Communication, Computation, and Control: Through the Information Lens
|
|
- Felix Benson
- 5 years ago
- Views:
Transcription
1 Communication, Computation, and Control: Through the Information Lens Pulkit Grover Stanford University CMU, April 16, Acknowledgments: C2S2/Interconnect Focus Center (IFC) NSF Center for Science of Information (CSoI) 1 NSF-CCF (cyber-physical systems)
2 Flows of information in modern systems 2/33
3 Flows of information in modern systems 2/33
4 Flows of information in modern systems 2/33
5 Flows of information in modern systems 2/33
6 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M 3/33
7 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M 3/33
8 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M 2) Information flows in physical systems C w1 C w2 C w6 Plant C w3 C w5 C w4 3/33
9 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M 2) Information flows in physical systems C w1 C w2 C w6 Implicit channel Plant C w3 C w5 C w4 3/33
10 Talk outline: Understanding Invisible Information Flows 1) Information flows in circuits M Transmitter P T Channel Receiver M Traditional: Minimize P T Now: Minimize total power Fundamental limits, experimental results 2) Information flows in physical systems C w1 C w2 C w6 Implicit channel Plant C w3 C w5 C w4 3/33
11 Short-distances: Processing power can exceed transmit power! Short-distance communication at Gbps (e.g. indoor wireless, data-centers ethernet) Encoder PA LNA ADC Equalizer Decoder M 80 mw [1] 11 mw[4] 26 mw[2] 12 mw [1] 144 mw [3] Transmitter Receiver [1] Uncoded [Marcu et al '09] [2] 7-bit ADCs [Murmann '08] [3] (6,32)-LDPC [Zhang et al '10] [4] [Shin 09] 4/33
12 Short-distances: Processing power can exceed transmit power! Short-distance communication at Gbps (e.g. indoor wireless, data-centers ethernet) Encoder PA LNA ADC Equalizer Decoder M 80 mw [1] 11 mw[4] 26 mw[2] 12 mw [1] 144 mw [3] Transmitter Choosing a -efficient code? P total Receiver [1] Uncoded [Marcu et al '09] [2] 7-bit ADCs [Murmann '08] [3] (6,32)-LDPC [Zhang et al '10] [4] [Shin 09] 4/33
13 Short-distances: Processing power can exceed transmit power! Short-distance communication at Gbps (e.g. indoor wireless, data-centers ethernet) Encoder PA LNA ADC Equalizer Decoder M 80 mw [1] 11 mw[4] 26 mw[2] 12 mw [1] 144 mw [3] Transmitter Choosing a -efficient code? P total Receiver P total = P T + P enc + P dec [1] Uncoded [Marcu et al '09] [2] 7-bit ADCs [Murmann '08] [3] (6,32)-LDPC [Zhang et al '10] [4] [Shin 09] 4/33
14 Minimizing transmit power: Shannon s waterfall curves Goal: Rate M E P T R, error probability 5 fixed R, W, η P e D M C = W log path loss 1+ ηp T N 0 >R log (P ) 10 (Pe) e Shannon limit (Tx power) Total power (Watts) Transmit Total power (Watts) (watts) 5/33
15 Minimizing total power: Initial theoretical approaches M E P T D M 6/33
16 Minimizing total power: Initial theoretical approaches Black-box model of processing power M E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 6/33
17 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 6/33
18 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 0 T 6/33
19 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 0 T 6/33
20 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 0 T 6/33
21 Minimizing total power: Initial theoretical approaches Black-box model of processing power M Optimal burstiness E P T D M [Cui, Goldsmith, Bahai 05] [Massaad, Medard, Zheng 08] 0 T What are the greenest codes? 6/33
22 Green system = Capacity-code + Green implementation? Theory Implementation On the design of LDPC codes within db of the Shannon limit. [Chung, Forney, Richardson, Urbanke IT 01] A 47-Gbps LDPC decoder... (10 GBase-T) [Zhang, Anantharam, Wainwright, Nikolic JSSC 10] 7/33
23 Green system = Capacity-code + Green implementation? Theory Implementation On the design of LDPC codes within db of the Shannon limit. [Chung, Forney, Richardson, Urbanke IT 01] A 47-Gbps LDPC decoder... (10 GBase-T) [Zhang, Anantharam, Wainwright, Nikolic JSSC 10] Wireless LAN and 60 GHz band 7/33
24 Green system = Capacity-code + Green implementation? Theory Implementation On the design of LDPC codes within db of the Shannon limit. [Chung, Forney, Richardson, Urbanke IT 01] A 47-Gbps LDPC decoder... (10 GBase-T) [Zhang, Anantharam, Wainwright, Nikolic JSSC 10] Wireless LAN and 60 GHz band uncoded transmission! 7/33
25 What can the total power look like? Some experiments 8/33
26 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] 8/33
27 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) Shannon waterfall Power (Watts) 8/33
28 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) P total Power (Watts) R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33
29 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) P total Power (Watts) R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33
30 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) P total Power (Watts) R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE Bad code choice? 8/33
31 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) Power (Watts) Bad code choice? P total Bad implementations? R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33
32 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) Power (Watts) Bad code choice? Both? P total Bad implementations? R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33
33 What can the total power look like? Some experiments Circuit-simulation-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] log 10 (Pe) P T Shannon waterfall Regular LDPCs (3,4) (3,6) (4,8) (5,10) Power (Watts) Bad code choice? Both? P total Bad implementations? Neither? R = 7 Gbps W = 7 GHz path-loss coeff. = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encounter (Layout) Synopsis HSPICE 8/33
34 Fundamental limits on total power? M E P T D M 9/33
35 Fundamental limits on total power? M E P T D M log (P e ) 10 (Pe) fixed rate, distance Shannon limit (Tx power) Total power (Watts) Total power (watts) 9/33
36 Fundamental limits on total power? M E P T D M log (P e ) 10 (Pe) fixed rate, distance Shannon limit (Tx power) Total power (Watts) Total power (watts) 9/33
37 Fundamental limits on total power? M E P T D M 5 fixed rate, Total power behavior log (P e ) 10 (Pe) distance Shannon limit (Tx power) Total power (Watts) Total power (watts) 9/33
38 Fundamental limits on total power? M E P T D M log (P e ) 10 (Pe) fixed rate, distance Shannon limit (Tx power) Total power behavior this? Total power (Watts) Total power (watts) 9/33
39 Fundamental limits on total power? M E P T D M log (P e ) 10 (Pe) fixed rate, distance Shannon limit (Tx power) Total power behavior this?... or this? Total power (Watts) Total power (watts) 9/33
40 Fundamental limits on total power? M E P T D M Total power behavior 5 fixed rate, Questions for this talk: this? distance or this? 1) Must always diverge to infinity? log (P e ) 10 (Pe) P total 2) Should we operate close to capacity? Shannon limit (Tx power) 25 3) Can we use bounded? P T 30 4) What codes minimize? P total Total power (Watts) Total power (watts) 9/33
41 Our approach 10/33
42 Our approach Circuit Models 10/33
43 Comm. complexity Decentralized Estimation Our approach Circuit Models Network information theory Information flow in circuits 10/33
44 Comm. complexity Decentralized Estimation Our approach Circuit Models Network information theory Circuit power models 0 Information flow in circuits log 10 (Pe) Decoding power (Watts) Encoding/decoding power 10/33
45 Comm. complexity Decentralized Estimation Our approach Circuit Models Network information theory Circuit power models 0 Information flow in circuits log 10 (Pe) Decoding power (Watts) Encoding/decoding power log 10 (Pe) Shannon limit (Tx power) P total P T Tx power (Watts) Information theory (Transmit power) 10/33
46 Comm. complexity Decentralized Estimation Our approach Circuit Models Network information theory Circuit power models 0 Information flow in circuits log 10 (Pe) Decoding power (Watts) Encoding/decoding power log 10 (Pe) Shannon limit (Tx power) P total P T Tx power (Watts) Information theory (Transmit power) log 10 (Pe) P total 25 P T Ptotal x 10 5 Total Power (Watts) Fundamental bounds on total power 10/33
47 Obtaining fundamental limits: Main difficulty Code passing through channel Transmit power P T Models: AWGN fading... 11/33
48 Obtaining fundamental limits: Main difficulty Code passing through channel implementation (encoding/decoding) encoding/decoding power Models:?? Transmit power P T Models: AWGN fading... 11/33
49 Obtaining fundamental limits: Main difficulty Code passing through channel implementation (encoding/decoding) encoding/decoding power Models:?? Transmit power P T Models: AWGN fading... Need implementation models that are relevant and analyzable 11/33
50 A graphical model for circuit implementation M E P T D M Output nodes Helper nodes Input nodes VLSI model of computing [Thompson 80] - degree of each node at most α (e.g. 4) 12/33
51 A graphical model for circuit implementation M E P T D M Output nodes Helper nodes Input nodes VLSI model of computing [Thompson 80] - degree of each node at most α (e.g. 4) Channel model: Binary Symmetric Channel p ch p ch 1 p ch p ch p ch = Q ηpt N /33
52 Decoding complexity/power: Fundamental limits Theorem*[Grover, Woyach, Sahai ISIT 08, JSAC 11] # of clock-cycles, 1 log 1 τ log(α 1) log P e (C(P T ) R) 2 /V (P T )... for any code and any decoding algorithm. α : Max. node degree V (P T ) : channel dispersion * precise result for any P e and any gap appears in [Grover, Woyach, Sahai 11] 13/33
53 Decoding complexity: Proof Technique 14/33
54 Decoding complexity: Proof Technique Information-flow constrained by fan-out 14/33
55 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i 14/33
56 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 14/33
57 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 τ =2 14/33
58 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 τ =2 τ =3 14/33
59 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] τ =2 τ =3 14/33
60 Decoding complexity: Proof Technique Information-flow constrained by fan-out B i τ =1 Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] n nbd : number of nodes in decoding neighborhood τ =2 τ =3 14/33
61 P e e n nbd Decoding complexity: Proof Technique Information-flow constrained by fan-out Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] (C(P T ) R) 2 V (P T ) B i τ =1 n nbd : number of nodes in decoding neighborhood τ =2 τ =3 14/33
62 P e e n nbd Decoding complexity: Proof Technique Information-flow constrained by fan-out Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] (C(P T ) R) 2 V (P T ) τ B i τ =1 n nbd : number of nodes in decoding neighborhood 1 log(α 1) log(n nbd) τ =2 τ =3 14/33
63 P e e n nbd Decoding complexity: Proof Technique Information-flow constrained by fan-out Sphere-packing for decoding neighborhoods [Grover 07][Grover, Sahai 08][Grover, Woyach, Sahai 11] (C(P T ) R) 2 V (P T ) τ B i τ =1 n nbd : number of nodes in decoding neighborhood 1 log(α 1) log(n nbd) τ =2 τ =3 Theorem*[Grover, Woyach, Sahai ISIT 08, JSAC 11] # of clock-cycles,τ 1 log(α 1) log log 1 P e (C(P T ) R) 2 /V (P T ) 14/33
64 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle 15/33
65 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T P T + P decoding 15/33
66 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) 15/33
67 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) log 10 (Pe) Shannon limit (Tx power) P total P T Enode = 3 pj distance = 10 m fc = 60 GHz W = 3 GHz R = 1.5 Gbps Total power (Watts) 15/33
68 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) log 10 (Pe) Shannon limit (Tx power) P total P T Enode = 3 pj distance = 10 m fc = 60 GHz W = 3 GHz R = 1.5 Gbps Total power (Watts) 15/33
69 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) log 10 (Pe) Shannon limit (Tx power) P total P T Enode = 3 pj distance = 10 m fc = 60 GHz W = 3 GHz R = 1.5 Gbps Total power (Watts) 15/33
70 Node model: Fundamental bounds on total power Node model: each node consumes constant amount of energy per clock cycle P total =min P T min P T P T + P decoding P T + γlog log 1 P e (C(P T ) R) 2 /V (P T ) log 10 (Pe) Shannon limit (Tx power) P total P T Enode = 3 pj distance = 10 m fc = 60 GHz W = 3 GHz R = 1.5 Gbps Total power (Watts) Moral: do not operate too close to capacity! 15/33
71 Node model What codes are good? 16/33
72 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? 16/33
73 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Random block codes, ML decoding? 16/33
74 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? 16/33
75 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? 16/33
76 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? 16/33
77 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? Regular LDPCs, iterative decoding [Lentmaier 05][Grover, Woyach, Sahai JSAC 11] 16/33
78 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? Regular LDPCs, iterative decoding [Lentmaier 05][Grover, Woyach, Sahai JSAC 11] db 25 log 10 (Pe) Optimizing transmit power for (3,4) LDPC Lower bound on total power Total power for (3,4) LDPC, Gallager decoding 125 Shannon limit !"#$%&'"()*&+,$##-.&%"/ -0$%)1 Total power (Watts) 16/33
79 Node model What codes are good? Capacity-approaching LDPCs, iterative decoding? Convolutional codes, Viterbi decoding Random block codes, ML decoding? Polar codes, successive cancelation? Regular LDPCs, iterative decoding [Lentmaier 05][Grover, Woyach, Sahai JSAC 11] db 25 log 10 (Pe) Optimizing transmit power for (3,4) LDPC Lower bound on total power Total power for (3,4) LDPC, Gallager decoding Data-centers (10 GBASE-T): regular LDPC! 125 Shannon limit !"#$%&'"()*&+,$##-.&%"/ -0$%)1 Total power (Watts) 16/33
80 Talk outline Information flows: visible and invisible M E P T D M Traditional: Minimize P T Now: Minimize total (transmit + proc.) power Fundamental limits Node model: stay away from capacity regular LDPCs are order optimal 17/33
81 Talk outline Information flows: visible and invisible M E P T D M Traditional: Minimize P T Now: Minimize total (transmit + proc.) power Fundamental limits Node model: stay away from capacity regular LDPCs are order optimal Wire model: using bounded P T suboptimal 17/33
82 What did we expect from our experimental results? Experiment-based modeling of decoding power [Ganesan, Grover, Rabaey SiPS 11][Ganesan, Wen, Grover, Rabaey 12] P T Regular LDPCs (3,4) (3,6) (4,8) (5,10) P total R = 7 Gbps W = 7 GHz path-loss coefft = 3 d = 3 meters fc = 60 GHz STM CMOS 90 nm Cadence Encnter (Layout) Synopsis HSPICE /33
83 Wire model of power consumption 19/33
84 Wire model of power consumption 19/33
85 Wire model of power consumption Fourier Transform [Thompson 80] Power A wiresτ n = Ω n log n Similar results for sorting, boolean functions,... for implementing any algorithm. 19/33
86 Wire model of power consumption Fourier Transform [Thompson 80] Power A wiresτ n = Ω n log n Similar results for sorting, boolean functions,... for implementing any algorithm. Encoding/decoding complexity: [El Gamal et al. 84] A chip τ 2 Ω nr 2 log npe 19/33
87 Wire model: Fundamental limits on encoding/decoding power Theorem *[Grover, Goldsmith, Sahai Allerton 11; ISIT Sub. 12] log 1 Encoding/decoding Power Ω P e P T... for any code and any encoding/decoding algorithm. * precise result for any P e and any gap appears in [Grover, Goldsmith, Sahai 12] 20/33
88 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T 21/33
89 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T 5 log 10 (Pe) P total d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech x 10 5 Power (Watts) 21/33
90 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T 5 log 10 (Pe) P T P total d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech x 10 5 Power (Watts) 21/33
91 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T log 10 (Pe) P T P total 3 log 1 P e x 10 5 Power (Watts) d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech. 21/33
92 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T log 10 (Pe) P T P total 3 log 1 P e x 10 5 Power (Watts) P total with bounded P T d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech. 21/33
93 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T log 10 (Pe) P T P total 3 log 1 P e x 10 5 Power (Watts) P total with bounded P T log 1 P e d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech. 21/33
94 Wire model: Fundamental limits on on total power P total =min P T P T + P decoding +P encoding =minp T +2β P T log 1 P e P T log 10 (Pe) P T P total 3 log 1 P e x 10 5 Power (Watts) P total with bounded P T log 1 P e d = 0.5 m path-loss coeff = 2 Capacitance = 1 ff/um CMOS 90 nm tech. Moral: Bounded P T is suboptimal 21/33
95 Suboptimality of bounded transmit power: Experimental results 22/33
96 Information flows in circuits: Summary M E D M P T Information needs to flow at the encoder and decoder (mixing) (de-mixing) Fundamental limits: Traditional: Operate close to capacity Total power perspective: Node model: stay away from capacity Wire model: use unbounded P T No assumptions on the code structure 23/33
97 Looking forward: Greenest codes for wireless? Grand goal: Code/encoder/decoder triples within bounded dbs of the optimal. 5 log (P ) 10 (Pe) e Shannon limit (Tx power) Total power (Watts) Transmit Total power power (Watts) (watts) 24/33
98 log 10 (Pe) Looking forward: Greenest codes for wireless? Grand goal: Code/encoder/decoder triples within bounded dbs of the optimal. Distance (meters) /33
99 log 10 (Pe) Looking forward: Greenest codes for wireless? Grand goal: Code/encoder/decoder triples within bounded dbs of the optimal. 5-5 (3,6), girth-6, 1-bit msg Distance (meters) (4,8), girth-6, 1-bit msg (3,6), girth-6, 2-bit msg (3,6), girth-8, 1-bit msg (3,6)-LDPC girth-8, 2-bit msg R = 7 Gbps W = 7 GHz path-loss coeff = 3 fc = 60 GHz STM CMOS 90 nm Layout:Cadence Enctr Synopsis HSPICE [Ganesan, Grover, Rabaey 11][Ganesan, Wen, Grover, Rabaey, Goldsmith 12] 24/33
100 log 10 (Pe) Looking forward: Greenest codes for wireless? Grand goal: Code/encoder/decoder triples within bounded dbs of the optimal. 5-5 (3,6), Uncoded girth-6, transmission (4,8), girth-6, 1-bit msg 1-bit msg Distance (meters) (3,6), girth-6, 2-bit msg (3,6), girth-8, 1-bit msg (3,6)-LDPC girth-8, 2-bit msg R = 7 Gbps W = 7 GHz path-loss coeff = 3 fc = 60 GHz STM CMOS 90 nm Layout:Cadence Enctr Synopsis HSPICE [Ganesan, Grover, Rabaey 11][Ganesan, Wen, Grover, Rabaey, Goldsmith 12] 24/33
101 Looking forward: Green data-center communication !2 10!4 FER/BER log 10 (Pe) Traditional view Code choice (10-Gbase-T): (6,32) - RS-LDPC, length 2048 Total-power perspective Distance (meters) FER/BER 10!6 10!8 10!10 10!12 10!14 10 iterations 20 iterations 50 iterations 100 iterations 200 iterations Eb/No (db) SNR (db) /33
102 Looking forward: Green data-center communication !2 10!4 FER/BER log 10 (Pe) Traditional view Code choice (10-Gbase-T): (6,32) - RS-LDPC, length 2048 Total-power perspective Distance (meters) FER/BER 10!6 10!8 10!10 10!12 10!14 10 iterations 20 iterations 50 iterations 100 iterations 200 iterations Eb/No (db) SNR (db) (6,32) - RS-LDPC length /33
103 Looking forward: Green data-center communication !2 10!4 FER/BER log 10 (Pe) Traditional view Code choice (10-Gbase-T): (6,32) - RS-LDPC, length 2048 Total-power perspective Distance (meters) FER/BER 10!6 10!8 10!10 10!12 10!14 10 iterations 20 iterations 50 iterations 100 iterations 200 iterations Eb/No (db) SNR (db) /33
104 Looking forward: Green data-center communication !2 10!4 FER/BER log 10 (Pe) Traditional view Code choice (10-Gbase-T): (6,32) - RS-LDPC, length 2048 Total-power perspective Distance (meters) FER/BER 10!6 10!8 10!10 10!12 10!14 10 iterations 20 iterations 50 iterations 100 iterations 200 iterations Eb/No (db) SNR (db) Code-choice must depend on distance 25/33
105 Looking forward: Energy costs of communication 26/33
106 Looking forward: Energy costs of communication Other models of computing - e.g. nodes/wires can sleep 26/33
107 Looking forward: Energy costs of communication Other models of computing - e.g. nodes/wires can sleep Multiple simultaneously transmitting links - Code-choice must depend on distance, density [Grover, Woyach, Sahai JSAC 11] Tx r Rx θ d 26/33
108 Looking forward: Energy costs of communication Other models of computing - e.g. nodes/wires can sleep Multiple simultaneously transmitting links - Code-choice must depend on distance, density [Grover, Woyach, Sahai JSAC 11] Tx r Rx θ d Other components of system power - Equalizer [Grover, Sahai, Park 11] M Encoder PA LNA ADC Equalizer Decoder M 26/33
109 Talk outline 1) Information flows in circuits M Transmitter P T Channel Receiver Communicating and processing information 2) Information flows in physical systems M Communicating and Using information C w1 C w 2 Implicit communication C w 6 Implicit channel Plant C w 3 Witsenhausen s counterexample - approximately optimal solutions C w 5 C w 4 Beyond the counterexample 27/33
110 Looking forward: Implicit information flows in control C w1 C w 2 C w 6 Plant C w 3 C w 5 C w 4 28/33
111 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 C w 6 Plant C w 3 C w 5 C w 4 28/33
112 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 C w 6 Plant C w 3 C w 5 C w 4 28/33
113 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4 28/33
114 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4 28/33
115 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4... semantic aspects of communication are irrelevant to the engineering problem. [Shannon 48] 28/33
116 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4 [comm theory] deals with an essentially simple problem, because the transmission of information is considered independently of its use. [Witsenhausen 71] 28/33
117 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory C w 6 Plant C w 3 C w 5 C w 4 28/33
118 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? C w 6 Plant C w 3 C w 5 C w 4 28/33
119 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Plant C w 3 C w 5 C w 4 28/33
120 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Implicit channel Plant C w 3 C w 5 C w 4 28/33
121 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Implicit channel Plant C w 5 C w 4 C w 3 Dual role of actions control communicate 28/33
122 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Implicit channel Plant C w 5 C w 4 C w 3 Dual role of actions control communicate x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) 28/33
123 Looking forward: Implicit information flows in control M E P T D Communication theory M C w1 C w 2 u Plant Control agent y Control theory Message? a choice C w 6 Implicit channel Plant C w 5 C w 4 C w 3 Dual role of actions control communicate x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) 28/33
124 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] 29/33
125 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] 29/33
126 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] 29/33
127 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] Nonlinear strategies can outperform linear strategies [Witsenhausen 68] 29/33
128 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] Nonlinear strategies can outperform linear strategies [Witsenhausen 68] Nonconvex [Witsenhausen 68], Intractable (NP-hard) [Papadimitriou, Tsitsiklis 86] 29/33
129 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian [Witsenhausen 68] Nonlinear strategies can outperform linear strategies [Witsenhausen 68] Nonconvex [Witsenhausen 68], Intractable (NP-hard) [Papadimitriou, Tsitsiklis 86] Semi-exhaustive searches [Deng, Ho 99] [Baglietto et al. 01] [Lee, Lau, Ho 01][Li, Marden, Shamma 09] [Karlsson et al. 10] 29/33
130 Breakdown of traditional theory: Witsenhausen s counterexample x 1 x 2 + x C u 1 + C 1 2 u 2 z y N (0, 1) x 0 N (0, σ0) 2 min k 2 E u E x 2 2 Linear, Quadratic, Gaussian Nonlinear strategies can outperform linear strategies [Witsenhausen 68] Nonconvex [Witsenhausen 68], Intractable (NP-hard) [Papadimitriou, Tsitsiklis 86] Semi-exhaustive searches [Deng, Ho 99] [Baglietto et al. 01] [Lee, Lau, Ho 01][Li, Marden, Shamma 09] [Karlsson et al. 10] x 1 x 1 [Witsenhausen 68] x 0 x 0 29/33
131 Our approach: understanding information flows to obtain fundamental limits on cost 30/33
132 Our approach: understanding information flows to obtain fundamental limits on cost x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) Original problem [Witsenhausen 68] 30/33
133 Our approach: understanding information flows to obtain fundamental limits on cost x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) Original problem [Witsenhausen 68] E u 1 x 0 + z x 1 y x 1 + D Identify information-flow [Grover, Sahai 08] 30/33
134 Our approach: understanding information flows to obtain fundamental limits on cost x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) Original problem [Witsenhausen 68] E u 1 x 0 + z x 1 y x 1 + D E b 1 b 2.b 3 b 4 b 5 x 0 x 1 y + u + D 1 b 1 b 2.b 3 b 4 b 5 b 1 b 2. z 0.z 1 z 2 z 3 u 2 = x 1 Understand information-flow: Binary version [Avestimehr et al. 08][Grover, Sahai 09] Identify information-flow [Grover, Sahai 08] 30/33
135 Our approach: understanding information flows to obtain fundamental limits on cost x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) x m C 1 C 2 u m 1 x m 1 z m u m 2 x m 2 Original problem [Witsenhausen 68] E u 1 x 0 + z x 1 y x 1 + D Asymptotic vector version [Grover, Sahai 08] E b 1 b 2.b 3 b 4 b 5 x 0 x 1 y + u + D 1 b 1 b 2.b 3 b 4 b 5 b 1 b 2. z 0.z 1 z 2 z 3 u 2 = x 1 Understand information-flow: Binary version [Avestimehr et al. 08][Grover, Sahai 09] Identify information-flow [Grover, Sahai 08] 30/33
136 Our approach: understanding information flows to obtain fundamental limits on cost Large-deviations/ sphere-packing [Grover, Park, Sahai 09, 12] x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) x m C 1 C 2 u m 1 x m 1 z m u m 2 x m 2 Original problem [Witsenhausen 68] E u 1 x 0 + z x 1 y x 1 + D Asymptotic vector version [Grover, Sahai 08] E b 1 b 2.b 3 b 4 b 5 x 0 x 1 y + u + D 1 b 1 b 2.b 3 b 4 b 5 b 1 b 2. z 0.z 1 z 2 z 3 u 2 = x 1 Understand information-flow: Binary version [Avestimehr et al. 08][Grover, Sahai 09] Identify information-flow [Grover, Sahai 08] 30/33
137 Approx. solutions to Witsenhausen s counterexample x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) min k 2 E u E x 2 2 Theorem [Grover, Park, Sahai IEEE Tran Auto Cont 12] For all (k, σ 0 ), Upper bound Lower bound 8 Upper bound Scalar quantization Lower bound Info-theory + Large deviations First approximately-optimal solutions to Witsenhausen s counterexample 31/33
138 Approx. solutions to Witsenhausen s counterexample min k 2 E u E x 2 2 Upper bound x 1 x 2 + x u 1 + u 2 C 1 C 2 z y N (0, 1) Scalar quantization Theorem [Grover, Park, Sahai IEEE Tran Auto Cont 12] For all (k, σ 0 ), x 1 Watermarking ( dirty-paper coding) Upper bound Lower bound 8 Lower bound Info-theory + Large deviations First approximately-optimal solutions to Witsenhausen s counterexample x 0 31/33
139 Looking forward: Information-flows in Cyber-Physical Systems 32/33
140 Looking forward: Information-flows in Cyber-Physical Systems C2 C w w1 y 1 y 2 u 2 u 1 System 32/33
141 Looking forward: Information-flows in Cyber-Physical Systems C2 C w w1 y 1 u 2 System 32/33
142 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 u 2 System 32/33
143 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 System 32/33
144 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 actuator System 32/33
145 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 actuator System 32/33
146 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 actuator System 32/33
147 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 sensor u 2 actuator System ν t + Unit delay x t z t C 1 + C s 2 x t sensor t actuator Communicating a evolving state [Bansal, Basar 89][Wong, Brockett 90][Tatikonda, Mitter 01] [Sahai, Mitter 06] [Sinopoli et al. 04]... 32/33
148 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 y 2 sensor u 1 u 2 System actuator ν t + Unit delay x t z t C 1 + C s 2 x t sensor t actuator Communicating a evolving state [Bansal, Basar 89][Wong, Brockett 90][Tatikonda, Mitter 01] [Sahai, Mitter 06] [Sinopoli et al. 04]... 32/33
149 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 y 2 sensor u 1 u 2 System actuator ν t + Unit delay x t z t C 1 + C s 2 x t sensor t actuator Communicating a evolving state [Bansal, Basar 89][Wong, Brockett 90][Tatikonda, Mitter 01] [Sahai, Mitter 06] [Sinopoli et al. 04]... ν t + x t Unit Delay + x t x C 1 + t C 2 u 1 z [Grover, Sahai 10] R ex [Grover 12] 32/33
150 Looking forward: Information-flows in Cyber-Physical Systems External channel C2 C w w1 y 1 y 2 sensor u 1 u 2 System actuator ν t + Unit delay x t z t C 1 + C s 2 x t sensor t actuator Communicating a evolving state [Bansal, Basar 89][Wong, Brockett 90][Tatikonda, Mitter 01] [Sahai, Mitter 06] [Sinopoli et al. 04]... ν t + x t Unit Delay + x t x C 1 + t C 2 u 1 z [Grover, Sahai 10] R ex [Grover 12] 32/33
151 Summary: Understanding hidden information-flows is useful Information flows in circuits Information flows in physical systems M E P T D M C w1 C w2 C w6 Implicit channel Plant C w3 C w5 C w4 Information flow in computing: fundamental bounds on total power Implicit information flows: approximately-optimal solutions 33/33
152 Backup slides 34/33
153 35/33
154 The appropriate approximations in the two bounds log 10 (Pe) Shannon limit (Tx power) P total P T Node model log 10 (Pe) P total Wire model Total power (Watts) Total power (Watts) x 10 5 Total Power power (Watts) (Watts) Dispersion approximation E sp (R) Sphere-packing exponent Approximation far from capacity 0 R C 36/33
155 Total power minimizing density Density (links/m 2 ) Optimal code (if decoding were free) r = 1m θ = 0 W = 3 GHz α = 3 P e = R = 1.5 Gbps data Outer bound with E node = 3 pj Uncoded transmission Extrapolated performance of the decoder of [Zhang et al.] Total Power (watts) 37/33
156 Wireless information transfer i v s s r s M i 2 Load l L 1 L r 2 l c l i 38/33
157 Wireless information transfer i v s s r s M i 2 Load l L 1 L r 2 l c l i 38/33
158 Wireless information transfer i v s s r s M i 2 Load l L 1 L r 2 l c l i z + v o + - v 38/33
159 Optimal information transfer strategy? 39/33
160 Optimal information transfer strategy? N(f)/η(f) Shannon strategy : waterfilling frequency (Hz) in log scale 39/33
161 Optimal information transfer strategy? C(P avail ) = max P 1,...,P n s.t. np P i P avail i=1 n i=1 log ( 1+ η ip i N ) N(f)/η(f) Shannon strategy : waterfilling frequency (Hz) in log scale 39/33
162 Optimal information transfer strategy? C(P avail ) = max P 1,...,P n s.t. np P i P avail i=1 n i=1 log ( 1+ η ip i N ) N(f)/η(f) Shannon strategy : waterfilling frequency (Hz) in log scale 39/33
163 Secure Communication Using Inductive Coupling!"#$%&'()*%+$,-'".*!"#$%&"'"()*+&,-"$$*-#%$"$*.")%(/(0* /$0"&$1*)"&0".-)1)"&*!"#$%&"'"()*+&,-"$$*-#%$"$* 1#2"3,&'*-,44#+$"* 5#2"$.&,++"&*.")"-)/,(*)6&,%06* $+"-)&%'*$"($/(0* 5#2"$.&,++"&*.")"-)/,(*)6&,%06* +67$/-$* 8(3,&'#)/,(*."$)&%-)/,(*)6&,%06* -#+#-/)79#++&,#-6/(0*-,."$*#(.*$)&,(0* -,(2"&$"*,3*-6#(("4*-,./(0*)6",&"'*!"#$%&'()*+),*#'-&.'/$&'0"* 8(3,&'#)/,(*."$)&%-)/,(*)6&,%06* +67$/-$* :%#()%'*;"7*./$)&/<%)/,(* 40/33
164 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D 41/33
165 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D x 0 b 1 b 2 b 3 b 4 b 5 41/33
166 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D b 1 b 2 x x 1 0 D x 1 b 3 b 4 b 5 41/33
167 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D b 1 b 2 x x 1 0 D x 1 b 3 b 4 b 5 z 2 41/33
168 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D x 0 b 1 b 2 b 3 b 4 b 5 x 1 D x 1 E z 2 41/33
169 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D x 0 b 1 b 2 b 3 b 4 b 5 x 1 D x 1 E z 2 R ex = 2 41/33
170 A deterministic abstraction x 0 + x 1 + x x 0 z E R ex + z N (0, 1) D u 1 u 2 = x 1 k 2 E u + E (x 2 ) 2 1 x 1 x 1 E u 1 u 2 + x 1 R ex + D x 0 b 1 b 2 b 3 b 4 b 5 x 1 E u 1 z 2 D x 1 R ex = 2 41/33
171 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 D x 1 E u 1 z 2 R ex = 2 42/33
172 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 D x 1 E u 1 z 2 R ex = 2 42/33
173 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 D x 1 E u 1 z 2 R ex = 2 42/33
174 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 E u 1 z 2 R ex = 2 42/33
175 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 E u 1 z 2 R ex = 2 42/33
176 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 E u 1 z 2 R ex = 2 42/33
177 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 E u 1 z 2 R ex = 2 b 3 b 4 42/33
178 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 b 3 b 4 E u 1 z 2 R ex = 2 b 3 b 4 42/33
179 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 b 3 b 4 E u 1 z 2 R ex = 2 b 3 b 4 42/33
180 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 x 1 x 0 b 1 b 2 D x 1 b 3 b 4 E u 1 b 5 b 3 b 4 z 2 R ex = 2 42/33
181 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 42/33
182 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 42/33
183 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 42/33
184 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information 42/33
185 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information 42/33
186 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information 42/33
187 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information Implicit channel: high order bits 42/33
188 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information Implicit channel: high order bits 42/33
189 Strategy for deterministic abstraction b 1 b 2 b 3 b 4 b 5 E x 1 x 0 b 1 b 2 D x 1 u 1 z 2 R ex = 2 b 3 b 4 0 b 5 b 3 b 4 Explicit channel: fine information Implicit channel: high order bits binning! 42/33
190 Infinitely better than the natural strategies!!" # Nonlinear +,-./-0123/45./6/7>3 implicit,./ /6/73?@127/-ab linear explicit [Martins '06] " 3:3; 6< =33:3!" # SNR ex = P ex = σ 2 0 k = 10 2 Average cost cost!" $ +,-./-0123/45./6/ /6/7 Our synergistic strategy ratio diverges to infinity!!"" #"" $"" %"" &"" '"" ("" )"" *"" σ 0" 43/33
191 Is the counterexample relevant? x C u 1 + C 1 2 u 2 z + x 2 min max x 0,z k 2 u x 2 2 x z2 Induced norm: linear strategies optimal! [Rotkowitz 06] Witsenhausen s LQG formulation: more assumptions harder! Q. Why consider the quadratic norm? [John Doyle, Paths ahead, MIT, 2009] 44/33
192 Induced norm formulation too conservative? + x 2 x u 1 + u 2 C 1 C 2 z min max x 0,z k 2 u x 2 2 x z2 Makes no assumptions: noise completely arbitrary, adversarial! Usually we know something about the noise, e.g. typical values, or bounds + x 2 x u 1 + u 2 C 1 C 2 z ( a, a) say z ( a, a) A quadratic cost min max x 0,z ( a,a) k2 u x 2 2 Quantization (signaling) : can outperform linear by an unbounded factor is approximately optimal! 45/33
193 Induced norm Which is a right norm? + x 2 x u 1 + u 2 C 1 C 2 z Quadratic norm min max x 0,z k 2 u x 2 2 x z2 min max x 0,z ( a,a) k2 u x 2 2 Induced norm: cost normalized by size of state and noise. In many practical cases, small perturbations and small noises do cost less! Quadratic norm captures how much large perturbations/noises hurt Moral: signal even in adversarial situations 46/33
Towards a theory of information for energy-efficient communication
Towards a theory of information for energy-efficient communication Pulkit Grover Wireless Foundations and Berkeley Wireless Research Center, UC Berkeley with Anant Sahai, Hari Palaiyanur, Kristen Woyach
More informationTime-division multiplexing for green broadcasting
Time-division multiplexing for green broadcasting Pulkit Grover and Anant Sahai Wireless Foundations, Department of EECS University of California at Berkeley Email: {pulkit, sahai} @ eecs.berkeley.edu
More informationInformation Structures, the Witsenhausen Counterexample, and Communicating Using Actions
Information Structures, the Witsenhausen Counterexample, and Communicating Using Actions Pulkit Grover, Carnegie Mellon University Abstract The concept of information-structures in decentralized control
More informationLower Bounds on the Graphical Complexity of Finite-Length LDPC Codes
Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International
More informationWitsenhausen s counterexample and its links with multimedia security problems
Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey Outline Introduction
More informationInformation Embedding meets Distributed Control
Information Embedding meets Distributed Control Pulkit Grover, Aaron B Wagner and Anant Sahai Abstract We consider the problem of information embedding where the encoder modifies a white Gaussian host
More informationAn Introduction to Low Density Parity Check (LDPC) Codes
An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,
More informationPulkit Grover and Anant Sahai*
Int. J. Systems, Control and Communications, Vol. Witsenhausen s counterexample as Assisted Interference Suppression Pulkit Grover and Anant Sahai* Wireless Foundations, Department of EECS, University
More informationStabilization over discrete memoryless and wideband channels using nearly memoryless observations
Stabilization over discrete memoryless and wideband channels using nearly memoryless observations Anant Sahai Abstract We study stabilization of a discrete-time scalar unstable plant over a noisy communication
More informationSparse Regression Codes for Multi-terminal Source and Channel Coding
Sparse Regression Codes for Multi-terminal Source and Channel Coding Ramji Venkataramanan Yale University Sekhar Tatikonda Allerton 2012 1 / 20 Compression with Side-Information X Encoder Rate R Decoder
More informationCommunication constraints and latency in Networked Control Systems
Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega
More informationA Deterministic Annealing Approach to Witsenhausen s Counterexample
A Deterministic Annealing Approach to Witsenhausen s Counterexample Mustafa Mehmetoglu Dep. of Electrical-Computer Eng. UC Santa Barbara, CA, US Email: mehmetoglu@ece.ucsb.edu Emrah Akyol Dep. of Electrical
More informationCommunication by Regression: Achieving Shannon Capacity
Communication by Regression: Practical Achievement of Shannon Capacity Department of Statistics Yale University Workshop Infusing Statistics and Engineering Harvard University, June 5-6, 2011 Practical
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationOne-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information
One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information ZOU Sheng and Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan University of
More informationPerformance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels
Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering
More informationConstruction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor
Construction of low complexity Array based Quasi Cyclic Low density parity check (QC-LDPC) codes with low error floor Pravin Salunkhe, Prof D.P Rathod Department of Electrical Engineering, Veermata Jijabai
More informationInformation Theory Meets Game Theory on The Interference Channel
Information Theory Meets Game Theory on The Interference Channel Randall A. Berry Dept. of EECS Northwestern University e-mail: rberry@eecs.northwestern.edu David N. C. Tse Wireless Foundations University
More informationIterative Encoding of Low-Density Parity-Check Codes
Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA
More informationMMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING
MMSE DECODING FOR ANALOG JOINT SOURCE CHANNEL CODING USING MONTE CARLO IMPORTANCE SAMPLING Yichuan Hu (), Javier Garcia-Frias () () Dept. of Elec. and Comp. Engineering University of Delaware Newark, DE
More informationSingle-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes
Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi kurkoski@ice.uec.ac.jp Dept. of Information and Communications Engineering
More informationCoding Techniques for Data Storage Systems
Coding Techniques for Data Storage Systems Thomas Mittelholzer IBM Zurich Research Laboratory /8 Göttingen Agenda. Channel Coding and Practical Coding Constraints. Linear Codes 3. Weight Enumerators and
More informationPractical Polar Code Construction Using Generalised Generator Matrices
Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:
More informationRCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths
RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University
More informationEnergy State Amplification in an Energy Harvesting Communication System
Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu
More informationLecture 2. Capacity of the Gaussian channel
Spring, 207 5237S, Wireless Communications II 2. Lecture 2 Capacity of the Gaussian channel Review on basic concepts in inf. theory ( Cover&Thomas: Elements of Inf. Theory, Tse&Viswanath: Appendix B) AWGN
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationGaussian Relay Channel Capacity to Within a Fixed Number of Bits
Gaussian Relay Channel Capacity to Within a Fixed Number of Bits Woohyuk Chang, Sae-Young Chung, and Yong H. Lee arxiv:.565v [cs.it] 23 Nov 2 Abstract In this paper, we show that the capacity of the threenode
More informationCommunication by Regression: Sparse Superposition Codes
Communication by Regression: Sparse Superposition Codes Department of Statistics, Yale University Coauthors: Antony Joseph and Sanghee Cho February 21, 2013, University of Texas Channel Communication Set-up
More informationSecrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View
Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference
More informationGraph-based Codes for Quantize-Map-and-Forward Relaying
20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,
More informationThe connection between information theory and networked control
The connection between information theory and networked control Anant Sahai based in part on joint work with students: Tunc Simsek, Hari Palaiyanur, and Pulkit Grover Wireless Foundations Department of
More informationData Rate Theorem for Stabilization over Time-Varying Feedback Channels
Data Rate Theorem for Stabilization over Time-Varying Feedback Channels Workshop on Frontiers in Distributed Communication, Sensing and Control Massimo Franceschetti, UCSD (joint work with P. Minero, S.
More informationDelay, feedback, and the price of ignorance
Delay, feedback, and the price of ignorance Anant Sahai based in part on joint work with students: Tunc Simsek Cheng Chang Wireless Foundations Department of Electrical Engineering and Computer Sciences
More informationModern Coding Theory. Daniel J. Costello, Jr School of Information Theory Northwestern University August 10, 2009
Modern Coding Theory Daniel J. Costello, Jr. Coding Research Group Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556 2009 School of Information Theory Northwestern University
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationTransmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations
Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National
More informationCommon Information. Abbas El Gamal. Stanford University. Viterbi Lecture, USC, April 2014
Common Information Abbas El Gamal Stanford University Viterbi Lecture, USC, April 2014 Andrew Viterbi s Fabulous Formula, IEEE Spectrum, 2010 El Gamal (Stanford University) Disclaimer Viterbi Lecture 2
More informationControl Capacity. Gireeja Ranade and Anant Sahai UC Berkeley EECS
Control Capacity Gireeja Ranade and Anant Sahai UC Berkeley EECS gireeja@eecs.berkeley.edu, sahai@eecs.berkeley.edu Abstract This paper presents a notion of control capacity that gives a fundamental limit
More informationConstructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach
Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,
More informationCapacity of the Discrete Memoryless Energy Harvesting Channel with Side Information
204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener
More informationA vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation
A vector version of Witsenhausen s counterexample: Towards convergence of control, communication and computation Pulkit Grover and Anant Sahai Wireless Foundations, Department of EECS University of California
More informationSome Goodness Properties of LDA Lattices
Some Goodness Properties of LDA Lattices Shashank Vatedka and Navin Kashyap {shashank,nkashyap}@eceiiscernetin Department of ECE Indian Institute of Science Bangalore, India Information Theory Workshop
More informationRECENT advances in technology have led to increased activity
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 49, NO 9, SEPTEMBER 2004 1549 Stochastic Linear Control Over a Communication Channel Sekhar Tatikonda, Member, IEEE, Anant Sahai, Member, IEEE, and Sanjoy Mitter,
More informationJoint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation
Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation Chongbin Xu, Peng Wang, Zhonghao Zhang, and Li Ping City University of Hong Kong 1 Outline Background Mutual Information
More informationThe Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel
The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department
More informationEncoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels
Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels LEI BAO, MIKAEL SKOGLUND AND KARL HENRIK JOHANSSON IR-EE- 26: Stockholm 26 Signal Processing School of Electrical Engineering
More informationLecture 18: Gaussian Channel
Lecture 18: Gaussian Channel Gaussian channel Gaussian channel capacity Dr. Yao Xie, ECE587, Information Theory, Duke University Mona Lisa in AWGN Mona Lisa Noisy Mona Lisa 100 100 200 200 300 300 400
More informationNONLINEAR CONTROL with LIMITED INFORMATION. Daniel Liberzon
NONLINEAR CONTROL with LIMITED INFORMATION Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign Plenary talk, 2 nd Indian Control
More informationLecture 4. Capacity of Fading Channels
1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February
More informationAchieving Flexibility in LDPC Code Design by Absorbing Set Elimination
Achieving Flexibility in LDPC Code Design by Absorbing Set Elimination Jiajun Zhang, Jiadong Wang, Shayan Garani Srinivasa, Lara Dolecek Department of Electrical Engineering, University of California,
More informationControl over finite capacity channels: the role of data loss, delay and signal-to-noise limitations
Control over finite capacity channels: the role of data loss, delay and signal-to-noise limitations Plant DEC COD Channel Luca Schenato University of Padova Control Seminars, Berkeley, 2014 University
More informationTitle. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels
Title Equal Gain Beamforming in Rayleigh Fading Channels Author(s)Tsai, Shang-Ho Proceedings : APSIPA ASC 29 : Asia-Pacific Signal Citationand Conference: 688-691 Issue Date 29-1-4 Doc URL http://hdl.handle.net/2115/39789
More informationIntroduction to Low-Density Parity Check Codes. Brian Kurkoski
Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code
More informationQUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS
QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS Parvathinathan Venkitasubramaniam, Gökhan Mergen, Lang Tong and Ananthram Swami ABSTRACT We study the problem of quantization for
More informationThe Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks
The Concept of Soft Channel Encoding and its Applications in Wireless Relay Networks Gerald Matz Institute of Telecommunications Vienna University of Technology institute of telecommunications Acknowledgements
More informationHalf-Duplex Gaussian Relay Networks with Interference Processing Relays
Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras
More informationarxiv:cs/ v2 [cs.it] 1 Oct 2006
A General Computation Rule for Lossy Summaries/Messages with Examples from Equalization Junli Hu, Hans-Andrea Loeliger, Justin Dauwels, and Frank Kschischang arxiv:cs/060707v [cs.it] 1 Oct 006 Abstract
More informationError Floors of LDPC Coded BICM
Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 2007 Error Floors of LDPC Coded BICM Aditya Ramamoorthy Iowa State University, adityar@iastate.edu
More informationQUANTIZED SYSTEMS AND CONTROL. Daniel Liberzon. DISC HS, June Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign
QUANTIZED SYSTEMS AND CONTROL Daniel Liberzon Coordinated Science Laboratory and Dept. of Electrical & Computer Eng., Univ. of Illinois at Urbana-Champaign DISC HS, June 2003 HYBRID CONTROL Plant: u y
More informationOptimal Power Control for LDPC Codes in Block-Fading Channels
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 7, JULY 2011 1759 Optimal Power Control for LDPC Codes in Block-Fading Channels Gottfried Lechner, Khoa D. Nguyen, Albert Guillén i Fàbregas, and Lars
More informationChapter 4: Continuous channel and its capacity
meghdadi@ensil.unilim.fr Reference : Elements of Information Theory by Cover and Thomas Continuous random variable Gaussian multivariate random variable AWGN Band limited channel Parallel channels Flat
More informationInteractions of Information Theory and Estimation in Single- and Multi-user Communications
Interactions of Information Theory and Estimation in Single- and Multi-user Communications Dongning Guo Department of Electrical Engineering Princeton University March 8, 2004 p 1 Dongning Guo Communications
More informationE Demystifying the Witsenhausen Counterexample
» ASK THE EXPERTS E Demystifying the Witsenhausen Counterexample Q. In my graduate-level controls course, the instructor mentioned the Witsenhausen counterexample, which seems to have something to do with
More informationEncoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels
Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels Lei Bao, Mikael Skoglund and Karl Henrik Johansson Department of Signals, Sensors and Systems, Royal Institute of Technology,
More informationDegrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel
/33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,
More informationAdvances in Error Control Strategies for 5G
Advances in Error Control Strategies for 5G Jörg Kliewer The Elisha Yegal Bar-Ness Center For Wireless Communications And Signal Processing Research 5G Requirements [Nokia Networks: Looking ahead to 5G.
More informationJoint Equalization and Decoding for Nonlinear Two-Dimensional Intersymbol Interference Channels with Application to Optical Storage
Joint Equalization and Decoding for Nonlinear Two-Dimensional Intersymbol Interference Channels with Application to Optical Storage 1 arxiv:cs/0509008v1 [cs.it] 4 Sep 2005 Naveen Singla and Joseph A. O
More informationBlind phase/frequency synchronization with low-precision ADC: a Bayesian approach
Blind phase/frequency synchronization with low-precision ADC: a Bayesian approach Aseem Wadhwa, Upamanyu Madhow Department of ECE, UCSB 1/26 Modern Communication Receiver Architecture Analog Digital TX
More informationThe Capacity Region of the Gaussian Cognitive Radio Channels at High SNR
The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR 1 Stefano Rini, Daniela Tuninetti and Natasha Devroye srini2, danielat, devroye @ece.uic.edu University of Illinois at Chicago Abstract
More informationLDPC Decoding Strategies for Two-Dimensional Magnetic Recording
SUBMITTED TO IEEE GLOBAL COMMUNICATIONS CONFERENCE, HONOLULU, HI, USA, NOV. 3-DEC. 4 29, 1 LDPC Decoding Strategies for Two-Dimensional Magnetic Recording Anantha Raman Krishnan, Rathnakumar Radhakrishnan,
More informationSum Capacity of General Deterministic Interference Channel with Channel Output Feedback
Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback Achaleshwar Sahai Department of ECE, Rice University, Houston, TX 775. as27@rice.edu Vaneet Aggarwal Department of
More informationVariable-Rate Universal Slepian-Wolf Coding with Feedback
Variable-Rate Universal Slepian-Wolf Coding with Feedback Shriram Sarvotham, Dror Baron, and Richard G. Baraniuk Dept. of Electrical and Computer Engineering Rice University, Houston, TX 77005 Abstract
More informationOptimum Rate Communication by Fast Sparse Superposition Codes
Optimum Rate Communication by Fast Sparse Superposition Codes Andrew Barron Department of Statistics Yale University Joint work with Antony Joseph and Sanghee Cho Algebra, Codes and Networks Conference
More informationCode design: Computer search
Code design: Computer search Low rate codes Represent the code by its generator matrix Find one representative for each equivalence class of codes Permutation equivalences? Do NOT try several generator
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationMMSE estimation and lattice encoding/decoding for linear Gaussian channels. Todd P. Coleman /22/02
MMSE estimation and lattice encoding/decoding for linear Gaussian channels Todd P. Coleman 6.454 9/22/02 Background: the AWGN Channel Y = X + N where N N ( 0, σ 2 N ), 1 n ni=1 X 2 i P X. Shannon: capacity
More informationCoding into a source: an inverse rate-distortion theorem
Coding into a source: an inverse rate-distortion theorem Anant Sahai joint work with: Mukul Agarwal Sanjoy K. Mitter Wireless Foundations Department of Electrical Engineering and Computer Sciences University
More informationLow-density parity-check codes
Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,
More informationA Simple Encoding And Decoding Strategy For Stabilization Over Discrete Memoryless Channels
A Simple Encoding And Decoding Strategy For Stabilization Over Discrete Memoryless Channels Anant Sahai and Hari Palaiyanur Dept. of Electrical Engineering and Computer Sciences University of California,
More informationCapacity of a Two-way Function Multicast Channel
Capacity of a Two-way Function Multicast Channel 1 Seiyun Shin, Student Member, IEEE and Changho Suh, Member, IEEE Abstract We explore the role of interaction for the problem of reliable computation over
More informationCapacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information
Capacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information Jialing Liu liujl@iastate.edu Sekhar Tatikonda sekhar.tatikonda@yale.edu Nicola Elia nelia@iastate.edu Dept. of
More informationLecture 15: Thu Feb 28, 2019
Lecture 15: Thu Feb 28, 2019 Announce: HW5 posted Lecture: The AWGN waveform channel Projecting temporally AWGN leads to spatially AWGN sufficiency of projection: irrelevancy theorem in waveform AWGN:
More informationAdaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes
Adaptive Cut Generation for Improved Linear Programming Decoding of Binary Linear Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego, La Jolla, CA 9093, U Email:{ericzhang, psiegel}@ucsd.edu
More informationOn the Duality of Gaussian Multiple-Access and Broadcast Channels
On the Duality of Gaussian ultiple-access and Broadcast Channels Xiaowei Jin I. INTODUCTION Although T. Cover has been pointed out in [] that one would have expected a duality between the broadcast channel(bc)
More informationStructured Low-Density Parity-Check Codes: Algebraic Constructions
Structured Low-Density Parity-Check Codes: Algebraic Constructions Shu Lin Department of Electrical and Computer Engineering University of California, Davis Davis, California 95616 Email:shulin@ece.ucdavis.edu
More informationCompetition and Cooperation in Multiuser Communication Environments
Competition and Cooperation in Multiuser Communication Environments Wei Yu Electrical Engineering Department Stanford University April, 2002 Wei Yu, Stanford University Introduction A multiuser communication
More informationThe Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference
The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference Soheyl Gherekhloo, Anas Chaaban, and Aydin Sezgin Chair of Communication Systems RUB, Germany Email: {soheyl.gherekhloo,
More informationQuasi-Cyclic Asymptotically Regular LDPC Codes
2010 IEEE Information Theory Workshop - ITW 2010 Dublin Quasi-Cyclic Asymptotically Regular LDPC Codes David G. M. Mitchell, Roxana Smarandache, Michael Lentmaier, and Daniel J. Costello, Jr. Dept. of
More informationOn Bit Error Rate Performance of Polar Codes in Finite Regime
On Bit Error Rate Performance of Polar Codes in Finite Regime A. Eslami and H. Pishro-Nik Abstract Polar codes have been recently proposed as the first low complexity class of codes that can provably achieve
More informationLDPC Codes. Slides originally from I. Land p.1
Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to
More informationIntroduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.
Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information
More informationHigh-dimensional graphical model selection: Practical and information-theoretic limits
1 High-dimensional graphical model selection: Practical and information-theoretic limits Martin Wainwright Departments of Statistics, and EECS UC Berkeley, California, USA Based on joint work with: John
More informationAccurate Calculation of Bit Error Rates in Optical Fiber Communications Systems
Accurate Calculation of Bit Error Rates in Optical Fiber Communications Systems presented by Curtis R. Menyuk 1 Contributors Ronald Holzlöhner Ivan T. Lima, Jr. Amitkumar Mahadevan Brian S. Marks Joel
More informationGraph-based codes for flash memory
1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background
More informationfor some error exponent E( R) as a function R,
. Capacity-achieving codes via Forney concatenation Shannon s Noisy Channel Theorem assures us the existence of capacity-achieving codes. However, exhaustive search for the code has double-exponential
More informationThe PPM Poisson Channel: Finite-Length Bounds and Code Design
August 21, 2014 The PPM Poisson Channel: Finite-Length Bounds and Code Design Flavio Zabini DEI - University of Bologna and Institute for Communications and Navigation German Aerospace Center (DLR) Balazs
More informationError Exponent Region for Gaussian Broadcast Channels
Error Exponent Region for Gaussian Broadcast Channels Lihua Weng, S. Sandeep Pradhan, and Achilleas Anastasopoulos Electrical Engineering and Computer Science Dept. University of Michigan, Ann Arbor, MI
More informationFEEDBACK does not increase the capacity of a discrete
1 Sequential Differential Optimization of Incremental Redundancy Transmission Lengths: An Example with Tail-Biting Convolutional Codes Nathan Wong, Kasra Vailinia, Haobo Wang, Sudarsan V. S. Ranganathan,
More informationMaking Error Correcting Codes Work for Flash Memory
Making Error Correcting Codes Work for Flash Memory Part I: Primer on ECC, basics of BCH and LDPC codes Lara Dolecek Laboratory for Robust Information Systems (LORIS) Center on Development of Emerging
More information