March 18, 2005 Network Coding in Interference Networks Brian Smith and Sriram Vishwanath University of Texas at Austin March 18 th, 2005 Conference on.

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Cooperative Network Coding
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Relaying in networks with multiple sources has new aspects: 1. Relaying messages to one destination increases interference to others 2. Relays can jointly.
AALTO UNIVERSITY School of Science and Technology Wang Wei
Enhancing Secrecy With Channel Knowledge
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
EE360: Lecture 13 Outline Cognitive Radios and their Capacity Announcements March 5 lecture moved to March 7, 12-1:15pm, Packard 364 Poster session scheduling.
June 4, 2015 On the Capacity of a Class of Cognitive Radios Sriram Sridharan in collaboration with Dr. Sriram Vishwanath Wireless Networking and Communications.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Network Coding and Xors in the Air 7th Week.
Network Coding and Reliable Communications Group Network Coding for Multi-Resolution Multicast March 17, 2010 MinJi Kim, Daniel Lucani, Xiaomeng (Shirley)
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
Network coding for multicasting and unicasting in MANETs Muriel Médard LIDS Massachusetts Institute of Technology.
Network Coding and Reliable Communications Group Algebraic Network Coding Approach to Deterministic Wireless Relay Networks MinJi Kim, Muriel Médard.
MIMO-CAST: A CROSS-LAYER AD HOC MULTICAST PROTOCOL USING MIMO RADIOS Soon Y. Oh*, Mario Gerla*, Pengkai Zhao**, Babak Daneshrad** *Computer Science Dept.,
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Processing Along the Way: Forwarding vs. Coding Christina Fragouli Joint work with Emina Soljanin and Daniela Tuninetti.
1 40 th Annual CISS 2006 Conference on Information Sciences and Systems Some Optimization Trade-offs in Wireless Network Coding Yalin E. Sagduyu Anthony.
A Graph-based Framework for Transmission of Correlated Sources over Multiuser Channels Suhan Choi May 2006.
Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland Joint work with Randy Cogill, University of Virginia.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Can Network Coding Help in P2P Networks? Dah Ming Chiu, Raymond W Yeung, Jiaqing Huang and Bin Fan Chinese University of Hong Kong Presented by Arjumand.
Networking Seminar Network Information Flow R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network Information Flow. IEEE Transactions on Information.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
When rate of interferer’s codebook small Does not place burden for destination to decode interference When rate of interferer’s codebook large Treating.
Joint Physical Layer Coding and Network Coding for Bi-Directional Relaying Makesh Wilson, Krishna Narayanan, Henry Pfister and Alex Sprintson Department.
Link Estimation, CTP and MultiHopLQI. Motivation Data Collection needs to estimate the link quality –To select a good link.
Channel Capacity
Wireless Networking and Communications Group 1/37 Capacities of Erasure Networks Qualification Proposal of Brian Smith February 23 rd, 2007.
Computer Communication & Networks Lecture # 05 Physical Layer: Signals & Digital Transmission Nadeem Majeed Choudhary
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Channel Capacity.
CODED COOPERATIVE TRANSMISSION FOR WIRELESS COMMUNICATIONS Prof. Jinhong Yuan 原进宏 School of Electrical Engineering and Telecommunications University of.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Link Estimation, CTP and MultiHopLQI. Learning Objectives Understand the motivation of link estimation protocols – the time varying nature of a wireless.
Cooperative Wireless Networks Hamid Jafarkhani Director Center for Pervasive Communications and Computing
Cooperative Communication in Sensor Networks: Relay Channels with Correlated Sources Brian Smith and Sriram Vishwanath University of Texas at Austin October.
A Distributed Relay-Assignment Algorithm for Cooperative Communications in Wireless Networks ICC 2006 Ahmed K. Sadek, Zhu Han, and K. J. Ray Liu Department.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Overview: Layerless Dynamic Networks Lizhong Zheng.
EE360: Lecture 9 Outline Announcements Cooperation in Ad Hoc Networks
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
Cross-Layer Approach to Wireless Collisions Dina Katabi.
The High, the Low and the Ugly Muriel Médard. Collaborators Nadia Fawaz, Andrea Goldsmith, Minji Kim, Ivana Maric 2.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Rate Bounds for MIMO Relay Channels Using Precoding Caleb K. Lo, Sriram Vishwanath and Robert W. Heath, Jr. Wireless Networking and Communications Group.
Cooperative Communication
October 28, 2005 Single User Wireless Scheduling Policies: Opportunism and Optimality Brian Smith and Sriram Vishwanath University of Texas at Austin October.
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
EE360: Lecture 13 Outline Capacity of Cognitive Radios Announcements Progress reports due Feb. 29 at midnight Overview Achievable rates in Cognitive Radios.
The Capacity of Interference Channels with Partial Transmitter Cooperation Ivana Marić Roy D. Yates Gerhard Kramer Stanford WINLAB, Rutgers Bell Labs Ivana.
Chapter 3 TRANSMISSION IMPAIRMENT. 3-4 TRANSMISSION IMPAIRMENT Signals travel through transmission media, which are not perfect. The imperfection causes.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Progress Report for the UCLA OCDMA Project UCLA Graduate School of Engineering - Electrical Engineering Program Communication Systems Laboratory Miguel.
Bridging the Gap: A Deterministic Model for Wireless Links David Tse Wireless Foundations U.C. Berkeley NSF Wireless Networks Workshop Aug 27, 2007 TexPoint.
Impact of Interference on Multi-hop Wireless Network Performance
EECS 290S: Network Information Flow
Advanced Wireless Networks
Ivana Marić, Ron Dabora and Andrea Goldsmith
Distributed MIMO Patrick Maechler April 2, 2008.
Independent Encoding for the Broadcast Channel
Hidden Terminal Decoding and Mesh Network Capacity
The Capacity of Wireless Networks
Watermarking with Side Information
Presentation transcript:

March 18, 2005 Network Coding in Interference Networks Brian Smith and Sriram Vishwanath University of Texas at Austin March 18 th, 2005 Conference on Information Sciences and Systems

March 18, 2005 Overview  Introduction  Interference vs. Non-Interference Networks  Network Coding in Non-Interference Networks  Gaussian Interference Networks  Classic Network Coding Example on a Gaussian Network  Network Coding on “Bow-Tie” Network  Network Coding with Node Cooperation  Summary

March 18, 2005 Introduction  Show by series of examples  Network-coding in interference network can act same as network coding in equivalent non-interference network  Can provide a benefit in interference network when it does not in the equivalent non-interference network  Node-cooperation and network-coding used together can additionally increase throughput

March 18, 2005 Non-Interference vs. Interference Networks  Arbitrary network configuration with conditional probability distributions across links Source Node #2 Terminal Node #1 Terminal Node #2 Terminal Node #3 Source Node #1

March 18, 2005 Non-Interference vs. Interference Networks X1X1 X2X2 X3X3 Y X Y1Y1 Y2Y2 Y3Y3 Interference NetworksNon-Interference Networks Sender is constrained to send the same signal to each receiver Sender not constrained to send the same signal to each receiver X=(X 1,X 2,X 3 ) Signals from different senders arriving at the same receiver interfere with each other Signals from different senders arriving at the same receiver are received independently Y=(Y 1,Y 2,Y 3 ) Multiple Access Model: p(y|x 1,x 2,x 3 ) Multiple Access Model: p(y|x 1,x 2,x 3 )=p(y 1 |x 1 )p(y 2 |x 2 )p(y 3 |x 3 ) Broadcast Model: p(y i |x) Broadcast Model: p(y i |x)=p(y i |x i ) We use additive Gaussian noise channels in examples In most network coding work, channels assumed perfect

March 18, 2005  Ahlswede, Cai, Li, Yeung, 2000  Model  Links transmit single symbol with no errors  Nodes can perform linear operations on received symbols  Result  Multicasting from single source to multiple receivers can be performed at min-cut max-flow rate [ACLY 2000]  Example  Ubiquitous routing vs. network coding example Classic Network Coding

March 18, 2005 The Network Coding Example S B D1D1 D2D2 A+B A BA BA S B D1D1 D2D2 A BA BA B BB Routing Network Coding 1.5 bits to each receiver2 bits to each receiver

March 18, 2005  Use additive complex white Gaussian noise channels in the illustrative examples  Each node has transmit power constraint  Received signal: Y=  X i +   ~ N (0,N)  Point-to-point channel  Capacity: R=lg(1+P/N)  Multiple access channel with independent messages  Sum Rate Capacity: R 1 +R 2 ≤lg(1 +P 1 /N+ P 2 /N) Gaussian Interference Networks X1X1 XY P1P1 X2X2 Y P2P2 P

March 18, 2005  Broadcast Channel with independent messages  Sum Rate Capacity:  R 1 +R 2 ≤ lg (1+P/N)  Multicasting over Broadcast Channel  Same message can be sent to both receivers at point-to-point rate  Broadcast channel with common message  First example: Classic network-coding network configuration with Gaussian channels  Use P=3/2 and N=1 at all nodes  To compare with bit-pipe model Gaussian Interference Networks X P Y1Y1 Y2Y2

March 18, 2005 Gaussian Network Coding Example B D1D1 D2D2 A X Y C=lg(1+3/2+3/2)=2 C=lg(1+3/2) C1C1 C2C2 P P P P

March 18, 2005  Strategies for the classic configuration in interference model  Ignore center nodes X,Y completely  Receive lg(5/2) bits/transmission each  Routing strategy  Constraints if multicasting at broadcast nodes  MACs: 2 bits/transmission  Direct links: lg(5/2) bits/transmission  R A =R B =R XY =R T =1 is viable  Route so that X-Y and Y-D links carry A’s information  1 bit to D 1, 2 bits to D 2, 1.5 bits on average  Can show with linear programming that no better pure routing strategy exists Interference Network Example: Routing B D1D1 D2D2 A X Y P P P P RARA RARA RBRB RBRB RTRT RTRT R XY

March 18, 2005 Interference Network Example: Network Coding  Instead, use the same strategy as in the non-interference network  Set all links to rate 1 bit/transmission  Send A B on links X-Y, Y-D 1, and Y-D 2  Each terminal receives 2 bits/transmission  Rate of 2 bits/transmission is maximum with independent codebooks  cut C 1 across multiple access channel  Exceeding the independent codebooks rate is the subject of the node-cooperation section  Essentially, taking the same actions as the non-interference network B D1D1 D2D2 A X Y P P P P C1C1

March 18, 2005 Aside: Multicasting  In the previous example, all broadcast nodes operated by multicasting  The same amount of information crosses cut C 1 in either mode  But, greater amount crosses each of C 2 and C 3 in the multicasting mode C1C1 C3C3 C2C2 R1R1 R2R2 P C1C1 C3C3 C2C2 R1R1 R2R2 PP (1-  )P R 1 =R 2 =lg(1+P) Multicasting R 1 +R 2 =lg(1+P) Broadcasting

March 18, 2005 Example: Multicasting Outperforms Broadcasting  In the following example, multicasting is superior to broadcasting  Three independent sources  Achievable rate across cut C 1 when center node multicasts:  Final term removes rate of common message  When center node broadcasts R1R1 R2R2 PP’ S1S1 S0S0 S2S2 C1C1

March 18, 2005 Effect of Multicasting  Intuition: Broadcast requirement of the interference network acts like a “T” configuration in the non-interference network  Adding a “bottleneck” link of equal capacity onto the node in the non- interference case constrains the two downlinks to send the same signal  Otherwise, not operating at full capacity  Analogy useful for next example P Multicasting in Interference Network “T” Configuration in Non- Interference Network “Bottleneck” link

March 18, 2005 Bow-Tie Network  Non-interference network: routing performs optimally  Interference Network Strategies  Ignore center node X  Allows lg(1+3/2) bits/transmission to each terminal node  Routing – Center node X alternately chooses A or B to forward  Rate of 1.5 bits/transmission to each terminal node  Network Coding  Node X multicasts A B to both destination nodes  Rate of 2 bits/transmission to each terminal node is optimal  Network Coding is useful in some interference networks when it provides no benefit in the non-interference network with the same configuration A B X D1D1 D2D2

March 18, 2005 Node Cooperation  Network coding is one method of inducing correlations on a network  Other methods:  Using correlated codebooks at separate nodes  Block-Markov coding for relay channel  For non-interference networks, independent coding shown optimal  Demonstrate interference network counter-example  Example: Network coding and node-cooperation in tandem increasing performance P0P0 U U,V V PP D1D1 D2D2

March 18, 2005 Node Cooperation  Nodes T 1 and T 2 have access to data sources U and V, respectively, while node T 0 has access to both U and V  Nodes T 1 and T 2 have power constraint P, while node T 0 has constraint P 0  When P=P 0 =3/2  Routing: 1.5 bits/transmission  Network coding with independent codebooks: 2 bits/transmission P0P0 U U,V V PP D1D1 D2D2 T1T1 T0T0 T2T2

March 18, 2005 Node Cooperation  Network coding with node cooperation scheme:  Three codebooks – for U message, V message, and U V message  Equal timesharing over two modes of operation  In first mode,  Node T 1 transmits U codeword scaled to power P+   Node T 2 transmits V codeword scaled to power P-   Node T 0 splits its power to transmit both U and U V  Second mode: Reverse of first mode P0P0 U U,V V PP D1D1 D2D2 T1T1 T0T0 T2T2

March 18, 2005 Node Cooperation  Network coding with node cooperation scheme:  T 1 and T 0 cooperate to send the codeword for U to D 1  T 0 sends codeword for U V to both D 1 and D 2  T 2 sends codeword for V to D 2  Destinations receive their own sources directly  Destinations can decode the opposite source with U V message  With appropriate choice of parameters  Average rate of 2.06 is achievable at each node P 0 -  0 U U,V V P+  P-  D1D1 D2D2 T1T1 T0T0 T2T2 00

March 18, 2005 Summary  “Bit-pipe” non-interference model is not complete  Neglects interactions between channels  In wireless scenario, imposes orthogonality constraint on channels  Any gains due to node-cooperation necessarily lost  Noisy channel model captures these effects  More difficult to handle  Results for non-interference networks can be duplicated  Configurations exists where bit-pipe model has no network coding gain, while interference model benefits from network coding  Node cooperation strategies can increase the throughput beyond that rate achieved by using independent codebooks