97 research outputs found

    Polarization as a novel architecture to boost the classical mismatched capacity of B-DMCs

    Full text link
    We show that the mismatched capacity of binary discrete memoryless channels can be improved by channel combining and splitting via Ar{\i}kan's polar transformations. We also show that the improvement is possible even if the transformed channels are decoded with a mismatched polar decoder.Comment: Submitted to ISIT 201

    Status Updates in a multi-stream M/G/1/1 preemptive queue

    Full text link
    We consider a source that collects a multiplicity of streams of updates and sends them through a network to a monitor. However, only a single update can be in the system at a time. Therefore, the transmitter always preempts the packet being served when a new update is generated. We consider Poisson arrivals for each stream and a common general service time, and refer to this system as the multi-stream M/G/1/1 queue with preemption. Using the detour flow graph method, we compute a closed form expression for the average age and the average peak age of each stream. Moreover, we deduce that although all streams are treated equally from a transmission point of view (they all preempt each other), one can still prioritize a stream from an age point of view by simply increasing its generation rate. However, this will increase the sum of the ages which is minimized when all streams have the same update rate

    Polar Codes for Arbitrary DMCs and Arbitrary MACs

    Full text link
    Polar codes are constructed for arbitrary channels by imposing an arbitrary quasigroup structure on the input alphabet. Just as with "usual" polar codes, the block error probability under successive cancellation decoding is o(2N1/2ϵ)o(2^{-N^{1/2-\epsilon}}), where NN is the block length. Encoding and decoding for these codes can be implemented with a complexity of O(NlogN)O(N\log N). It is shown that the same technique can be used to construct polar codes for arbitrary multiple access channels (MAC) by using an appropriate Abelian group structure. Although the symmetric sum capacity is achieved by this coding scheme, some points in the symmetric capacity region may not be achieved. In the case where the channel is a combination of linear channels, we provide a necessary and sufficient condition characterizing the channels whose symmetric capacity region is preserved by the polarization process. We also provide a sufficient condition for having a maximal loss in the dominant face.Comment: 32 pages, 1 figure. arXiv admin note: text overlap with arXiv:1112.177

    Polar Codes for the m-User MAC

    Get PDF
    In this paper, polar codes for the mm-user multiple access channel (MAC) with binary inputs are constructed. It is shown that Ar{\i}kan's polarization technique applied individually to each user transforms independent uses of a mm-user binary input MAC into successive uses of extremal MACs. This transformation has a number of desirable properties: (i) the `uniform sum rate' of the original MAC is preserved, (ii) the extremal MACs have uniform rate regions that are not only polymatroids but matroids and thus (iii) their uniform sum rate can be reached by each user transmitting either uncoded or fixed bits; in this sense they are easy to communicate over. A polar code can then be constructed with an encoding and decoding complexity of O(nlogn)O(n \log n) (where nn is the block length), a block error probability of o(\exp(- n^{1/2 - \e})), and capable of achieving the uniform sum rate of any binary input MAC with arbitrary many users. An application of this polar code construction to communicating on the AWGN channel is also discussed

    On Channel Resolvability in Presence of Feedback

    Full text link
    We study the problem of generating an approximately i.i.d. string at the output of a discrete memoryless channel using a limited amount of randomness at its input in presence of causal noiseless feedback. Feedback does not decrease the channel resolution, the minimum entropy rate required to achieve an accurate approximation of an i.i.d. output string. However, we show that, at least over a binary symmetric channel, a significantly larger resolvability exponent (the exponential decay rate of the divergence between the output distribution and product measure), compared to the best known achievable resolvability exponent in a system without feedback, is possible. We show that by employing a variable-length resolvability scheme and using an average number of coin-flips per channel use, the average divergence between the distribution of the output sequence and product measure decays exponentially fast in the average length of output sequence with an exponent equal to [RI(U;V)]+[R-I(U;V)]^+ where I(U;V)I(U;V) is the mutual information developed across the channel.Comment: 8 pages, 4 figures; to be presented at the 54th Annual Allerton Conference on Communication, Control, and Computin

    On the Correlation Between Polarized BECs

    Full text link
    We consider the 2n2^n channels synthesized by the nn-fold application of Ar\i{}kan's polar transform to a binary erasure channel (BEC). The synthetic channels are BECs themselves, and we show that, asymptotically for almost all these channels, the pairwise correlations between their erasure events are extremely small: the correlation coefficients vanish faster than any exponential in nn. Such a fast decay of correlations allows us to conclude that the union bound on the block error probability of polar codes is very tight.Comment: 9 pages, Extended version of a paper submitted to ISIT 201

    Content Based Status Updates

    Get PDF
    Consider a stream of status updates generated by a source, where each update is of one of two types: high priority or ordinary (low priority). These updates are to be transmitted through a network to a monitor. However, the transmission policy of each packet depends on the type of stream it belongs to. For the low priority stream, we analyze and compare the performances of two transmission schemes: (i) Ordinary updates are served in a First-Come-First-Served (FCFS) fashion, whereas, in (ii), the ordinary updates are transmitted according to an M/G/1/1 with preemption policy. In both schemes, high priority updates are transmitted according to an M/G/1/1 with preemption policy and receive preferential treatment. An arriving priority update discards and replaces any currently-in-service high priority update, and preempts (with eventual resume for scheme (i)) any ordinary update. We model the arrival processes of the two kinds of updates, in both schemes, as independent Poisson processes. For scheme (i), we find the arrival and service rates under which the system is stable and give closed-form expressions for average peak age and a lower bound on the average age of the ordinary stream. For scheme (ii), we derive closed-form expressions for the average age and average peak age of the high priority and low priority streams. We finally show that, if the service time is exponentially distributed, the M/M/1/1 with preemption policy leads to an average age of the low priority stream higher than the one achieved using the FCFS scheme. Therefore, the M/M//1/1 with preemption policy, when applied on the low priority stream of updates and in the presence of a higher priority scheme, is not anymore the optimal transmission policy from an age point of view

    Polar codes for the two-user multiple-access channel

    Full text link
    Arikan's polar coding method is extended to two-user multiple-access channels. It is shown that if the two users of the channel use the Arikan construction, the resulting channels will polarize to one of five possible extremals, on each of which uncoded transmission is optimal. The sum rate achieved by this coding technique is the one that correponds to uniform input distributions. The encoding and decoding complexities and the error performance of these codes are as in the single-user case: O(nlogn)O(n\log n) for encoding and decoding, and o(exp(n1/2ϵ))o(\exp(-n^{1/2-\epsilon})) for block error probability, where nn is the block length.Comment: 12 pages. Submitted to the IEEE Transactions on Information Theor

    Exact Random Coding Secrecy Exponents for the Wiretap Channel

    Full text link
    We analyze the exact exponential decay rate of the expected amount of information leaked to the wiretapper in Wyner's wiretap channel setting using wiretap channel codes constructed from both i.i.d. and constant-composition random codes. Our analysis for those sampled from i.i.d. random coding ensemble shows that the previously-known achievable secrecy exponent using this ensemble is indeed the exact exponent for an average code in the ensemble. Furthermore, our analysis on wiretap channel codes constructed from the ensemble of constant-composition random codes leads to an exponent which, in addition to being the exact exponent for an average code, is larger than the achievable secrecy exponent that has been established so far in the literature for this ensemble (which in turn was known to be smaller than that achievable by wiretap channel codes sampled from i.i.d. random coding ensemble). We show examples where the exact secrecy exponent for the wiretap channel codes constructed from random constant-composition codes is larger than that of those constructed from i.i.d. random codes and examples where the exact secrecy exponent for the wiretap channel codes constructed from i.i.d. random codes is larger than that of those constructed from constant-composition random codes. We, hence, conclude that, unlike the error correction problem, there is no general ordering between the two random coding ensembles in terms of their secrecy exponent.Comment: 23 pages, 5 figures, submitted to IEEE Transactions on Information Theor
    corecore