A Lego-Brick Approach to Coding for Network Communication

11/14/2022
by   Nadim Ghaddar, et al.
0

Coding schemes for several problems in network information theory are constructed starting from point-to-point channel codes that are designed for symmetric channels. Given that the point-to-point codes satisfy certain properties pertaining to the rate, the error probability, and the distribution of decoded sequences, bounds on the performance of the coding schemes are derived and shown to hold irrespective of other properties of the codes. In particular, we consider the problems of lossless and lossy source coding, Slepian–Wolf coding, Wyner–Ziv coding, Berger–Tung coding, multiple description coding, asymmetric channel coding, Gelfand–Pinsker coding, coding for multiple access channels, Marton coding for broadcast channels, and coding for cloud radio access networks (C-RAN's). We show that the coding schemes can achieve the best known inner bounds for most of these problems, provided that the constituent point-to-point channel codes are rate-optimal. This would allow one to leverage commercial off-the-shelf codes for point-to-point symmetric channels in the practical implementation of codes over networks. Simulation results demonstrate the gain of the proposed coding schemes compared to existing practical solutions to these problems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/23/2022

Lattices from Linear Codes: Source and Channel Networks

In this paper, we consider the information-theoretic characterization of...
research
12/10/2018

A Unified Framework for One-shot Achievability via the Poisson Matching Lemma

We introduce a fundamental lemma called the Poisson matching lemma, and ...
research
02/18/2020

Impact of Fountain Codes on GPRS channels

The rateless and information additive properties of fountain codes make ...
research
09/19/2018

Zero-error communication over adder MAC

Adder MAC is a simple noiseless multiple-access channel (MAC), where if ...
research
08/31/2020

Coding Constructions for Efficient Oblivious Transfer from Noisy Channels

We consider oblivious transfer protocols performed over binary symmetric...
research
11/02/2019

Sparse Regression Codes

Developing computationally-efficient codes that approach the Shannon-the...
research
03/21/2019

Semantic Security on Wiretap Channels using Universal Hashing with Fading Applications

We furnish a procedure based on universal hash families (UHFs) that can ...

Please sign up or login with your details

Forgot password? Click here to reset