Protocol Coding through Reordering of User Resources: Applications and Capacity Results
نویسندگان
چکیده
While there are continuous efforts to introduce new communication systems and standards, it is legitimate to ask the question: how can one send additional bits by minimally changing the systems that are already operating? This is of a significant practical interest, since it has a potential to generate additional value of the systems through, for example, introduction of new devices and only a software update of the access points or base stations, without incurring additional cost for infrastructure hardware installation. The place to look for such an opportunity is the communication protocol and we use the term protocol coding to refer to strategies for sending information by using the degrees of freedom available when one needs to decide the actions taken by a particular communication protocol. In this paper we consider protocol coding that gives a rise to secondary communication channels, defined by combinatorial ordering of the user resources (packets, channels) in a primary (legacy) communication system. We introduce communication models that enable us to compute the capacity of such secondary channels under suitable restrictions imposed by the primary systems. We first show the relation to the capacity of channels with causal channel state information at the transmitter (CSIT), originally considered by Shannon. By using the specific communication setup, we develop an alternative framework for achieving the capacity and we discuss coding strategies that need to be used over the secondary channels. We also discuss some practical features of the secondary channels and their applications that add value to the existing wireless systems. ar X iv :1 01 1. 57 39 v1 [ cs .I T ] 2 6 N ov 2 01 0
منابع مشابه
Protocol Coding through Reordering of User Resources, Part I: Capacity Results
The vast existing wireless infrastructure features a variety of systems and standards. It is of significant practical value to introduce new features and devices without changing the physical layer/hardware infrastructure, but upgrade it only in software. A way to achieve it is to apply protocol coding: encode information in the actions taken by a certain (existing) communication protocol. In t...
متن کاملProtocol Coding through Reordering of User Resources, Part II: Practical Coding Strategies
We use the term protocol coding to denote the communication strategies in which information is encoded through the actions taken by a certain communication protocol. In this work we investigate strategies for protocol coding via combinatorial ordering of the labelled user resources (packets, channels) in an existing, primary system. This introduces a new, secondary communication channel in the ...
متن کاملSecurity testing of session initiation protocol implementations
The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...
متن کاملDistributed Active Element for High-Performance Data Distribution
Requirement on multi-point data distribution in IP networks assumes some distribution service, be it implemented as a part of network native services (IP multicast) or user-empowered solution (data reflectors). In our previous work, we have introduced user-empowered distribution networks based on Active Elements (AE) [1], which scale well in terms of number of clients connected. It is however n...
متن کاملپروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1011.5739 شماره
صفحات -
تاریخ انتشار 2010