Communication, Computation, and Control: Through the Information Lens

Size: px
Start display at page:

Download "Communication, Computation, and Control: Through the Information Lens"

Transcription

1 Communication, Computation, and Control: Through the Information Lens Pulkit Grover Stanford University CMU, April 16, Acknowledgments: C2S2/Interconnect Focus Center (IFC) NSF Center for Science of Information (CSoI) 1 NSF-CCF (cyber-physical systems)

2 Flows of information in modern systems 2/33

3 Flows of information in modern systems 2/33

4 Flows of information in modern systems 2/33

5 Flows of information in modern systems 2/33

6 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M 3/33

7 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M 3/33

8 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M 2) Information flows in physical systems C w1 C w2 C w6 Plant C w3 C w5 C w4 3/33

9 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M 2) Information flows in physical systems C w1 C w2 C w6 Implicit channel Plant C w3 C w5 C w4 3/33

10 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M Traditional: Minimize P T Now: Minimize total power Fundamental limits, experimental results 2) Information flows in physical systems C w1 C w2 C w6 Implicit channel Plant C w3 C w5 C w4 3/33

11 Short-distances: Processing power can exceed transmit power! Short-distance communication at Gbps (e.g. indoor wireless, data-centers ethernet) Encoder PA LNA ADC Equalizer Decoder M 80 mw [1] 11 mw[4] 26 mw[2] 12 mw [1] 144 mw [3] Transmitter Receiver [1] Uncoded [Marcu et al '09] [2] 7-bit ADCs [Murmann '08] [3] (6,32)-LDPC [Zhang et al '10] [4] [Shin 09] 4/33

12 Short-distances: Processing power can exceed transmit power! Short-distance communication at Gbps (e.g. indoor wireless, data-centers ethernet) Encoder PA LNA ADC Equalizer Decoder M 80 mw [1] 11 mw[4] 26 mw[2] 12 mw [1] 144 mw [3] Transmitter Choosing a -efficient code? P total Receiver [1] Uncoded [Marcu et al '09] [2] 7-bit ADCs [Murmann '08] [3] (6,32)-LDPC [Zhang et al '10] [4] [Shin 09] 4/33

13 Short-distances: Processing power can exceed transmit power! Short-distance communication at Gbps (e.g. indoor wireless, data-centers ethernet) Encoder PA LNA ADC Equalizer Decoder M 80 mw [1] 11 mw[4] 26 mw[2] 12 mw [1] 144 mw [3] Transmitter Choosing a -efficient code? P total Receiver P total = P T + P enc + P dec [1] Uncoded [Marcu et al '09] [2] 7-bit ADCs [Murmann '08] [3] (6,32)-LDPC [Zhang et al '10] [4] [Shin 09] 4/33

14 Minimizing transmit power: Shannon s waterfall curves Goal: Rate M E P T R, error probability 5 fixed R, W, η P e D M C = W log path loss 1+ ηp T N 0 >R log (P ) 10 (Pe) e Shannon limit (Tx power) Total power (Watts) Transmit Total power (Watts) (watts) 5/33

15 Minimizing total power: Initial theoretical approaches M E P T D M 6/33

16 Minimizing total power: Initial theoretical approaches Black-box model of processing power M E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 6/33

17 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 6/33

18 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 0 T 6/33

19 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 0 T 6/33

20 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 0 T 6/33

21 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 0 T What are the greenest codes? 6/33

22 Green system = Capacity-code + Green implementation? Theory Implementation On the design of LDPC codes within db of the Shannon limit. [Chung, Forney, Richardson, Urbanke IT 01] A 47-Gbps LDPC decoder... (10 GBase-T) [Zhang, Anantharam, Wainwright, Nikolic JSSC 10] 7/33

23 Green system = Capacity-code + Green implementation? Theory Implementation On the design of LDPC codes within db of the Shannon limit. [Chung, Forney, Richardson, Urbanke IT 01] A 47-Gbps LDPC decoder... (10 GBase-T) [Zhang, Anantharam, Wainwright, Nikolic JSSC 10] Wireless LAN and 60 GHz band 7/33

24 Green system = Capacity-code + Green implementation? Theory Implementation On the design of LDPC codes within db of the Shannon limit. [Chung, Forney, Richardson, Urbanke IT 01] A 47-Gbps LDPC decoder... (10 GBase-T) [Zhang, Anantharam, Wainwright, Nikolic JSSC 10] Wireless LAN and 60 GHz band uncoded transmission! 7/33

25 What can the total power look like? Some experiments 8/33

26 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] 8/33

27 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) Shannon waterfall Power (Watts) 8/33

28 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) P total Power (Watts) R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33

29 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) P total Power (Watts) R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33

30 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) P total Power (Watts) R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE Bad code choice? 8/33

31 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) Power (Watts) Bad code choice? P total Bad implementations? R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33

32 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) Power (Watts) Bad code choice? Both? P total Bad implementations? R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33

33 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) Power (Watts) Bad code choice? Both? P total Bad implementations? Neither? R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33

34 Fundamental limits on total power? M E P T D M 9/33

35 Fundamental limits on total power? M E P T D M log (P e ) 10 (Pe) fixed rate, distance Shannon limit (Tx power) Total power (Watts) Total power (watts) 9/33

36 Fundamental limits on total power? M E P T D M log (P e ) 10 (Pe) fixed rate, distance Shannon limit (Tx power) Total power (Watts) Total power (watts) 9/33

37 Fundamental limits on total power? M E P T D M 5 fixed rate, Total power behavior log (P e ) 10 (Pe) distance Shannon limit (Tx power) Total power (Watts) Total power (watts) 9/33

38 Fundamental limits on total power? M E P T D M log (P e ) 10 (Pe) fixed rate, distance Shannon limit (Tx power) Total power behavior this? Total power (Watts) Total power (watts) 9/33

39 Fundamental limits on total power? M E P T D M log (P e ) 10 (Pe) fixed rate, distance Shannon limit (Tx power) Total power behavior this?... or this? Total power (Watts) Total power (watts) 9/33

40 Fundamental limits on total power? M E P T D M Total power behavior 5 fixed rate, Questions for this talk: this? distance or this? 1) Must always diverge to infinity? log (P e ) 10 (Pe) P total 2) Should we operate close to capacity? Shannon limit (Tx power) 25 3) Can we use bounded? P T 30 4) What codes minimize? P total Total power (Watts) Total power (watts) 9/33

41 Our approach 10/33

42 Our approach Circuit Models 10/33

43 Comm. complexity Decentralized Estimation Our approach Circuit Models Network information theory Information flow in circuits 10/33

44 Comm. complexity Decentralized Estimation Our approach Circuit Models Network information theory Circuit power models 0 Information flow in circuits log 10 (Pe) Decoding power (Watts) Encoding/decoding power 10/33

45 Comm. complexity Decentralized Estimation Our approach Circuit Models Network information theory Circuit power models 0 Information flow in circuits log 10 (Pe) Decoding power (Watts) Encoding/decoding power log 10 (Pe) Shannon limit (Tx power) P total P T Tx power (Watts) Information theory (Transmit power) 10/33

46 Comm. complexity Decentralized Estimation Our approach Circuit Models Network information theory Circuit power models 0 Information flow in circuits log 10 (Pe) Decoding power (Watts) Encoding/decoding power log 10 (Pe) Shannon limit (Tx power) P total P T Tx power (Watts) Information theory (Transmit power) log 10 (Pe) P total 25 P T Ptotal x 10 5 Total Power (Watts) Fundamental bounds on total power 10/33

47 Obtaining fundamental limits: Main difficulty Code passing through channel Transmit power P T Models: AWGN fading... 11/33

48 Obtaining fundamental limits: Main difficulty Code passing through channel implementation (encoding/decoding) encoding/decoding power Models:?? Transmit power P T Models: AWGN fading... 11/33

49 Obtaining fundamental limits: Main difficulty Code passing through channel implementation (encoding/decoding) encoding/decoding power Models:?? Transmit power P T Models: AWGN fading... Need implementation models that are relevant and analyzable 11/33

50 A graphical model for circuit implementation M E P T D M Output nodes Helper nodes Input nodes VLSI model of computing [Thompson 80] - degree of each node at most α (e.g. 4) 12/33

51 A graphical model for circuit implementation M E P T D M Output nodes Helper nodes Input nodes VLSI model of computing [Thompson 80] - degree of each node at most α (e.g. 4) Channel model: Binary Symmetric Channel p ch p ch 1 p ch p ch p ch = Q ηpt N /33

52 Decoding complexity/power: Fundamental limits Theorem*[Grover, Woyach, Sahai ISIT 08, JSAC 11] # of clock-cycles, 1 log 1 τ log(α 1) log P e (C(P T ) R) 2 /V (P T )... for any code and any decoding algorithm. α : Max. node degree V (P T ) : channel dispersion * precise result for any P e and any gap appears in [Grover, Woyach, Sahai 11] 13/33

53 Decoding complexity: Proof Technique 14/33

54 Decoding complexity: Proof Technique Information-flow constrained by fan-out 14/33

55 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i 14/33

56 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 14/33

57 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 τ =2 14/33

58 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 τ =2 τ =3 14/33

59 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] τ =2 τ =3 14/33

60 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] n nbd : number of nodes in decoding neighborhood τ =2 τ =3 14/33

61 P e e n nbd Decoding complexity: Proof Technique Information-flow constrained by fan-out Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] (C(P T ) R) 2 V (P T ) B i τ =1 n nbd : number of nodes in decoding neighborhood τ =2 τ =3 14/33

62 P e e n nbd Decoding complexity: Proof Technique Information-flow constrained by fan-out Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] (C(P T ) R) 2 V (P T ) τ B i τ =1 n nbd : number of nodes in decoding neighborhood 1 log(α 1) log(n nbd) τ =2 τ =3 14/33

63 P e e n nbd Decoding complexity: Proof Technique Information-flow constrained by fan-out Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] (C(P T ) R) 2 V (P T ) τ B i τ =1 n nbd : number of nodes in decoding neighborhood 1 log(α 1) log(n nbd) τ =2 τ =3 Theorem*[Grover, Woyach, Sahai ISIT 08, JSAC 11] # of clock-cycles,τ 1 log(α 1) log log 1 P e (C(P T ) R) 2 /V (P T ) 14/33

64 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle 15/33

65 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T P T + P decoding 15/33

66 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) 15/33

67 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) log 10 (Pe) Shannon limit (Tx power) P total P T Enode = 3 pj distance = 10 m fc = 60 GHz W = 3 GHz R = 1.5 Gbps Total power (Watts) 15/33

68 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) log 10 (Pe) Shannon limit (Tx power) P total P T Enode = 3 pj distance = 10 m fc = 60 GHz W = 3 GHz R = 1.5 Gbps Total power (Watts) 15/33

69 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) log 10 (Pe) Shannon limit (Tx power) P total P T Enode = 3 pj distance = 10 m fc = 60 GHz W = 3 GHz R = 1.5 Gbps Total power (Watts) 15/33

70 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) log 10 (Pe) Shannon limit (Tx power) P total P T Enode = 3 pj distance = 10 m fc = 60 GHz W = 3 GHz R = 1.5 Gbps Total power (Watts) Moral: do not operate too close to capacity! 15/33

71 Node model What codes are good? 16/33

72 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? 16/33

73 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Random block codes, ML decoding? 16/33

74 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? 16/33

75 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? 16/33

76 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? 16/33

77 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? Regular LDPCs, iterative decoding [Lentmaier 05][Grover, Woyach, Sahai JSAC 11] 16/33

78 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? Regular LDPCs, iterative decoding [Lentmaier 05][Grover, Woyach, Sahai JSAC 11] db 25 log 10 (Pe) Optimizing transmit power for (3,4) LDPC Lower bound on total power Total power for (3,4) LDPC, Gallager decoding 125 Shannon limit !"#$%&'"()*&+,$##-.&%"/ -0$%)1 Total power (Watts) 16/33

79 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? Regular LDPCs, iterative decoding [Lentmaier 05][Grover, Woyach, Sahai JSAC 11] db 25 log 10 (Pe) Optimizing transmit power for (3,4) LDPC Lower bound on total power Total power for (3,4) LDPC, Gallager decoding Data-centers (10 GBASE-T): regular LDPC! 125 Shannon limit !"#$%&'"()*&+,$##-.&%"/ -0$%)1 Total power (Watts) 16/33

80 Talk outline Information flows: visible and invisible M E P T D M Traditional: Minimize P T Now: Minimize total (transmit + proc.) power Fundamental limits Node model: stay away from capacity regular LDPCs are order optimal 17/33

81 Talk outline Information flows: visible and invisible M E P T D M Traditional: Minimize P T Now: Minimize total (transmit + proc.) power Fundamental limits Node model: stay away from capacity regular LDPCs are order optimal Wire model: using bounded P T suboptimal 17/33

82 What did we expect from our experimental results? Experiment-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] P T Regular LDPCs (3,4) (3,6) (4,8) (5,10) P total R = 7 Gbps W = 7 GHz path-loss coefft = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encnter (Layout) Synopsis HSPICE /33

83 Wire model of power consumption 19/33

84 Wire model of power consumption 19/33

85 Wire model of power consumption Fourier Transform [Thompson 80] Power A wiresτ n = Ω n log n Similar results for sorting, boolean functions,... for implementing any algorithm. 19/33

86 Wire model of power consumption Fourier Transform [Thompson 80] Power A wiresτ n = Ω n log n Similar results for sorting, boolean functions,... for implementing any algorithm. Encoding/decoding complexity: [El Gamal et al. 84] A chip τ 2 Ω nr 2 log npe 19/33

87 Wire model: Fundamental limits on encoding/decoding power Theorem *[Grover, Goldsmith, Sahai Allerton 11; ISIT Sub. 12] log 1 Encoding/decoding Power Ω P e P T... for any code and any encoding/decoding algorithm. * precise result for any P e and any gap appears in [Grover, Goldsmith, Sahai 12] 20/33

88 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T 21/33

89 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T 5 log 10 (Pe) P total d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech x 10 5 Power (Watts) 21/33

90 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T 5 log 10 (Pe) P T P total d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech x 10 5 Power (Watts) 21/33

91 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T log 10 (Pe) P T P total 3 log 1 P e x 10 5 Power (Watts) d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech. 21/33

92 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T log 10 (Pe) P T P total 3 log 1 P e x 10 5 Power (Watts) P total with bounded P T d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech. 21/33

93 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T log 10 (Pe) P T P total 3 log 1 P e x 10 5 Power (Watts) P total with bounded P T log 1 P e d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech. 21/33

94 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T log 10 (Pe) P T P total 3 log 1 P e x 10 5 Power (Watts) P total with bounded P T log 1 P e d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech. Moral: Bounded P T is suboptimal 21/33

95 Suboptimality of bounded transmit power: Experimental results 22/33

96 Information flows in circuits: Summary M E D M P T Information needs to flow at the encoder and decoder (mixing) (de-mixing) Fundamental limits: Traditional: Operate close to capacity Total power perspective: Node model: stay away from capacity Wire model: use unbounded P T No assumptions on the code structure 23/33

97 Looking forward: Greenest codes for wireless? Grand goal: Code/encoder/decoder triples within bounded dbs of the optimal. 5 log (P ) 10 (Pe) e Shannon limit (Tx power) Total power (Watts) Transmit Total power power (Watts) (watts) 24/33

98 log 10 (Pe) Looking forward: Greenest codes for wireless? Grand goal: Code/encoder/decoder triples within bounded dbs of the optimal. Distance (meters) /33

99 log 10 (Pe) Looking forward: Greenest codes for wireless? Grand goal: Code/encoder/decoder triples within bounded dbs of the optimal. 5-5 (3,6), girth-6, 1-bit msg Distance (meters) (4,8), girth-6, 1-bit msg (3,6), girth-6, 2-bit msg (3,6), girth-8, 1-bit msg (3,6)-LDPC girth-8, 2-bit msg R = 7 Gbps W = 7 GHz path-loss coeff = 3 fc = 60 GHz STM CMOS 90 nm Layout:Cadence Enctr Synopsis HSPICE [Ganesan, Grover, Rabaey 11][Ganesan, Wen, Grover, Rabaey, Goldsmith 12] 24/33

100 log 10 (Pe) Looking forward: Greenest codes for wireless? Grand goal: Code/encoder/decoder triples within bounded dbs of the optimal. 5-5 (3,6), Uncoded girth-6, transmission (4,8), girth-6, 1-bit msg 1-bit msg Distance (meters) (3,6), girth-6, 2-bit msg (3,6), girth-8, 1-bit msg (3,6)-LDPC girth-8, 2-bit msg R = 7 Gbps W = 7 GHz path-loss coeff = 3 fc = 60 GHz STM CMOS 90 nm Layout:Cadence Enctr Synopsis HSPICE [Ganesan, Grover, Rabaey 11][Ganesan, Wen, Grover, Rabaey, Goldsmith 12] 24/33

101 Looking forward: Green data-center communication !2 10!4 FER/BER log 10 (Pe) Traditional view Code choice (10-Gbase-T): (6,32) - RS-LDPC, length 2048 Total-power perspective Distance (meters) FER/BER 10!6 10!8 10!10 10!12 10!14 10 iterations 20 iterations 50 iterations 100 iterations 200 iterations Eb/No (db) SNR (db) /33

102 Looking forward: Green data-center communication !2 10!4 FER/BER log 10 (Pe) Traditional view Code choice (10-Gbase-T): (6,32) - RS-LDPC, length 2048 Total-power perspective Distance (meters) FER/BER 10!6 10!8 10!10 10!12 10!14 10 iterations 20 iterations 50 iterations 100 iterations 200 iterations Eb/No (db) SNR (db) (6,32) - RS-LDPC length /33

103 Looking forward: Green data-center communication !2 10!4 FER/BER log 10 (Pe) Traditional view Code choice (10-Gbase-T): (6,32) - RS-LDPC, length 2048 Total-power perspective Distance (meters) FER/BER 10!6 10!8 10!10 10!12 10!14 10 iterations 20 iterations 50 iterations 100 iterations 200 iterations Eb/No (db) SNR (db) /33

104 Looking forward: Green data-center communication !2 10!4 FER/BER log 10 (Pe) Traditional view Code choice (10-Gbase-T): (6,32) - RS-LDPC, length 2048 Total-power perspective Distance (meters) FER/BER 10!6 10!8 10!10 10!12 10!14 10 iterations 20 iterations 50 iterations 100 iterations 200 iterations Eb/No (db) SNR (db) Code-choice must depend on distance 25/33

105 Looking forward: Energy costs of communication 26/33

106 Looking forward: Energy costs of communication Other models of computing - e.g. nodes/wires can sleep 26/33

107 Looking forward: Energy costs of communication Other models of computing - e.g. nodes/wires can sleep Multiple simultaneously transmitting links - Code-choice must depend on distance, density [Grover, Woyach, Sahai JSAC 11] Tx r Rx θ d 26/33

108 Looking forward: Energy costs of communication Other models of computing - e.g. nodes/wires can sleep Multiple simultaneously transmitting links - Code-choice must depend on distance, density [Grover, Woyach, Sahai JSAC 11] Tx r Rx θ d Other components of system power - Equalizer [Grover, Sahai, Park 11] M Encoder PA LNA ADC Equalizer Decoder M 26/33

109 Talk outline 1) Information flows in circuits M Transmitter P T Channel Receiver Communicating and processing information 2) Information flows in physical systems M Communicating and Using information C w1 C w 2 Implicit communication C w 6 Implicit channel Plant C w 3 Witsenhausen s counterexample - approximately optimal solutions C w 5 C w 4 Beyond the counterexample 27/33

110 Looking forward: Implicit information flows in control C w1 C w 2 C w 6 Plant C w 3 C w 5 C w 4 28/33

111 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 C w 6 Plant C w 3 C w 5 C w 4 28/33

112 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 C w 6 Plant C w 3 C w 5 C w 4 28/33

113 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4 28/33

114 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4 28/33

115 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4... semantic aspects of communication are irrelevant to the engineering problem. [Shannon 48] 28/33

116 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4 [comm theory] deals with an essentially simple problem, because the transmission of information is considered independently of its use. [Witsenhausen 71] 28/33

117 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4 28/33

118 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? C w 6 Plant C w 3 C w 5 C w 4 28/33

119 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Plant C w 3 C w 5 C w 4 28/33

120 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Implicit channel Plant C w 3 C w 5 C w 4 28/33

121 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Implicit channel Plant C w 5 C w 4 C w 3 Dual role of actions control communicate 28/33

122 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Implicit channel Plant C w 5 C w 4 C w 3 Dual role of actions control communicate x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) 28/33

123 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Implicit channel Plant C w 5 C w 4 C w 3 Dual role of actions control communicate x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) 28/33

124 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] 29/33

125 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] 29/33

126 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] 29/33

127 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] Nonlinear strategies can outperform linear strategies [Witsenhausen 68] 29/33

128 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] Nonlinear strategies can outperform linear strategies [Witsenhausen 68] Nonconvex [Witsenhausen 68], Intractable (NP-hard) [Papadimitriou, Tsitsiklis 86] 29/33

129 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] Nonlinear strategies can outperform linear strategies [Witsenhausen 68] Nonconvex [Witsenhausen 68], Intractable (NP-hard) [Papadimitriou, Tsitsiklis 86] Semi-exhaustive searches [Deng, Ho 99] [Baglietto et al. 01] [Lee, Lau, Ho 01][Li, Marden, Shamma 09] [Karlsson et al. 10] 29/33

130 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian Nonlinear strategies can outperform linear strategies [Witsenhausen 68] Nonconvex [Witsenhausen 68], Intractable (NP-hard) [Papadimitriou, Tsitsiklis 86] Semi-exhaustive searches [Deng, Ho 99] [Baglietto et al. 01] [Lee, Lau, Ho 01][Li, Marden, Shamma 09] [Karlsson et al. 10] x 1 x 1 [Witsenhausen 68] x 0 x 0 29/33

131 Our approach: understanding information flows to obtain fundamental limits on cost 30/33

132 Our approach: understanding information flows to obtain fundamental limits on cost x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) Original problem [Witsenhausen 68] 30/33

133 Our approach: understanding information flows to obtain fundamental limits on cost x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) Original problem [Witsenhausen 68] E u 1 x 0 + z x 1 y x 1 + D Identify information-flow [Grover, Sahai 08] 30/33

134 Our approach: understanding information flows to obtain fundamental limits on cost x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) Original problem [Witsenhausen 68] E u 1 x 0 + z x 1 y x 1 + D E b 1 b 2.b 3 b 4 b 5 x 0 x 1 y + u + D 1 b 1 b 2.b 3 b 4 b 5 b 1 b 2. z 0.z 1 z 2 z 3 u 2 = x 1 Understand information-flow: Binary version [Avestimehr et al. 08][Grover, Sahai 09] Identify information-flow [Grover, Sahai 08] 30/33

135 Our approach: understanding information flows to obtain fundamental limits on cost x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) x m C 1 C 2 u m 1 x m 1 z m u m 2 x m 2 Original problem [Witsenhausen 68] E u 1 x 0 + z x 1 y x 1 + D Asymptotic vector version [Grover, Sahai 08] E b 1 b 2.b 3 b 4 b 5 x 0 x 1 y + u + D 1 b 1 b 2.b 3 b 4 b 5 b 1 b 2. z 0.z 1 z 2 z 3 u 2 = x 1 Understand information-flow: Binary version [Avestimehr et al. 08][Grover, Sahai 09] Identify information-flow [Grover, Sahai 08] 30/33

136 Our approach: understanding information flows to obtain fundamental limits on cost Large-deviations/ sphere-packing [Grover, Park, Sahai 09, 12] x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) x m C 1 C 2 u m 1 x m 1 z m u m 2 x m 2 Original problem [Witsenhausen 68] E u 1 x 0 + z x 1 y x 1 + D Asymptotic vector version [Grover, Sahai 08] E b 1 b 2.b 3 b 4 b 5 x 0 x 1 y + u + D 1 b 1 b 2.b 3 b 4 b 5 b 1 b 2. z 0.z 1 z 2 z 3 u 2 = x 1 Understand information-flow: Binary version [Avestimehr et al. 08][Grover, Sahai 09] Identify information-flow [Grover, Sahai 08] 30/33

137 Approx. solutions to Witsenhausen s counterexample x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) min k 2 E u E x 2 2 Theorem [Grover, Park, Sahai IEEE Tran Auto Cont 12] For all (k, σ 0 ), Upper bound Lower bound 8 Upper bound Scalar quantization Lower bound Info-theory + Large deviations First approximately-optimal solutions to Witsenhausen s counterexample 31/33

138 Approx. solutions to Witsenhausen s counterexample min k 2 E u E x 2 2 Upper bound x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) Scalar quantization Theorem [Grover, Park, Sahai IEEE Tran Auto Cont 12] For all (k, σ 0 ), x 1 Watermarking ( dirty-paper coding) Upper bound Lower bound 8 Lower bound Info-theory + Large deviations First approximately-optimal solutions to Witsenhausen s counterexample x 0 31/33

139 Looking forward: Information-flows in Cyber-Physical Systems 32/33

140 Looking forward: Information-flows in Cyber-Physical Systems C2 C w w1 y 1 y 2 u 2 u 1 System 32/33

141 Looking forward: Information-flows in Cyber-Physical Systems C2 C w w1 y 1 u 2 System 32/33

142 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 u 2 System 32/33

143 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 System 32/33

144 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 actuator System 32/33

145 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 actuator System 32/33

146 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 actuator System 32/33

147 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 actuator System ν t + Unit delay x t z t C 1 + C s 2 x t sensor t actuator Communicating a evolving state [Bansal, Basar 89][Wong, Brockett 90][Tatikonda, Mitter 01] [Sahai, Mitter 06] [Sinopoli et al. 04]... 32/33

148 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 y 2 sensor u 1 u 2 System actuator ν t + Unit delay x t z t C 1 + C s 2 x t sensor t actuator Communicating a evolving state [Bansal, Basar 89][Wong, Brockett 90][Tatikonda, Mitter 01] [Sahai, Mitter 06] [Sinopoli et al. 04]... 32/33

149 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 y 2 sensor u 1 u 2 System actuator ν t + Unit delay x t z t C 1 + C s 2 x t sensor t actuator Communicating a evolving state [Bansal, Basar 89][Wong, Brockett 90][Tatikonda, Mitter 01] [Sahai, Mitter 06] [Sinopoli et al. 04]... ν t + x t Unit Delay + x t x C 1 + t C 2 u 1 z [Grover, Sahai 10] R ex [Grover 12] 32/33

150 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 y 2 sensor u 1 u 2 System actuator ν t + Unit delay x t z t C 1 + C s 2 x t sensor t actuator Communicating a evolving state [Bansal, Basar 89][Wong, Brockett 90][Tatikonda, Mitter 01] [Sahai, Mitter 06] [Sinopoli et al. 04]... ν t + x t Unit Delay + x t x C 1 + t C 2 u 1 z [Grover, Sahai 10] R ex [Grover 12] 32/33

151 Summary: Understanding hidden information-flows is useful Information flows in circuits Information flows in physical systems M E P T D M C w1 C w2 C w6 Implicit channel Plant C w3 C w5 C w4 Information flow in computing: fundamental bounds on total power Implicit information flows: approximately-optimal solutions 33/33

152 Backup slides 34/33

153 35/33

154 The appropriate approximations in the two bounds log 10 (Pe) Shannon limit (Tx power) P total P T Node model log 10 (Pe) P total Wire model Total power (Watts) Total power (Watts) x 10 5 Total Power power (Watts) (Watts) Dispersion approximation E sp (R) Sphere-packing exponent Approximation far from capacity 0 R C 36/33

155 Total power minimizing density Density (links/m 2 ) Optimal code (if decoding were free) r = 1m θ = 0 W = 3 GHz α = 3 P e = R = 1.5 Gbps data Outer bound with E node = 3 pj Uncoded transmission Extrapolated performance of the decoder of [Zhang et al.] Total Power (watts) 37/33

156 Wireless information transfer i v s s r s M i 2 Load l L 1 L r 2 l c l i 38/33

157 Wireless information transfer i v s s r s M i 2 Load l L 1 L r 2 l c l i 38/33

158 Wireless information transfer i v s s r s M i 2 Load l L 1 L r 2 l c l i z + v o + - v 38/33

159 Optimal information transfer strategy? 39/33

160 Optimal information transfer strategy? N(f)/η(f) Shannon strategy : waterfilling frequency (Hz) in log scale 39/33

161 Optimal information transfer strategy? C(P avail ) = max P 1,...,P n s.t. np P i P avail i=1 n i=1 log ( 1+ η ip i N ) N(f)/η(f) Shannon strategy : waterfilling frequency (Hz) in log scale 39/33

162 Optimal information transfer strategy? C(P avail ) = max P 1,...,P n s.t. np P i P avail i=1 n i=1 log ( 1+ η ip i N ) N(f)/η(f) Shannon strategy : waterfilling frequency (Hz) in log scale 39/33

163 Secure Communication Using Inductive Coupling!"#$%&'()*%+$,-'".*!"#$%&"'"()*+&,-"$$*-#%$"$*.")%(/(0* /$0"&$1*)"&0".-)1)"&*!"#$%&"'"()*+&,-"$$*-#%$"$* 1#2"3,&'*-,44#+$"* 5#2"$.&,++"&*.")"-)/,(*)6&,%06* $+"-)&%'*$"($/(0* 5#2"$.&,++"&*.")"-)/,(*)6&,%06* +67$/-$* 8(3,&'#)/,(*."$)&%-)/,(*)6&,%06* -#+#-/)79#++&,#-6/(0*-,."$*#(.*$)&,(0* -,(2"&$"*,3*-6#(("4*-,./(0*)6",&"'*!"#$%&'()*+),*#'-&.'/$&'0"* 8(3,&'#)/,(*."$)&%-)/,(*)6&,%06* +67$/-$* :%#()%'*;"7*./$)&/<%)/,(* 40/33

164 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D 41/33

165 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D x 0 b 1 b 2 b 3 b 4 b 5 41/33

166 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D b 1 b 2 x x 1 0 D x 1 b 3 b 4 b 5 41/33

167 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D b 1 b 2 x x 1 0 D x 1 b 3 b 4 b 5 z 2 41/33

168 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D x 0 b 1 b 2 b 3 b 4 b 5 x 1 D x 1 E z 2 41/33

169 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D x 0 b 1 b 2 b 3 b 4 b 5 x 1 D x 1 E z 2 R ex = 2 41/33

170 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D x 0 b 1 b 2 b 3 b 4 b 5 x 1 E u 1 z 2 D x 1 R ex = 2 41/33

171 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 D x 1 E u 1 z 2 R ex = 2 42/33

172 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 D x 1 E u 1 z 2 R ex = 2 42/33

173 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 D x 1 E u 1 z 2 R ex = 2 42/33

174 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 E u 1 z 2 R ex = 2 42/33

175 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 E u 1 z 2 R ex = 2 42/33

176 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 E u 1 z 2 R ex = 2 42/33

177 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 E u 1 z 2 R ex = 2 b 3 b 4 42/33

178 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 b 3 b 4 E u 1 z 2 R ex = 2 b 3 b 4 42/33

179 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 b 3 b 4 E u 1 z 2 R ex = 2 b 3 b 4 42/33

180 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 b 3 b 4 E u 1 b 5 b 3 b 4 z 2 R ex = 2 42/33

181 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 42/33

182 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 42/33

183 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 42/33

184 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information 42/33

185 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information 42/33

186 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information 42/33

187 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information Implicit channel: high order bits 42/33

188 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information Implicit channel: high order bits 42/33

189 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information Implicit channel: high order bits binning! 42/33

190 Infinitely better than the natural strategies!!" # Nonlinear +,-./-0123/45./6/7>3 implicit,./ /6/73?@127/-ab linear explicit [Martins '06] " 3:3; 6< =33:3!" # SNR ex = P ex = σ 2 0 k = 10 2 Average cost cost!" $ +,-./-0123/45./6/ /6/7 Our synergistic strategy ratio diverges to infinity!!"" #"" $"" %"" &"" '"" ("" )"" *"" σ 0" 43/33

191 Is the counterexample relevant? x C u 1 + C 1 2 u 2 z + x 2 min max x 0,z k 2 u x 2 2 x z2 Induced norm: linear strategies optimal! [Rotkowitz 06] Witsenhausen s LQG formulation: more assumptions harder! Q. Why consider the quadratic norm? [John Doyle, Paths ahead, MIT, 2009] 44/33

192 Induced norm formulation too conservative? + x 2 x u 1 + u 2 C 1 C 2 z min max x 0,z k 2 u x 2 2 x z2 Makes no assumptions: noise completely arbitrary, adversarial! Usually we know something about the noise, e.g. typical values, or bounds + x 2 x u 1 + u 2 C 1 C 2 z ( a, a) say z ( a, a) A quadratic cost min max x 0,z ( a,a) k2 u x 2 2 Quantization (signaling) : can outperform linear by an unbounded factor is approximately optimal! 45/33

193 Induced norm Which is a right norm? + x 2 x u 1 + u 2 C 1 C 2 z Quadratic norm min max x 0,z k 2 u x 2 2 x z2 min max x 0,z ( a,a) k2 u x 2 2 Induced norm: cost normalized by size of state and noise. In many practical cases, small perturbations and small noises do cost less! Quadratic norm captures how much large perturbations/noises hurt Moral: signal even in adversarial situations 46/33

Towards a theory of information for energy-efficient communication

Towards a theory of information for energy-efficient communication Towards a theory of information for energy-efficient communication Pulkit Grover Wireless Foundations and Berkeley Wireless Research Center, UC Berkeley with Anant Sahai, Hari Palaiyanur, Kristen Woyach

More information

Time-division multiplexing for green broadcasting

Time-division multiplexing for green broadcasting Time-division multiplexing for green broadcasting Pulkit Grover and Anant Sahai Wireless Foundations, Department of EECS University of California at Berkeley Email: {pulkit, sahai} @ eecs.berkeley.edu

More information

Information Structures, the Witsenhausen Counterexample, and Communicating Using Actions

Information Structures, the Witsenhausen Counterexample, and Communicating Using Actions Information Structures, the Witsenhausen Counterexample, and Communicating Using Actions Pulkit Grover, Carnegie Mellon University Abstract The concept of information-structures in decentralized control

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

Witsenhausen s counterexample and its links with multimedia security problems

Witsenhausen s counterexample and its links with multimedia security problems Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey Outline Introduction

More information

Information Embedding meets Distributed Control

Information Embedding meets Distributed Control Information Embedding meets Distributed Control Pulkit Grover, Aaron B Wagner and Anant Sahai Abstract We consider the problem of information embedding where the encoder modifies a white Gaussian host

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

Pulkit Grover and Anant Sahai*

Pulkit Grover and Anant Sahai* Int. J. Systems, Control and Communications, Vol. Witsenhausen s counterexample as Assisted Interference Suppression Pulkit Grover and Anant Sahai* Wireless Foundations, Department of EECS, University

More information

Stabilization over discrete memoryless and wideband channels using nearly memoryless observations

Stabilization over discrete memoryless and wideband channels using nearly memoryless observations Stabilization over discrete memoryless and wideband channels using nearly memoryless observations Anant Sahai Abstract We study stabilization of a discrete-time scalar unstable plant over a noisy communication

More information

Sparse Regression Codes for Multi-terminal Source and Channel Coding

Sparse Regression Codes for Multi-terminal Source and Channel Coding Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder

More information

Communication constraints and latency in Networked Control Systems

Communication constraints and latency in Networked Control Systems Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega

More information

A Deterministic Annealing Approach to Witsenhausen s Counterexample

A Deterministic Annealing Approach to Witsenhausen s Counterexample A Deterministic Annealing Approach to Witsenhausen s Counterexample Mustafa Mehmetoglu Dep. of Electrical-Computer Eng. UC Santa Barbara, CA, US Email: mehmetoglu@ece.ucsb.edu Emrah Akyol Dep. of Electrical

More information

Communication by Regression: Achieving Shannon Capacity

Communication by Regression: Achieving Shannon Capacity Communication by Regression: Practical Achievement of Shannon Capacity Department of Statistics Yale University Workshop Infusing Statistics and Engineering Harvard University, June 5-6, 2011 Practical

More information

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints

Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,

More information

One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information

One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information ZOU Sheng and Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan University of

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor

Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Pravin Salunkhe, Prof D.P Rathod Department of Electrical Engineering, Veermata Jijabai

More information

Information Theory Meets Game Theory on The Interference Channel

Information Theory Meets Game Theory on The Interference Channel Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University

More information

Iterative Encoding of Low-Density Parity-Check Codes

Iterative Encoding of Low-Density Parity-Check Codes Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA

More information

MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING

MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING Yichuan Hu (), Javier Garcia-Frias () () Dept. of Elec. and Comp. Engineering University of Delaware Newark, DE

More information

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi kurkoski@ice.uec.ac.jp Dept. of Information and Communications Engineering

More information

Coding Techniques for Data Storage Systems

Coding Techniques for Data Storage Systems Coding Techniques for Data Storage Systems Thomas Mittelholzer IBM Zurich Research Laboratory /8 Göttingen Agenda. Channel Coding and Practical Coding Constraints. Linear Codes 3. Weight Enumerators and

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University

More information

Energy State Amplification in an Energy Harvesting Communication System

Energy State Amplification in an Energy Harvesting Communication System Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu

More information

Lecture 2. Capacity of the Gaussian channel

Lecture 2. Capacity of the Gaussian channel Spring, 207 5237S, Wireless Communications II 2. Lecture 2 Capacity of the Gaussian channel Review on basic concepts in inf. theory ( Cover&Thomas: Elements of Inf. Theory, Tse&Viswanath: Appendix B) AWGN

More information

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Gaussian Relay Channel Capacity to Within a Fixed Number of Bits

Gaussian Relay Channel Capacity to Within a Fixed Number of Bits Gaussian Relay Channel Capacity to Within a Fixed Number of Bits Woohyuk Chang, Sae-Young Chung, and Yong H. Lee arxiv:.565v [cs.it] 23 Nov 2 Abstract In this paper, we show that the capacity of the threenode

More information

Communication by Regression: Sparse Superposition Codes

Communication by Regression: Sparse Superposition Codes Communication by Regression: Sparse Superposition Codes Department of Statistics, Yale University Coauthors: Antony Joseph and Sanghee Cho February 21, 2013, University of Texas Channel Communication Set-up

More information

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference

More information

Graph-based Codes for Quantize-Map-and-Forward Relaying

Graph-based Codes for Quantize-Map-and-Forward Relaying 20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,

More information

The connection between information theory and networked control

The connection between information theory and networked control The connection between information theory and networked control Anant Sahai based in part on joint work with students: Tunc Simsek, Hari Palaiyanur, and Pulkit Grover Wireless Foundations Department of

More information

Data Rate Theorem for Stabilization over Time-Varying Feedback Channels

Data Rate Theorem for Stabilization over Time-Varying Feedback Channels Data Rate Theorem for Stabilization over Time-Varying Feedback Channels Workshop on Frontiers in Distributed Communication, Sensing and Control Massimo Franceschetti, UCSD (joint work with P. Minero, S.

More information

Delay, feedback, and the price of ignorance

Delay, feedback, and the price of ignorance Delay, feedback, and the price of ignorance Anant Sahai based in part on joint work with students: Tunc Simsek Cheng Chang Wireless Foundations Department of Electrical Engineering and Computer Sciences

More information

Modern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009

Modern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009 Modern Coding Theory Daniel J. Costello, Jr. Coding Research Group Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556 2009 School of Information Theory Northwestern University

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

Common Information. Abbas El Gamal. Stanford University. Viterbi Lecture, USC, April 2014

Common Information. Abbas El Gamal. Stanford University. Viterbi Lecture, USC, April 2014 Common Information Abbas El Gamal Stanford University Viterbi Lecture, USC, April 2014 Andrew Viterbi s Fabulous Formula, IEEE Spectrum, 2010 El Gamal (Stanford University) Disclaimer Viterbi Lecture 2

More information

Control Capacity. Gireeja Ranade and Anant Sahai UC Berkeley EECS

Control Capacity. Gireeja Ranade and Anant Sahai UC Berkeley EECS Control Capacity Gireeja Ranade and Anant Sahai UC Berkeley EECS gireeja@eecs.berkeley.edu, sahai@eecs.berkeley.edu Abstract This paper presents a notion of control capacity that gives a fundamental limit

More information

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach

Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

A vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation

A vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation A vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation Pulkit Grover and Anant Sahai Wireless Foundations, Department of EECS University of California

More information

Some Goodness Properties of LDA Lattices

Some Goodness Properties of LDA Lattices Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop

More information

RECENT advances in technology have led to increased activity

RECENT advances in technology have led to increased activity IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 49, NO 9, SEPTEMBER 2004 1549 Stochastic Linear Control Over a Communication Channel Sekhar Tatikonda, Member, IEEE, Anant Sahai, Member, IEEE, and Sanjoy Mitter,

More information

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels

Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels LEI BAO, MIKAEL SKOGLUND AND KARL HENRIK JOHANSSON IR-EE- 26: Stockholm 26 Signal Processing School of Electrical Engineering

More information

Lecture 18: Gaussian Channel

Lecture 18: Gaussian Channel Lecture 18: Gaussian Channel Gaussian channel Gaussian channel capacity Dr. Yao Xie, ECE587, Information Theory, Duke University Mona Lisa in AWGN Mona Lisa Noisy Mona Lisa 100 100 200 200 300 300 400

More information

NONLINEAR CONTROL with LIMITED INFORMATION. Daniel Liberzon

NONLINEAR CONTROL with LIMITED INFORMATION. Daniel Liberzon NONLINEAR CONTROL with LIMITED INFORMATION Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign Plenary talk, 2 nd Indian Control

More information

Lecture 4. Capacity of Fading Channels

Lecture 4. Capacity of Fading Channels 1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February

More information

Achieving Flexibility in LDPC Code Design by Absorbing Set Elimination

Achieving Flexibility in LDPC Code Design by Absorbing Set Elimination Achieving Flexibility in LDPC Code Design by Absorbing Set Elimination Jiajun Zhang, Jiadong Wang, Shayan Garani Srinivasa, Lara Dolecek Department of Electrical Engineering, University of California,

More information

Control over finite capacity channels: the role of data loss, delay and signal-to-noise limitations

Control over finite capacity channels: the role of data loss, delay and signal-to-noise limitations Control over finite capacity channels: the role of data loss, delay and signal-to-noise limitations Plant DEC COD Channel Luca Schenato University of Padova Control Seminars, Berkeley, 2014 University

More information

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels Title Equal Gain Beamforming in Rayleigh Fading Channels Author(s)Tsai, Shang-Ho Proceedings : APSIPA ASC 29 : Asia-Pacific Signal Citationand Conference: 688-691 Issue Date 29-1-4 Doc URL http://hdl.handle.net/2115/39789

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS

QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS Parvathinathan Venkitasubramaniam, Gökhan Mergen, Lang Tong and Ananthram Swami ABSTRACT We study the problem of quantization for

More information

The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks

The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks Gerald Matz Institute of Telecommunications Vienna University of Technology institute of telecommunications Acknowledgements

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

arxiv:cs/ v2 [cs.it] 1 Oct 2006

arxiv:cs/ v2 [cs.it] 1 Oct 2006 A General Computation Rule for Lossy Summaries/Messages with Examples from Equalization Junli Hu, Hans-Andrea Loeliger, Justin Dauwels, and Frank Kschischang arxiv:cs/060707v [cs.it] 1 Oct 006 Abstract

More information

Error Floors of LDPC Coded BICM

Error Floors of LDPC Coded BICM Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 2007 Error Floors of LDPC Coded BICM Aditya Ramamoorthy Iowa State University, adityar@iastate.edu

More information

QUANTIZED SYSTEMS AND CONTROL. Daniel Liberzon. DISC HS, June Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign

QUANTIZED SYSTEMS AND CONTROL. Daniel Liberzon. DISC HS, June Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign QUANTIZED SYSTEMS AND CONTROL Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign DISC HS, June 2003 HYBRID CONTROL Plant: u y

More information

Optimal Power Control for LDPC Codes in Block-Fading Channels

Optimal Power Control for LDPC Codes in Block-Fading Channels IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 7, JULY 2011 1759 Optimal Power Control for LDPC Codes in Block-Fading Channels Gottfried Lechner, Khoa D. Nguyen, Albert Guillén i Fàbregas, and Lars

More information

Chapter 4: Continuous channel and its capacity

Chapter 4: Continuous channel and its capacity meghdadi@ensil.unilim.fr Reference : Elements of Information Theory by Cover and Thomas Continuous random variable Gaussian multivariate random variable AWGN Band limited channel Parallel channels Flat

More information

Interactions of Information Theory and Estimation in Single- and Multi-user Communications

Interactions of Information Theory and Estimation in Single- and Multi-user Communications Interactions of Information Theory and Estimation in Single- and Multi-user Communications Dongning Guo Department of Electrical Engineering Princeton University March 8, 2004 p 1 Dongning Guo Communications

More information

E Demystifying the Witsenhausen Counterexample

E Demystifying the Witsenhausen Counterexample » ASK THE EXPERTS E Demystifying the Witsenhausen Counterexample Q. In my graduate-level controls course, the instructor mentioned the Witsenhausen counterexample, which seems to have something to do with

More information

Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels

Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels Lei Bao, Mikael Skoglund and Karl Henrik Johansson Department of Signals, Sensors and Systems, Royal Institute of Technology,

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

Advances in Error Control Strategies for 5G

Advances in Error Control Strategies for 5G Advances in Error Control Strategies for 5G Jörg Kliewer The Elisha Yegal Bar-Ness Center For Wireless Communications And Signal Processing Research 5G Requirements [Nokia Networks: Looking ahead to 5G.

More information

Joint Equalization and Decoding for Nonlinear Two-Dimensional Intersymbol Interference Channels with Application to Optical Storage

Joint Equalization and Decoding for Nonlinear Two-Dimensional Intersymbol Interference Channels with Application to Optical Storage Joint Equalization and Decoding for Nonlinear Two-Dimensional Intersymbol Interference Channels with Application to Optical Storage 1 arxiv:cs/0509008v1 [cs.it] 4 Sep 2005 Naveen Singla and Joseph A. O

More information

Blind phase/frequency synchronization with low-precision ADC: a Bayesian approach

Blind phase/frequency synchronization with low-precision ADC: a Bayesian approach Blind phase/frequency synchronization with low-precision ADC: a Bayesian approach Aseem Wadhwa, Upamanyu Madhow Department of ECE, UCSB 1/26 Modern Communication Receiver Architecture Analog Digital TX

More information

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract

More information

LDPC Decoding Strategies for Two-Dimensional Magnetic Recording

LDPC Decoding Strategies for Two-Dimensional Magnetic Recording SUBMITTED TO IEEE GLOBAL COMMUNICATIONS CONFERENCE, HONOLULU, HI, USA, NOV. 3-DEC. 4 29, 1 LDPC Decoding Strategies for Two-Dimensional Magnetic Recording Anantha Raman Krishnan, Rathnakumar Radhakrishnan,

More information

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of

More information

Variable-Rate Universal Slepian-Wolf Coding with Feedback

Variable-Rate Universal Slepian-Wolf Coding with Feedback Variable-Rate Universal Slepian-Wolf Coding with Feedback Shriram Sarvotham, Dror Baron, and Richard G. Baraniuk Dept. of Electrical and Computer Engineering Rice University, Houston, TX 77005 Abstract

More information

Optimum Rate Communication by Fast Sparse Superposition Codes

Optimum Rate Communication by Fast Sparse Superposition Codes Optimum Rate Communication by Fast Sparse Superposition Codes Andrew Barron Department of Statistics Yale University Joint work with Antony Joseph and Sanghee Cho Algebra, Codes and Networks Conference

More information

Code design: Computer search

Code design: Computer search Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

MMSE estimation and lattice encoding/decoding for linear Gaussian channels. Todd P. Coleman /22/02

MMSE estimation and lattice encoding/decoding for linear Gaussian channels. Todd P. Coleman /22/02 MMSE estimation and lattice encoding/decoding for linear Gaussian channels Todd P. Coleman 6.454 9/22/02 Background: the AWGN Channel Y = X + N where N N ( 0, σ 2 N ), 1 n ni=1 X 2 i P X. Shannon: capacity

More information

Coding into a source: an inverse rate-distortion theorem

Coding into a source: an inverse rate-distortion theorem Coding into a source: an inverse rate-distortion theorem Anant Sahai joint work with: Mukul Agarwal Sanjoy K. Mitter Wireless Foundations Department of Electrical Engineering and Computer Sciences University

More information

Low-density parity-check codes

Low-density parity-check codes Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,

More information

A Simple Encoding And Decoding Strategy For Stabilization Over Discrete Memoryless Channels

A Simple Encoding And Decoding Strategy For Stabilization Over Discrete Memoryless Channels A Simple Encoding And Decoding Strategy For Stabilization Over Discrete Memoryless Channels Anant Sahai and Hari Palaiyanur Dept. of Electrical Engineering and Computer Sciences University of California,

More information

Capacity of a Two-way Function Multicast Channel

Capacity of a Two-way Function Multicast Channel Capacity of a Two-way Function Multicast Channel 1 Seiyun Shin, Student Member, IEEE and Changho Suh, Member, IEEE Abstract We explore the role of interaction for the problem of reliable computation over

More information

Capacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information

Capacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information Capacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information Jialing Liu liujl@iastate.edu Sekhar Tatikonda sekhar.tatikonda@yale.edu Nicola Elia nelia@iastate.edu Dept. of

More information

Lecture 15: Thu Feb 28, 2019

Lecture 15: Thu Feb 28, 2019 Lecture 15: Thu Feb 28, 2019 Announce: HW5 posted Lecture: The AWGN waveform channel Projecting temporally AWGN leads to spatially AWGN sufficiency of projection: irrelevancy theorem in waveform AWGN:

More information

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes

Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu

More information

On the Duality of Gaussian Multiple-Access and Broadcast Channels

On the Duality of Gaussian Multiple-Access and Broadcast Channels On the Duality of Gaussian ultiple-access and Broadcast Channels Xiaowei Jin I. INTODUCTION Although T. Cover has been pointed out in [] that one would have expected a duality between the broadcast channel(bc)

More information

Structured Low-Density Parity-Check Codes: Algebraic Constructions

Structured Low-Density Parity-Check Codes: Algebraic Constructions Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu

More information

Competition and Cooperation in Multiuser Communication Environments

Competition and Cooperation in Multiuser Communication Environments Competition and Cooperation in Multiuser Communication Environments Wei Yu Electrical Engineering Department Stanford University April, 2002 Wei Yu, Stanford University Introduction A multiuser communication

More information

The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference

The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference Soheyl Gherekhloo, Anas Chaaban, and Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {soheyl.gherekhloo,

More information

Quasi-Cyclic Asymptotically Regular LDPC Codes

Quasi-Cyclic Asymptotically Regular LDPC Codes 2010 IEEE Information Theory Workshop - ITW 2010 Dublin Quasi-Cyclic Asymptotically Regular LDPC Codes David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, and Daniel J. Costello, Jr. Dept. of

More information

On Bit Error Rate Performance of Polar Codes in Finite Regime

On Bit Error Rate Performance of Polar Codes in Finite Regime On Bit Error Rate Performance of Polar Codes in Finite Regime A. Eslami and H. Pishro-Nik Abstract Polar codes have been recently proposed as the first low complexity class of codes that can provably achieve

More information

LDPC Codes. Slides originally from I. Land p.1

LDPC Codes. Slides originally from I. Land p.1 Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to

More information

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

High-dimensional graphical model selection: Practical and information-theoretic limits

High-dimensional graphical model selection: Practical and information-theoretic limits 1 High-dimensional graphical model selection: Practical and information-theoretic limits Martin Wainwright Departments of Statistics, and EECS UC Berkeley, California, USA Based on joint work with: John

More information

Accurate Calculation of Bit Error Rates in Optical Fiber Communications Systems

Accurate Calculation of Bit Error Rates in Optical Fiber Communications Systems Accurate Calculation of Bit Error Rates in Optical Fiber Communications Systems presented by Curtis R. Menyuk 1 Contributors Ronald Holzlöhner Ivan T. Lima, Jr. Amitkumar Mahadevan Brian S. Marks Joel

More information

Graph-based codes for flash memory

Graph-based codes for flash memory 1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background

More information

for some error exponent E( R) as a function R,

for some error exponent E( R) as a function R, . Capacity-achieving codes via Forney concatenation Shannon s Noisy Channel Theorem assures us the existence of capacity-achieving codes. However, exhaustive search for the code has double-exponential

More information

The PPM Poisson Channel: Finite-Length Bounds and Code Design

The PPM Poisson Channel: Finite-Length Bounds and Code Design August 21, 2014 The PPM Poisson Channel: Finite-Length Bounds and Code Design Flavio Zabini DEI - University of Bologna and Institute for Communications and Navigation German Aerospace Center (DLR) Balazs

More information

Error Exponent Region for Gaussian Broadcast Channels

Error Exponent Region for Gaussian Broadcast Channels Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

FEEDBACK does not increase the capacity of a discrete

FEEDBACK does not increase the capacity of a discrete 1 Sequential Differential Optimization of Incremental Redundancy Transmission Lengths: An Example with Tail-Biting Convolutional Codes Nathan Wong, Kasra Vailinia, Haobo Wang, Sudarsan V. S. Ranganathan,

More information

Making Error Correcting Codes Work for Flash Memory

Making Error Correcting Codes Work for Flash Memory Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging

More information