Shannon Capacity is Achievable for Binary Interactive First-Order Markovian Protocols
نویسندگان
چکیده
We address the problem of simulating an arbitrary binary interactive first-order Markovian protocol over a pair of binary symmetric channels with crossover probability ε. We are interested in the achievable rates of reliable simulation, i.e., in characterizing the smallest possible blowup in communications such that a vanishing error probability (in the protocol length) can be attained. Whereas for general interactive protocols the output of each party may depend on all previous outputs of its counterpart, in a (first-order) Markovian protocol this dependence is limited to the last observed output only. In this paper we prove that the one-way Shannon capacity, 1 − h(ε), can be achieved for any binary firstorder Markovian protocol. This surprising result, is to the best of our knowledge, the first example in which non-trivial interactive protocol can be simulated in the Shannon capacity. Our scheme is based on two simple notions: non-interactive simulation, block-wise interactive communication. Previous results in the field discuss different families of protocol and mostly assess the achievable rates at the limit where ε→ 0. We also show that for higher order Markovian protocols, if the transmission functions are drawn uniformly i.i.d, the probability of drawing a non-capacity achieving protocol goes to zero with n.
منابع مشابه
The capacity of Abelian group codes over symmetric channels
In this paper the capacity achievable by Abelian group codes when employed over symmetric channels is determined. For certain important examples, like the AWGN channel with m-PSK modulation, it follows that this capacity coincides with the corresponding Shannon capacity of these channels. In other words using Abelian group codes in this case there is no loss of capacity (as it happens for binar...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملThe Classically-Enhanced Father Protocol
The classically-enhanced father protocol is an optimal protocol for a sender to transmit both classical and quantum information to a receiver by exploiting preshared entanglement and a large number of independent uses of a noisy quantum channel. We detail the proof of a quantum Shannon theorem that gives the three-dimensional capacity region containing all achievable rates that the classically-...
متن کاملAsymptotics of Input-Constrained Erasure Channel
In this paper, we examine an input-constrained erasure channel and we characterize the asymptotics of its capacity when the erasure rate is low. More specifically, for a general memoryless erasure channel with its input supported on an irreducible finite-type constraint, we derive partial asymptotics of its capacity, using some series expansion type formulas of its mutual information rate; and ...
متن کاملSlotted Gaussian Multiple Access Channel: Stable Throughput Region and Role of Side Information
We study the relation between the stable throughput regions and the capacity regions for a Gaussian multiple-access channel. Our main focus is to study how the extent of side information about source arrival statistics and/or instantaneous queue states at each transmitter influence the achievable stable throughput region. Two notions of MAC capacity are studied. The first notion is the conventi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1801.01022 شماره
صفحات -
تاریخ انتشار 2017