Eecs 290s: Network Information Flow Lecture 18 — October 30

نویسندگان

  • Anant Sahai
  • David Tse
  • Changho Suh
چکیده

First we consider compound channels which have common messages to all the receivers. The best-well known example is TV broadcast. Notice that compound channels are different from broadcast channels with independent messages to different receivers. Fig. 18.1 illustrates the encoding and decoding operations for the compound channel. Since the message is common, we have only one message w. From w, the encoder generates codewords x(w). This passes through different channels (h1, h2, · · · , hK) and we get y 1 , y n 2 , · · · , y K in each receiver, respectively. Since the message is the same, all the receivers also have a common decoder D. Suppose that the channels are non-varying and known to each receiver. Then, the trivial achievable scheme is to generate codewords based on the worst channel. Therefore, we can achieve

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Eecs 290s: Network Information Flow Lecture 10 — October 7 10.1 Outline

The linear deterministic network models are simplified abstractions that try to capture the essential broadcast and superposition aspects of wireless networks, but suppress the role of additive noise by pretending that everything above the noise-level is heard correctly while everything below the noise-level is completely scrambled. This lecture’s objective: Extending the min-cut theorem to gen...

متن کامل

Eecs 290s: Network Information Flow 12.1.2 Details from the Proof for Cyclic/non-layered Linear Relay Networks

• The proof for the layered case used block codes of length T and pipelining. The reason for having large T was to make the probability of error go to zero since we are using a random-coding argument over coding matrices and something needs to go to infinity to make the probability of error go to zero. However, notice that we didn’t actually need the probability of error to go to zero. It just ...

متن کامل

EECS 290 S : Network Information Flow Fall 2008 Lecture 15 — October 16

1. Many-to-One: Multiple senders sending independent information to the same destination t. The destination t is interested in all of the informations. Common practical scenarios with many-to-one communication pattern include cases when a central node is gathering information from multiple nodes in the network. Note that the solution in this case is categorized not by a single rate but by a set...

متن کامل

EECS 291E/ME 290S Lecture 1: Introduction

– thermostat – chemical plants with valves, pumps – control modes for complex systems, eg. intelligent cruise control in automobiles, aircraft autopilot modes • Coordinating processes: systems which are comprised of many interacting subsystems (called multiple agent, or multi-agent systems) typically feature continuous controllers to optimize performance of individual agents, and coordination a...

متن کامل

Eecs 290s: Network Information Flow 16.1 Finishing up on Earlier Lectures

So far, we have focused on modeling channel interaction and the resulting interference. The simplest model that captures this phenomenon was a multi-level binary deterministic model, which gave us an understanding of information flow in networks. However, it is conspicuously missing the role of noise in communication systems. Even so, this deterministic model is reasonable for the high-SNR case...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008