Information Theory of Wireless Networks: A Deterministic Approach David Tse Wireless Foundations U.C. Berkeley CISS 2008 March 21, 2008 TexPoint fonts.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Advertisements

Feedback for Interference Mitigation David Tse Wireless Foundations Dept. of EECS U.C. Berkeley CWIT May 20, 2011 TexPoint fonts used in EMF. Read the.
Impact of Interference on Multi-hop Wireless Network Performance Kamal Jain, Jitu Padhye, Venkat Padmanabhan and Lili Qiu Microsoft Research Redmond.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 TexPoint fonts used in EMF: AAA A AA.
Information theory Multi-user information theory A.J. Han Vinck Essen, 2004.
Cooperative Network Coding
Breaking the Interference Barrier David Tse Wireless Foundations University of California at Berkeley Mobicom/Mobihoc Plenary Talk September 13, 2007 TexPoint.
Relaying in networks with multiple sources has new aspects: 1. Relaying messages to one destination increases interference to others 2. Relays can jointly.
Authors: David N.C. Tse, Ofer Zeitouni. Presented By Sai C. Chadalapaka.
Cooperative Interference Management in Wireless Networks I-Hsiang Wang École Polytechnique Fédérale de Lausanne (EPFL) IE/INC Seminar Chinese University.
Cooperation / Contention - an Information Theoretic Perspective Syed A. Jafar University of California Irvine What is the optimal form of cooperation?
EE360: Lecture 13 Outline Cognitive Radios and their Capacity Announcements March 5 lecture moved to March 7, 12-1:15pm, Packard 364 Poster session scheduling.
Network-Coded Multiple Access Presented by Soung Liew (Joint Work with Lu Lu, Lizhao You, Shenghao Yang) Institute of Network Coding The Chinese University.
June 4, 2015 On the Capacity of a Class of Cognitive Radios Sriram Sridharan in collaboration with Dr. Sriram Vishwanath Wireless Networking and Communications.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Ergodic Capacity of MIMO Relay Channel Bo Wang and Junshan Zhang Dept. of Electrical Engineering Arizona State University Anders Host-Madsen Dept. of Electrical.
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
Mobility Increases Capacity In Ad-Hoc Wireless Networks Lecture 17 October 28, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor.
EE360: Lecture 6 Outline MAC Channel Capacity in AWGN
Tracey Ho Sidharth Jaggi Tsinghua University Hongyi Yao California Institute of Technology Theodoros Dikaliotis California Institute of Technology Chinese.
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley MIT LIDS May 7, 2007 Joint work.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Gaussian Interference Channel Capacity to Within One Bit David Tse Wireless Foundations U.C. Berkeley MIT LIDS May 4, 2007 Joint work with Raul Etkin (HP)
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
The Role of Specialization in LDPC Codes Jeremy Thorpe Pizza Meeting Talk 2/12/03.
Noise, Information Theory, and Entropy
Coding Schemes for Multiple-Relay Channels 1 Ph.D. Defense Department of Electrical and Computer Engineering University of Waterloo Xiugang Wu December.
Noise, Information Theory, and Entropy
Network Alignment: Treating Networks as Wireless Interference Channel Chun Meng Univ. of California, Irvine.
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley AISP Workshop May 2, 2007 Joint.
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Joint Physical Layer Coding and Network Coding for Bi-Directional Relaying Makesh Wilson, Krishna Narayanan, Henry Pfister and Alex Sprintson Department.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Layerless Dynamic Networks Lizhong Zheng, Todd Coleman.
Wireless Networking and Communications Group 1/37 Capacities of Erasure Networks Qualification Proposal of Brian Smith February 23 rd, 2007.
1 Mobility Increases the Capacity of Ad-hoc Wireless Networks Matthias Grossglauser, David Tse IEEE Infocom 2001 (Best paper award) Oct 21, 2004 Som C.
MD-based scheme could outperform MR-based scheme while preserving the source- channel interface Rate is not sufficient as source- channel interface, ordering.
Distributed Algorithms Rajmohan Rajaraman Northeastern University, Boston May 2012 Chennai Network Optimization WorkshopDistributed Algorithms1.
Transmit Diversity with Channel Feedback Krishna K. Mukkavilli, Ashutosh Sabharwal, Michael Orchard and Behnaam Aazhang Department of Electrical and Computer.
CODED COOPERATIVE TRANSMISSION FOR WIRELESS COMMUNICATIONS Prof. Jinhong Yuan 原进宏 School of Electrical Engineering and Telecommunications University of.
PODC Distributed Computation of the Mode Fabian Kuhn Thomas Locher ETH Zurich, Switzerland Stefan Schmid TU Munich, Germany TexPoint fonts used in.
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Outage-Optimal Relaying In the Low SNR Regime Salman Avestimehr and David Tse University of California, Berkeley.
Multiple Antennas Have a Big Multi- User Advantage in Wireless Communications Bertrand Hochwald (Bell Labs)
University of Houston Cullen College of Engineering Electrical & Computer Engineering Capacity Scaling in MIMO Wireless System Under Correlated Fading.
EE360: Lecture 9 Outline Announcements Cooperation in Ad Hoc Networks
Local Phy + Global Routing: A Fundamental Layering Principle for Wireless Networks Pramod Viswanath, University of Illinois July, 2011.
Interference in MANETs: Friend or Foe? Andrea Goldsmith
MAIN RESULT: Depending on path loss and the scaling of area relative to number of nodes, a novel hybrid scheme is required to achieve capacity, where multihop.
Capacity of Large Scale Wireless Networks with Directional Antenna and Delay Constraint Guanglin Zhang IWCT, SJTU 26 Sept, 2012 INC, CUHK 1.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
Cooperative Diversity Using Distributed Turbo Codes Bin Zhao and Matthew C. Valenti Lane Dept. of Comp. Sci. & Elect. Eng. West Virginia.
Rate Bounds for MIMO Relay Channels Using Precoding Caleb K. Lo, Sriram Vishwanath and Robert W. Heath, Jr. Wireless Networking and Communications Group.
1 WELCOME Chen. 2 Simulation of MIMO Capacity Limits Professor: Patric Ö sterg å rd Supervisor: Kalle Ruttik Communications Labortory.
Using Feedback in MANETs: a Control Perspective Todd P. Coleman University of Illinois DARPA ITMANET TexPoint fonts used.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
March 18, 2005 Network Coding in Interference Networks Brian Smith and Sriram Vishwanath University of Texas at Austin March 18 th, 2005 Conference on.
EE360: Lecture 13 Outline Capacity of Cognitive Radios Announcements Progress reports due Feb. 29 at midnight Overview Achievable rates in Cognitive Radios.
Bridging the Gap: A Deterministic Model for Wireless Links David Tse Wireless Foundations U.C. Berkeley NSF Wireless Networks Workshop Aug 27, 2007 TexPoint.
Impact of Interference on Multi-hop Wireless Network Performance
EECS 290S: Network Information Flow
Reasoning about Performance in Competition and Cooperation
Amplify-and-Forward Schemes for Wireless Communications
Ivana Marić, Ron Dabora and Andrea Goldsmith
Wireless Network Coding: Some Lessons Learned in ITMANET
Compute-and-Forward Can Buy Secrecy Cheap
Towards characterizing the capacity of the building block of MANETs
Presentation transcript:

Information Theory of Wireless Networks: A Deterministic Approach David Tse Wireless Foundations U.C. Berkeley CISS 2008 March 21, 2008 TexPoint fonts used in EMF: AAA A AA A A A A A A A A Joint work with Salman Avestimehr, Guy Bresler, Suhas Diggavi, Abhay Parekh.

The Holy Grail Shannon’s information theory provides the basis for all modern-day communication systems. His original theory was point-to-point. After 60 years we are still very far away from generalizing the theory to networks. We propose an approach to make progress in the context of wireless networks.

Modeling the Wireless Medium broadcast superposition high dynamic range in channel strengths between different nodes Basic model: additive Gaussian channel:

Gaussian Network Capacity: What We Know Tx Rx1 Tx Rx Tx 1 Tx 2 Rx 2 point-to-point (Shannon 48) multiple-access (Alshwede, Liao 70’s) broadcast (Cover, Bergmans 70’s)

What We Don’t Know Unfortunately we don’t know the capacity of most other Gaussian networks. D Tx 1 Relay S Tx 2Rx 2 Rx 1 Interference relay (Best known achievable region: Han & Kobayashi 81) (Best known achievable region: El Gamal & Cover 79)

30 Years Have Gone by….. We are still stuck. How to make progress?

It’s the model. Shannon focused on noise in point-to-point communication. But many wireless networks are interference rather than noise-limited. We propose a deterministic channel model emphasizing interaction between users’ signals rather than on background noise. Far more analytically tractable and can be used to determine approximate Gaussian capacity

General Methodology Deterministic networkGaussian network Deterministic model Exact analysisApproximate analysis Perturbation AWGN Linear Finite field

Agenda Warmup: point-to-point channel multiple access channel broadcast channel The meat: relay networks (Avestimehr, Diggavi & T. 07) interference channels (Bresler &T. 08, Bresler,Parekh & T. 08)

Gaussian Transmit a real number If we have Example 1: Point-to-Point Link Deterministic n / SNR on the dB scale Least significant bits are truncated at noise level.

Gaussian Example 2: Multiple Access Deterministic user 2 user 1 mod 2 addition user 1 sends cloud centers, user 2 sends clouds.

Comparing Multiple Access Capacity Regions Gaussian Deterministic user 2 user 1 mod 2 addition accurate to within 1 bit per user

High SNR Convergence

Example 3: Broadcast Gaussian Deterministic user 2 user 1 To within 1 bit

Agenda Warmup: point-to-point channel multiple access channel broadcast channel The meat: relay networks interference channels

History The (single) relay channel was first proposed by Van der Meulen in Cover and El Gamal (1979) provided a whole array of achievable strategies. Recent generalization of these techniques to more than 1 relay. Do not know how far they are from optimal General upper bound: cutset bound

The Relay Channel Gaussian Deterministic S R D h SR h RD h SD Decode-Forward is near optimal Decode-Forward is optimal On average it is much less than 1-bit x x n SR n RD n SD gap Cutset bound is achievable. Theorem (Avestimehr et al 07) Gap from cutset bound is at most 1 bit.

Generalization to Relay Networks Can the cutset bound be achievable in the deterministic model? Can one always achieve to within a contant gap of the cutset bound in the Gaussian case?

General Relay Networks Main Theorem: Cutset bound is achievable for deterministic networks. (Avestimehr, Diggavi & T. 07)

Main Theorem Theorem generalizes to arbitrary linear MIMO channels on finite fields. In the case of wireline graph, rank is the number of links crossing the cut. Our theorem is a generalization of Ford-Fulkerson max-flow min-cut theorem.

Connections to Network Coding Achievability: random linear coding at relays Proof style: similar to Ahlswede et al 2000 for wireline networks. Technical innovation: dealing with “inter-symbol interference” between signals arriving along paths of different lengths.

Achievability (Special Case): Equal Path Lengths Lengths of all paths from source to destination are the same. Source maps each message into a random codeword. Each relay randomly bins its received signal and transmits the bin index. Same achievability strategy as Ashlwede et al 00. Key simpification of equal path lengths: messages don’t mix. Can generalize to arbitrary networks via time-expansion.

Back to Gaussian Relay Networks Approximation Theorem: There is a scheme that achieves within a constant gap to the cutset bound, independent of the SNR’s of the links. (Avestimehr, Diggavi and T. 2008)

Agenda Warmup: point-to-point channel multiple access channel broadcast channel The meat: relay networks interference channels

Interference So far we have looked at single source, single destination networks. All the signals received is useful. With multiple sources and multiple destinations, interference is the central phenomenon. Simplest interference network is the two-user interference channel.

Two-User Gaussian Interference Channel Capacity region unknown Best known achievable region: Han & Kobayashi 81. message m 1 message m 2 want m 1 want m 2

Gaussian to Deterministic Interference Channel Gaussian Deterministic Capacity can be computed using a result by El Gamal and Costa 82. In symmetric case, channel described by two parameters: SNR, INR

Symmetric Deterministic Capacity 1 1/2

Back to Gaussian Theorem: Constant gap between capacity regions of the two- user deterministic and Gaussian interference channels. (Bresler & T. 08) A deeper view of earlier 1-bit gap result on two-user Gaussian interference channel (Etkin,T. & Wang 06). Bounds further sharpened to get exact results in the low-interference regime (  < 1/3) (Shang et al 07,Annaprueddy&Veeravalli08,Motahari&Khandani07)

Extension: Many-to-One Interference Channel Gaussian Deterministic Deterministic capacity can be computed exactly. Gaussian capacity to within constant gap, using structured codes and interference alignment. (Bresler, Parekh & T. 07)

Example Interference from users 1 and 2 is aligned at the MSB at user 0’s receiver in the deterministic channel. How can we mimic it for the Gaussian channel ? Tx 0 Tx 1 Tx 2 Rx 0 Rx 1 Rx 2

Suppose users 1 and 2 use a random Gaussian codebook: Gaussian Han-Kobayashi Not Optimal Tx 0 Tx 1 Tx 2 Rx 0 Rx 1 Rx 2 Random Code Sum of Two Random Codebooks Lattice Code for Users 1 and 2 User 0 Code Interference from users 1 and 2 fills the space: no room for user 0. Lattice codes can achieve constant gap

Interference Channels: Recap In two-user case, we showed that an existing strategy can achieve within 1 bit to optimality. In many-to-one case, we showed that a new strategy can do much better. General K-user interference channel still open.

Evolution of Ideas deterministic network capacity in 1980’s: –broadcast channels (Marton 78, Pinsker 79) –2-user interference channel (El Gamal & Costa 82) –single-relay channel (El Gamal & Aref 82) –relay networks with broadcast but no interference (Aref 79) inspired by network coding in early 2000’s: –finite-field model with erasures (Gupta et al 06) but connection to Gaussian networks missing. 2-user Gaussian interference channel capacity to within 1 bit (Etkin, T & Wang 06) Linear deterministic model (Avestimehr, Diggavi & T 07) and applied to relay networks.

Parting Words Main message: If something can’t be computed exactly, approximate. Similar evolution has happened in other fields: –fluid and heavy-traffic approximation in queueing networks –approximation algorithms in CS theory Approximation should be good in engineering-relevant regimes.