(Structured) Coding for Real-Time Streaming Communication

Size: px
Start display at page:

Download "(Structured) Coding for Real-Time Streaming Communication"

Transcription

1 (Structured) Coding for Real-Time Streaming Communication Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Farrokh Etezadi (Toronto), Wai-Tian Tan (Cisco), John Apostolopoulos (Cisco), Mitchell Trott (Luminate Wireless) October 9, 2014 University of Michigan, Ann Arbor

2 Multimedia Streaming Source Stream Latency Receiver Interrup;on Network Receiver 2 Latency Interrup;on Streaming Server Receiver 3 Applications Application Bit-Rate (Mbps) MSDU (B) Delay (ms) PLR Video Conf. 2 Mbps ms 10 4 Interactive Gaming 1 Mbps ms 10 4 Video Streaming 4 Mbps ms 10 6 October 9, 2014 University of Michigan, Ann Arbor 2/ 1

3 Multimedia Streaming Source Stream Latency Receiver Interrup;on Network Receiver 2 Latency Interrup;on Streaming Server Receiver 3 Packet-Loss Analysis Burst Losses - High Performance Degradation FEC vs Retransmission October 9, 2014 University of Michigan, Ann Arbor 2/ 1

4 Outline Real-Time Streaming Communication Streaming Error Correction Streaming Compression Collaborators: Ahmed Badr (Toronto) John Apostolopoulos (Cisco) Wai-Tian Tan (Cisco) Collaborators: Farrokh Etezadi (Toronto) Mitchell Trott October 9, 2014 University of Michigan, Ann Arbor 3/ 1

5 Outline Real-Time Streaming Communication Streaming Error Correction Streaming Compression Collaborators: Ahmed Badr (Toronto) John Apostolopoulos (Cisco) Wai-Tian Tan (Cisco) Collaborators: Farrokh Etezadi (Toronto) Mitchell Trott Physical Layer Security (Time Permitting) October 9, 2014 University of Michigan, Ann Arbor 3/ 1

6 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

7 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

8 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

9 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

10 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

11 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

12 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

13 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

14 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

15 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

16 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

17 Real-Time Communication System October 9, 2014 University of Michigan, Ann Arbor 4/ 1

18 Proposed Channel Model 1- Good Bad 1- Bad State Good State Bad State Gilbert-Elliott Model Structural Properties Performance Gains October 9, 2014 University of Michigan, Ann Arbor 5/ 1

19 Proposed Channel Model 1- Good Bad 1- Bad State Good State Bad State Gilbert-Elliott Model Sliding Window Erasure Channel: C(N, B, W ) In any sliding window of length W, the channel can introduce only one of the following: An erasure burst of maximum length B Upto N erasures in arbitrary positions October 9, 2014 University of Michigan, Ann Arbor 5/ 1

20 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = 6 N = 2 October 9, 2014 University of Michigan, Ann Arbor 6/ 1

21 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= 6 N = N 2= 2 October 9, 2014 University of Michigan, Ann Arbor 6/ 1

22 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= 6 N = N 2= N 2= 2 October 9, 2014 University of Michigan, Ann Arbor 6/ 1

23 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= W 6= 6 N = N 2= N 2= B 2= 3 October 9, 2014 University of Michigan, Ann Arbor 6/ 1

24 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= W 6= W 6= 6 N = N 2= N 2= B 2= B 3= 3 C(N = 1, B, W ): Burst-Erasure Channel October 9, 2014 University of Michigan, Ann Arbor 6/ 1

25 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= W 6= W 6= 6 N = N 2= N 2= B 2= B 3= 3 C(N = 1, B, W ): Burst-Erasure Channel B W-1 B W-1 October 9, 2014 University of Michigan, Ann Arbor 6/ 1

26 Sliding Window Erasure Channel: Remarks (N,B,W) = (2,3,6) W = W 6= W 6= W 6= W 6= 6 N = N 2= N 2= B 2= B 3= 3 C(N = 1, B, W ): Burst-Erasure Channel C(N, B, W ): Worst-Case B W-N B W-N October 9, 2014 University of Michigan, Ann Arbor 6/ 1

27 Problem Setup - Sliding Window Erasure Channel Model Source Model : i.i.d. sequence s[t] p s ( )= Unif{(F q ) k } Streaming Encoder: x[t] = f t (s[0],..., s[t]), x[t] (F q ) n Erasure Channel: (Sliding Window Model) Delay-Constrained Decoder: ŝ[t] = g t (y[0],..., y[t + T ]) Rate R = k n Streaming Capacity A rate R is achievable over the C(N, B, W ) channel, if there is a sequence of encoding and decoding functions, f t ( ) and g t ( ) respectively over a sufficiently large field F q, with delay T and rate R = k n. The supremum of achievable rates is the streaming capacity. October 9, 2014 University of Michigan, Ann Arbor 7/ 1

28 Problem Setup - Sliding Window Erasure Channel Model Source Model : i.i.d. sequence s[t] p s ( )= Unif{(F q ) k } Streaming Encoder: x[t] = f t (s[0],..., s[t]), x[t] (F q ) n Erasure Channel: (Sliding Window Model) Delay-Constrained Decoder: ŝ[t] = g t (y[0],..., y[t + T ]) Rate R = k n Streaming Capacity A rate R is achievable over the C(N, B, W ) channel, if there is a sequence of encoding and decoding functions, f t ( ) and g t ( ) respectively over a sufficiently large field F q, with delay T and rate R = k n. The supremum of achievable rates is the streaming capacity. Worst Case Definition Arbitrarily large field size October 9, 2014 University of Michigan, Ann Arbor 7/ 1

29 Main Result Badr-Patil-Khisti-Tan-Apostolopoulos, IEEE Trans. on Inform. Theory (Under Review) Theorem Consider the C(N, B, W ) channel, with W B + 1, and let the delay be T. Upper-Bound For any rate R code, we have: ( R 1 R ) B + N min(w, T + 1) Lower-Bound: There exists a rate R code that satisfies: ( ) R B + N min(w, T + 1) 1. 1 R The gap between the upper and lower bound is 1 unit of delay. October 9, 2014 University of Michigan, Ann Arbor 8/ 1

30 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1

31 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1

32 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1

33 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1

34 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1

35 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1

36 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: Recover s 0, s 1, s 2, s 3 H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1

37 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: Recover s 0, s 1, s 2, s 3 H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) October 9, 2014 University of Michigan, Ann Arbor 9/ 1

38 Baseline Codes - Full Rank Condition k n s 0 s 1 s 2 s 3 s 4 s 5 s 6 s 7 x i p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p i = s i H 0 + s i 1 H s i M H M, Erasure Codes: Recover s 0, s 1, s 2, s 3 H i F k n k q Random Linear Codes Strongly-MDS Codes (Gabidulin 88, Gluesing-Luerssen 06 ) p 4 H 4 H 3 H 2 H 1 s 0 p 5 p 6 = H 5 H 4 H 3 H 2 s 1 0 H 5 H 4 H 3 s 2 p H 5 H 4 s 3 }{{} full rank October 9, 2014 University of Michigan, Ann Arbor 9/ 1

39 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 Rate 1/2 Baseline Erasure Codes, T = 7 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 v 8 v 9 v 10 v 11 p 8 p 9 p 10 p 11 x i v 0,v 1,v 2,v 3 October 9, 2014 University of Michigan, Ann Arbor 10/ 1

40 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 Rate 1/2 Baseline Erasure Codes, T = 7 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 v 8 v 9 v 10 v 11 p 8 p 9 p 10 p 11 x i Rate 1/2 Repetition Code, T = 8 v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 8 u 9 u 10 u 11 u 0 u 1 u 2 u 3 x i u 0 u 1 u 2 u 3 October 9, 2014 University of Michigan, Ann Arbor 10/ 1

41 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 v u u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 0 u 1 u 2 u 3 u u October 9, 2014 University of Michigan, Ann Arbor 11/ 1

42 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 u 0 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 u -8 u 1 u -7 u 2 u -6 u 3 u -5 u 4 u -4 u 5 u -3 u 6 u -2 u 7 u -1 u 8 u 0 u 9 u 1 u 10 u 2 u 11 p 11 u 3 u v u u R= u+v 3u+v = 1 2 October 9, 2014 University of Michigan, Ann Arbor 11/ 1

43 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = 2 3 October 9, 2014 University of Michigan, Ann Arbor 11/ 1

44 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u v 2 u v Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1

45 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = 2 3 v 0,v 1,v 2,v 3 Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1

46 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u v 2 u v v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 Encoding: 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1

47 Streaming Code - Example B = 4, T = 8, R = T T +B = 2 3 s i u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 +u -4 u v u x i R= u+v 2 u+v = 2 3 v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 3 Encoding: s 0 s 1 s 2 s 3 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1

48 Streaming Code - Example B = 4, T = 8, R = s i T T +B = 2 3 v u 0 p v 0 v u 1 p v 1 v u 2 p v 2 v u 3 p v 3 v u 4 p v 4 v u 5 p v 5 v u 6 p v 6 v u 7 7 p v 7 7 v u 8 p v 8 v u 9 p v 9 v u 10 p v 10 v u 11 p v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 +u -8 +u -7 +u -6 +u -5 +u -4 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 u -8 u -7 u -6 u -5 +u u -4-4 u -3 u 0 u 1 R= u u+v u v 2 u 3 u 4 u 5 u 6 u u+v 1 2 v u v 0,v 1,v 2,v 3 u 0 u 1 u 2 u 2 = u -8 u -7 u -6 u -5 u -4 u -3 u -2 u -1 u 0 u 1 u 2 Encoding: u -2 u -1 u 0 u 1 u 2 u 3 u 3 s 0 s 1 s 2 s 3 uv vu u u u u x i 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s 5 Rate: R = T T +B October 9, 2014 University of Michigan, Ann Arbor 11/ 1

49 Streaming Code Burst Erasure Channel 1 Source Splitting: s i = (u i, v i ), u i F B q, v i F T B q 2 Erasure Code on v i : Generate v i (v i, p i ) where p i F B q is obtained from a Strongly-MDS code. 3 Repetition Code on u i : Repeat the u i symbols with a shift of T 4 Merging: Combine the repeated u i s with the p i s October 9, 2014 University of Michigan, Ann Arbor 12/ 1

50 Robust Extension: C(N, B, W ) Channel Layered Code Design u 0 u 1 u 2 u 3 u 4 u 5 u 6 u 7 u 8 u 9 u 10 u 11 v 0 v 1 v 2 v 3 v 4 v 5 v 6 v 7 v 8 v 9 v 10 v 11 p 0 p 1 p 2 p 3 p 4 p 5 p 6 p 7 p 8 p 9 p 10 p 11 u +u -8 +u -7 +u -6 +u -5 +u -4 +u -3 +u -2 +u -1 +u 0 +u 1 +u 2 +u 3 q 1 q 2 q 3 q 4 q 5 q 6 q 7 q 8 q 9 q 10 q 11 k q 0 u v x i Burst-Erasure Streaming Code: (u i, v i, p i + u i T ) Erasure Code: q i = M t=1 u i t H u t, q i F k q Concatenation: (u i, v i, p i + u i T, q i ) Attains the lower bound R = T T + B + k October 9, 2014 University of Michigan, Ann Arbor 13/ 1

51 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j States Trellis Diagram October 9, 2014 University of Michigan, Ann Arbor 14/ 1

52 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j States Trellis Diagram Free Distance October 9, 2014 University of Michigan, Ann Arbor 14/ 1

53 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 s0... s T d T = min [s 0,...,s T ] s 0 0 wt G 0 October 9, 2014 University of Michigan, Ann Arbor 14/ 1

54 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 s0... s T d T = min [s 0,...,s T ] s 0 0 wt G 0 October 9, 2014 University of Michigan, Ann Arbor 14/ 1

55 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 s0... s T d T = min [s 0,...,s T ] s 0 0 wt G States Column Span in [0,3] October 9, 2014 University of Michigan, Ann Arbor 14/ 1

56 Distance and Span Properties Consider (n, k, m) Convolutional code: x i = m j=0 s i jg j Column Distance: d T G 0 G 1... G T [ ] 0 G 0... G T 1 s0... s T d T = min [s 0,...,s T ] s 0 0 wt G 0 Column Span: c T G 0 G 1... G T [ ] 0 G 0... G T 1 c T = min span s0... s T [s 0,...,s T ]..... s G 0 October 9, 2014 University of Michigan, Ann Arbor 14/ 1

57 Column-Distance & Column Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos 2014 Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 October 9, 2014 University of Michigan, Ann Arbor 15/ 1

58 Column-Distance & Column Span Tradeoff Badr-Patil-Khisti-Tan-Apostolopoulos 2014 Theorem Consider a C(N, B, W ) channel with delay T and W T + 1. A streaming code is feasible over this channel if and only if it satisfies: d T N + 1 and c T B + 1 Theorem For any rate R convolutional code and any T 0 the Column-Distance d T and Column-Span c T satisfy the following: ( R 1 R ) c T + d T T R There exists a rate R code (MiDAS Code) over a sufficiently large field that satisfies: ( ) R c T + d T T R 1 R October 9, 2014 University of Michigan, Ann Arbor 15/ 1

59 Simulation Result Gilbert-Elliott Channel (α, β) = (5 10 4, 0.5), T = 12 and R 0.5 Gilbert Elliott Channel Good State: Pr(loss) = ε Bad State: Pr(loss) = 1 1- Good Bad Gilbert Channel (, ) = (5x10 4,0.5) Simulation Length = Probability of Occurence Burst Length October 9, 2014 University of Michigan, Ann Arbor 16/ 1

60 Simulation Results Gilbert-Elliott Channel (α, β) = (5 10 4, 0.5), T = 12 and R Gilbert Elliott Channel (, ) = (5E 4,0.5), T = Loss Probability x 10 3 Code N B Code N B Strongly MDS 6 6 MiDAS 2 9 Burst-Erasure 1 11 October 9, 2014 University of Michigan, Ann Arbor 17/ 1

61 Simulation Results-II Fritchman Channel (α, β) = (1e 5, 0.5) and T = 40 and R = 40/79, 9 states α Good E 1 E 2 E 3 E N-1 E N 1- α α = 1e 5 β = Histogram of Burst Lengths for 9 States Fritchman Channel (, ) = (1E 5,0.5) Analytical Actual Probability of Occurence Burst Length October 9, 2014 University of Michigan, Ann Arbor 18/ 1

62 Simulation Results-II Fritchman Channel (α, β) = (1e 5, 0.5) and T = 40 and R = 40/79, 9 states Uncoded RLC SCo E RLC (Shift = 32) E RLC (Shift = 36) 9 States Fritchman Channel (, ) = (1e 005,0.5), T = 40 Loss Probability x 10 3 Code N B Code N B Strongly MDS MiDAS-I 8 31 Burst Erasure 1 39 MiDAS-II 4 35 October 9, 2014 University of Michigan, Ann Arbor 18/ 1

63 Multicast Streaming Codes Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Motivation B 1 < B 2 Receiver 1 : Good Channel State Receiver 2: Weaker Channel State Delay adapts to Channel State October 9, 2014 University of Michigan, Ann Arbor 19/ 1

64 Multicast Streaming Codes Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Capacity Function Capacity function C(T 1, T 2, B 1, B 2 ) Single User Upper Bound: C min ( T1 T 1 +B 1, Concatenation Lower Bound: C 1 1+ B 1 T 1 + B 2 T 2 ) T 2 T 2 +B 2 October 9, 2014 University of Michigan, Ann Arbor 19/ 1

65 Multicast Streaming Setup Burst Erasure Broadcast Channel Src. Stream Encoder X[i] B 1 Decoder 1 Delay = T 1 B 2 Decoder 2 Delay = T 2 Capacity Function Capacity function C(T 1, T 2, B 1, B 2 ) Single User Upper Bound: C min ( T1 T 1 +B 1, Concatenation Lower Bound: C 1 1+ B 1 T 1 + B 2 T 2 ) T 2 T 2 +B 2 October 9, 2014 University of Michigan, Ann Arbor 20/ 1

66 Multicast Streaming Capacity Badr-Khisti-Lui (IT Trans. To Appear 2014) Assume w.l.o.g. B 2 B 1 T 2 B T = T1 B1 B1 Region A Capacity T2 T + B 2 2 B C B 1 + B 2 E (B 1, B 2 ) DE-SCo B 2 D T 2 =T 1 +B 1 T 2 =T 1 SCo A T 1 B C D E T1 T + B 2 1 T1 T + B 1 1 Partial Characterization 1 T2 B1 T B + B 2 2 October 9, 2014 University of Michigan, Ann Arbor 21/ 1

67 Other Extensions Mismatched Streaming Codes (Patil-Badr-Khisti-Tan Asilomar 2013) Partial Recovery Streaming Codes (Badr-Khisti-Tan-Apostolopoulos JSTSP 2014) Multiple Erasure Bursts (Li-Khisti-Girod Asilomar 2011) - Interleaved Low-Delay Codes Multiple Links (Lui-Badr-Khisti CWIT 2011) - Layered coding for burst erasure channels Multiple Source Streams with Different Decoding Delays (Lui (Unpublished) 2011) - Embedded Codes Other Results Burst Erasure Channels: Martinian and Sundberg (IT-2004) Other Recent Results: Leong-Ho (ISIT 2012), Leong-Qureshi-Ho (ISIT 2013) October 9, 2014 University of Michigan, Ann Arbor 22/ 1

68 Outline Real-Time Streaming Communication Streaming Error Correction Streaming Compression Collaborators: Ahmed Badr (Toronto) John Apostolopoulos (Cisco) Wai-Tian Tan (Cisco) Collaborators: Farrokh Etezadi (Toronto) Mitchell Trott October 9, 2014 University of Michigan, Ann Arbor 23/ 1

69 Compression Vs Error Propagation GOP Picture Structure 1 Compression Predictive Coding Still Image Coding Error Propagation Interleaving Approach Error Control Coding 1 Source : October 9, 2014 University of Michigan, Ann Arbor 24/ 1

70 Motivation - Video Streaming Compression Efficiency Predictive Coding Still Image Compression Robustness to Error Propagation October 9, 2014 University of Michigan, Ann Arbor 25/ 1

71 Motivation - Video Streaming Compression Efficiency Predictive Coding MPEG Still Image Compression Robustness to Error Propagation October 9, 2014 University of Michigan, Ann Arbor 25/ 1

72 Motivation - Video Streaming Compression Efficiency Predictive Coding MPEG Fundamental Tradeoff Still Image Compression Robustness to Error Propagation October 9, 2014 University of Michigan, Ann Arbor 25/ 1

73 Information Theoretic Model Src Packets s 1 s 2 s 3 s 4 s 5 s 6 s 7 s 8 Compressed Packets f 1 f 2 f 3 f 4 f 5 f 6 f 7 f 8 Channel f 1 f 2 f 3 * f 5 f 6 f 7 f 8 Reproduced Stream s 1 s 2 s 3 S 4 S 5 S 6 s 7 s 8 System Parameters: Compression Rate: R Erasure Burst Length: B Recovery Window: W Lossless or Lossy Recovery B=1 W=2 October 9, 2014 University of Michigan, Ann Arbor 26/ 1

74 Problem Setup Source Model: Sequence of vectors Temporally Markov, Spatially i.i.d. (see Viswanathan and Berger ( 00), Wang and Xu ( 10), Song-Chen-Wang-Liu ( 13), Ma-Ishwar ( 11)) Pr(s n i s n i 1, s n i 2,..., ) = n Pr(s ij s i 1,j ) j=1 Channel Model: { Burst Erasure Model f i, i / {j, j + 1,..., j + B 1} g i =, otherwise October 9, 2014 University of Michigan, Ann Arbor 27/ 1

75 Problem Setup Source Model: Sequence of vectors Temporally Markov, Spatially i.i.d. (see Viswanathan and Berger ( 00), Wang and Xu ( 10), Song-Chen-Wang-Liu ( 13), Ma-Ishwar ( 11)) Pr(s n i s n i 1, s n i 2,..., ) = n Pr(s ij s i 1,j ) j=1 Channel Model: { Burst Erasure Model f i, i / {j, j + 1,..., j + B 1} g i =, otherwise Encoder: F i : {s n 0,..., sn i } f i {1, 2,..., 2 nr }. Decoder: G i : {g 0,..., g i } ŝ n i Lossless Recovery: Pr(si n ŝi n ) ε n except for i [j,..., j + B + W 1]. October 9, 2014 University of Michigan, Ann Arbor 27/ 1

76 Rate-Recovery Function Definition (Rate-Recovery Function) The minimum compression rate R that is achieved when: Burst-Erasure Length = B Recovery Window = W Lossless or Lossy Recovery s n 0 s n 1 s n 2 s n j 1 s n j s n j+1 s n j+b 1 s n j+b s n j+b+w 1 s n j+b+w f 0 f 1 f 2 f j 1 f j f j+1 f j+b 1 f j+b f j+b+w 1 f j+b+w f 0 f 1 f 2 f j 1 f j+b f j+b+w 1 f j+b+w ŝ n 0 ŝ n 1 ŝ n 2 ŝ n j 1 ŝ n j+b+w Erased Not to be recovered Error Propagation Window October 9, 2014 University of Michigan, Ann Arbor 28/ 1

77 Rate-Recovery Function Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) s n 0 s n 1 s n 2 s n j 1 s n j s n j+1 s n j+b 1 s n j+b s n j+b+w 1 s n j+b+w f 0 f 1 f 2 f j 1 f j f j+1 f j+b 1 f j+b f j+b+w 1 f j+b+w f 0 f 1 f 2 f j 1 f j+b f j+b+w 1 f j+b+w ŝ n 0 ŝ n 1 ŝ n 2 ŝ n j 1 Erased Not to be recovered Error Propagation Window Theorem (Upper and Lower Bounds - Lossless Case) ŝ n j+b+w R + (B, W ) = H(s 1 s 0 ) + 1 W + 1 I(s B; s B 1 s 1 ) R (B, W ) = H(s 1 s 0 ) + 1 W + 1 I(s B+W ; s B 1 s 1 ) Upper bound : Binning based scheme. Upper and Lower Bounds Coincide: W = 0 and W. October 9, 2014 University of Michigan, Ann Arbor 29/ 1

78 Lower Bound - Rate Recovery Function Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Let W = 1. Encoding of s n j, sn j+1 sn j 1 s n j, sn j+1 Encoder f j f j+1 Decoder j Decoder j+1 ŝ n j ŝ n j+1 s n j B 1 October 9, 2014 University of Michigan, Ann Arbor 30/ 1

79 Lower Bound - Rate Recovery Function Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Let W = 1. Encoding of s n j, sn j+1 sn j 1, sn j+1 s n j, sn j+1 Encoder f j f j+1 Decoder j Decoder j+1 ŝ n j ŝ n j+1 s n j B 1 October 9, 2014 University of Michigan, Ann Arbor 30/ 1

80 Lower Bound - Rate Recovery Function Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Let W = 1. Encoding of s n j, sn j+1 sn j 1, sn j+1 s n j, sn j+1 Encoder f j f j+1 Decoder j Decoder j+1 ŝ n j ŝ n j+1 s n j B 1 Lower Bound: R j + R j+1 H(s j s j 1, s j+1 ) + H(s j+1 s j B 1 ). October 9, 2014 University of Michigan, Ann Arbor 30/ 1

81 Gauss-Markov Source Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Stationary Gauss-Markov Source, s i N (0, 1). s i = ρs i 1 + z i, z i N (0, 1 ρ 2 ) {s j } j<i October 9, 2014 University of Michigan, Ann Arbor 31/ 1

82 Gauss-Markov Source Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Stationary Gauss-Markov Source, s i N (0, 1). s i = ρs i 1 + z i, z i N (0, 1 ρ 2 ) {s j } j<i Quadratic Distortion Measure: [ ] 1 n E (s i (k) ŝ i (k)) 2 D, n k=1 October 9, 2014 University of Michigan, Ann Arbor 31/ 1

83 Gauss-Markov Source Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Stationary Gauss-Markov Source, s i N (0, 1). s i = ρs i 1 + z i, z i N (0, 1 ρ 2 ) {s j } j<i Quadratic Distortion [ Measure: ] 1 n E (s i (k) ŝ i (k)) 2 D, n k=1 No Recovery Period, W = 0. s 0 s 1 s j 1 s j s j+1 s j+b 1 s j+b f 0 f 1 f j 1 f j f j+1 f j+b 1 f j+b f 0 f 1 f j 1 f j+b ŝ 0 ŝ 1 ŝ j 1 Erased ŝ j+b October 9, 2014 University of Michigan, Ann Arbor 31/ 1

84 Gauss-Markov Source Etezadi-Khisti-Trott (IEEE Trans. Information Theory, Aug. 2014) Stationary Gauss-Markov Source, s i N (0, 1). s i = ρs i 1 + z i, z i N (0, 1 ρ 2 ) {s j } j<i Quadratic Distortion Measure: [ ] 1 n E (s i (k) ŝ i (k)) 2 D, n k=1 No Recovery Period, W = 0 Lossy Rate Recovery Function R(B, D) High Resolution Limit R(B, D) = 1 2 log ( 1 ρ 2(B+1) D Upper and Lower bounds. W > 0: Novel Hybrid Coding Schemes ) + o D (1). October 9, 2014 University of Michigan, Ann Arbor 31/ 1

85 Gauss-Markov Sources W > 0 (In Progress) Predictive Coding: u i = s i ŝ i (u i 1 ) + n i Memoryless Quantize and Binning: u i = s i + n i Truncated Prediction (Hybrid): u i = s i ŝ i (u i i W ) + n i s n 0 s n 1 s n 2 s n j 1 s n j s n j+1 s n j+b 1 s n j+b s n j+b+w 1 s n j+b+w f 0 f 1 f 2 f j 1 f j f j+1 f j+b 1 f j+b f j+b+w 1 f j+b+w f 0 f 1 f 2 f j 1 f j+b f j+b+w 1 f j+b+w ŝ n 0 ŝ n 1 ŝ n 2 ŝ n j 1 ŝ n j+b+w Erased Not to be recovered Error Propagation Window October 9, 2014 University of Michigan, Ann Arbor 32/ 1

86 Gauss-Markov Sources W > 0 (In Progress) Predictive Coding: u i = s i ŝ i (u i 1 ) + n i Memoryless Quantize and Binning: u i = s i + n i Truncated Prediction (Hybrid): u i = s i ŝ i (u i i W ) + n i October 9, 2014 University of Michigan, Ann Arbor 32/ 1

87 Block Fading Channels w 1 w 2 w 3 w 4 w 5 w 6 h 1 h 2 h 3 h 4 h 5 h 6 w 1 w 2 w 3 w 4 w 5 Block Fading Channel y i = h i x i + z i, i = 1, 2,... Block Fading Channels: n symbols per block Source Packet: One in each coherence block nr bits Decoding Delay: T coherence blocks Quasi-Static Model: T = 1 Ergodic Model T October 9, 2014 University of Michigan, Ann Arbor 33/ 1

88 Streaming DMT of Fading Channels Theorem (Khisti-Draper, IT-Trans To Appear, 2014) The diversity multiplexing tradeoff for streaming source with a delay of T coherence blocks and a block-fading channel model is d(r) = T d 1 (r) where d 1 (r) is the quasi-static DMT. Coding Scheme: Time-Sharing Upper Bound: Outage Amplification Argument October 9, 2014 University of Michigan, Ann Arbor 34/ 1

89 Achievability: Fading Channels T = 2 T parallel channel code Divide each coherence block into T sub-blocks Apply parallel channel code across T sub-blocks w 1 w 2 w 3 w 4 w 5 w 6 h 1 h 2 h 3 h 4 h 5 h 6 w 1 w 2 w 3 w 4 w 5 October 9, 2014 University of Michigan, Ann Arbor 35/ 1

90 Achievability: Fading Channels T = 2 T parallel channel code Divide each coherence block into T sub-blocks Apply parallel channel code across T sub-blocks w 1 w 2 w 3 w 4 w 5 w 6 X 1 X 2 X 3 X 4 X 5 X 6 w 1 w 2 w 3 w 4 w 5 October 9, 2014 University of Michigan, Ann Arbor 35/ 1

91 Achievability: Fading Channels T = 2 T parallel channel code Divide each coherence block into T sub-blocks Apply parallel channel code across T sub-blocks w 1 w 2 w 3 w 4 w 5 w 6 X 1 Y 0 X 2 Y 1 X 3 Y 2 X 4 Y 3 X 5 Y 4 X 6 Y 5 w 1 w 2 w 3 w 4 w 5 October 9, 2014 University of Michigan, Ann Arbor 35/ 1

92 Achievability: Fading Channels T = 2 T parallel channel code Divide each coherence block into T sub-blocks Apply parallel channel code across T sub-blocks w 1 w 2 w 3 w 4 w 5 w 6 X 1 Y 0 X 2 Y 1 X 3 Y 2 X 4 Y 3 X 5 Y 4 X 6 Y 5 w 1 w 2 w 3 w 4 w 5 DMT: d(r) = 2 2r October 9, 2014 University of Michigan, Ann Arbor 35/ 1

93 Physical Layer Security October 9, 2014 University of Michigan, Ann Arbor 36/ 1

94 Secret-Key Generation over Fading Channels Khisti, IT-Trans Submitted Aug m A A Forward Link A BA y = h x + n B B y = h x + n BA AB A AB Reverse Link B m B K A z + AE = g AE xa nae z BE = g BE xb + nbe K B E Two-way block-fading channel Coherence Period: T Channel Reciprocity Non Coherent Main-Channel, Perfect CSI for eavesdropper Interactive Communication October 9, 2014 University of Michigan, Ann Arbor 37/ 1

95 Secret-Key Generation over Fading Channels Khisti, IT-Trans Submitted Aug m A A Forward Link A BA y = h x + n B B y = h x + n BA AB A AB Reverse Link B m B K A z + AE = g AE xa nae z BE = g BE xb + nbe K B E High SNR Capacity: C 1 [ ( T I(h AB; h BA ) + E log 1 + h AB 2 )] [ ) g A 2 + E log (1 + h BA 2 )] g B 2 ) Optimal Scheme: Training + Interactive Communication October 9, 2014 University of Michigan, Ann Arbor 37/ 1

96 Secure Communication - Wiretap Channel Secure Multi-Antenna Multicast (A. Khisti IT-2011, A. Khisti and D. Zhang Comm Letters 2013) Practical Codes for MIMO Wiretap Channel (A. Khina and Y. Kochman ISIT 2014) V-Blast Type Decomposition Scalar AWGN Wiretap Codebooks MIMO Arbitrarily Varying Wiretap Channel (A. Yener and X. He, IT-Trans 2013, T-COMM 2014) Fading Wiretap Channel with Imperfect CSI (Z. Rezki and M. S. Alouini, T-COMM 2014, T-Wireless 2014) Private Broadcasting (T. Liu IT-Trans 2014) Secure Broadcasting with Independent Secret Keys (R. Schaefer, CISS 2014) October 9, 2014 University of Michigan, Ann Arbor 38/ 1

97 Conclusions Real-Time Streaming Communication Part I: Channel Coding Channels with Burst and Isolated Erasures Explicit Codes New Distance and Span Metrics Part II: Source Coding Tradeoff between compression rate and error propagation Lossless Recovery Gaussian Sources with Quadratic Distortion October 9, 2014 University of Michigan, Ann Arbor 39/ 1

Error Control for Real-Time Streaming Applications

Error Control for Real-Time Streaming Applications Error Control for Real-Time Streaming Applications Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Joint work with: Ahmed Badr (Toronto), Wai-Tian Tan (Cisco), Xiaoqing

More information

Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels

Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels Ashish Khisti University of Toronto Joint Work: Ahmed Badr (Toronto), Wai-Tian Tan (Cisco), John Apostolopoulos (Cisco). Sequential

More information

AN increasing number of multimedia applications require. Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures

AN increasing number of multimedia applications require. Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures 1 Streaming Codes with Partial Recovery over Channels with Burst and Isolated Erasures Ahmed Badr, Student Member, IEEE, Ashish Khisti, Member, IEEE, Wai-Tian Tan, Member IEEE and John Apostolopoulos,

More information

A Truncated Prediction Framework for Streaming over Erasure Channels

A Truncated Prediction Framework for Streaming over Erasure Channels A Truncated Prediction Framework for Streaming over Erasure Channels Farrokh Etezadi, Ashish Khisti, Jun Chen Abstract We propose a new coding technique for sequential transmission of a stream of Gauss-Markov

More information

Streaming-Codes for Multicast over Burst Erasure Channels

Streaming-Codes for Multicast over Burst Erasure Channels 1 Streaming-Codes for Multicast over Burst Erasure Channels Ahmed Badr, Devin Lui and Ashish Khisti School of Electrical and Computer Engineering University of Toronto Toronto, ON, M5S 3G4, Canada Email:

More information

MANY multimedia applications such as interactive audio/video conferencing, mobile gaming and cloud-computing require

MANY multimedia applications such as interactive audio/video conferencing, mobile gaming and cloud-computing require Layered Constructions for Low-Delay Streaming Codes Ahmed Badr, Student Member, IEEE, Pratik Patil, Ashish Khisti, Member, IEEE, Wai-Tian Tan, Member, IEEE and John Apostolopoulos, Fellow, IEEE 1 arxiv:1308.3827v1

More information

Convolutional Codes with Maximum Column Sum Rank for Network Streaming

Convolutional Codes with Maximum Column Sum Rank for Network Streaming 1 Convolutional Codes with Maximum Column Sum Rank for Network Streaming Rafid Mahmood, Ahmed Badr, and Ashish Khisti School of Electrical and Computer Engineering University of Toronto Toronto, ON, M5S

More information

Performance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University)

Performance-based Security for Encoding of Information Signals. FA ( ) Paul Cuff (Princeton University) Performance-based Security for Encoding of Information Signals FA9550-15-1-0180 (2015-2018) Paul Cuff (Princeton University) Contributors Two students finished PhD Tiance Wang (Goldman Sachs) Eva Song

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Secret Key Agreement Using Asymmetry in Channel State Knowledge

Secret Key Agreement Using Asymmetry in Channel State Knowledge Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,

More information

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

On the Secrecy Capacity of Fading Channels

On the Secrecy Capacity of Fading Channels On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University

More information

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO

More information

Incremental Coding over MIMO Channels

Incremental Coding over MIMO Channels Model Rateless SISO MIMO Applications Summary Incremental Coding over MIMO Channels Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv University Gregory W. Wornell,

More information

PREDICTIVE quantization is one of the most widely-used

PREDICTIVE quantization is one of the most widely-used 618 IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL. 1, NO. 4, DECEMBER 2007 Robust Predictive Quantization: Analysis and Design Via Convex Optimization Alyson K. Fletcher, Member, IEEE, Sundeep

More information

On Scalable Source Coding for Multiple Decoders with Side Information

On Scalable Source Coding for Multiple Decoders with Side Information On Scalable Source Coding for Multiple Decoders with Side Information Chao Tian School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS), EPFL, Lausanne,

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Sequential Coding of Gauss Markov Sources With Packet Erasures and Feedback

Sequential Coding of Gauss Markov Sources With Packet Erasures and Feedback Sequential Coding of Gauss Markov Sources With Packet Erasures and Feedback Anatoly Khina, Victoria Kostina, Ashish Khisti, and Babak Hassibi Abstract We consider the problem of sequential transmission

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

II. THE TWO-WAY TWO-RELAY CHANNEL

II. THE TWO-WAY TWO-RELAY CHANNEL An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007 Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter

More information

Exploiting Partial Channel State Information for Secrecy over Wireless Channels

Exploiting Partial Channel State Information for Secrecy over Wireless Channels Exploiting Partial Channel State Information for Secrecy over Wireless Channels Matthieu R. Bloch and J. Nicholas Laneman Abstract In this paper, we investigate the effect of partial channel state information

More information

Anatoly Khina. Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT

Anatoly Khina. Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT Network Modulation: Transmission Technique for MIMO Networks Anatoly Khina Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT ACC Workshop, Feder Family Award

More information

Decomposing the MIMO Wiretap Channel

Decomposing the MIMO Wiretap Channel Decomposing the MIMO Wiretap Channel Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, Hebrew University Ashish Khisti, University of Toronto ISIT 2014 Honolulu, Hawai i, USA June 30,

More information

Appendix B Information theory from first principles

Appendix B Information theory from first principles Appendix B Information theory from first principles This appendix discusses the information theory behind the capacity expressions used in the book. Section 8.3.4 is the only part of the book that supposes

More information

Generalized Writing on Dirty Paper

Generalized Writing on Dirty Paper Generalized Writing on Dirty Paper Aaron S. Cohen acohen@mit.edu MIT, 36-689 77 Massachusetts Ave. Cambridge, MA 02139-4307 Amos Lapidoth lapidoth@isi.ee.ethz.ch ETF E107 ETH-Zentrum CH-8092 Zürich, Switzerland

More information

Graph-based Codes for Quantize-Map-and-Forward Relaying

Graph-based Codes for Quantize-Map-and-Forward Relaying 20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,

More information

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

Capacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback

Capacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback 2038 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 9, SEPTEMBER 2004 Capacity of Memoryless Channels and Block-Fading Channels With Designable Cardinality-Constrained Channel State Feedback Vincent

More information

Lecture 5 Channel Coding over Continuous Channels

Lecture 5 Channel Coding over Continuous Channels Lecture 5 Channel Coding over Continuous Channels I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw November 14, 2014 1 / 34 I-Hsiang Wang NIT Lecture 5 From

More information

Midterm Exam Information Theory Fall Midterm Exam. Time: 09:10 12:10 11/23, 2016

Midterm Exam Information Theory Fall Midterm Exam. Time: 09:10 12:10 11/23, 2016 Midterm Exam Time: 09:10 12:10 11/23, 2016 Name: Student ID: Policy: (Read before You Start to Work) The exam is closed book. However, you are allowed to bring TWO A4-size cheat sheet (single-sheet, two-sided).

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Friday, May 25, 2018 09:00-11:30, Kansliet 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless

More information

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 9: Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH : Diversity-Multiplexing Tradeoff Theoretical Foundations of Wireless Communications 1 Rayleigh Wednesday, June 1, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel

More information

Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou Email: tchou@wisc.edu Akbar M. Sayeed Email: akbar@engr.wisc.edu Stark C. Draper Email: sdraper@ece.wisc.edu

More information

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels Giuseppe Caire University of Southern California Los Angeles, CA, USA Email: caire@usc.edu Nihar

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Interactive Decoding of a Broadcast Message

Interactive Decoding of a Broadcast Message In Proc. Allerton Conf. Commun., Contr., Computing, (Illinois), Oct. 2003 Interactive Decoding of a Broadcast Message Stark C. Draper Brendan J. Frey Frank R. Kschischang University of Toronto Toronto,

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Compressed Sensing Using Bernoulli Measurement Matrices

Compressed Sensing Using Bernoulli Measurement Matrices ITSchool 11, Austin Compressed Sensing Using Bernoulli Measurement Matrices Yuhan Zhou Advisor: Wei Yu Department of Electrical and Computer Engineering University of Toronto, Canada Motivation Motivation

More information

Incremental Coding over MIMO Channels

Incremental Coding over MIMO Channels Incremental Coding over MIMO Channels Anatoly Khina EE-Systems Dept, TAU Tel Aviv, Israel Email: anatolyk@engtauacil Yuval Kochman EECS Dept, MIT Cambridge, MA 02139, USA Email: yuvalko@mitedu Uri Erez

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

The Optimality of Beamforming: A Unified View

The Optimality of Beamforming: A Unified View The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,

More information

Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT

Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT 1 Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with artial CSIT Kaushi Josiam, Dinesh Rajan and Mandyam Srinath, Department of Electrical Engineering, Southern Methodist

More information

On the Duality of Gaussian Multiple-Access and Broadcast Channels

On the Duality of Gaussian Multiple-Access and Broadcast Channels On the Duality of Gaussian ultiple-access and Broadcast Channels Xiaowei Jin I. INTODUCTION Although T. Cover has been pointed out in [] that one would have expected a duality between the broadcast channel(bc)

More information

Asymptotic Distortion Performance of Source-Channel Diversity Schemes over Relay Channels

Asymptotic Distortion Performance of Source-Channel Diversity Schemes over Relay Channels Asymptotic istortion Performance of Source-Channel iversity Schemes over Relay Channels Karim G. Seddik 1, Andres Kwasinski 2, and K. J. Ray Liu 1 1 epartment of Electrical and Computer Engineering, 2

More information

Turbo Codes for xdsl modems

Turbo Codes for xdsl modems Turbo Codes for xdsl modems Juan Alberto Torres, Ph. D. VOCAL Technologies, Ltd. (http://www.vocal.com) John James Audubon Parkway Buffalo, NY 14228, USA Phone: +1 716 688 4675 Fax: +1 716 639 0713 Email:

More information

Iterative Quantization. Using Codes On Graphs

Iterative Quantization. Using Codes On Graphs Iterative Quantization Using Codes On Graphs Emin Martinian and Jonathan S. Yedidia 2 Massachusetts Institute of Technology 2 Mitsubishi Electric Research Labs Lossy Data Compression: Encoding: Map source

More information

Training-Symbol Embedded, High-Rate Complex Orthogonal Designs for Relay Networks

Training-Symbol Embedded, High-Rate Complex Orthogonal Designs for Relay Networks Training-Symbol Embedded, High-Rate Complex Orthogonal Designs for Relay Networks J Harshan Dept of ECE, Indian Institute of Science Bangalore 56001, India Email: harshan@eceiiscernetin B Sundar Rajan

More information

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong Interleave Division Multiple Access Li Ping, Department of Electronic Engineering City University of Hong Kong 1 Outline! Introduction! IDMA! Chip-by-chip multiuser detection! Analysis and optimization!

More information

On Source-Channel Communication in Networks

On Source-Channel Communication in Networks On Source-Channel Communication in Networks Michael Gastpar Department of EECS University of California, Berkeley gastpar@eecs.berkeley.edu DIMACS: March 17, 2003. Outline 1. Source-Channel Communication

More information

Sparse Regression Codes for Multi-terminal Source and Channel Coding

Sparse Regression Codes for Multi-terminal Source and Channel Coding Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder

More information

Simultaneous SDR Optimality via a Joint Matrix Decomp.

Simultaneous SDR Optimality via a Joint Matrix Decomp. Simultaneous SDR Optimality via a Joint Matrix Decomposition Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv Uni. May 26, 2011 Model: Source Multicasting over MIMO Channels z 1 H 1 y 1 Rx1 ŝ 1 s

More information

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Multiplexing,

More information

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels Diversity-Fidelity Tradeo in Transmission o Analog Sources over MIMO Fading Channels Mahmoud Taherzadeh, Kamyar Moshksar and Amir K. Khandani Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca

More information

Digital communication system. Shannon s separation principle

Digital communication system. Shannon s separation principle Digital communication system Representation of the source signal by a stream of (binary) symbols Adaptation to the properties of the transmission channel information source source coder channel coder modulation

More information

C.M. Liu Perceptual Signal Processing Lab College of Computer Science National Chiao-Tung University

C.M. Liu Perceptual Signal Processing Lab College of Computer Science National Chiao-Tung University Quantization C.M. Liu Perceptual Signal Processing Lab College of Computer Science National Chiao-Tung University http://www.csie.nctu.edu.tw/~cmliu/courses/compression/ Office: EC538 (03)5731877 cmliu@cs.nctu.edu.tw

More information

Approximate Ergodic Capacity of a Class of Fading Networks

Approximate Ergodic Capacity of a Class of Fading Networks Approximate Ergodic Capacity of a Class of Fading Networks Sang-Woon Jeon, Chien-Yi Wang, and Michael Gastpar School of Computer and Communication Sciences EPFL Lausanne, Switzerland {sangwoon.jeon, chien-yi.wang,

More information

SOURCE coding problems with side information at the decoder(s)

SOURCE coding problems with side information at the decoder(s) 1458 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 3, MARCH 2013 Heegard Berger Cascade Source Coding Problems With Common Reconstruction Constraints Behzad Ahmadi, Student Member, IEEE, Ravi Ton,

More information

How Much Training and Feedback are Needed in MIMO Broadcast Channels?

How Much Training and Feedback are Needed in MIMO Broadcast Channels? How uch raining and Feedback are Needed in IO Broadcast Channels? ari Kobayashi, SUPELEC Gif-sur-Yvette, France Giuseppe Caire, University of Southern California Los Angeles CA, 989 USA Nihar Jindal University

More information

Improved MU-MIMO Performance for Future Systems Using Differential Feedback

Improved MU-MIMO Performance for Future Systems Using Differential Feedback Improved MU-MIMO Performance for Future 80. Systems Using Differential Feedback Ron Porat, Eric Ojard, Nihar Jindal, Matthew Fischer, Vinko Erceg Broadcom Corp. {rporat, eo, njindal, mfischer, verceg}@broadcom.com

More information

Side-information Scalable Source Coding

Side-information Scalable Source Coding Side-information Scalable Source Coding Chao Tian, Member, IEEE, Suhas N. Diggavi, Member, IEEE Abstract The problem of side-information scalable (SI-scalable) source coding is considered in this work,

More information

Distributed Decoding of Convolutional Network Error Correction Codes

Distributed Decoding of Convolutional Network Error Correction Codes 1 Distributed Decoding of Convolutional Network Error Correction Codes Hengjie Yang and Wangmei Guo arxiv:1701.06283v2 [cs.it] 18 Feb 2017 Abstract A Viterbi-like decoding algorithm is proposed in this

More information

Secret-Key Generation from Channel Reciprocity: A Separation Approach

Secret-Key Generation from Channel Reciprocity: A Separation Approach Secret-ey Generation from Channel Reciprocity: Separation pproach shish histi Department of Electrical and Computer Engineering University of Toronto Feb 11, 2013 Security at PHY-Layer Use PHY Resources

More information

Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels

Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Mahdi Jafari Siavoshani Sharif University of Technology, Iran Shaunak Mishra, Suhas Diggavi, Christina Fragouli Institute of

More information

A robust transmit CSI framework with applications in MIMO wireless precoding

A robust transmit CSI framework with applications in MIMO wireless precoding A robust transmit CSI framework with applications in MIMO wireless precoding Mai Vu, and Arogyaswami Paulraj Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Ahmed S. Mansour, Rafael F. Schaefer and Holger Boche. June 9, 2015

Ahmed S. Mansour, Rafael F. Schaefer and Holger Boche. June 9, 2015 The Individual Secrecy Capacity of Degraded Multi-Receiver Wiretap Broadcast Channels Ahmed S. Mansour, Rafael F. Schaefer and Holger Boche Lehrstuhl für Technische Universität München, Germany Department

More information

Soft-Output Trellis Waveform Coding

Soft-Output Trellis Waveform Coding Soft-Output Trellis Waveform Coding Tariq Haddad and Abbas Yongaçoḡlu School of Information Technology and Engineering, University of Ottawa Ottawa, Ontario, K1N 6N5, Canada Fax: +1 (613) 562 5175 thaddad@site.uottawa.ca

More information

Physical-Layer MIMO Relaying

Physical-Layer MIMO Relaying Model Gaussian SISO MIMO Gauss.-BC General. Physical-Layer MIMO Relaying Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, MIT Uri Erez, Tel Aviv University August 5, 2011 Model Gaussian

More information

Distributed Reed-Solomon Codes

Distributed Reed-Solomon Codes Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes

More information

Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms

Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms Flierl and Girod: Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms, IEEE DCC, Mar. 007. Half-Pel Accurate Motion-Compensated Orthogonal Video Transforms Markus Flierl and Bernd Girod Max

More information

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,

More information

Lecture 4. Capacity of Fading Channels

Lecture 4. Capacity of Fading Channels 1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February

More information

Fading Wiretap Channel with No CSI Anywhere

Fading Wiretap Channel with No CSI Anywhere Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract

More information

Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks

Single-Symbol ML Decodable Distributed STBCs for Partially-Coherent Cooperative Networks This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings Single-Symbol ML Decodable Distributed STBCs for

More information

ON SCALABLE CODING OF HIDDEN MARKOV SOURCES. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

ON SCALABLE CODING OF HIDDEN MARKOV SOURCES. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose ON SCALABLE CODING OF HIDDEN MARKOV SOURCES Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California, Santa Barbara, CA, 93106

More information

Joint Source-Channel Coding Optimized On Endto-End Distortion for Multimedia Source

Joint Source-Channel Coding Optimized On Endto-End Distortion for Multimedia Source Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 8-2016 Joint Source-Channel Coding Optimized On Endto-End Distortion for Multimedia Source Ebrahim Jarvis ej7414@rit.edu

More information

Lecture 4 Capacity of Wireless Channels

Lecture 4 Capacity of Wireless Channels Lecture 4 Capacity of Wireless Channels I-Hsiang Wang ihwang@ntu.edu.tw 3/0, 014 What we have learned So far: looked at specific schemes and techniques Lecture : point-to-point wireless channel - Diversity:

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

Multiple Description Transform Coding of Images

Multiple Description Transform Coding of Images Multiple Description Transform Coding of Images Vivek K Goyal Jelena Kovačević Ramon Arean Martin Vetterli U. of California, Berkeley Bell Laboratories École Poly. Féd. de Lausanne École Poly. Féd. de

More information

Communication constraints and latency in Networked Control Systems

Communication constraints and latency in Networked Control Systems Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega

More information

Shannon s A Mathematical Theory of Communication

Shannon s A Mathematical Theory of Communication Shannon s A Mathematical Theory of Communication Emre Telatar EPFL Kanpur October 19, 2016 First published in two parts in the July and October 1948 issues of BSTJ. First published in two parts in the

More information

Quantization for Distributed Estimation

Quantization for Distributed Estimation 0 IEEE International Conference on Internet of Things ithings 0), Green Computing and Communications GreenCom 0), and Cyber-Physical-Social Computing CPSCom 0) Quantization for Distributed Estimation uan-yu

More information

Multiuser Successive Refinement and Multiple Description Coding

Multiuser Successive Refinement and Multiple Description Coding Multiuser Successive Refinement and Multiple Description Coding Chao Tian Laboratory for Information and Communication Systems (LICOS) School of Computer and Communication Sciences EPFL Lausanne Switzerland

More information

Harnessing Interaction in Bursty Interference Networks

Harnessing Interaction in Bursty Interference Networks 215 IEEE Hong Kong-Taiwan Joint Workshop on Information Theory and Communications Harnessing Interaction in Bursty Interference Networks I-Hsiang Wang NIC Lab, NTU GICE 1/19, 215 Modern Wireless: Grand

More information

Lecture 4 Capacity of Wireless Channels

Lecture 4 Capacity of Wireless Channels Lecture 4 Capacity of Wireless Channels I-Hsiang Wang ihwang@ntu.edu.tw 3/0, 014 What we have learned So far: looked at specific schemes and techniques Lecture : point-to-point wireless channel - Diversity:

More information

Tracking and Control of Gauss Markov Processes over Packet-Drop Channels with Acknowledgments

Tracking and Control of Gauss Markov Processes over Packet-Drop Channels with Acknowledgments Tracking and Control of Gauss Markov Processes over Packet-Drop Channels with Acknowledgments Anatoly Khina, Victoria Kostina, Ashish Khisti, and Babak Hassibi arxiv:1702.01779v4 [cs.it] 23 May 2018 Abstract

More information

Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming

Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming Authors: Christian Lameiro, Alfredo Nazábal, Fouad Gholam, Javier Vía and Ignacio Santamaría University of Cantabria,

More information

RECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS

RECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS RECURSIVE TRAINING WITH UNITARY MODULATION FOR CORRELATED BLOCK-FADING MIMO CHANNELS Wenyi Zhang, Student Member, IEEE, and J Nicholas Laneman, Member, IEEE Department of Electrical Engineering University

More information

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance

More information

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,

More information

Wavelet Scalable Video Codec Part 1: image compression by JPEG2000

Wavelet Scalable Video Codec Part 1: image compression by JPEG2000 1 Wavelet Scalable Video Codec Part 1: image compression by JPEG2000 Aline Roumy aline.roumy@inria.fr May 2011 2 Motivation for Video Compression Digital video studio standard ITU-R Rec. 601 Y luminance

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Delayed Sequential Coding of Correlated Sources

Delayed Sequential Coding of Correlated Sources Delayed Sequential Coding of Correlated Sources Nan Ma, Ye Wang, and Prakash Ishwar Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {nanma, yw, pi}@bu.edu Abstract

More information

Network Control: A Rate-Distortion Perspective

Network Control: A Rate-Distortion Perspective Network Control: A Rate-Distortion Perspective Jubin Jose and Sriram Vishwanath Dept. of Electrical and Computer Engineering The University of Texas at Austin {jubin, sriram}@austin.utexas.edu arxiv:8.44v2

More information

Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper

Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper Mohsen Bahrami, Ali Bereyhi, Mahtab Mirmohseni and Mohammad Reza Aref Information Systems and Security

More information

ELEC546 MIMO Channel Capacity

ELEC546 MIMO Channel Capacity ELEC546 MIMO Channel Capacity Vincent Lau Simplified Version.0 //2004 MIMO System Model Transmitter with t antennas & receiver with r antennas. X Transmitted Symbol, received symbol Channel Matrix (Flat

More information