We aim to exploit cognition to maximize network performance What is the side information at a cognitive node? What is the best encoding scheme given this.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Advertisements

Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 10 User.
Derives the optimal achievable rate for MISO secondary users under coexistence constraints Proposes practical strategy for cognition and cooperation in.
Relaying in networks with multiple sources has new aspects: 1. Relaying messages to one destination increases interference to others 2. Relays can jointly.
Capacity of Wireless Channels
Information Theoretical Security and Secure Network Coding NCIS11 Ning Cai May 14, 2011 Xidian University.
EE360: Lecture 13 Outline Cognitive Radios and their Capacity Announcements March 5 lecture moved to March 7, 12-1:15pm, Packard 364 Poster session scheduling.
Achilleas Anastasopoulos (joint work with Lihua Weng and Sandeep Pradhan) April A Framework for Heterogeneous Quality-of-Service Guarantees in.
June 4, 2015 On the Capacity of a Class of Cognitive Radios Sriram Sridharan in collaboration with Dr. Sriram Vishwanath Wireless Networking and Communications.
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
Node Cooperation and Cognition in Dynamic Wireless Networks
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Lihua Weng Dept. of EECS, Univ. of Michigan Error Exponent Regions for Multi-User Channels.
1 Network Source Coding Lee Center Workshop 2006 Wei-Hsin Gu (EE, with Prof. Effros)
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
ECE 776 Information Theory Capacity of Fading Channels with Channel Side Information Andrea J. Goldsmith and Pravin P. Varaiya, Professor Name: Dr. Osvaldo.
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
EE360: Lecture 13 Outline Cognitive Radios and their Capacity Announcements Progress reports due today, HW 2 posted March 5 lecture moved to March 7, 12-1:15pm,
Coding Schemes for Multiple-Relay Channels 1 Ph.D. Defense Department of Electrical and Computer Engineering University of Waterloo Xiugang Wu December.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
An algorithm for dynamic spectrum allocation in shadowing environment and with communication constraints Konstantinos Koufos Helsinki University of Technology.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Distributed Storage Allocations for Optimal Delay Derek Leong 1, Alexandros G. Dimakis 2, Tracey Ho 1 1 California Institute of Technology 2 University.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Layerless Dynamic Networks Lizhong Zheng, Todd Coleman.
ECE559VV – Fall07 Course Project Presented by Guanfeng Liang Distributed Power Control and Spectrum Sharing in Wireless Networks.
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
MD-based scheme could outperform MR-based scheme while preserving the source- channel interface Rate is not sufficient as source- channel interface, ordering.
Three-layer scheme dominates previous double-layer schemes Distortion-diversity tradeoff provides useful comparison in different operating regions Layered.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
A Continuity Theory of Source Coding over Networks WeiHsin Gu, Michelle Effros, Mayank Bakshi, and Tracey Ho FLoWS PI Meeting, Washington DC, September.
1 Codage avec Information Adjacante (DPC : Dirty paper coding) et certaines de ses applications : Tatouage (Watermarking) MIMO broadcast channels Gholam-Reza.
Toward a Secure Data-Rate Theorem Paul Cuff. Control Setting Controller Encoder System (Plant) Sensors Rate R UiUi XiXi YiYi.
JWITC 2013Jan. 19, On the Capacity of Distributed Antenna Systems Lin Dai City University of Hong Kong.
Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Yingzhe Li, Xinbing Wang, Xiaohua Tian Department of Electronic Engineering.
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Novel network coding strategy for TDD Use of feedback (ACK) improves delay/energy/ throughput performance, especially for high latency- high errors scenarios.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Overview: Layerless Dynamic Networks Lizhong Zheng.
Some Networking Aspects of Multiple Access Muriel Medard EECS MIT.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
Transmission over composite channels with combined source-channel outage: Reza Mirghaderi and Andrea Goldsmith Work Summary STATUS QUO A subset Vo (with.
Interference in MANETs: Friend or Foe? Andrea Goldsmith
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Competitive Scheduling in Wireless Networks with Correlated Channel State Ozan.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrusts 0 and 1 Metrics and Upper Bounds Muriel Medard, Michelle Effros and.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
1 On the Channel Capacity of Wireless Fading Channels C. D. Charalambous and S. Z. Denic School of Information Technology and Engineering, University of.
The Finite-state channel was introduced as early as 1953 [McMillan'53]. Memory captured by channel state at end of previous symbol's transmission: - S.
October 28, 2005 Single User Wireless Scheduling Policies: Opportunism and Optimality Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Key insight.  With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation  Responding to ACK of the.
RELIABLE COMMUNICATION 1 IN THE PRESENCE OFLIMITEDADVERSARIES.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
4 Introduction Carrier-sensing Range Network Model Distributed Data Collection Simulation 6 Conclusion 2.
EE360: Lecture 13 Outline Capacity of Cognitive Radios Announcements Progress reports due Feb. 29 at midnight Overview Achievable rates in Cognitive Radios.
1)Effect of Network Coding in Graphs Undirecting the edges is roughly as strong as allowing network coding simplicity is the main benefit 2)Effect of Network.
The Capacity of Interference Channels with Partial Transmitter Cooperation Ivana Marić Roy D. Yates Gerhard Kramer Stanford WINLAB, Rutgers Bell Labs Ivana.
Joint Source, Channel, and Network Coding in MANETs
Ivana Marić, Ron Dabora and Andrea Goldsmith
Layered Decoding and Secrecy Over Degraded Broadcast Channel
Design and Performance of a Noncoherent SIMO MAC System
Introduction Results Proofs Summary
Jinhua Jiang, Ivana Marić, Andrea Goldsmith, and Shuguang Cui Summary
Information Theoretical Analysis of Digital Watermarking
Towards characterizing the capacity of the building block of MANETs
Lihua Weng Dept. of EECS, Univ. of Michigan
Presentation transcript:

We aim to exploit cognition to maximize network performance What is the side information at a cognitive node? What is the best encoding scheme given this side information? A model for cognition in IT: Perfect side information at the cognitive pair Very optimistic Cognitive and non-cognitive pair communication modeled as: Converse The Capacity Region of the Cognitive Z-interference Channel with a Noiseless Non-cognitive Link Nan Liu, Ivana Marić, Andrea Goldsmith and Shlomo Shamai (Shitz) In the considered scenario, interference can be minimized by exploiting the structure of interference and cognition at the nodes The corresponding encoding scheme requires 1)Superposition coding 2) Gel’fand-Pinsker coding This is in contrast to the Gaussian case For the GP problem, the optimum interference has superposition structure We considered single-user cognitive models that capture delay in related work [Marić, Liu and Goldsmith 2008] Channel Model ? In some scenarios, interference can be minimized by exploiting the structure of interference and cognition at the nodes. Cognition should be used by the encoder to precode against part of the interference caused to its receiver. Capacity of networks with cognitive users are unknown. Consequently, optimal ways how to operate such networks are not understood, nor it is clear how cognitive nodes should exploit the obtained information. IT channel models suitable for networks with cognitive users still need to be proposed. Capacity of Z-interference channel is still unknown. Encoding scheme was proposed that exploits cognition and is optimal in certain scenarios IMPACT NEXT-PHASE GOALS ACHIEVEMENT DESCRIPTION Introduction In multiuser networks: A key issue is how to handle and exploit interference created by simultaneous transmissions Not well understood: Capacity of the interference channel an open problem Capacity of the Z-interference channel an open problem Cognitive radio networks: Multiuser networks in which some users cognitive, i.e., can sense the environment and hence obtain side information about transmissions in neighborhood How to exploit cognition in optimal ways? STATUS QUO NEW INSIGHTS MAIN ACHIEVEMENT: 1) The capacity region of the discrete cognitive Z- interference channel with a noiseless non-cognitive link 2) An inner and outer bound for the cognitive Z-interference channel 3) Solution to the generalized Gel’fand- Pinsker (GP) problem in which a transmitter-receiver pair communicates in the presence of interference non causally known to the encoder. Our solution determines the optimum structure of interference. HOW IT WORKS: Non-cognitive encoder uses superposition coding to enable partial decoding of interference. The cognitive encoder precodes against the rest of interference using GP encoding. ASSUMPTIONS AND LIMITATIONS: The considered channel model: 1) Optimal scheme for some channels 2) Superposition coding and Gel’fand-Pinsker coding may be required in order to minimize interference, in some channels. This is in contrast to the Gaussian channel. 3) For the GP problem, the optimal interference has a superposition structure Evaluate a numerical example Apply proposed encoding scheme to larger networks and to different cognitive node models Motivation Previous Work Connection to the Gel’fand-Pinsker Problem Summary and Future Work An achievable rate region and an outer bound for the cognitive ZIC were derived The capacity result for the ZIC with a noiseless non-cognitive link was obtained The Generalized Gel’fand-Pinsker problem was solved Future work: Evaluate a numerical example Apply proposed encoding scheme to larger networks and to different cognitive node models Theorem: Achievable rate pairs (R 1,R 2 ) belong to a union of rate regions given by where the union is over all probability distributions p( v,u,x 2 )p( x 1 | u,x 2 ) Encoder 1 is cognitive in the sense that it knows the message of other user Summary Achievability Achievability Implications dest1 dest2 cognitive encoder non-cognitive encoder W2W2 W1W1 W 1 W 2 W2W2 dest1 dest2 source 1 source 2 W2W2 W1W1 W1W1 W2W2 Theorem: Achievable rate pairs (R 1,R 2 ) are given by a union of rate regions given by where the union is over all probability distributions p( v,u,x 2 )p( x 1 | u,x 2 ) Encoding scheme: Encoder 2: - rate-splits its message into two messages - encodes using superposition coding with an inner codebook v n and an outer codebook x 2 n Encoder 1: - for each v n it performs binning, i.e., Gel’fand-Pinsker encoding in order to precode against interference x 2 n given v n Encoding: Decoding: Two messages: Rates: In general, the achievable rates and the converse result do no meet Markovity U→(V,X 2 )→Y 2 implies: I(U;X 2 | V) ≥ I(U;Y 2 | V) For Y 2 =X 2 the two regions are the same. This leads to the following: Capacity Result Theorem: For the cognitive ZIC with a noiseless non- cognitive link i.e., p(y 2 |x 2 ) is a deterministic one-to-one function, the capacity region is given by the union of rate regions: where the union is over all probability distributions p( v,u,x 2 )p( x 1 | u,x 2 ) Alphabet for encoder t : Communication in the presence of interference (state) non-causally known to the encoder In the cognitive ZIC, when X 2 =Y 2, X 2 can be viewed as a state i.i.d. distributed on a set of size of 2 nR2 We can design not only the codebook of the cognitive encoder, but also the structure of the state When reduces to the GP rate achieved in the channel with an iid state and uniformly distributed on X [Marić, Yates, Kramer], [Devroye, Mitran, Tarokh] 2006 [Wu, Vishwanath, Arapostathis], [Jovičić, Viswanath], [Sridharan, Vishwanath] 2007 [Marić, Goldsmith, Shamai, Kramer], [Jiang, Xin], [Cao, Chen] 2008 Capacity results known in special cases of ‘strong’ and ‘weak’ interference Thus, for the given rate R2 of the interferer, the optimal interference has the superposition structure