排序方式: 共有32条查询结果,搜索用时 15 毫秒
21.
Medard M. Srikant R. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(7):3052-3062
We investigate the following issue: if fast fades are Markovian and known at the receiver, while the transmitter has only a coarse quantization of the fading process, what capacity penalty comes from having the transmitter act on the current coarse quantization alone? For time-varying channels which experience rapid time variations, sender and receiver typically have asymmetric channel side information. To avoid the expense of providing, through feedback, detailed channel side information to the sender, the receiver offers the sender only a coarse, generally time-averaged, representation of the state of the channel, which we term slow variations. Thus, the receiver tracks the fast variations of the channel (and the slow ones perforce) while the sender receives feedback only about the slow variations. While the fast variations (micro-states) remain Markovian, the slow variations (macro-states) are not. We compute an approximate channel capacity in the following sense: each rate smaller than the "approximate" capacity, computed using results by Caire and Shamai, can be achieved for sufficiently large separation between the time scales for the slow and fast fades. The difference between the true capacity and the approximate capacity is O(/spl epsi/log/sup 2/(/spl epsi/)log(-log(/spl epsi/))), where /spl epsi/ is the ratio between the speed of variation of the channel in the macro- and micro-states. The approximate capacity is computed by power allocation between the slowly varying states using appropriate water filling. 相似文献
22.
Medard M. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2000,46(3):933-946
We present a model for time-varying communication single-access and multiple-access channels without feedback. We consider the difference between mutual information when the receiver knows the channel perfectly and mutual information when the receiver only has an estimate of the channel. We relate the variance of the channel measurement error at the receiver to upper and lower bounds for this difference in mutual information. We illustrate the use of our bounds on a channel modeled by a Gauss-Markov process, measured by a pilot tone. We relate the rate of time variation of the channel to the loss in mutual information due to imperfect knowledge of the measured channel 相似文献
23.
Security issues in all-optical networks 总被引:2,自引:0,他引:2
All-optical networks are emerging as a promising technology for terabit per second class communications. However, they are intrinsically different from electro-optical networks, particularly because they do not regenerate signals in the network. The characteristics of all-optical network components and architectures manifest new and still unstudied security vulnerabilities but also offer a new array of possible countermeasures. We focus on two types of attacks on the physical security of the network: service disruption, which prevents communication or degrades quality of service (QoS), and tapping, which compromises privacy by providing unauthorized users access to data which may be used for eavesdropping or traffic analysis 相似文献
24.
In May 2017, the African Great Lakes community convened for a region-wide conference in Entebbe, Uganda. The African Great Lakes Conference (AGLC) focused on 6 regionally-important themes, and 300+ attendees presented over 100 talks and posters. The AGLC culminated in the adoption of a set of Conference Resolutions designed to direct the future of African Great Lakes conservation and management. As an Introduction to this Journal of Great Lakes Research special section on African Great Lakes, we report on the impetus for the African Great Lakes Conference as well as discuss three major advances and investments that were a direct result of conference resolutions adopted at the meeting. First, we present the AGLC Resolutions, a set of management issues and solutions developed at the conference. Second, we discuss the African Great Lakes Conference Fund, a conservation fund that has awarded $500,000 USD to launch four new initiatives. Finally, we describe African Great Lakes Inform, a knowledge management platform designed to promote collaboration in the region. The AGLC in general, and these three major conference outcomes specifically, provide a set of basic building blocks to advance partnerships, research and capacity in the African Great Lakes region. 相似文献
25.
Link recovery in high-speed four-fiber networks can be achieved using dynamic searches, covers of rings, or generalized loopback. We present a method to provide link recovery for all links in a network without using all links for backup traffic transmission. The method extends generalized loopback to operate on a subgraph of the full backup graph. The backup capacity on such links can then be used to carry unprotected traffic, i.e., traffic that is not recovered in case of a failure, while primary fibers on the links retain failure protection. Although all primary fibers remain fully robust to single-link failures, reserving links for unprotected traffic reduces a network's ability to recover from multiple failures. We explore the tradeoff between capacity and robustness to two-link failures for several typical high-speed optical fiber networks, comparing the properties of three link-restoration algorithms based on generalized loopback with the properties of covers of rings. Our results demonstrate robustness comparable or superior to that available with covers of rings while providing an additional unprotected traffic capacity of roughly 20% of the network's primary capacity 相似文献
26.
A network consisting of transparent optical nodes (TONs) can provide high speed end-to-end communication paths with very low bit-error rates (BERs). However, owing to component crosstalk and other degradations at TONs, the BER of a particular communication path traversing several TONs can be degraded by a few orders of magnitude even in the absence of component failure. Monitoring the quality-of-service (QoS) of a communication path has typically relied on sporadic BER testing and operation monitoring by the nodes using probe signals. Intermittent BER testing cannot provide continuous monitoring of the network QoS. On the other hand, the use of probe signals is not sensitive enough to detect the BER degradation. This work investigates a novel approach of monitoring service degradation at individual nodes using a wrap-around device which taps and compares signals from the input and the output at each TON along the lightpath. We propose a modification using hard limiters at TON inputs and derive the BER value that this modified method can guarantee in the presence of signal degradation due to coherent crosstalk at TONs 相似文献
27.
We analyze the error probability of peaky signaling on bandlimited multipath fading channels, the signaling strategy that achieves the capacity of such channels in the limit of infinite bandwidth under an average power constraint. We first derive an upper bound for general fading, then specialize to the case of Rayleigh fading, where we obtain upper and lower bounds that are exponentially tight and, therefore, yield the reliability function. These bounds constitute a strong coding theorem for the channel, as they not only delimit the range of achievable rates, but also give us a relationship among the error probability, data rate, bandwidth, peakiness, and fading parameters, such as the coherence time. They can be used to compare peaky signaling systems to other large bandwidth systems over fading channels, such as ultra-wideband radio and wideband code-division multiple access. We find that the error probability decreases slowly with the bandwidth W; under Rayleigh fading, the error probability varies roughly as W/sup -/spl alpha//, where /spl alpha/>0. With parameters typical of indoor wireless situations, we study the behavior of the upper and lower bounds on the error probability and the reliability function numerically. 相似文献
28.
Medard M. Jianyi Huang Goldsmith A.J. Meyn S.P. Coleman T.P. 《Wireless Communications, IEEE Transactions on》2004,3(2):486-499
We study different notions of capacity for time-slotted ALOHA systems. In these systems, multiple users synchronously send packets in a bursty manner over a common additive white Gaussian noise (AWGN) channel. The users do not coordinate their transmissions, which may collide at the receiver. For such a system, we define both single-slot capacity and multiple-slot capacity. We then construct a coding and decoding scheme for single-slot capacity that achieves any rate within this capacity region. This coding and decoding scheme for a single time slot combines aspects of multiple access rate splitting and of broadcast codes for degraded AWGN channels. This design allows some bits to be reliably received even when collisions occur and more bits to be reliably received in the absence of collisions. The exact number of bits reliably received under both of these scenarios is part of the code design process, which we optimize to maximize the expected rate in each slot. Next, we examine the behavior of the system asymptotically over multiple slots. We show that there exist coding and decoding strategies such that regardless of the burstiness of the traffic, the system is stable as long as the average rate of the users is within the multiple access capacity region of the channel. In other words, we show that bursty traffic does not decrease the Cover-Wyner capacity region of the multiple access channel. A vast family of codes, which includes the type of codes we introduce for the single-slot transmission, achieve the capacity region, in a sense we define, for multiple-slot transmissions. These codes are stabilizing, using only local information at each of the individual queues. The use of information regarding other queues or the use of scheduling does not improve the multiple-slot capacity region. 相似文献
29.
On approaching wideband capacity using multitone FSK 总被引:1,自引:0,他引:1
Cheng Luo Medard M. Lizhong Zheng 《Selected Areas in Communications, IEEE Journal on》2005,23(9):1830-1838
In the wideband limit, certain types of "flash" signaling, such as flash frequency-shift keying (FSK), achieve the capacity of multipath fading channels. It is not clear, however, whether these asymptotic results translate into insights for practical fading channels in the finite-bandwidth, power-limited regime. It is known that, for flash FSK, the size of the input alphabet grows slowly with increasing bandwidth, leading to very high-peak power per tone. Thus, for flash FSK, the codeword probability of error decays very slowly with bandwidth and feasible rates approach the wideband capacity limit extremely slowly. Without contradicting the above results, our results in this paper point to a more optimistic outlook, from the point of view of error exponents and achievable rates, for the applicability of flash techniques in practical scenarios. We consider multitone FSK (MFSK), which has the same asymptotic capacity-achieving property as flash FSK in the wideband limit, but allows a larger input alphabet size with the same bandwidth. First, we show, using an error exponent approach, that multitone FSK allows lower peak power per tone than flash FSK. Next, we present the capacity of single-tone and two-tone FSK schemes with hard-decision detection at finite bandwidths. For typical channel parameters, the capacities are close to the wideband capacity limit. 相似文献
30.
A Random Linear Network Coding Approach to Multicast 总被引:11,自引:0,他引:11
Ho T. Medard M. Koetter R. Karger D.R. Effros M. Jun Shi Leong B. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(10):4413-4430
We present a distributed random linear network coding approach for transmission and compression of information in general multisource multicast networks. Network nodes independently and randomly select linear mappings from inputs onto output links over some field. We show that this achieves capacity with probability exponentially approaching 1 with the code length. We also demonstrate that random linear coding performs compression when necessary in a network, generalizing error exponents for linear Slepian-Wolf coding in a natural way. Benefits of this approach are decentralized operation and robustness to network changes or link failures. We show that this approach can take advantage of redundant network capacity for improved success probability and robustness. We illustrate some potential advantages of random linear network coding over routing in two examples of practical scenarios: distributed network operation and networks with dynamically varying connections. Our derivation of these results also yields a new bound on required field size for centralized network coding on general multicast networks 相似文献