine-type Communication: Tradeoff between Detection and Decoding

    Full text link
    Machine-type communication requires rethinking of the structure of short packets due to the coding limitations and the significant role of the control information. In ultra-reliable low-latency communication (URLLC), it is crucial to optimally use the limited degrees of freedom (DoFs) to send data and control information. We consider a URLLC model for short packet transmission with acknowledgement (ACK). We compare the detection/decoding performance of two short packet structures: (1) time-multiplexed detection sequence and data; and (2) structure in which both packet detection and data decoding use all DoFs. Specifically, as an instance of the second structure we use superimposed sequences for detection and data. We derive the probabilities of false alarm and misdetection for an AWGN channel and numerically minimize the packet error probability (PER), showing that for delay-constrained data and ACK exchange, there is a tradeoff between the resources spent for detection and decoding. We show that the optimal PER for the superimposed structure is achieved for higher detection overhead. For this reason, the PER is also higher than in the preamble case. However, the superimposed structure is advantageous due to its flexibility to achieve optimal operation without the need to use multiple codebooks.Comment: Accepted at ICASSP 2018, special session on "Signal Processing for Machine-Type Communications

    Variable-length coding for short packets over a multiple access channel with feedback

    Get PDF
    • …
    corecore