This paper considers a general Gaussian relay network where a source transmits a message to a destination with the help of N half-duplex relays. It proves that the information theoretic cut-set upper bound to the capacity can be achieved to within 2.021(N + 2) bits with noisy network coding, thereby reducing the previously known gap. Further improved gap results are presented for more structured networks like diamond networks.It is then shown that the generalized Degrees-of-Freedom of a general Gaussian half-duplex relay network is the solution of a linear program, where the coefficients of the linear inequality constraints are proved to be the solution of several linear programs, known in graph theory as the assignment problem, for which efficient numerical algorithms exist. The optimal schedule, that is, the optimal value of the for a general N -relay network with N ≤ 8, the optimal schedule has at most N + 1 states with strictly positive probability. As an extension of a conjecture presented for diamond networks, it is conjectured that this result holds for any HD relay network and any number of relays.Finally, a 2-relay network is studied to determine the channel conditions under which selecting the best relay is not optimal, and to highlight the nature of the rate gain due to multiple relays.
This paper considers the two-user Gaussian Causal Cognitive Interference Channel (GCCIC), which consists of two source-destination pairs that share the same channel and where one full-duplex cognitive source can causally learn the message of the primary source through a noisy link. The GCCIC is an interference channel with unilateral source cooperation that better models practical cognitive radio networks than the commonly used model which assumes that one source has perfect non-causal knowledge of the other source's message.First the sum-capacity of the symmetric GCCIC is determined to within a constant gap. Then, the insights gained from the derivation of the symmetric sum-capacity are extended to characterize the whole capacity region to within a constant gap for more general cases. In particular, the capacity is determined (a) to within 2 bits for the fully connected GCCIC when, roughly speaking, the interference is not weak at both receivers, (b) to within 2 bits for the Z-channel, i.e., when there is no interference from the primary user, and (c) to within 2 bits for the S-channel, i.e., when there is no interference from the secondary user. M. Cardone and R. Knopp are withThe parameter regimes where the GCCIC is equivalent, in terms of generalized degrees-of-freedom, to the noncooperative interference channel (i.e., unilateral causal cooperation is not useful), to the noncausal cognitive interference channel (i.e., causal cooperation attains the ultimate limit of cognitive radio technology), and to bilateral source cooperation are identified. These comparisons shed lights into the parameter regimes and network topologies that in practice might provide an unbounded throughput gain compared to currently available (non cognitive) technologies.
Abstract-The problem of operating a Gaussian Half-Duplex (HD) relay network optimally is challenging due to the exponential number of listen/transmit network states that need to be considered. Recent results have shown that, for the class of Gaussian HD networks with N relays, there always exists a simple schedule, i.e., with at most N +1 active states, that is sufficient for approximate (i.e., up to a constant gap) capacity characterization. This paper investigates how to efficiently find such a simple schedule over line networks. Towards this end, a polynomialtime algorithm is designed and proved to output a simple schedule that achieves the approximate capacity. The key ingredient of the algorithm is to leverage similarities between network states in HD and edge coloring in a graph. It is also shown that the algorithm allows to derive a closed-form expression for the approximate capacity of the Gaussian line network that can be evaluated distributively and in linear time. Additionally, it is shown using this closed-form that the problem of Half-Duplex routing is NPHard.
Using a broadcast channel to transmit clients' data requests may impose privacy risks. In this paper, we address such privacy concerns in the index coding framework. We show how a malicious client can infer some information about the requests and side information of other clients by learning the encoding matrix used by the server. We propose an information-theoretic metric to measure the level of privacy and show how encoding matrices can be designed to achieve specific privacy guarantees. We then consider a special scenario for which we design a transmission scheme and derive the achieved levels of privacy in closed-form. We also derive upper bounds and we compare them to the levels of privacy achieved by our scheme, highlighting that an inherent trade-off exists between protecting privacy of the request and of the side information of the clients.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.