Protocol Coding through Reordering of User Resources: Applications and Capacity Results

نویسندگان

  • Petar Popovski
  • Zoran Utkovski
چکیده

While there are continuous efforts to introduce new communication systems and standards, it is legitimate to ask the question: how can one send additional bits by minimally changing the systems that are already operating? This is of a significant practical interest, since it has a potential to generate additional value of the systems through, for example, introduction of new devices and only a software update of the access points or base stations, without incurring additional cost for infrastructure hardware installation. The place to look for such an opportunity is the communication protocol and we use the term protocol coding to refer to strategies for sending information by using the degrees of freedom available when one needs to decide the actions taken by a particular communication protocol. In this paper we consider protocol coding that gives a rise to secondary communication channels, defined by combinatorial ordering of the user resources (packets, channels) in a primary (legacy) communication system. We introduce communication models that enable us to compute the capacity of such secondary channels under suitable restrictions imposed by the primary systems. We first show the relation to the capacity of channels with causal channel state information at the transmitter (CSIT), originally considered by Shannon. By using the specific communication setup, we develop an alternative framework for achieving the capacity and we discuss coding strategies that need to be used over the secondary channels. We also discuss some practical features of the secondary channels and their applications that add value to the existing wireless systems. ar X iv :1 01 1. 57 39 v1 [ cs .I T ] 2 6 N ov 2 01 0

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protocol Coding through Reordering of User Resources, Part I: Capacity Results

The vast existing wireless infrastructure features a variety of systems and standards. It is of significant practical value to introduce new features and devices without changing the physical layer/hardware infrastructure, but upgrade it only in software. A way to achieve it is to apply protocol coding: encode information in the actions taken by a certain (existing) communication protocol. In t...

متن کامل

Protocol Coding through Reordering of User Resources, Part II: Practical Coding Strategies

We use the term protocol coding to denote the communication strategies in which information is encoded through the actions taken by a certain communication protocol. In this work we investigate strategies for protocol coding via combinatorial ordering of the labelled user resources (packets, channels) in an existing, primary system. This introduces a new, secondary communication channel in the ...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Distributed Active Element for High-Performance Data Distribution

Requirement on multi-point data distribution in IP networks assumes some distribution service, be it implemented as a part of network native services (IP multicast) or user-empowered solution (data reflectors). In our previous work, we have introduced user-empowered distribution networks based on Active Elements (AE) [1], which scale well in terms of number of clients connected. It is however n...

متن کامل

پروتکل کارا برای جمع چندسویه امن با قابلیت تکرار

In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1011.5739  شماره 

صفحات  -

تاریخ انتشار 2010