Tracey Ho Sidharth Jaggi Tsinghua University Hongyi Yao California Institute of Technology Theodoros Dikaliotis California Institute of Technology Chinese.

Slides:



Advertisements
Similar presentations
The Transmission-Switching Duality of Communication Networks
Advertisements

Functions of the Data Link Layer Provide service interface to the network layer Dealing with transmission errors Regulating data flow Slow receivers not.
Cyclic Code.
On error and erasure correction coding for networks and deadlines Tracey Ho Caltech NTU, November 2011.
Relaying in networks with multiple sources has new aspects: 1. Relaying messages to one destination increases interference to others 2. Relays can jointly.
Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li Institute of Network Coding (INC) The Chinese University of Hong Kong October 19, 2011 IEEE Information.
The Performance of Polar Codes for Multi-level Flash Memories
Cooperative Interference Management in Wireless Networks I-Hsiang Wang École Polytechnique Fédérale de Lausanne (EPFL) IE/INC Seminar Chinese University.
Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
Submission May, 2000 Doc: IEEE / 086 Steven Gray, Nokia Slide Brief Overview of Information Theory and Channel Coding Steven D. Gray 1.
Chapter 6 Information Theory
Achilleas Anastasopoulos (joint work with Lihua Weng and Sandeep Pradhan) April A Framework for Heterogeneous Quality-of-Service Guarantees in.
Cellular Communications
Amplify-and-Forward in Wireless Relay Networks Samar Agnihotri, Sidharth Jaggi, Minghua Chen Institute of Network Coding The Chinese University of Hong.
Lihua Weng Dept. of EECS, Univ. of Michigan Error Exponent Regions for Multi-User Channels.
Fundamental limits in Information Theory Chapter 10 :
The 1’st annual (?) workshop. 2 Communication under Channel Uncertainty: Oblivious channels Michael Langberg California Institute of Technology.
Information Theory of Wireless Networks: A Deterministic Approach David Tse Wireless Foundations U.C. Berkeley CISS 2008 March 21, 2008 TexPoint fonts.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
BASiCS Group University of California at Berkeley Generalized Coset Codes for Symmetric/Asymmetric Distributed Source Coding S. Sandeep Pradhan Kannan.
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
EE 3220: Digital Communication Dr Hassan Yousif 1 Dr. Hassan Yousif Ahmed Department of Electrical Engineering College of Engineering at Wadi Aldwasser.
Low Complexity Algebraic Multicast Network Codes Sidharth “Sid” Jaggi Philip Chou Kamal Jain.
Gaussian Interference Channel Capacity to Within One Bit David Tse Wireless Foundations U.C. Berkeley MIT LIDS May 4, 2007 Joint work with Raul Etkin (HP)
Noise, Information Theory, and Entropy
Channel Polarization and Polar Codes
Noise, Information Theory, and Entropy
Analysis of Iterative Decoding
林茂昭 教授 台大電機系 個人專長 錯誤更正碼 數位通訊
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
DIGITAL COMMUNICATION Error - Correction A.J. Han Vinck.
1 INF244 Textbook: Lin and Costello Lectures (Tu+Th ) covering roughly Chapter 1;Chapters 9-19? Weekly exercises: For your convenience Mandatory.
On coding for networks with errors Tracey Ho Caltech BIRS, August 2011.
Channel Coding Part 1: Block Coding
Joint Physical Layer Coding and Network Coding for Bi-Directional Relaying Makesh Wilson, Krishna Narayanan, Henry Pfister and Alex Sprintson Department.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Layerless Dynamic Networks Lizhong Zheng, Todd Coleman.
Channel Capacity
Channel Capacity.
Iterative Soft Decoding of Reed-Solomon Convolutional Concatenated Codes Li Chen Associate Professor School of Information Science and Technology, Sun.
Wireless Communication Elec 534 Set I September 9, 2007 Behnaam Aazhang.
Correction of Adversarial Errors in Networks Sidharth Jaggi Michael Langberg Tracey Ho Michelle Effros Submitted to ISIT 2005.
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 12.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
DIGITAL COMMUNICATIONS Linear Block Codes
Coding Theory Efficient and Reliable Transfer of Information
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
University of Houston Cullen College of Engineering Electrical & Computer Engineering Capacity Scaling in MIMO Wireless System Under Correlated Fading.
Performance Analysis of Complementary Code Keying (CCK) Modulation in a Multi-Path Channel Paul Yang, University of California at Berkeley SURE Program.
Some Computation Problems in Coding Theory
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Turbo Codes. 2 A Need for Better Codes Designing a channel code is always a tradeoff between energy efficiency and bandwidth efficiency. Lower rate Codes.
Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi.
Sequential Soft Decision Decoding of Reed Solomon Codes Hari Palaiyanur Cornell University Prof. John Komo Clemson University 2003 SURE Program.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Reliable Deniable Communication: Hiding Messages from Noise Pak Hou Che Joint Work with Sidharth Jaggi, Mayank Bakshi and Madhi Jafari Siavoshani Institute.
Source Encoder Channel Encoder Noisy channel Source Decoder Channel Decoder Figure 1.1. A communication system: source and channel coding.
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
1 Code design: Computer search Low rate: Represent code by its generator matrix Find one representative for each equivalence class of codes Permutation.
RELIABLE COMMUNICATION
EECS 290S: Network Information Flow
Reliable Deniable Communication: Hiding Messages in Noise
Reasoning about Performance in Competition and Cooperation
Amplify-and-Forward Schemes for Wireless Communications
Coding and Interleaving
Information-Theoretic Study of Optical Multiple Access
Information-Theoretic Security
Compute-and-Forward Can Buy Secrecy Cheap
Lihua Weng Dept. of EECS, Univ. of Michigan
Presentation transcript:

Tracey Ho Sidharth Jaggi Tsinghua University Hongyi Yao California Institute of Technology Theodoros Dikaliotis California Institute of Technology Chinese University of Hong Kong Cornell University Salman Avestimehr

Communication in a wireless medium Source Receiver Noise Interference Synchronization Channel parameters

Communication over a wireless medium Source Receiver Noise Interference Synchronization Channel parameters

Communication over a wireless medium Source Receiver Noise Interference Synchronization Channel parameters

Communication over a wireless medium Source Receiver Noise Interference Synchronization Channel parameters Cut-set bounds tight?

Communication over a general network S A D B C T h1h1 h2h2 h3h3 h6h6 h8h8 h7h7 h4h4 h5h5 The capacity region for networks with Gaussian channels is still an open problem

Communication over a general network S A D B C T h1h1 h2h2 h3h3 h6h6 h8h8 h7h7 h4h4 h5h5 S. Avestimehr, S. Diggavi and D. Tse, “Wireless network information flow”, to appear in IEEE Transactions on Information Theory The capacity region for networks with Gaussian channels is still an open problem Quantize-map and forward achieves rates within a constant gap from the capacity

Communication over a general network S A D B C T h1h1 h2h2 h3h3 h6h6 h8h8 h7h7 h4h4 h5h5 S. Avestimehr, S. Diggavi and D. Tse, “Wireless network information flow”, to appear in IEEE Transactions on Information Theory The capacity region for networks with Gaussian channels is still an open problem Quantize-map and forward achieves rates within a constant gap from the capacity Our goal: polynomial-complexity codes that achieve within a constant gap from the capacity of the network

Communication over a point-to-point channel

Lattice codes Uri Erez, Ram Zamir, “Achieving (1/2)*log(1 + SNR) on the AWGN Channel With Lattice Encoding and Decoding,” IEEE Trans. On Inform. Theory, Oct. 2004

Communication over a point-to-point channel Lattice codes Polar codes Uri Erez, Ram Zamir, “Achieving (1/2)*log(1 + SNR) on the AWGN Channel With Lattice Encoding and Decoding,” IEEE Trans. On Inform. Theory, Oct E. Arıkan, “Channel polarization: A method for constructing capacity achieving codes for symmetric binary-input memoryless channels,” IEEE Trans. Inform. Theory, July 2009

Communication over a point-to-point channel Lattice codes Polar codes Superposition codes Uri Erez, Ram Zamir, “Achieving (1/2)*log(1 + SNR) on the AWGN Channel With Lattice Encoding and Decoding,” IEEE Trans. On Inform. Theory, Oct E. Arıkan, “Channel polarization: A method for constructing capacity achieving codes for symmetric binary-input memoryless channels,” IEEE Trans. Inform. Theory, July 2009 A. R. Barron, A. Joseph, “Least Squares Superposition Codes of Moderate Dictionary Size, Reliable at Rates up tp Capacity,” IEEE Trans. On Inform. Theory, June 2004

Communication over a point-to-point channel is an integer... ===== ===== and we take its binary representation

Communication over a point-to-point channel is an integer ===== and we take its binary representation Bit flips

Communication over a point-to-point channel is an integer ===== and we take its binary representation Bit flips

Communication over a point-to-point channel is an integer ===== and we take its binary representation Bit flips Dependent bit flips...

Communication over a point-to-point channel is an integer ===== and we take its binary representation Bit flips Dependent bit flips... Less noisy bit levels Very noisy bit levels

Communication over a point-to-point channel is an integer ===== and we take its binary representation Bit flips Less noisy bit levels Very noisy bit levels Code to correct adversarial errors

Communication over a point-to-point channel is an integer ===== and we take its binary representation Bit flips Less noisy bit levels Very noisy bit levels Code to correct adversarial errors

Communication over a point-to-point channel is an integer ===== and we take its binary representation Bit flips Less noisy bit levels Very noisy bit levels p j ≤ j R j = 1-h(2p j ) Due to adversarial errors

Communication over a point-to-point channel Bit flips Less noisy bit levels Very noisy bit levels Code to correct adversarial errors p j ≤ j R j = 1-h(2p j ) Due to adversarial errors Complexity: Exponential!!!

Communication over a point-to-point channel Bit flips Less noisy bit levels Very noisy bit levels Code to correct adversarial errors p j ≤ j R j = 1-h(2p j ) Due to adversarial errors Complexity: Exponential!!! symbol Redundancy symbol Complexity per bit level: Complexity:

Communication over a general network S A D B C T h1h1 h2h2 h3h3 h6h6 h8h8 h7h7 h4h4 h5h5 S. Avestimehr, S. Diggavi and D. Tse, “Wireless network information flow”, to appear in IEEE Transactions on Information Theory For every node i in the network where

Communication over a general network Encoding Strategy: 1.RS Outer code (only at source) 2.ADT random inner code at source and interior nodes, length log n. Decoding strategy at receiver(s): 1.For each inner code, guess each possible codeword and (low-weight) error pattern due to bit flips at any node to decode – polynomial number. 2.Use outer RS code to correct any inner code errors Challenges: 1.Correlated bit-flips – distinguish between noise and carry bit-flips 2.Mapping operations at nodes convert low-weight bit-flips to high- weight errors – but entropy is all that matters. 3.Concentration results on the expected number of correlated bit flips. Overall code complexity O(n 2 2 |V| )

Questions?