scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Transactions on Information Theory in 2002"


Journal ArticleDOI
TL;DR: An efficient closest point search algorithm, based on the Schnorr-Euchner (1995) variation of the Pohst (1981) method, is implemented and is shown to be substantially faster than other known methods.
Abstract: In this semitutorial paper, a comprehensive survey of closest point search methods for lattices without a regular structure is presented. The existing search strategies are described in a unified framework, and differences between them are elucidated. An efficient closest point search algorithm, based on the Schnorr-Euchner (1995) variation of the Pohst (1981) method, is implemented. Given an arbitrary point x /spl isin/ /spl Ropf//sup m/ and a generator matrix for a lattice /spl Lambda/, the algorithm computes the point of /spl Lambda/ that is closest to x. The algorithm is shown to be substantially faster than other known methods, by means of a theoretical comparison with the Kannan (1983, 1987) algorithm and an experimental comparison with the Pohst (1981) algorithm and its variants, such as the Viterbo-Boutros (see ibid. vol.45, p.1639-42, 1999) decoder. Modifications of the algorithm are developed to solve a number of related search problems for lattices, such as finding a shortest vector, determining the kissing number, computing the Voronoi (1908)-relevant vectors, and finding a Korkine-Zolotareff (1873) reduced basis.

1,616 citations


Journal ArticleDOI
TL;DR: This work proposes a high-rate coding scheme that can handle any configuration of transmit and receive antennas and that subsumes both V-BLAST and many proposed space-time block codes as special cases and shows that their performance is generally superior to earlier proposed methods over a wide range of rates and signal-to-noise ratios (SNRs).
Abstract: Multiple-antenna systems that operate at high rates require simple yet effective space-time transmission schemes to handle the large traffic volume in real time. At rates of tens of bits per second per hertz, Vertical Bell Labs Layered Space-Time (V-BLAST), where every antenna transmits its own independent substream of data, has been shown to have good performance and simple encoding and decoding. Yet V-BLAST suffers from its inability to work with fewer receive antennas than transmit antennas-this deficiency is especially important for modern cellular systems, where a base station typically has more antennas than the mobile handsets. Furthermore, because V-BLAST transmits independent data streams on its antennas there is no built-in spatial coding to guard against deep fades from any given transmit antenna. On the other hand, there are many previously proposed space-time codes that have good fading resistance and simple decoding, but these codes generally have poor performance at high data rates or with many antennas. We propose a high-rate coding scheme that can handle any configuration of transmit and receive antennas and that subsumes both V-BLAST and many proposed space-time block codes as special cases. The scheme transmits substreams of data in linear combinations over space and time. The codes are designed to optimize the mutual information between the transmitted and received signals. Because of their linear structure, the codes retain the decoding simplicity of V-BLAST, and because of their information-theoretic optimality, they possess many coding advantages. We give examples of the codes and show that their performance is generally superior to earlier proposed methods over a wide range of rates and signal-to-noise ratios (SNRs).

1,506 citations


Journal ArticleDOI
TL;DR: The fundamental bandwidth-power tradeoff of a general class of channels in the wideband regime characterized by low, but nonzero, spectral efficiency and energy per bit close to the minimum value required for reliable communication is found.
Abstract: The tradeoff of spectral efficiency (b/s/Hz) versus energy-per-information bit is the key measure of channel capacity in the wideband power-limited regime. This paper finds the fundamental bandwidth-power tradeoff of a general class of channels in the wideband regime characterized by low, but nonzero, spectral efficiency and energy per bit close to the minimum value required for reliable communication. A new criterion for optimality of signaling in the wideband regime is proposed, which, in contrast to the traditional criterion, is meaningful for finite-bandwidth communication.

1,320 citations


Journal ArticleDOI
TL;DR: The capacity of multiple-antenna fading channels is studied using a noncoherent block fading model proposed by Marzetta and Hochwald and has a geometric interpretation as sphere packing in the Grassmann manifold.
Abstract: We study the capacity of multiple-antenna fading channels. We focus on the scenario where the fading coefficients vary quickly; thus an accurate estimation of the coefficients is generally not available to either the transmitter or the receiver. We use a noncoherent block fading model proposed by Marzetta and Hochwald (see ibid. vol.45, p.139-57, 1999). The model does not assume any channel side information at the receiver or at the transmitter, but assumes that the coefficients remain constant for a coherence interval of length T symbol periods. We compute the asymptotic capacity of this channel at high signal-to-noise ratio (SNR) in terms of the coherence time T, the number of transmit antennas M, and the number of receive antennas N. While the capacity gain of the coherent multiple antenna channel is min{M, N} bits per second per Hertz for every 3-dB increase in SNR, the corresponding gain for the noncoherent channel turns out to be M* (1 - M*/T) bits per second per Hertz, where M*=min{M, N, [T/2]}. The capacity expression has a geometric interpretation as sphere packing in the Grassmann manifold.

1,096 citations


Journal ArticleDOI
TL;DR: Results show that empirical capacities converge to the limit capacity predicted from the asymptotic theory even at moderate n = 16, and the assumption of separable transmit/receive correlations via simulations based on a ray-tracing propagation model is analyzed.
Abstract: Previous studies have shown that single-user systems employing n-element antenna arrays at both the transmitter and the receiver can achieve a capacity proportional to n, assuming independent Rayleigh fading between antenna pairs. We explore the capacity of dual-antenna-array systems under correlated fading via theoretical analysis and ray-tracing simulations. We derive and compare expressions for the asymptotic growth rate of capacity with n antennas for both independent and correlated fading cases; the latter is derived under some assumptions about the scaling of the fading correlation structure. In both cases, the theoretic capacity growth is linear in n but the growth rate is 10-20% smaller in the presence of correlated fading. We analyze our assumption of separable transmit/receive correlations via simulations based on a ray-tracing propagation model. Results show that empirical capacities converge to the limit capacity predicted from our asymptotic theory even at moderate n = 16. We present results for both the cases when the transmitter does and does not know the channel realization.

1,039 citations


Journal ArticleDOI
TL;DR: Nested codes are proposed, or more specifically, nested parity-check codes for the binary case and nested lattices in the continuous case, which connect network information theory with the rich areas of linear codes and lattice codes, and have strong potential for practical applications.
Abstract: Network information theory promises high gains over simple point-to-point communication techniques, at the cost of higher complexity. However, lack of structured coding schemes limited the practical application of these concepts so far. One of the basic elements of a network code is the binning scheme. Wyner (1974, 1978) and other researchers proposed various forms of coset codes for efficient binning, yet these schemes were applicable only for lossless source (or noiseless channel) network coding. To extend the algebraic binning approach to lossy source (or noisy channel) network coding, previous work proposed the idea of nested codes, or more specifically, nested parity-check codes for the binary case and nested lattices in the continuous case. These ideas connect network information theory with the rich areas of linear codes and lattice codes, and have strong potential for practical applications. We review these developments and explore their tight relation to concepts such as combined shaping and precoding, coding for memories with defects, and digital watermarking. We also propose a few novel applications adhering to a unified approach.

1,008 citations


Journal ArticleDOI
TL;DR: In this paper, the exact average bit and block erasure probability for a given regular ensemble of LDPC codes when decoded iteratively was derived for the binary erasure channel (BEC).
Abstract: In this paper, we are concerned with the finite-length analysis of low-density parity-check (LDPC) codes when used over the binary erasure channel (BEC). The main result is an expression for the exact average bit and block erasure probability for a given regular ensemble of LDPC codes when decoded iteratively. We also give expressions for upper bounds on the average bit and block erasure probability for regular LDPC ensembles and the standard random ensemble under maximum-likelihood (ML) decoding. Finally, we present what we consider to be the most important open problems in this area.

959 citations


Journal ArticleDOI
TL;DR: An overview of statistical and information-theoretic aspects of hidden Markov processes (HMPs) is presented and consistency and asymptotic normality of the maximum-likelihood parameter estimator were proved under some mild conditions.
Abstract: An overview of statistical and information-theoretic aspects of hidden Markov processes (HMPs) is presented. An HMP is a discrete-time finite-state homogeneous Markov chain observed through a discrete-time memoryless invariant channel. In recent years, the work of Baum and Petrie (1966) on finite-state finite-alphabet HMPs was expanded to HMPs with finite as well as continuous state spaces and a general alphabet. In particular, statistical properties and ergodic theorems for relative entropy densities of HMPs were developed. Consistency and asymptotic normality of the maximum-likelihood (ML) parameter estimator were proved under some mild conditions. Similar results were established for switching autoregressive processes. These processes generalize HMPs. New algorithms were developed for estimating the state, parameter, and order of an HMP, for universal coding and classification of HMPs, and for universal decoding of hidden Markov channels. These and other related topics are reviewed.

897 citations


Journal ArticleDOI
TL;DR: The tradeoff between the average delay and the average transmission power required for reliable communication is analyzed and a dynamic programming formulation is given to find all Pareto optimal power/delay operating points.
Abstract: We consider a user communicating over a fading channel with perfect channel state information. Data are assumed to arrive from some higher layer application and are stored in a buffer until transmitted. We study adapting the user's transmission rate and power based on the channel state information as well as the buffer occupancy; the objectives are to regulate both the long-term average transmission power and the average buffer delay incurred by the traffic. Two models for this situation are discussed; one corresponding to fixed-length/variable-rate codewords and one corresponding to variable-length codewords. The tradeoff between the average delay and the average transmission power required for reliable communication is analyzed. A dynamic programming formulation is given to find all Pareto optimal power/delay operating points. We then quantify the behavior of this tradeoff in the regime of asymptotically large delay. In this regime, we characterize simple buffer control policies which exhibit optimal characteristics. Connections to the delay-limited capacity and the expected capacity of fading channels are also discussed.

752 citations


Journal ArticleDOI
TL;DR: In the classical analog of entanglement-assisted communication - communication over a discrete memoryless channel (DMC) between parties who share prior random information - one parameter is sufficient, i.e., that in the presence of prior shared random information, all DMCs of equal capacity can simulate one another with unit asymptotic efficiency.
Abstract: The entanglement-assisted classical capacity of a noisy quantum channel (C/sub E/) is the amount of information per channel use that can be sent over the channel in the limit of many uses of the channel, assuming that the sender and receiver have access to the resource of shared quantum entanglement, which may be used up by the communication protocol. We show that the capacity C/sub E/ is given by an expression parallel to that for the capacity of a purely classical channel: i.e., the maximum, over channel inputs /spl rho/, of the entropy of the channel input plus the entropy of the channel output minus their joint entropy, the latter being defined as the entropy of an entangled purification of /spl rho/ after half of it has passed through the channel. We calculate entanglement-assisted capacities for two interesting quantum channels, the qubit amplitude damping channel and the bosonic channel with amplification/attenuation and Gaussian noise. We discuss how many independent parameters are required to completely characterize the asymptotic behavior of a general quantum channel, alone or in the presence of ancillary resources such as prior entanglement. In the classical analog of entanglement-assisted communication - communication over a discrete memoryless channel (DMC) between parties who share prior random information - we show that one parameter is sufficient, i.e., that in the presence of prior shared random information, all DMCs of equal capacity can simulate one another with unit asymptotic efficiency.

724 citations


Journal ArticleDOI
TL;DR: The main contribution in this paper is the improvement of an important result due to Donoho and Huo (2001) concerning the replacement of the l/sub 0/ optimization problem by a linear programming minimization when searching for the unique sparse representation.
Abstract: An elementary proof of a basic uncertainty principle concerning pairs of representations of R/sup N/ vectors in different orthonormal bases is provided. The result, slightly stronger than stated before, has a direct impact on the uniqueness property of the sparse representation of such vectors using pairs of orthonormal bases as overcomplete dictionaries. The main contribution in this paper is the improvement of an important result due to Donoho and Huo (2001) concerning the replacement of the l/sub 0/ optimization problem by a linear programming (LP) minimization when searching for the unique sparse representation.

Journal ArticleDOI
TL;DR: The performance of uncoded, fully synchronous, randomly spread code-division multiple-access (CDMA) multiuser detectors with additive white Gaussian noise (AWGN) channel, under perfect power control, and in the large-system limit is evaluated.
Abstract: We present a theory, based on statistical mechanics, to evaluate analytically the performance of uncoded, fully synchronous, randomly spread code-division multiple-access (CDMA) multiuser detectors with additive white Gaussian noise (AWGN) channel, under perfect power control, and in the large-system limit. Application of the replica method, a tool developed in the literature of statistical mechanics, allows us to derive analytical expressions for the bit-error rate, as well as the multiuser efficiency, of the individually optimum (IO) and jointly optimum (JO) multiuser detectors over the whole range of noise levels. The information-theoretic capacity of the randomly spread CDMA channel and the performance of decorrelating and linear minimum mean-square error (MMSE) detectors are also derived in the same replica formulation, thereby demonstrating validity of the statistical-mechanical approach.

Journal ArticleDOI
TL;DR: The case when the transmitter has partial, but not perfect, knowledge about the channel and how to improve a predetermined code so that this fact is taken into account is considered and a particularly efficient solution method is developed for the special case of independently fading channel coefficients.
Abstract: Multiple transmit and receive antennas can be used in wireless systems to achieve high data rate communication. Efficient space-time codes have been developed that utilize a large portion of the available capacity. These codes are designed under the assumption that the transmitter has no knowledge about the channel. In this work, on the other hand, we consider the case when the transmitter has partial, but not perfect, knowledge about the channel and how to improve a predetermined code so that this fact is taken into account. A performance criterion is derived for a frequency-nonselective fading channel and then utilized to optimize a linear transformation of the predetermined code. The resulting optimization problem turns out to be convex and can thus be efficiently solved using standard methods. In addition, a particularly efficient solution method is developed for the special case of independently fading channel coefficients. The proposed transmission scheme combines the benefits of conventional beamforming with those given by orthogonal space-time block coding. Simulation results for a narrow-band system with multiple transmit antennas and one or more receive antennas demonstrate significant gains over conventional methods in a scenario with nonperfect channel knowledge.

Journal ArticleDOI
TL;DR: In this article, the authors present a simple proof of the strong converse for identification via discrete memoryless quantum channels, based on a novel covering lemma, which involves a development of explicit large deviation estimates to the case of random variables taking values in self-adjoint operators on a Hilbert space.
Abstract: We present a simple proof of the strong converse for identification via discrete memoryless quantum channels, based on a novel covering lemma. The new method is a generalization to quantum communication channels of Ahlswede's (1979, 1992) approach to classical channels. It involves a development of explicit large deviation estimates to the case of random variables taking values in self-adjoint operators on a Hilbert space. This theory is presented separately in an appendix, and we illustrate it by showing its application to quantum generalizations of classical hypergraph covering problems.

Journal ArticleDOI
Olav Tirkkonen1, Ari Hottinen1
TL;DR: A complete classification of linear codes is given in the case when the symbol constellations are complex, and the code is based on a square matrix or restriction of such by deleting columns (antennas).
Abstract: Space-time block codes for providing transmit diversity in wireless communication systems are considered. Based on the principles of linearity and unitarity, a complete classification of linear codes is given in the case when the symbol constellations are complex, and the code is based on a square matrix or restriction of such by deleting columns (antennas). Maximal rate delay optimal codes are constructed within this category. The maximal rates allowed by linearity and unitarity fall off exponentially with the number of transmit antennas.

Journal ArticleDOI
TL;DR: This work expands on the work on quantum data hiding and shows how the scheme that hides one bit between two parties using Bell (1964) states can be used in a conditionally secure quantum bit commitment scheme.
Abstract: We expand on our work on quantum data hiding - hiding classical data among parties who are restricted to performing only local quantum operations and classical communication (LOCC). We review our scheme that hides one bit between two parties using Bell (1964) states, and we derive upper and lower bounds on the secrecy of the hiding scheme. We provide an explicit bound showing that multiple bits can be hidden bitwise with our scheme. We give a preparation of the hiding states as an efficient quantum computation that uses at most one ebit of entanglement. A candidate data-hiding scheme that does not use entanglement is presented. We show how our scheme for quantum data hiding can be used in a conditionally secure quantum bit commitment scheme.

Journal ArticleDOI
TL;DR: A new family of linear space-time block codes is constructed by the combination of rotated constellations and the Hadamard transform, and it is shown that using the proposed codes in a multiantenna system yields good performances with high spectral efficiency and moderate decoding complexity.
Abstract: We construct a new family of linear space-time (ST) block codes by the combination of rotated constellations and the Hadamard transform, and we prove them to achieve the full transmit diversity over a quasi-static or fast fading channels. The proposed codes transmit at a normalized rate of 1 symbol/s. When the number of transmit antennas n=1, 2, or n is a multiple of four, we spread a rotated version of the information symbol vector by the Hadamard transform and send it over n transmit antennas and n time periods; for other values of n, we construct the codes by sending the components of a rotated version of the information symbol vector over the diagonal of an n /spl times/ n ST code matrix. The codes maintain their rate, diversity, and coding gains for all real and complex constellations carved from the complex integers ring Z [i], and they outperform the codes from orthogonal design when using complex constellations for n > 2. The maximum-likelihood (ML) decoding of the proposed codes can be implemented by the sphere decoder at a moderate complexity. It is shown that using the proposed codes in a multiantenna system yields good performances with high spectral efficiency and moderate decoding complexity.

Journal ArticleDOI
TL;DR: The problem of placing training symbols optimally for orthogonal frequency-division multiplexing (OFDM) and single-carrier systems is considered and the lower bound is maximized by a family of placement schemes called QPP-/spl alpha/, where QPP stands for quasi-periodic placement.
Abstract: The problem of placing training symbols optimally for orthogonal frequency-division multiplexing (OFDM) and single-carrier systems is considered. The channel is assumed to be quasi-static with a finite impulse response of length (L + 1) samples. Under the assumptions that neither the transmitter nor the receiver knows the channel, and that the receiver forms a minimum mean square error (MMSE) channel estimate based on training symbols only, training is optimized by maximizing a tight lower bound on the ergodic training-based independent and identically distributed (i.i.d.) capacity. For OFDM systems, it is shown that the lower bound is maximized by placing the known symbols periodically in frequency. For single-carrier systems, under the assumption that the training symbols are placed in clusters of length /spl alpha/ /spl ges/ (2L + 1), it is shown that the lower bound is maximized by a family of placement schemes called QPP-/spl alpha/, where QPP stands for quasi-periodic placement. These placement schemes are formed by grouping the known symbols into as many clusters as possible and then placing these clusters periodically in the packet. For both OFDM and single-carrier systems, the optimum energy tradeoff between training and data is also obtained.

Journal ArticleDOI
TL;DR: It is shown that the new code outperforms the Alamouti code at low and high signal-to-noise ratio (SNR) when the number of receive antennas N>1, and the performance improvement is further enhanced when N or the size of the constellation increases.
Abstract: We construct a full data rate space-time (ST) block code over M=2 transmit antennas and T=2 symbol periods, and we prove that it achieves a transmit diversity of 2 over all constellations carved from Z[i]/sup 4/. Further, we optimize the coding gain of the proposed code and then compare it to the Alamouti code. It is shown that the new code outperforms the Alamouti (see IEEE J Select. Areas Commun., vol.16, p.1451-58, 1998) code at low and high signal-to-noise ratio (SNR) when the number of receive antennas N>1. The performance improvement is further enhanced when N or the size of the constellation increases. We relate the problem of ST diversity gain to algebraic number theory, and the coding gain optimization to the theory of simultaneous Diophantine approximation in the geometry of numbers. We find that the coding gain optimization is equivalent to finding irrational numbers "the furthest," from any simultaneous rational approximations.

Journal ArticleDOI
U. Mittal1, N. Phamdo
TL;DR: It is demonstrated that robust codes exist whenever the source and channel bandwidths are equal and a matched tandem code whose channel encoder's output is partially/fully matched to its input is proposed and the existence of an asymptotically optimal matched tandemcode is shown.
Abstract: We consider the problem of transmitting a band-limited Gaussian source on an additive band-limited Gaussian noise channel. The well-known "threshold effect" dictates that the more powerful a code is, the more sensitive it is to the exact knowledge of the channel noise. A code is said to be robust if it is asymptotically optimal for a wide range of channel noise. Thus, robust codes have a "graceful degradation" characteristic and are free of the threshold effect. It is demonstrated that robust codes exist whenever the source and channel bandwidths are equal. In the unequal-bandwidth case, a collection of nearly robust joint source-channel codes is constructed using a hybrid digital-analog (HDA) coding technique. For designing nearly robust codes, a matched tandem code whose channel encoder's output is partially/fully matched to its input is proposed and the existence of an asymptotically optimal matched tandem code is shown. The nearly robust codes achieve the Shannon limit (theoretically optimum distortion) and have a less severe threshold effect. Finally, for the case of two different noise conditions, the distortion regions of these codes are determined.

Journal ArticleDOI
TL;DR: Simulations show that the Cayley codes allow efficient and effective high-rate data transmission in multiantenna communication systems without knowing the channel.
Abstract: One method for communicating with multiple antennas is to encode the transmitted data differentially using unitary matrices at the transmitter, and to decode differentially without knowing the channel coefficients at the receiver. Since channel knowledge is not required at the receiver, differential schemes are ideal for use on wireless links where channel tracking is undesirable or infeasible, either because of rapid changes in the channel characteristics or because of limited system resources. Although this basic principle is well understood, it is not known how to generate good-performing constellations of unitary matrices, for any number of transmit and receive antennas and for any rate. This is especially true at high rates where the constellations must be rapidly encoded and decoded. We propose a class of Cayley codes that works with any number of antennas, and has efficient encoding and decoding at any rate. The codes are named for their use of the Cayley transform, which maps the highly nonlinear Stiefel manifold of unitary matrices to the linear space of skew-Hermitian matrices. This transformation leads to a simple linear constellation structure in the Cayley transform domain and to an information-theoretic design criterion based on emulating a Cauchy random matrix. Moreover, the resulting Cayley codes allow polynomial-time near-maximum-likelihood (ML) decoding based on either successive nulling/canceling or sphere decoding. Simulations show that the Cayley codes allow efficient and effective high-rate data transmission in multiantenna communication systems without knowing the channel.

Journal ArticleDOI
Alexander Barg1, D.Yu. Nogin
TL;DR: The Gilbert-Varshamov and Hamming bounds for packings of spheres (codes) in the Grassmann manifolds over R and C are derived.
Abstract: We derive the Gilbert-Varshamov and Hamming bounds for packings of spheres (codes) in the Grassmann manifolds over R and C. Asymptotic expressions are obtained for the geodesic metric and projection Frobenius (chordal) metric on the manifold.

Journal ArticleDOI
TL;DR: In this paper, the duality between channel capacity and data compression is retained when state information is available to the sender, to the receiver, to both, or to neither, and a unified theory for eight special cases of channel capacity with state information was presented.
Abstract: We show that the duality between channel capacity and data compression is retained when state information is available to the sender, to the receiver, to both, or to neither. We present a unified theory for eight special cases of channel capacity and rate distortion with state information, which also extends existing results to arbitrary pairs of independent and identically distributed (i.i.d.) correlated state information (S/sub 1/, S/sub 2/) available at the sender and at the receiver, respectively. In particular, the resulting general formula for channel capacity C = max/sub p/(u,x|s/sub 1/) [I(U; S/sub 2/, Y) I(U; S/sub 1/)] assumes the same form as the generalized Wyner-Ziv (1976) rate distortion function R(D) = min/sub p/(u|x, s/sub 1/)p(x/spl I.cap/|u, s/sub 2/) [I(U; S/sub 1/, X) 1(U; S/sub 2/)].

Journal ArticleDOI
TL;DR: It is shown that very large bandwidths on fading multipath channels cannot be effectively utilized by spread-spectrum systems that spread the available power uniformly over both time and frequency.
Abstract: We show that very large bandwidths on fading multipath channels cannot be effectively utilized by spread-spectrum systems that (in a particular sense) spread the available power uniformly over both time and frequency. The approach is to express the input process as an expansion in an orthonormal set of functions each localized in time and frequency. The fourth moment of each coefficient in this expansion is then uniformly constrained. We show that such a constraint forces the mutual information to 0 inversely with increasing bandwidth. Simply constraining the second moment of these coefficients does not achieve this effect. The results suggest strongly that conventional direct-sequence code-division multiple-access (CDMA) systems do not scale well to extremely large bandwidths. To illustrate how the interplay between channel estimation and symbol detection affects capacity, we present results for a specific channel and CDMA signaling scheme.

Journal ArticleDOI
TL;DR: In this paper, the authors derived expressions for the average distance distributions in several ensembles of regular low-density parity-check codes (LDPC) for bipartite graphs.
Abstract: We derive expressions for the average distance distributions in several ensembles of regular low-density parity-check codes (LDPC). Among these ensembles are the standard one defined by matrices having given column and row sums, ensembles defined by matrices with given column sums or given row sums, and an ensemble defined by bipartite graphs.

Journal ArticleDOI
TL;DR: The capacity of wireless communication architectures equipped with multiple transmit and receive antennas and impaired by both noise and cochannel interference is studied and a closed-form solution is found for the capacity in the limit of a large number of antennas.
Abstract: The capacity of wireless communication architectures equipped with multiple transmit and receive antennas and impaired by both noise and cochannel interference is studied. We find a closed-form solution for the capacity in the limit of a large number of antennas. This asymptotic solution, which is a sole function of the relative number of transmit and receive antennas and the signal-to-noise and signal-to-interference ratios (SNR and SIR), is then particularized to a number of cases of interest. By verifying that antenna diversity one can substitute for time and/or frequency diversity at providing ergodicity, we show that these asymptotic solutions approximate the ergodic capacity very closely even when the number of antennas is very small.

Journal ArticleDOI
TL;DR: Three types of algorithm that use loss measurements to infer the underlying multicast topology are proposed: a grouping estimator that exploits the monotonicity of loss rates with increasing path length; a maximum-likelihood estimator (MLE); and a Bayesian estimator.
Abstract: The use of multicast inference on end-to-end measurement has been proposed as a means to infer network internal characteristics such as packet link loss rate and delay. We propose three types of algorithm that use loss measurements to infer the underlying multicast topology: (i) a grouping estimator that exploits the monotonicity of loss rates with increasing path length; (ii) a maximum-likelihood estimator (MLE); and (iii) a Bayesian estimator. We establish their consistency, compare their complexity and accuracy, and analyze the modes of failure and their asymptotic probabilities.

Journal ArticleDOI
TL;DR: A random matrix model is introduced that probabilistically describes the spatial and temporal multipath propagation between a transmitting and receiving antenna array with a limited number of scatterers for mobile radio and indoor environments and quantifies to what extent rich scattering improves performance.
Abstract: A random matrix model is introduced that probabilistically describes the spatial and temporal multipath propagation between a transmitting and receiving antenna array with a limited number of scatterers for mobile radio and indoor environments. The model characterizes the channel by its richness delay profile which gives the number of scattering objects as a function of the path delay. Each delay is assigned the eigenvalue distribution of a random matrix that depends on the number of scatterers, receiving antennas, and transmitting antennas. The model allows one to calculate signal-to-interference-and-noise ratios (SINRs) and channel capacities for large antenna arrays analytically and quantifies to what extent rich scattering improves performance.

Journal ArticleDOI
TL;DR: The d-FCSR, a slight modification of the (Fibonacci) FCSR architecture in which the feedback bit is delayed for d clock cycles before being returned to the first cell of the shift register, admits a more efficient "Galois" architecture.
Abstract: A feedback-with-carry shift register (FCSR) with "Fibonacci" architecture is a shift register provided with a small amount of memory which is used in the feedback algorithm. Like the linear feedback shift register (LFSR), the FCSR provides a simple and predictable method for the fast generation of pseudorandom sequences with good statistical properties and large periods. In this paper, we describe and analyze an alternative architecture for the FCSR which is similar to the "Galois" architecture for the LFSR. The Galois architecture is more efficient than the Fibonacci architecture because the feedback computations are performed in parallel. We also describe the output sequences generated by the d-FCSR, a slight modification of the (Fibonacci) FCSR architecture in which the feedback bit is delayed for d clock cycles before being returned to the first cell of the shift register. We explain how these devices may be configured so as to generate sequences with large periods. We show that the d-FCSR also admits a more efficient "Galois" architecture.

Journal ArticleDOI
Gerhard Kramer1
TL;DR: This paper considers the case where K messages are transmitted through the network in a point-to-point manner, i.e., each message is encoded by exactly one transmitter and is destined for exactly one receiver.
Abstract: A white Gaussian interference network is a channel with T transmitters and R receivers where the received symbols are linear combinations of the transmitted symbols and white Gaussian noise. This paper considers the case where K messages are transmitted through the network in a point-to-point manner, i.e., each message is encoded by exactly one transmitter and is destined for exactly one receiver. It is further assumed that feedback is available so that each transmitter sees the outputs of the receivers to which it is sending messages. Communication strategies based on the discrete Fourier transform (DFT) are developed that perform well for such networks. For multiple-access channels (K=T, R=1) with equal transmitter powers the strategies achieve the feedback sum-rate capacity if the powers are beyond some threshold. For the same channels with fixed transmitter powers and large K, the achievable sum-rate is approximately (log log K)/2 larger than the sum-rate capacity without feedback. For broadcast channels (T=1, K=R) with strong symmetries, the strategies achieve a monotonically increasing sum-rate with K. For interference channels (K=T=R) with strong interference, the strategies significantly enlarge the no-feedback capacity region by "correlation routing.".