2012
DOI: 10.1109/wcl.2012.041612.120093
|View full text |Cite
|
Sign up to set email alerts
|

Piggybacking an Additional Lonely Bit on Linearly Coded Payload Data

Abstract: Abstract-We provide a coding scheme, by which an additional lonely bit can be piggybacked on a payload data packet encoded with a linear channel code, at no essential extra cost in power or bandwidth. The underlying principle is to use the additional bit to select which of two linear codes that should be used for encoding the payload packet, this way effectively creating a nonlinear code. We give a fast algorithm for detecting the additional bit, without decoding the data packet. Applications include control s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 19 publications
(29 citation statements)
references
References 8 publications
0
29
0
Order By: Relevance
“…Moreover, unlike HTC, in MTC the data traffic is uplink-driven with packet sizes going down as low as a few bits [7]. An example of a single-bit transmission is the transmission of ACK/NACK bits [8]. In the mMTC context, the amount of signaling overhead per packet can become very significant compared to traditional setups with mainly humandriven traffic [9].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, unlike HTC, in MTC the data traffic is uplink-driven with packet sizes going down as low as a few bits [7]. An example of a single-bit transmission is the transmission of ACK/NACK bits [8]. In the mMTC context, the amount of signaling overhead per packet can become very significant compared to traditional setups with mainly humandriven traffic [9].…”
Section: Introductionmentioning
confidence: 99%
“…There are practical solutions for transmission of a single bit of control information. For example, [21] considers the joint transmission of linearly coded payload data and a single "additional bit". The transmitter uses the additional bit, through a one-to-one mapping, to select one out of two possible codebooks for the encoding of the payload.…”
Section: A Motivationmentioning
confidence: 99%
“…We choose the columns of A uniformly i.i.d. from the sphere of radius √ L. Notice also that if one wishes to send the same payload message using the piggybacking scheme of [26,33], each user should make use of 2 96 columns, which is totally impractical.…”
Section: Simulationsmentioning
confidence: 99%