-
Training-Based Equivalence Relations in Large-Scale Quantized Communication Systems
Authors:
Kang Gao,
Xiangbo Meng,
J. Nicholas Laneman,
Jonathan Chisum,
Ralf Bendlin,
Aditya Chopra,
Bertrand Hochwald
Abstract:
We show that a quantized large-scale system with unknown parameters and training signals can be analyzed by examining an equivalent system with known parameters by modifying the signal power and noise variance in a prescribed manner. Applications to training in wireless communications and signal processing are shown. In wireless communications, we show that the optimal number of training signals c…
▽ More
We show that a quantized large-scale system with unknown parameters and training signals can be analyzed by examining an equivalent system with known parameters by modifying the signal power and noise variance in a prescribed manner. Applications to training in wireless communications and signal processing are shown. In wireless communications, we show that the optimal number of training signals can be significantly smaller than the number of transmitting elements. Similar conclusions can be drawn when considering the symbol error rate in signal processing applications, as long as the number of receiving elements is large enough. We show that a linear analysis of training in a quantized system can be accurate when the thermal noise is high or the system is operating near its saturation rate.
△ Less
Submitted 4 August, 2021; v1 submitted 2 December, 2020;
originally announced December 2020.
-
Training for Channel Estimation in Nonlinear Multi-Antenna Transceivers
Authors:
Kang Gao,
J. Nicholas Laneman,
N. J. Estes,
Jonathan Chisum,
Bertrand Hochwald
Abstract:
Recent efforts to obtain high data rates in wireless systems have focused on what can be achieved in systems that have nonlinear or coarsely quantized transceiver architectures. Estimating the channel in such a system is challenging because the nonlinearities distort the channel estimation process. It is therefore of interest to determine how much training is needed to estimate the channel suffici…
▽ More
Recent efforts to obtain high data rates in wireless systems have focused on what can be achieved in systems that have nonlinear or coarsely quantized transceiver architectures. Estimating the channel in such a system is challenging because the nonlinearities distort the channel estimation process. It is therefore of interest to determine how much training is needed to estimate the channel sufficiently well so that the channel estimate can be used during data communication. We provide a way to determine how much training is needed by deriving a lower bound on the achievable rate in a training-based scheme that can be computed and analyzed even when the number of antennas is very large. This lower bound can be tight, especially at high SNR. One conclusion is that the optimal number of training symbols may paradoxically be smaller than the number of transmitters for systems with coarsely-quantized transceivers. We show how the training time can be strongly dependent on the number of receivers, and give an example where doubling the number of receivers reduces the training time by about 37 percent.
△ Less
Submitted 14 December, 2019;
originally announced December 2019.
-
Anywhere Decoding: Low-Overhead Uplink Interference Management for Wireless Networks
Authors:
Hamed Pezeshki,
Masoumeh Sadeghi,
Martin Haenggi,
J. Nicholas Laneman
Abstract:
Inter-cell interference (ICI) is one of the major performance-limiting factors in the context of modern cellular systems. To tackle ICI, coordinated multi-point (CoMP) schemes have been proposed as a key technology for next-generation mobile communication systems. Although CoMP schemes offer promising theoretical gains, their performance could degrade significantly because of practical issues such…
▽ More
Inter-cell interference (ICI) is one of the major performance-limiting factors in the context of modern cellular systems. To tackle ICI, coordinated multi-point (CoMP) schemes have been proposed as a key technology for next-generation mobile communication systems. Although CoMP schemes offer promising theoretical gains, their performance could degrade significantly because of practical issues such as limited backhaul. To address this issue, we explore a novel uplink interference management scheme called anywhere decoding, which requires exchanging just a few bits of information per coding interval among the base stations (BSs). In spite of the low overhead of anywhere decoding, we observe considerable gains in the outage probability performance of cell-edge users, compared to no cooperation between BSs. Additionally, asymptotic results of the outage probability for high-SNR regimes demonstrate that anywhere decoding schemes achieve full spatial diversity through multiple decoding opportunities, and they are within 1.5 dB of full cooperation.
△ Less
Submitted 28 March, 2019;
originally announced March 2019.
-
Capacity of Multiple One-Bit Transceivers in a Rayleigh Environment
Authors:
Kang Gao,
J. Nicholas Laneman,
Bertrand Hochwald
Abstract:
We analyze the channel capacity of a system with a large number of one-bit transceivers in a classical Rayleigh environment with perfect channel information at the receiver. With $M$ transmitters and $N=αM$ receivers, we derive an expression of the capacity per transmitter $\mathcal{C}$, where $\mathcal{C}\leq\min(1,α)$, as a function of $α$ and signal-to-noise ratio (SNR) $ρ$, when $M\to\infty$.…
▽ More
We analyze the channel capacity of a system with a large number of one-bit transceivers in a classical Rayleigh environment with perfect channel information at the receiver. With $M$ transmitters and $N=αM$ receivers, we derive an expression of the capacity per transmitter $\mathcal{C}$, where $\mathcal{C}\leq\min(1,α)$, as a function of $α$ and signal-to-noise ratio (SNR) $ρ$, when $M\to\infty$. We show that our expression is a good approximation for small $M$, and provide simple approximations of $\mathcal{C}$ for various ranges of $α$ and SNR $ρ$. We conclude that at high SNR, $\mathcal{C}$ reaches its upper limit of one only if the ratio $α>1.24$. Expressions for determining when $\mathcal{C}$ "saturates" as a function of $α$ and $ρ$ are given.
△ Less
Submitted 21 April, 2018;
originally announced April 2018.
-
Beamforming with Multiple One-Bit Wireless Transceivers
Authors:
Kang Gao,
J. Nicholas Laneman,
Bertrand Hochwald
Abstract:
Classical beamforming techniques rely on highly linear transmitters and receivers to allow phase-coherent combining at the transmitter and receiver. The transmitter uses beamforming to steer signal power towards the receiver, and the receiver uses beamforming to gather and coherently combine the signals from multiple receiver antennas. When the transmitters and receivers are instead constrained fo…
▽ More
Classical beamforming techniques rely on highly linear transmitters and receivers to allow phase-coherent combining at the transmitter and receiver. The transmitter uses beamforming to steer signal power towards the receiver, and the receiver uses beamforming to gather and coherently combine the signals from multiple receiver antennas. When the transmitters and receivers are instead constrained for power and cost reasons to be non-linear one-bit devices, the potential advantages and performance metrics associated with beamforming are not as well understood. We define beamforming at the transmitter as a codebook design problem to maximize the minimum distance between codewords. We define beamforming at the receiver as the maximum likelihood detector of the transmitted codeword. We show that beamforming with one-bit transceivers is a constellation design problem, and that we can come within a few dB SNR of the capacity attained by linear transceivers.
△ Less
Submitted 13 February, 2018;
originally announced February 2018.
-
Smart Wireless Communication is the Cornerstone of Smart Infrastructures
Authors:
Mary Ann Weitnauer,
Jennifer Rexford,
Nicholas Laneman,
Matthieu Bloch,
Santiago Griljava,
Catherine Ross,
Gee-Kung Chang
Abstract:
Emerging smart infrastructures, such as Smart City, Smart Grid, Smart Health, and Smart Transportation, need smart wireless connectivity. However, the requirements of these smart infrastructures cannot be met with today's wireless networks. A new wireless infrastructure is needed to meet unprecedented needs in terms of agility, reliability, security, scalability, and partnerships.
We are at the…
▽ More
Emerging smart infrastructures, such as Smart City, Smart Grid, Smart Health, and Smart Transportation, need smart wireless connectivity. However, the requirements of these smart infrastructures cannot be met with today's wireless networks. A new wireless infrastructure is needed to meet unprecedented needs in terms of agility, reliability, security, scalability, and partnerships.
We are at the beginning of a revolution in how we live with technology, resulting from a convergence of machine learning (ML), the Internet-of-Things (IoT), and robotics. A smart infrastructure monitors and processes a vast amount of data, collected from a dense and wide distribution of heterogeneous sensors (e.g., the IoT), as well as from web applications like social media. In real time, using machine learning, patterns and relationships in the data over space, time, and application can be detected and predictions can be made; on the basis of these, resources can be managed, decisions can be made, and devices can be actuated to optimize metrics, such as cost, health, safety, and convenience.
△ Less
Submitted 22 June, 2017;
originally announced June 2017.
-
Beamforming Codebook Compensation for Beam Squint with Channel Capacity Constraint
Authors:
Mingming Cai,
J. Nicholas Laneman,
Bertrand Hochwald
Abstract:
Analog beamforming with phased arrays is a promising technique for 5G wireless communication in millimeter wave bands. A beam focuses on a small range of angles of arrival or departure and corresponds to a set of fixed phase shifts across frequency due to practical hardware constraints. In switched beamforming, a discrete codebook consisting of multiple beams is used to cover a larger angle range.…
▽ More
Analog beamforming with phased arrays is a promising technique for 5G wireless communication in millimeter wave bands. A beam focuses on a small range of angles of arrival or departure and corresponds to a set of fixed phase shifts across frequency due to practical hardware constraints. In switched beamforming, a discrete codebook consisting of multiple beams is used to cover a larger angle range. However, for sufficiently large bandwidth, the gain provided by the phased array is frequency dependent even if the radiation pattern of the antenna elements is frequency independent, an effect called beam squint. This paper shows that the beam squint reduces channel capacity of a uniform linear array (ULA). The beamforming codebook is designed to compensate for the beam squint by imposing a channel capacity constraint. For example, our codebook design algorithm can improve the channel capacity by 17.8% for a ULA with 64 antennas operating at bandwidth of 2.5 GHz and carrier frequency of 73 GHz. Analysis and numerical examples suggest that a denser codebook is required to compensate for the beam squint compared to the case without beam squint. Furthermore, the effect of beam squint is shown to increase as bandwidth increases, and the beam squint limits the bandwidth given the number of antennas in the array.
△ Less
Submitted 12 May, 2017;
originally announced May 2017.
-
Wideband Distributed Spectrum Sharing with Multichannel Immediate Multiple Access
Authors:
Mingming Cai,
J. Nicholas Laneman
Abstract:
This paper describes a radio architecture for distributed spectrum sharing of multiple channels among secondary users (SUs) in a wide band of frequencies and a localized area. A novel Multichannel Immediate Multiple Access (MIMA) physical layer is developed such that each SU can monitor all the channels simultaneously for incoming signals and achieve fast rendezvous within the multiple channels. T…
▽ More
This paper describes a radio architecture for distributed spectrum sharing of multiple channels among secondary users (SUs) in a wide band of frequencies and a localized area. A novel Multichannel Immediate Multiple Access (MIMA) physical layer is developed such that each SU can monitor all the channels simultaneously for incoming signals and achieve fast rendezvous within the multiple channels. The spectrum utilized by an SU pair can be changed dynamically based upon spectrum sensing at the transmitter and tracking synchronization and control messages at the receiver. Although information about the number of active SUs can be used to improve the spectrum sharing efficiency, the improvement is small relative to the cost of obtaining such information. Therefore, the architecture adopts Multichannel Carrier Sense Multiple Access (CSMA) for medium access control regardless of the number of active SUs. A prototype implementation of the architecture has been developed using an advanced software defined radio (SDR) platform. System tests demonstrate that the spectrum sharing efficiency of the prototype is close to an upper bound if the signal-to-noise ratio (SNR) is sufficiently high. Among other practical issues, imaged interference caused by hardware IQ imbalance limits system performance. In the prototype, the MIMA is based on an LTE waveform. Therefore, the spectrum sharing radio can be potentially applied to the 3.5 GHz radar band for Citizens Broadband Radio Service (CBRS).
△ Less
Submitted 8 February, 2017;
originally announced February 2017.
-
Beampattern-Based Tracking for Millimeter Wave Communication Systems
Authors:
Kang Gao,
Mingming Cai,
Ding Nie,
Bertrand Hochwald,
J. Nicholas Laneman,
Huang Huang,
Kunpeng Liu
Abstract:
We present a tracking algorithm to maintain the communication link between a base station (BS) and a mobile station (MS) in a millimeter wave (mmWave) communication system, where antenna arrays are used for beamforming in both the BS and MS. Downlink transmission is considered, and the tracking is performed at the MS as it moves relative to the BS. Specifically, we consider the case that the MS ro…
▽ More
We present a tracking algorithm to maintain the communication link between a base station (BS) and a mobile station (MS) in a millimeter wave (mmWave) communication system, where antenna arrays are used for beamforming in both the BS and MS. Downlink transmission is considered, and the tracking is performed at the MS as it moves relative to the BS. Specifically, we consider the case that the MS rotates quickly due to hand movement. The algorithm estimates the angle of arrival (AoA) by using variations in the radiation pattern of the beam as a function of this angle. Numerical results show that the algorithm achieves accurate beam alignment when the MS rotates in a wide range of angular speeds. For example, the algorithm can support angular speeds up to 800 degrees per second when tracking updates are available every 10 ms.
△ Less
Submitted 15 December, 2016;
originally announced December 2016.
-
RadioHound: A Pervasive Sensing Network for Sub-6 GHz Dynamic Spectrum Monitoring
Authors:
Nikolaus Kleber,
Jonathan Chisum,
Aaron Striegel,
Bertrand Hochwald,
Abbas Termos,
J. Nicholas Laneman,
Zuohui Fu,
John Merritt
Abstract:
We design a custom spectrum sensing network, called RadioHound, capable of tuning from 25 MHz to 6 GHz, which covers nearly all widely-deployed wireless activity. We describe the system hardware and network infrastructure in detail with a view towards driving the cost, size, and power usage of the sensors as low as possible. The system estimates the spatial variation of radio-frequency power from…
▽ More
We design a custom spectrum sensing network, called RadioHound, capable of tuning from 25 MHz to 6 GHz, which covers nearly all widely-deployed wireless activity. We describe the system hardware and network infrastructure in detail with a view towards driving the cost, size, and power usage of the sensors as low as possible. The system estimates the spatial variation of radio-frequency power from an unknown random number of sources. System performance is measured by computing the mean square error against a simulated radio-frequency environment. We find that the system performance depends heavily on the deployment density of the sensors. Consequently, we derive an expression for the sensor density as a function of environmental characteristics and confidence in measurement quality.
△ Less
Submitted 19 October, 2016;
originally announced October 2016.
-
Effect of Wideband Beam Squint on Codebook Design in Phased-Array Wireless Systems
Authors:
Mingming Cai,
Kang Gao,
Ding Nie,
Bertrand Hochwald,
J. Nicholas Laneman,
Huang Huang,
Kunpeng Liu
Abstract:
Analog beamforming with phased arrays is a promising technique for 5G wireless communication at millimeter wave frequencies. Using a discrete codebook consisting of multiple analog beams, each beam focuses on a certain range of angles of arrival or departure and corresponds to a set of fixed phase shifts across frequency due to practical hardware considerations. However, for sufficiently large ban…
▽ More
Analog beamforming with phased arrays is a promising technique for 5G wireless communication at millimeter wave frequencies. Using a discrete codebook consisting of multiple analog beams, each beam focuses on a certain range of angles of arrival or departure and corresponds to a set of fixed phase shifts across frequency due to practical hardware considerations. However, for sufficiently large bandwidth, the gain provided by the phased array is actually frequency dependent, which is an effect called beam squint, and this effect occurs even if the radiation pattern of the antenna elements is frequency independent. This paper examines the nature of beam squint for a uniform linear array (ULA) and analyzes its impact on codebook design as a function of the number of antennas and system bandwidth normalized by the carrier frequency. The criterion for codebook design is to guarantee that each beam's minimum gain for a range of angles and for all frequencies in the wideband system exceeds a target threshold, for example 3 dB below the array's maximum gain. Analysis and numerical examples suggest that a denser codebook is required to compensate for beam squint. For example, 54% more beams are needed compared to a codebook design that ignores beam squint for a ULA with 32 antennas operating at a carrier frequency of 73 GHz and bandwidth of 2.5 GHz. Furthermore, beam squint with this design criterion limits the bandwidth or the number of antennas of the array if the other one is fixed.
△ Less
Submitted 22 September, 2016; v1 submitted 11 September, 2016;
originally announced September 2016.
-
Intermittent Communication
Authors:
Mostafa Khoshnevisan,
J Nicholas Laneman
Abstract:
We formulate a model for intermittent communication that can capture bursty transmissions or a sporadically available channel, where in either case the receiver does not know a priori when the transmissions will occur. Focusing on the point-to-point case, we develop a decoding structure, decoding from pattern detection, and its achievable rate for such communication scenarios. Decoding from patter…
▽ More
We formulate a model for intermittent communication that can capture bursty transmissions or a sporadically available channel, where in either case the receiver does not know a priori when the transmissions will occur. Focusing on the point-to-point case, we develop a decoding structure, decoding from pattern detection, and its achievable rate for such communication scenarios. Decoding from pattern detection first detects the locations of codeword symbols and then uses them to decode. We introduce the concept of partial divergence and study some of its properties in order to obtain stronger achievability results. As the system becomes more intermittent, the achievable rates decrease due to the additional uncertainty about the positions of the codeword symbols at the decoder. Additionally, we provide upper bounds on the capacity of binary noiseless intermittent communication with the help of a genie-aided encoder and decoder. The upper bounds imply a tradeoff between the capacity and the intermittency rate of the communication system, even if the receive window scales linearly with the codeword length.
△ Less
Submitted 17 March, 2017; v1 submitted 4 December, 2013;
originally announced December 2013.
-
A Finite-Blocklength Perspective on Gaussian Multi-Access Channels
Authors:
Ebrahim MolavianJazi,
J. Nicholas Laneman
Abstract:
Motivated by the growing application of wireless multi-access networks with stringent delay constraints, we investigate the Gaussian multiple access channel (MAC) in the finite blocklength regime. Building upon information spectrum concepts, we develop several non-asymptotic inner bounds on channel coding rates over the Gaussian MAC with a given finite blocklength, positive average error probabili…
▽ More
Motivated by the growing application of wireless multi-access networks with stringent delay constraints, we investigate the Gaussian multiple access channel (MAC) in the finite blocklength regime. Building upon information spectrum concepts, we develop several non-asymptotic inner bounds on channel coding rates over the Gaussian MAC with a given finite blocklength, positive average error probability, and maximal power constraints. Employing Central Limit Theorem (CLT) approximations, we also obtain achievable second-order coding rates for the Gaussian MAC based on an explicit expression for its dispersion matrix. We observe that, unlike the pentagon shape of the asymptotic capacity region, the second-order region has a curved shape with no sharp corners.
A main emphasis of the paper is to provide a new perspective on the procedure of handling input cost constraints for tight achievability proofs. Contrary to the complicated achievability techniques in the literature, we show that with a proper choice of input distribution, tight bounds can be achieved via the standard random coding argument and a modified typicality decoding. In particular, we prove that codebooks generated randomly according to independent uniform distributions on the respective "power shells" perform far better than both independent and identically distributed (i.i.d.) Gaussian inputs and TDMA with power control. Interestingly, analogous to an error exponent result of Gallager, the resulting achievable region lies roughly halfway between that of the i.i.d. Gaussian inputs and that of a hypothetical "sum-power shell" input. However, dealing with such a non-i.i.d. input requires additional analysis such as a new change of measure technique and application of a Berry-Esseen CLT for functions of random variables.
△ Less
Submitted 9 September, 2013;
originally announced September 2013.
-
Strong Secrecy from Channel Resolvability
Authors:
Matthieu R. Bloch,
J. Nicholas Laneman
Abstract:
We analyze physical-layer security based on the premise that the coding mechanism for secrecy over noisy channels is tied to the notion of channel resolvability. Instead of considering capacity-based constructions, which associate to each message a sub-code that operates just below the capacity of the eavesdropper's channel, we consider channel-resolvability-based constructions, which associate to…
▽ More
We analyze physical-layer security based on the premise that the coding mechanism for secrecy over noisy channels is tied to the notion of channel resolvability. Instead of considering capacity-based constructions, which associate to each message a sub-code that operates just below the capacity of the eavesdropper's channel, we consider channel-resolvability-based constructions, which associate to each message a sub-code that operates just above the resolvability of the eavesdropper's channel. Building upon the work of Csiszar and Hayashi, we provide further evidence that channel resolvability is a powerful and versatile coding mechanism for secrecy by developing results that hold for strong secrecy metrics and arbitrary channels.
Specifically, we show that at least for symmetric wiretap channels, random capacity-based constructions fail to achieve the strong secrecy capacity while channel-resolvability-based constructions achieve it. We then leverage channel resolvability to establish the secrecy-capacity region of arbitrary broadcast channels with confidential messages and a cost constraint for strong secrecy metrics. Finally, we specialize our results to study the secrecy capacity of wireless channels with perfect channel state information, mixed channels and compound channels with receiver Channel State Information (CSI), as well as the secret-key capacity of source models for secret-key agreement. By tying secrecy to channel resolvability, we obtain achievable rates for strong secrecy metrics with simple proofs.
△ Less
Submitted 6 September, 2013; v1 submitted 26 May, 2011;
originally announced May 2011.
-
Cooperative Relaying with State Available Non-Causally at the Relay
Authors:
Abdellatif Zaidi,
Shiva Prasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a three-terminal state-dependent relay channel with the channel state noncausally available at only the relay. Such a model may be useful for designing cooperative wireless networks with some terminals equipped with cognition capabilities, i.e., the relay in our setup. In the discrete memoryless (DM) case, we establish lower and upper bounds on channel capacity. The lower bound is ob…
▽ More
We consider a three-terminal state-dependent relay channel with the channel state noncausally available at only the relay. Such a model may be useful for designing cooperative wireless networks with some terminals equipped with cognition capabilities, i.e., the relay in our setup. In the discrete memoryless (DM) case, we establish lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme at the relay that uses a combination of codeword splitting, Gel'fand-Pinsker binning, and decode-and-forward relaying. The upper bound improves upon that obtained by assuming that the channel state is available at the source, the relay, and the destination. For the Gaussian case, we also derive lower and upper bounds on the capacity. The lower bound is obtained by a coding scheme at the relay that uses a combination of codeword splitting, generalized dirty paper coding, and decode-and-forward relaying; the upper bound is also better than that obtained by assuming that the channel state is available at the source, the relay, and the destination. In the case of degraded Gaussian channels, the lower bound meets with the upper bound for some special cases, and, so, the capacity is obtained for these cases. Furthermore, in the Gaussian case, we also extend the results to the case in which the relay operates in a half-duplex mode.
△ Less
Submitted 24 November, 2009;
originally announced November 2009.
-
Multiaccess Channels with State Known to One Encoder: Another Case of Degraded Message Sets
Authors:
Abdellatif Zaidi,
Shiva Prasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a two-user state-dependent multiaccess channel in which only one of the encoders is informed, non-causally, of the channel states. Two independent messages are transmitted: a common message transmitted by both the informed and uninformed encoders, and an individual message transmitted by only the uninformed encoder. We derive inner and outer bounds on the capacity region of this mode…
▽ More
We consider a two-user state-dependent multiaccess channel in which only one of the encoders is informed, non-causally, of the channel states. Two independent messages are transmitted: a common message transmitted by both the informed and uninformed encoders, and an individual message transmitted by only the uninformed encoder. We derive inner and outer bounds on the capacity region of this model in the discrete memoryless case as well as the Gaussian case. Further, we show that the bounds for the Gaussian case are tight in some special cases.
△ Less
Submitted 8 June, 2009;
originally announced June 2009.
-
Multihop Diversity in Wideband OFDM Systems: The Impact of Spatial Reuse and Frequency Selectivity
Authors:
Ozgur Oyman,
J. Nicholas Laneman
Abstract:
The goal of this paper is to establish which practical routing schemes for wireless networks are most suitable for wideband systems in the power-limited regime, which is, for example, a practically relevant mode of operation for the analysis of ultrawideband (UWB) mesh networks. For this purpose, we study the tradeoff between energy efficiency and spectral efficiency (known as the power-bandwidt…
▽ More
The goal of this paper is to establish which practical routing schemes for wireless networks are most suitable for wideband systems in the power-limited regime, which is, for example, a practically relevant mode of operation for the analysis of ultrawideband (UWB) mesh networks. For this purpose, we study the tradeoff between energy efficiency and spectral efficiency (known as the power-bandwidth tradeoff) in a wideband linear multihop network in which transmissions employ orthogonal frequency-division multiplexing (OFDM) modulation and are affected by quasi-static, frequency-selective fading. Considering open-loop (fixed-rate) and closed-loop (rate-adaptive) multihop relaying techniques, we characterize the impact of routing with spatial reuse on the statistical properties of the end-to-end conditional mutual information (conditioned on the specific values of the channel fading parameters and therefore treated as a random variable) and on the energy and spectral efficiency measures of the wideband regime. Our analysis particularly deals with the convergence of these end-to-end performance measures in the case of large number of hops, i.e., the phenomenon first observed in \cite{Oyman06b} and named as ``multihop diversity''. Our results demonstrate the realizability of the multihop diversity advantages in the case of routing with spatial reuse for wideband OFDM systems under wireless channel effects such as path-loss and quasi-static frequency-selective multipath fading.
△ Less
Submitted 14 July, 2008;
originally announced July 2008.
-
Cooperative Relaying with State Available at the Relay
Authors:
Abdellatif Zaidi,
Shivaprasad Kotagiri,
J. Nicholas Laneman,
Luc Vandendorpe
Abstract:
We consider a state-dependent full-duplex relay channel with the state of the channel non-causally available at only the relay. In the framework of cooperative wireless networks, some specific terminals can be equipped with cognition capabilities, i.e, the relay in our model. In the discrete memoryless (DM) case, we derive lower and upper bounds on channel capacity. The lower bound is obtained b…
▽ More
We consider a state-dependent full-duplex relay channel with the state of the channel non-causally available at only the relay. In the framework of cooperative wireless networks, some specific terminals can be equipped with cognition capabilities, i.e, the relay in our model. In the discrete memoryless (DM) case, we derive lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme at the relay that consists in a combination of codeword splitting, Gel'fand-Pinsker binning, and a decode-and-forward scheme. The upper bound is better than that obtained by assuming that the channel state is available at the source and the destination as well. For the Gaussian case, we also derive lower and upper bounds on channel capacity. The lower bound is obtained by a coding scheme which is based on a combination of codeword splitting and Generalized dirty paper coding. The upper bound is also better than that obtained by assuming that the channel state is available at the source, the relay, and the destination. The two bounds meet, and so give the capacity, in some special cases for the degraded Gaussian case.
△ Less
Submitted 8 September, 2008; v1 submitted 29 November, 2007;
originally announced November 2007.
-
Variations on Information Embedding in Multiple Access and Broadcast Channels
Authors:
ShivaPrasad Kotagiri,
J. Nicholas Laneman
Abstract:
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversible IE and reversible IE, depending upon whether or not the host, as well as the message, is recovered at the decoder. In irreversible IE, only the embedded message is recovered at the decoder, and in reversible IE, both…
▽ More
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversible IE and reversible IE, depending upon whether or not the host, as well as the message, is recovered at the decoder. In irreversible IE, only the embedded message is recovered at the decoder, and in reversible IE, both the message and the host are recovered at the decoder. This paper considers combinations of irreversible and reversible IE in multiple access channels (MAC) and physically degraded broadcast channels (BC).
△ Less
Submitted 17 November, 2007;
originally announced November 2007.
-
Outage-Efficient Downlink Transmission Without Transmit Channel State Information
Authors:
Wenyi Zhang,
Shivaprasad Kotagiri,
J. Nicholas Laneman
Abstract:
This paper investigates downlink transmission over a quasi-static fading Gaussian broadcast channel (BC), to model delay-sensitive applications over slowly time-varying fading channels. System performance is characterized by outage achievable rate regions. In contrast to most previous work, here the problem is studied under the key assumption that the transmitter only knows the probability distr…
▽ More
This paper investigates downlink transmission over a quasi-static fading Gaussian broadcast channel (BC), to model delay-sensitive applications over slowly time-varying fading channels. System performance is characterized by outage achievable rate regions. In contrast to most previous work, here the problem is studied under the key assumption that the transmitter only knows the probability distributions of the fading coefficients, but not their realizations. For scalar-input channels, two coding schemes are proposed. The first scheme is called blind dirty paper coding (B-DPC), which utilizes a robustness property of dirty paper coding to perform precoding at the transmitter. The second scheme is called statistical superposition coding (S-SC), in which each receiver adaptively performs successive decoding with the process statistically governed by the realized fading. Both B-DPC and S-SC schemes lead to the same outage achievable rate region, which always dominates that of time-sharing, irrespective of the particular fading distributions. The S-SC scheme can be extended to BCs with multiple transmit antennas.
△ Less
Submitted 10 November, 2007;
originally announced November 2007.
-
Writing on Dirty Paper with Resizing and its Application to Quasi-Static Fading Broadcast Channels
Authors:
Wenyi Zhang,
Shivaprasad Kotagiri,
J. Nicholas Laneman
Abstract:
This paper studies a variant of the classical problem of ``writing on dirty paper'' in which the sum of the input and the interference, or dirt, is multiplied by a random variable that models resizing, known to the decoder but not to the encoder. The achievable rate of Costa's dirty paper coding (DPC) scheme is calculated and compared to the case of the decoder's also knowing the dirt. In the er…
▽ More
This paper studies a variant of the classical problem of ``writing on dirty paper'' in which the sum of the input and the interference, or dirt, is multiplied by a random variable that models resizing, known to the decoder but not to the encoder. The achievable rate of Costa's dirty paper coding (DPC) scheme is calculated and compared to the case of the decoder's also knowing the dirt. In the ergodic case, the corresponding rate loss vanishes asymptotically in the limits of both high and low signal-to-noise ratio (SNR), and is small at all finite SNR for typical distributions like Rayleigh, Rician, and Nakagami. In the quasi-static case, the DPC scheme is lossless at all SNR in terms of outage probability. Quasi-static fading broadcast channels (BC) without transmit channel state information (CSI) are investigated as an application of the robustness properties. It is shown that the DPC scheme leads to an outage achievable rate region that strictly dominates that of time division.
△ Less
Submitted 20 April, 2007;
originally announced April 2007.
-
A Case For Amplify-Forward Relaying in the Block-Fading Multi-Access Channel
Authors:
Deqiang Chen,
Kambiz Azarian,
J. Nicholas Laneman
Abstract:
This paper demonstrates the significant gains that multi-access users can achieve from sharing a single amplify-forward relay in slow fading environments. The proposed protocol, namely the multi-access relay amplify-forward, allows for a low-complexity relay and achieves the optimal diversity-multiplexing trade-off at high multiplexing gains. Analysis of the protocol reveals that it uniformly do…
▽ More
This paper demonstrates the significant gains that multi-access users can achieve from sharing a single amplify-forward relay in slow fading environments. The proposed protocol, namely the multi-access relay amplify-forward, allows for a low-complexity relay and achieves the optimal diversity-multiplexing trade-off at high multiplexing gains. Analysis of the protocol reveals that it uniformly dominates the compress-forward strategy and further outperforms the dynamic decode-forward protocol at high multiplexing gains. An interesting feature of the proposed protocol is that, at high multiplexing gains, it resembles a multiple-input single-output system, and at low multiplexing gains, it provides each user with the same diversity-multiplexing trade-off as if there is no contention for the relay from the other users.
△ Less
Submitted 8 January, 2007;
originally announced January 2007.
-
Multiaccess Channels with State Known to Some Encoders and Independent Messages
Authors:
Shiva Prasad Kotagiri,
J. Nicholas Laneman
Abstract:
We consider a state-dependent multiaccess channel (MAC) with state non-causally known to some encoders. We derive an inner bound for the capacity region in the general discrete memoryless case and specialize to a binary noiseless case. In the case of maximum entropy channel state, we obtain the capacity region for binary noiseless MAC with one informed encoder by deriving a non-trivial outer bou…
▽ More
We consider a state-dependent multiaccess channel (MAC) with state non-causally known to some encoders. We derive an inner bound for the capacity region in the general discrete memoryless case and specialize to a binary noiseless case. In the case of maximum entropy channel state, we obtain the capacity region for binary noiseless MAC with one informed encoder by deriving a non-trivial outer bound for this case. For a Gaussian state-dependent MAC with one encoder being informed of the channel state, we present an inner bound by applying a slightly generalized dirty paper coding (GDPC) at the informed encoder that allows for partial state cancellation, and a trivial outer bound by providing channel state to the decoder also. The uninformed encoders benefit from the state cancellation in terms of achievable rates, however, appears that GDPC cannot completely eliminate the effect of the channel state on the achievable rate region, in contrast to the case of all encoders being informed. In the case of infinite state variance, we analyze how the uninformed encoder benefits from the informed encoder's actions using the inner bound and also provide a non-trivial outer bound for this case which is better than the trivial outer bound.
△ Less
Submitted 30 March, 2008; v1 submitted 23 July, 2006;
originally announced July 2006.
-
How Good is Phase-Shift Keying for Peak-Limited Rayleigh Fading Channels in the Low-SNR Regime?
Authors:
Wenyi Zhang,
J. Nicholas Laneman
Abstract:
This paper investigates the achievable information rate of phase-shift keying (PSK) over frequency non-selective Rayleigh fading channels without channel state information (CSI). The fading process exhibits general temporal correlation characterized by its spectral density function. We consider both discrete-time and continuous-time channels, and find their asymptotics at low signal-to-noise rat…
▽ More
This paper investigates the achievable information rate of phase-shift keying (PSK) over frequency non-selective Rayleigh fading channels without channel state information (CSI). The fading process exhibits general temporal correlation characterized by its spectral density function. We consider both discrete-time and continuous-time channels, and find their asymptotics at low signal-to-noise ratio (SNR). Compared to known capacity upper bounds under peak constraints, these asymptotics usually lead to negligible rate loss in the low-SNR regime for slowly time-varying fading channels. We further specialize to case studies of Gauss-Markov and Clarke's fading models.
△ Less
Submitted 27 August, 2005;
originally announced August 2005.
-
Source-Channel Diversity for Parallel Channels
Authors:
J. Nicholas Laneman,
Emin Martinian,
Gregory W. Wornell,
John G. Apostolopoulos
Abstract:
We consider transmitting a source across a pair of independent, non-ergodic channels with random states (e.g., slow fading channels) so as to minimize the average distortion. The general problem is unsolved. Hence, we focus on comparing two commonly used source and channel encoding systems which correspond to exploiting diversity either at the physical layer through parallel channel coding or at…
▽ More
We consider transmitting a source across a pair of independent, non-ergodic channels with random states (e.g., slow fading channels) so as to minimize the average distortion. The general problem is unsolved. Hence, we focus on comparing two commonly used source and channel encoding systems which correspond to exploiting diversity either at the physical layer through parallel channel coding or at the application layer through multiple description source coding.
For on-off channel models, source coding diversity offers better performance. For channels with a continuous range of reception quality, we show the reverse is true. Specifically, we introduce a new figure of merit called the distortion exponent which measures how fast the average distortion decays with SNR. For continuous-state models such as additive white Gaussian noise channels with multiplicative Rayleigh fading, optimal channel coding diversity at the physical layer is more efficient than source coding diversity at the application layer in that the former achieves a better distortion exponent.
Finally, we consider a third decoding architecture: multiple description encoding with a joint source-channel decoding. We show that this architecture achieves the same distortion exponent as systems with optimal channel coding diversity for continuous-state channels, and maintains the the advantages of multiple description systems for on-off channels. Thus, the multiple description system with joint decoding achieves the best performance, from among the three architectures considered, on both continuous-state and on-off channels.
△ Less
Submitted 28 December, 2004;
originally announced December 2004.