Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel

Size: px
Start display at page:

Download "Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel"

Transcription

1 Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School of Electrical and Computer Engineering, Purdue University Presented in ISIT, 08/04/2011 Sponsored by NSF CCF and CNS

2 Wang, ISIT 2011 p. 2/15 Motivation The COPE Principle The COPE protocol 2-hop relay networks [Katti et al. 06] 4 transmissions w/o coding vs. 3 transmissions w. coding r sends [X + Y]; d 1 decodes X by subtraction. Empirically, % throughput improvement.

3 Wang, ISIT 2011 p. 2/15 Motivation The COPE Principle The COPE protocol 2-hop relay networks [Katti et al. 06] 4 transmissions w/o coding vs. 3 transmissions w. coding r sends [X + Y]; d 1 decodes X by subtraction. Empirically, % throughput improvement. The capacity can be defined over the corresponding PEC network.

4 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0.

5 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: R 1 min ( p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1

6 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: s R 1 min ( r p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1 Transmit all info from s i to r.

7 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: s R 1 min ( r avail. slots min inter. p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1 Transmit all info from s i to r. The cost of carrying the not overheard info for the other session.

8 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: s R 1 min ( r avail. slots min inter. p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1 Transmit all info from s i to r. The cost of carrying the not overheard info for the other session.

9 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: s R 1 min ( r avail. slots min inter. p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1 Transmit all info from s i to r. The cost of carrying the not overheard info for the other session.

10 A Competing Technique Wang, ISIT 2011 p. 4/15

11 A Competing Technique Wang, ISIT 2011 p. 4/15

12 Wang, ISIT 2011 p. 4/15 A Competing Technique Opportunistic Routing: Allow d 1 to directly hear from s 1. [Chachulski et al. 07]. No (intersession) coding at relay.

13 Wang, ISIT 2011 p. 4/15 A Competing Technique Opportunistic Routing: Allow d 1 to directly hear from s 1. [Chachulski et al. 07]. No (intersession) coding at relay. Capacity of Opp. Routing is characterized by the min-cut/max-flow theorem [Dana et al. 06]. R 1 min(p s1 ;{r or d 1 }, p s1 ;r + p s1 ;d 1 ).

14 Wang, ISIT 2011 p. 4/15 A Competing Technique Opportunistic Routing: Allow d 1 to directly hear from s 1. [Chachulski et al. 07]. No (intersession) coding at relay. Capacity of Opp. Routing is characterized by the min-cut/max-flow theorem [Dana et al. 06]. R 1 min(p s1 ;{r or d 1 }, p s1 ;r + p s1 ;d 1 ). Can we combine the benefits of Network Coding & Opportunistic Routing?

15 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info.

16 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: The overheard info.:

17 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] The overheard info.:

18 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] [What r and d 1 both have heard] The overheard info.:

19 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] [What r and d 1 both have heard] The overheard info.: [What r and d 2 have heard]

20 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] [What r and d 1 both have heard] The overheard info.: [What r and d 2 have heard] [What r, d 2, and d 1 all have heard] Wang, ISIT 2011 p. 5/15

21 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] Common Info. [What r and d 1 both have heard] The overheard info.: Common Info. [What r and d 2 have heard] Common Info. [What r, d 2, and d 1 all have heard] Wang, ISIT 2011 p. 5/15

22 Initial Thoughts Without direct s i d i communication: With this motivation, this work studies the Common Info. of Random Linear Network Coding. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] Common Info. [What r and d 1 both have heard] The overheard info.: Common Info. [What r and d 2 have heard] Common Info. [What r, d 2, and d 1 all have heard] Wang, ISIT 2011 p. 5/15

23 Wang, ISIT 2011 p. 6/15 Settings and Definitions Random Linear Network Coding (RLNC) N packets: W = (W 1,, W N ) (GF(q)) N. Each time t, source sends Y t = v t W T via an erasure CH. R t : The set of destinations receive the packet at time t. v t is randomly generated, but is known to all receivers.

24 Wang, ISIT 2011 p. 6/15 Settings and Definitions Random Linear Network Coding (RLNC) N packets: W = (W 1,, W N ) (GF(q)) N. Each time t, source sends Y t = v t W T via an erasure CH. R t : The set of destinations receive the packet at time t. v t is randomly generated, but is known to all receivers. Knowledge Space: Ω k = span{v t : t such that d k R t }. If Z k denotes the pkts rcv d by d k, then I(W; Z k ) = rank(ω k ).

25 Wang, ISIT 2011 p. 6/15 Settings and Definitions Random Linear Network Coding (RLNC) N packets: W = (W 1,, W N ) (GF(q)) N. Each time t, source sends Y t = v t W T via an erasure CH. R t : The set of destinations receive the packet at time t. v t is randomly generated, but is known to all receivers. Knowledge Space: Ω k = span{v t : t such that d k R t }. If Z k denotes the pkts rcv d by d k, then I(W; Z k ) = rank(ω k ). ( Kk=1 ) Common Information (CI): rank Ω k. Gács-Körner CI among Z 1 to Z K is rank ( Kk=1 Ω k ).

26 Settings and Definitions Random Linear Network Coding (RLNC) N packets: W = (W 1,, W N ) (GF(q)) N. Each time t, source sends Y t = v t W T via an erasure CH. R t : The set of destinations receive the packet at time t. v t is randomly generated, but is known to all receivers. Knowledge Space: Ω k = span{v t : t such that d k R t }. If Z k denotes the pkts rcv d by d k, then I(W; Z k ) = rank(ω k ). ( Kk=1 ) Common Information (CI): rank Ω k. Gács-Körner CI among Z 1 to Z K is rank ( Kk=1 Ω k ). Other notations: T S = { t : S Rt : The amount of time when all d k in S receive the pkt; A B = span(v : v A B). Wang, ISIT 2011 p. 6/15

27 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total # of to-be-sent symbols: [What r has heard] [What r and d 1 both have heard] The overheard info.: [What r and d 2 have heard] [What r, d 2, and d 1 all have heard]

28 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total (# of to-be-sent ) symbols: rank Ω [s 1] r [What r and d 1 both have heard] The overheard info.: [What r and d 2 have heard] [What r, d 2, and d 1 all have heard]

29 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard info.: [What r and d 2 have heard] [What r, d 2, and d 1 all have heard]

30 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard info.: ( ) rank Ω [s 1] r Ω [s 1] d 2 [What r, d 2, and d 1 all have heard]

31 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard ( info.: ) rank Ω [s 1] r Ω [s 1] ( d 2 rank Ω [s 1] r Ω [s 1] d 2 Ω [s 1] d 1 )

32 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k )

33 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k ) When K = 1, then rank (Ω 1 ) = min(t 1, N).

34 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k ) When K = 1, then rank (Ω 1 ) = min(t 1, N). When K = 2, we have rank (Ω 1 Ω 2 ) =rank (Ω 1 ) + rank (Ω 2 ) rank (Ω 1 Ω 2 ) = min(t 1, N) + min(t 2, N) min(t 1 + T 2 T {1,2}, N)

35 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k ) When K = 1, then rank (Ω 1 ) = min(t 1, N). When K = 2, we have rank (Ω 1 Ω 2 ) =rank (Ω 1 ) + rank (Ω 2 ) rank (Ω 1 Ω 2 ) = min(t 1, N) + min(t 2, N) min(t 1 + T 2 T {1,2}, N) Our first thought was when K = 3, we should have rank ( 3 k=1 Ω k ) = K k=1 rank (Ω k ) rank ( ) Ω i Ω j + rank (Ω1 Ω 2 Ω 3 ) i<j

36 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k ) When K = 1, then rank (Ω 1 ) = min(t 1, N). When K = 2, we have rank (Ω 1 Ω 2 ) =rank (Ω 1 ) + rank (Ω 2 ) rank (Ω 1 Ω 2 ) = min(t 1, N) + min(t 2, N) min(t 1 + T 2 T {1,2}, N) Our first thought was when K = 3, we should have rank ( 3 k=1 Ω k ) = K k=1 rank (Ω k ) rank ( ) Ω i Ω j + rank (Ω1 Ω 2 Ω 3 ) i<j DOES NOT HOLD!! An example is provided in the paper.

37 Wang, ISIT 2011 p. 9/15 Main Result A partition of {1,, K} is a collection of disjoint subsets {S m } = {S 1, S 2,, S M } such that M m=1 S m = {1,, K}. Theorem 1 Define ( ) + = max(, 0). For any receiving sets {R t : t}, with sufficiently large GF(q) we have ( ) { } K M rank Ω k = max N (N T Sm ) + : partition {S m } m=1 k=1.

38 Wang, ISIT 2011 p. 10/15 Proof of A Simplified Example We prove a degenerate case in this presentation. Assume N max k [K] T k S [K], ( k S ( Kk=1 ) We will prove that rank Ω k T k ) ( S 1)N T S. = K k=1 T k (K 1)N.

39 Proof of A Simplified Example We prove a degenerate case in this presentation. Assume N max k [K] T k S [K], ( k S ( Kk=1 ) We will prove that rank Ω k T k ) ( S 1)N T S. = K k=1 T k (K 1)N. An illustrative example w. K = 3: N = 5 dimensional vector space. 7 vectors with reception status 001, 010, 011, 100, 101, 110, 111. T 1 = T 2 = T 3 = 4, T {1,2} = T {1,3} = T {2,3} = 2, and T {1,2,3} = 1. Wang, ISIT 2011 p. 10/15

40 Proof of A Simplified Example We prove a degenerate case in this presentation. Assume N max k [K] T k S [K], ( k S ( Kk=1 ) We will prove that rank Ω k T k ) ( S 1)N T S. = K k=1 T k (K 1)N. ( 3k=1 ) An illustrative example w. K = 3: We will prove rank Ω k = N = 5 dimensional vector space (3 1) 5 = 2. 7 vectors with reception status 001, 010, 011, 100, 101, 110, 111. T 1 = T 2 = T 3 = 4, T {1,2} = T {1,3} = T {2,3} = 2, and T {1,2,3} = 1. Wang, ISIT 2011 p. 10/15

41 Proof (Cont d) Wang, ISIT 2011 p. 11/15

42 Proof (Cont d) Wang, ISIT 2011 p. 11/15

43 Proof (Cont d) Wang, ISIT 2011 p. 11/15

44 Proof (Cont d) Wang, ISIT 2011 p. 11/15

45 Proof (Cont d) Wang, ISIT 2011 p. 11/15

46 Proof (Cont d) Wang, ISIT 2011 p. 11/15

47 Proof (Cont d) Wang, ISIT 2011 p. 11/15

48 Proof (Cont d) Wang, ISIT 2011 p. 11/15

49 Proof (Cont d) Wang, ISIT 2011 p. 11/15

50 Proof (Cont d) Wang, ISIT 2011 p. 11/15

51 Proof (Cont d) Wang, ISIT 2011 p. 11/15

52 Proof (Cont d) Wang, ISIT 2011 p. 11/15

53 Proof (Cont d) Wang, ISIT 2011 p. 11/15

54 Proof (Cont d) Wang, ISIT 2011 p. 11/15

55 Proof (Cont d) Wang, ISIT 2011 p. 11/15

56 Proof (Cont d) Wang, ISIT 2011 p. 11/15

57 Proof (Cont d) Wang, ISIT 2011 p. 11/15

58 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5.

59 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5.

60 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond.

61 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned

62 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned

63 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Intersected Cond.

64 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond.

65 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond.

66 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond. then for almost all rand. choices of the 7 vectors, rank((ω 1 Ω 2 ) Ω 3 ) = 5.

67 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond. then for almost all rand. choices of the 7 vectors, rank((ω 1 Ω 2 ) Ω 3 ) = 5. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Wang, ISIT 2011 p. 12/15

68 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. It does not matter how we choose v 1, v 2, v 3, plus 7, Fully Spanned Cond. and in what order we construct the vectors. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. Any deterministic construction will suffice! The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond. then for almost all rand. choices of the 7 vectors, rank((ω 1 Ω 2 ) Ω 3 ) = 5. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Wang, ISIT 2011 p. 12/15

69 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

70 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

71 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

72 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

73 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

74 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

75 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

76 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

77 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

78 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

79 A Deterministic Assignment Wang, ISIT 2011 p. 13/15

80 Wang, ISIT 2011 p. 14/15 Intuition of the FS and FI Conds. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Let x denote the input coding vectors and the local mixing kernels. Then in RLNC, each message along an edge has the form of M = ( f 1 (x), f 2 (x),, f N (x)) where f i (x) are polynomials of x. [Koetter et al. 03].

81 Wang, ISIT 2011 p. 14/15 Intuition of the FS and FI Conds. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Let x denote the input coding vectors and the local mixing kernels. Then in RLNC, each message along an edge has the form of M = ( f 1 (x), f 2 (x),, f N (x)) where f i (x) are polynomials of x. [Koetter et al. 03]. When constructing the basis vectors of k Ω k, we need to solve linear equations (i.e., being in( all marginal spaces), which results in the form f1 (x) v = g 1 (x), f 2(x) g 2 (x),, f ) N(x). g N (x)

82 Wang, ISIT 2011 p. 14/15 Intuition of the FS and FI Conds. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Let x denote the input coding vectors and the local mixing kernels. Then in RLNC, each message along an edge has the form of M = ( f 1 (x), f 2 (x),, f N (x)) where f i (x) are polynomials of x. [Koetter et al. 03]. When constructing the basis vectors of k Ω k, we need to solve linear equations (i.e., being in( all marginal spaces), which results in the form f1 (x) v = g 1 (x), f 2(x) g 2 (x),, f ) N(x). g N (x) [Fully Intersected] associates a deterministic x 0 assignment with the corresponding fractional expressions; [Fully Spanned] guarantees both g n (x) and det ([v i ]) are non-zero.

83 Wang, ISIT 2011 p. 15/15 Conclusion & Future Works The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds.

84 Wang, ISIT 2011 p. 15/15 Conclusion & Future Works The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Main Results rank ( K k=1 Ω k ) = max { N } M (N T Sm ) + : partition {S m }. m=1

85 Wang, ISIT 2011 p. 15/15 Conclusion & Future Works The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Main Results rank ( K k=1 Ω k ) = max { N } M (N T Sm ) + : partition {S m }. m=1 Main motivation: The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard ( info.: ) rank Ω [s 1] r Ω [s 1] ( d 2 rank Ω [s 1] r Ω [s 1] d 2 Ω [s 1] d 1 )

86 Conclusion & Future Works The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Main Results rank ( K k=1 Ω k ) = max { N } M (N T Sm ) + : partition {S m }. m=1 Main motivation: The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard ( info.: ) rank Ω [s 1] r Ω [s 1] ( d 2 rank Ω [s 1] r Ω [s 1] d 2 Ω [s 1] d 1 ) Future works: (i) Arbitrary combinations: Ex: (Ω 1 Ω 2 ) Ω 3. (ii) Common Information of RLNC over multi-hop networks. Wang, ISIT 2011 p. 15/15

On the Capacity of Wireless 1-Hop Intersession Network Coding A Broadcast Packet Erasure Channel Approach

On the Capacity of Wireless 1-Hop Intersession Network Coding A Broadcast Packet Erasure Channel Approach 1 On the Capacity of Wireless 1-Hop Intersession Networ Coding A Broadcast Pacet Erasure Channel Approach Chih-Chun Wang, Member, IEEE Abstract Motivated by practical wireless networ protocols, this paper

More information

Capacity of 1-to-K Broadcast Packet Erasure Channels with Channel Output Feedback

Capacity of 1-to-K Broadcast Packet Erasure Channels with Channel Output Feedback Capacity of 1-to-K Broadcast Packet Erasure Channels with Channel Output Feedback Chih-Chun Wang Center of Wireless Systems and Applications (CWSA School of Electrical and Computer Engineering, Purdue

More information

Local network coding on packet erasure channels -- From Shannon capacity to stability region

Local network coding on packet erasure channels -- From Shannon capacity to stability region Purdue University Purdue e-pubs Open Access Dissertations Theses and Dissertations Spring 2015 Local network coding on packet erasure channels -- From Shannon capacity to stability region Wei-Chung Wang

More information

Random Linear Intersession Network Coding With Selective Cancelling

Random Linear Intersession Network Coding With Selective Cancelling 2009 IEEE Information Theory Workshop Random Linear Intersession Network Coding With Selective Cancelling Chih-Chun Wang Center of Wireless Systems and Applications (CWSA) School of ECE, Purdue University

More information

LOCAL NETWORK CODING ON PACKET ERASURE CHANNELS FROM SHANNON CAPACITY TO STABILITY REGION. A Preliminary Report. Submitted to the Faculty

LOCAL NETWORK CODING ON PACKET ERASURE CHANNELS FROM SHANNON CAPACITY TO STABILITY REGION. A Preliminary Report. Submitted to the Faculty LOCAL NETWORK CODING ON PACKET ERASURE CHANNELS FROM SHANNON CAPACITY TO STABILITY REGION A Preliminary Report Submitted to the Faculty of Purdue University by Wei-Cheng Kuo In Partial Fulfillment of the

More information

Interference, Cooperation and Connectivity A Degrees of Freedom Perspective

Interference, Cooperation and Connectivity A Degrees of Freedom Perspective Interference, Cooperation and Connectivity A Degrees of Freedom Perspective Chenwei Wang, Syed A. Jafar, Shlomo Shamai (Shitz) and Michele Wigger EECS Dept., University of California Irvine, Irvine, CA,

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints

Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints Inter-Session Network Coding Schemes for -to- Downlink Access-Point Networks with Sequential Hard Deadline Constraints Xiaohang Li, Chih-Chun Wang, and Xiaojun Lin Center for Wireless Systems and Applications,

More information

Event-triggered stabilization of linear systems under channel blackouts

Event-triggered stabilization of linear systems under channel blackouts Event-triggered stabilization of linear systems under channel blackouts Pavankumar Tallapragada, Massimo Franceschetti & Jorge Cortés Allerton Conference, 30 Sept. 2015 Acknowledgements: National Science

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

On the Capacity of the Interference Channel with a Relay

On the Capacity of the Interference Channel with a Relay On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of

More information

CERIAS Tech Report Analysis and Design of Intersession Network Coding in Communication Networks by Abdallah Khreishah Center for Education

CERIAS Tech Report Analysis and Design of Intersession Network Coding in Communication Networks by Abdallah Khreishah Center for Education CERIAS Tech Report 2010-33 Analysis and Design of Intersession Network Coding in Communication Networks by Abdallah Khreishah Center for Education and Research Information Assurance and Security Purdue

More information

Generalized Network Sharing Outer Bound and the Two-Unicast Problem

Generalized Network Sharing Outer Bound and the Two-Unicast Problem Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback IEEE TRANSACTIONS ON INFORMATION THEORY, ONLINE PREPRINT 2014 1 The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedack Chih-Chun Wang, Memer, IEEE,

More information

Network Error Correction From Matrix Network Coding

Network Error Correction From Matrix Network Coding Network Error Correction From Matrix Network Coding Kwang Taik Kim Communication and Networking Group, Samsung Advanced Institute of Technology Yongin, Republic of Korea Email: kwangtaik.kim@samsung.com

More information

Equivalence for Networks with Adversarial State

Equivalence for Networks with Adversarial State Equivalence for Networks with Adversarial State Oliver Kosut Department of Electrical, Computer and Energy Engineering Arizona State University Tempe, AZ 85287 Email: okosut@asu.edu Jörg Kliewer Department

More information

Random Access: An Information-Theoretic Perspective

Random Access: An Information-Theoretic Perspective Random Access: An Information-Theoretic Perspective Paolo Minero, Massimo Franceschetti, and David N. C. Tse Abstract This paper considers a random access system where each sender can be in two modes of

More information

II. THE TWO-WAY TWO-RELAY CHANNEL

II. THE TWO-WAY TWO-RELAY CHANNEL An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable

More information

Capacity Region of the Permutation Channel

Capacity Region of the Permutation Channel Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network

DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network Dan Zhang Narayan Mandayam and Shyam Parekh WINLAB, Rutgers University 671 Route 1 South, North Brunswick,

More information

An Ins t Ins an t t an Primer

An Ins t Ins an t t an Primer An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,

More information

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO

More information

Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels

Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Mahdi Jafari Siavoshani Sharif University of Technology, Iran Shaunak Mishra, Suhas Diggavi, Christina Fragouli Institute of

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Multicast Packing for Coding across Multiple Unicasts

Multicast Packing for Coding across Multiple Unicasts Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng1@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Kenneth

More information

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Secret Key Agreement Using Asymmetry in Channel State Knowledge

Secret Key Agreement Using Asymmetry in Channel State Knowledge Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,

More information

A Polynomial-Time Algorithm for Pliable Index Coding

A Polynomial-Time Algorithm for Pliable Index Coding 1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n

More information

Graph-Theoretic Characterization of The Feasibility of The Precoding-Based 3-Unicast Interference Alignment Scheme

Graph-Theoretic Characterization of The Feasibility of The Precoding-Based 3-Unicast Interference Alignment Scheme 1 Graph-Theoretic Characterization of The Feasibility of The Precoding-Based 3-Unicast Interference Alignment Scheme arxiv:1305.0503v1 [cs.it] 2 May 2013 Jaemin Han, Chih-Chun Wang Center of Wireless Systems

More information

Computing and Communicating Functions over Sensor Networks

Computing and Communicating Functions over Sensor Networks Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]

More information

HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks

HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks Adrian Segall arxiv:1512.06997v1 [cs.ni] 22 Dec 2015 March 12, 2018 Abstract The work contains a first attempt to treat the

More information

Graph-based Codes for Quantize-Map-and-Forward Relaying

Graph-based Codes for Quantize-Map-and-Forward Relaying 20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,

More information

Reverse Edge Cut-Set Bounds for Secure Network Coding

Reverse Edge Cut-Set Bounds for Secure Network Coding Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology

More information

On Secure Index Coding with Side Information

On Secure Index Coding with Side Information On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:

More information

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Nima Torabkhani, Faramarz Fekri School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta GA 30332,

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Interference Channel aided by an Infrastructure Relay

Interference Channel aided by an Infrastructure Relay Interference Channel aided by an Infrastructure Relay Onur Sahin, Osvaldo Simeone, and Elza Erkip *Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, Department

More information

On the Capacity of Secure Network Coding

On the Capacity of Secure Network Coding On the Capacity of Secure Network Coding Jon Feldman Dept. of IEOR Tal Malkin Dept. of CS Rocco A. Servedio Dept. of CS Columbia University, New York, NY {jonfeld@ieor, tal@cs, rocco@cs, cliff@ieor}.columbia.edu

More information

Interplay of security and clock synchronization"

Interplay of security and clock synchronization July 13, 2010, P. R. Kumar " This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License." See http://creativecommons.org/licenses/by-nc-nd/3.0/" Interplay

More information

Approximately achieving Gaussian relay. network capacity with lattice-based QMF codes

Approximately achieving Gaussian relay. network capacity with lattice-based QMF codes Approximately achieving Gaussian relay 1 network capacity with lattice-based QMF codes Ayfer Özgür and Suhas Diggavi Abstract In [1], a new relaying strategy, quantize-map-and-forward QMF scheme, has been

More information

Network coding for resource optimization and error correction

Network coding for resource optimization and error correction Network coding for resource optimization and error correction Thesis by Sukwon Kim In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute of Technology Pasadena,

More information

Cognitive Multiple Access Networks

Cognitive Multiple Access Networks Cognitive Multiple Access Networks Natasha Devroye Email: ndevroye@deas.harvard.edu Patrick Mitran Email: mitran@deas.harvard.edu Vahid Tarokh Email: vahid@deas.harvard.edu Abstract A cognitive radio can

More information

Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels

Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels Ashish Khisti University of Toronto Joint Work: Ahmed Badr (Toronto), Wai-Tian Tan (Cisco), John Apostolopoulos (Cisco). Sequential

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information

Broadcasting With Side Information

Broadcasting With Side Information Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008 Outline I shall avoid rigorous math and terminologies and be more

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Interactive Decoding of a Broadcast Message

Interactive Decoding of a Broadcast Message In Proc. Allerton Conf. Commun., Contr., Computing, (Illinois), Oct. 2003 Interactive Decoding of a Broadcast Message Stark C. Draper Brendan J. Frey Frank R. Kschischang University of Toronto Toronto,

More information

Bounds on Achievable Rates for General Multi-terminal Networks with Practical Constraints

Bounds on Achievable Rates for General Multi-terminal Networks with Practical Constraints Bounds on Achievable Rates for General Multi-terminal Networs with Practical Constraints Mohammad Ali Khojastepour, Ashutosh Sabharwal, and Behnaam Aazhang Department of Electrical and Computer Engineering

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

Degrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling

Degrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling Degrees-of-Freedom for the -User SISO Interference Channel with Improper Signaling C Lameiro and I Santamaría Dept of Communications Engineering University of Cantabria 9005 Santander Cantabria Spain Email:

More information

Flow-level performance of wireless data networks

Flow-level performance of wireless data networks Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University

More information

Lecture 14 February 28

Lecture 14 February 28 EE/Stats 376A: Information Theory Winter 07 Lecture 4 February 8 Lecturer: David Tse Scribe: Sagnik M, Vivek B 4 Outline Gaussian channel and capacity Information measures for continuous random variables

More information

Code Construction for Two-Source Interference Networks

Code Construction for Two-Source Interference Networks Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il

More information

On Randomized Network Coding

On Randomized Network Coding On Randomized Network Coding Tracey Ho, Muriel Médard, Jun Shi, Michelle Effros and David R. Karger Massachusetts Institute of Technology, University of California, Los Angeles, California Institute of

More information

Lecture 4 : Introduction to Low-density Parity-check Codes

Lecture 4 : Introduction to Low-density Parity-check Codes Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

IN a wireless broadcast network, a source node distributes a

IN a wireless broadcast network, a source node distributes a 674 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 63, NO. 2, FEBRUARY 2014 Scheduling and Network Coding for Relay-Aided Wireless Broadcast: Optimality and Heuristic Linyu Huang, Student Member, IEEE,

More information

Information Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem

Information Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem Information Theory for Wireless Communications. Lecture 0 Discrete Memoryless Multiple Access Channel (DM-MAC: The Converse Theorem Instructor: Dr. Saif Khan Mohammed Scribe: Antonios Pitarokoilis I. THE

More information

Multiple Access Network Information-flow And Correction codes

Multiple Access Network Information-flow And Correction codes Multiple Access Network Information-flow And Correction codes Hongyi Yao 1, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho 1 Tsinghua University California Institute of Technology Chinese University

More information

A Comparison of Superposition Coding Schemes

A Comparison of Superposition Coding Schemes A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA

More information

Secret Message Capacity of Erasure Broadcast Channels with Feedback

Secret Message Capacity of Erasure Broadcast Channels with Feedback Secret Message Capacity of Erasure Broadcast Channels with Feedback László Czap Vinod M. Prabhakaran Christina Fragouli École Polytechnique Fédérale de Lausanne, Switzerland Email: laszlo.czap vinod.prabhakaran

More information

On Common Information and the Encoding of Sources that are Not Successively Refinable

On Common Information and the Encoding of Sources that are Not Successively Refinable On Common Information and the Encoding of Sources that are Not Successively Refinable Kumar Viswanatha, Emrah Akyol, Tejaswi Nanjundaswamy and Kenneth Rose ECE Department, University of California - Santa

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

Multicast Packing for Coding across Multiple Unicasts

Multicast Packing for Coding across Multiple Unicasts Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng@uci.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Kenneth

More information

Network coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology

Network coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology Network coding for online and dynamic networking problems Tracey Ho Center for the Mathematics of Information California Institute of Technology 1 Work done in collaboration with: Harish Viswanathan: Bell

More information

On Network Interference Management

On Network Interference Management On Network Interference Management Aleksandar Jovičić, Hua Wang and Pramod Viswanath March 3, 2008 Abstract We study two building-block models of interference-limited wireless networks, motivated by the

More information

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca

More information

On Multiple User Channels with State Information at the Transmitters

On Multiple User Channels with State Information at the Transmitters On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu

More information

Multi-Layer Hybrid-ARQ for an Out-of-Band Relay Channel

Multi-Layer Hybrid-ARQ for an Out-of-Band Relay Channel 203 IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications: Fundamentals and PHY Track Multi-Layer Hybrid-ARQ for an Out-of-Band Relay Channel Seok-Hwan Park Osvaldo Simeone

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

Randomized Algorithms. Zhou Jun

Randomized Algorithms. Zhou Jun Randomized Algorithms Zhou Jun 1 Content 13.1 Contention Resolution 13.2 Global Minimum Cut 13.3 *Random Variables and Expectation 13.4 Randomized Approximation Algorithm for MAX 3- SAT 13.6 Hashing 13.7

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

On the Capacity of the Two-Hop Half-Duplex Relay Channel

On the Capacity of the Two-Hop Half-Duplex Relay Channel On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,

More information

A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model

A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model M. Anand, Student Member, IEEE, and P. R. Kumar, Fellow, IEEE Abstract For every Gaussian

More information

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Achaleshwar Sahai, Vaneet Aggarwal, Melda Yuksel and Ashutosh Sabharwal 1 Abstract arxiv:1104.4805v3 [cs.it]

More information

Asymptotics, asynchrony, and asymmetry in distributed consensus

Asymptotics, asynchrony, and asymmetry in distributed consensus DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex

More information

Decentralized Control across Bit-Limited Communication Channels: An Example

Decentralized Control across Bit-Limited Communication Channels: An Example Decentralized Control across Bit-Limited Communication Channels: An Eample Ling Shi, Chih-Kai Ko, Zhipu Jin, Dennice Gayme, Vijay Gupta, Steve Waydo and Richard M. Murray Abstract We formulate a simple

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

Multiuser broadcast erasure channel with feedback capacity and algorithms

Multiuser broadcast erasure channel with feedback capacity and algorithms Multiuser broadcast erasure channel with feedback capacity and algorithms Marios Gatzianas, Leonidas Georgiadis, Leandros Tassiulas To cite this version: Marios Gatzianas, Leonidas Georgiadis, Leandros

More information

Instantly Decodable Network Codes for Real-Time Applications

Instantly Decodable Network Codes for Real-Time Applications Instantly Decodable Network Codes for Real-Time Applications Anh Le, Arash S. Tehrani +, Alexandros G. Dimakis, Athina Markopoulou {anh.le, athina}@uci.edu University of California, Irvine + arash.sabertehrani@usc.edu

More information

Radio Network Clustering from Scratch

Radio Network Clustering from Scratch Radio Network Clustering from Scratch Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer {kuhn,moscitho,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland Abstract.

More information

Distributed Reed-Solomon Codes

Distributed Reed-Solomon Codes Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Approximate Capacity of Fast Fading Interference Channels with no CSIT

Approximate Capacity of Fast Fading Interference Channels with no CSIT Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

Capacity Theorems for Relay Channels

Capacity Theorems for Relay Channels Capacity Theorems for Relay Channels Abbas El Gamal Department of Electrical Engineering Stanford University April, 2006 MSRI-06 Relay Channel Discrete-memoryless relay channel [vm 7] Relay Encoder Y n

More information