-
Coding for the unsourced B-channel with erasures: enhancing the linked loop code
Authors:
William W. Zheng,
Jamison R. Ebert,
Stefano Rini,
Jean-Francois Chamberland
Abstract:
In [1], the linked loop code (LLC) is presented as a promising code for the unsourced A-channel with erasures (UACE). The UACE is an unsourced multiple access channel in which active users' transmitted symbols are erased with a given probability and the channel output is obtained as the union of the non-erased symbols. In this paper, we extend the UACE channel model to the unsourced B-channel with…
▽ More
In [1], the linked loop code (LLC) is presented as a promising code for the unsourced A-channel with erasures (UACE). The UACE is an unsourced multiple access channel in which active users' transmitted symbols are erased with a given probability and the channel output is obtained as the union of the non-erased symbols. In this paper, we extend the UACE channel model to the unsourced B-channel with erasures (UBCE). The UBCE differs from the UACE in that the channel output is the multiset union, or bag union, of the non-erased input symbols. In other words, the UBCE preserves the symbol multiplicity of the channel output while the UACE does not. Both the UACE and UBCE find applications in modeling aspects of unsourced random access. The LLC from [1] is enhanced and shown to outperform the tree code over the UBCE. Findings are supported by numerical simulations.
△ Less
Submitted 20 May, 2024;
originally announced June 2024.
-
Evolution of the 5G New Radio Two-Step Random Access towards 6G Unsourced MAC
Authors:
Patrick Agostini,
Jean-Francois Chamberland,
Federico Clazzer,
Johannes Dommel,
Gianluigi Liva,
Andrea Munari,
Krishna Narayanan,
Yury Polyanskiy,
Slawomir Stanczak,
Zoran Utkovski
Abstract:
This report summarizes some considerations on possible evolutions of grant-free random access in the next generation of the 3GPP wireless cellular standard. The analysis is carried out by map** the problem to the recently-introduced unsourced multiple access channel (UMAC) setup. By doing so, the performance of existing solutions can be benchmarked with information-theoretic bounds, assessing th…
▽ More
This report summarizes some considerations on possible evolutions of grant-free random access in the next generation of the 3GPP wireless cellular standard. The analysis is carried out by map** the problem to the recently-introduced unsourced multiple access channel (UMAC) setup. By doing so, the performance of existing solutions can be benchmarked with information-theoretic bounds, assessing the potential gains that can be achieved over legacy 3GPP schemes. The study focuses on the two-step random access (2SRA) protocol introduced by Release 16 of the 5G New Radio standard, investigating its applicability to support large MTC / IoT terminal populations in a grant-free fashion. The analysis shows that the existing 2SRA scheme may not succeed in providing energy-efficient support to large user populations. Modifications to the protocol are proposed that enable remarkable gains in both energy and spectral efficiency while retaining a strong resemblance to the legacy protocol.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Multi-User SR-LDPC Codes via Coded Demixing with Applications to Cell-Free Systems
Authors:
Jamison R. Ebert,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Novel sparse regression LDPC (SR-LDPC) codes exhibit excellent performance over additive white Gaussian noise (AWGN) channels in part due to their natural provision of sha** gains. Though SR-LDPC-like codes have been considered within the context of single-user error correction and massive random access, they are yet to be examined as candidates for coordinated multi-user communication scenarios…
▽ More
Novel sparse regression LDPC (SR-LDPC) codes exhibit excellent performance over additive white Gaussian noise (AWGN) channels in part due to their natural provision of sha** gains. Though SR-LDPC-like codes have been considered within the context of single-user error correction and massive random access, they are yet to be examined as candidates for coordinated multi-user communication scenarios. This article explores this gap in the literature and demonstrates that SR-LDPC codes, when combined with coded demixing techniques, offer a new framework for efficient non-orthogonal multiple access (NOMA) in the context of coordinated multi-user communication channels. The ensuing communication scheme is referred to as MU-SR-LDPC coding. Empirical evidence suggests that, for a fixed SNR, MU-SR-LDPC coding can achieve a target bit error rate (BER) at a higher sum rate than orthogonal multiple access (OMA) techniques such as time division multiple access (TDMA) and frequency division multiple access (FDMA). Importantly, MU-SR-LDPC codes enable a pragmatic solution path for user-centric cell-free communication systems with (local) joint decoding. Results are supported by numerical simulations.
△ Less
Submitted 9 February, 2024;
originally announced February 2024.
-
Coding for the unsourced A-channel with erasures: the linked loop code
Authors:
William W. Zheng,
Jamison R. Ebert,
Stefano Rini,
Jean-Francois Chamberland
Abstract:
The A-channel is a noiseless multiple access channel in which users simultaneously transmit Q-ary symbols and the receiver observes the set of transmitted symbols, but not their multiplicities. An A-channel is said to be unsourced if, additionally, users transmissions are encoded across time using a common codebook and decoding of the transmitted messages is done without regard to the identities o…
▽ More
The A-channel is a noiseless multiple access channel in which users simultaneously transmit Q-ary symbols and the receiver observes the set of transmitted symbols, but not their multiplicities. An A-channel is said to be unsourced if, additionally, users transmissions are encoded across time using a common codebook and decoding of the transmitted messages is done without regard to the identities of the active users. An interesting variant of the unsourced A-channel is the unsourced A-channel with erasures (UACE), in which transmitted symbols are erased with a given independent and identically distributed probability. In this paper, we focus on designing a code that enables a list of transmitted codewords to be recovered despite the erasures of some of the transmitted symbols. To this end, we propose the linked-loop code (LLC), which uses parity bits to link each symbol to the previous M symbols in a tail-biting manner, i.e., the first symbols of the transmission are linked to the last ones. The decoding process occurs in two phases: the first phase decodes the codewords that do not suffer from any erasures, and the second phase attempts to recover the erased symbols using the available parities. We compare the performance of the LLC over the UACE with other codes in the literature and argue for the effectiveness of the construction. Our motivation for studying the UACE comes from its relevance in machine-type communication and coded compressed sensing.
△ Less
Submitted 19 September, 2023;
originally announced December 2023.
-
Sparse Regression LDPC Codes
Authors:
Jamison R. Ebert,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
This article introduces a novel concatenated coding scheme called sparse regression LDPC (SR-LDPC) codes. An SR-LDPC code consists of an outer non-binary LDPC code and an inner sparse regression code (SPARC) whose respective field size and section sizes are equal. For such codes, an efficient decoding algorithm is proposed based on approximate message passing (AMP) that dynamically shares soft inf…
▽ More
This article introduces a novel concatenated coding scheme called sparse regression LDPC (SR-LDPC) codes. An SR-LDPC code consists of an outer non-binary LDPC code and an inner sparse regression code (SPARC) whose respective field size and section sizes are equal. For such codes, an efficient decoding algorithm is proposed based on approximate message passing (AMP) that dynamically shares soft information between inner and outer decoders. This dynamic exchange of information is facilitated by a denoiser that runs belief propagation (BP) on the factor graph of the outer LDPC code within each AMP iteration. It is shown that this denoiser falls within the class of non-separable pseudo-Lipschitz denoising functions and thus that state evolution holds for the proposed AMP-BP algorithm. Leveraging the rich structure of SR-LDPC codes, this article proposes an efficient low-dimensional approximate state evolution recursion that can be used for efficient hyperparameter tuning, thus paving the way for future work on optimal code design. Finally, numerical simulations demonstrate that SR-LDPC codes outperform contemporary codes over the AWGN channel for parameters of practical interest. SR-LDPC codes are shown to be viable means to obtain sha** gains over the AWGN channel.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Transformers are Provably Optimal In-context Estimators for Wireless Communications
Authors:
Vishnu Teja Kunde,
Vicram Rajagopalan,
Chandra Shekhara Kaushik Valmeekam,
Krishna Narayanan,
Srinivas Shakkottai,
Dileep Kalathil,
Jean-Francois Chamberland
Abstract:
Pre-trained transformers exhibit the capability of adapting to new tasks through in-context learning (ICL), where they efficiently utilize a limited set of prompts without explicit model optimization.
The canonical communication problem of estimating transmitted symbols from received observations can be modelled as an in-context learning problem: Received observations are essentially a noisy fun…
▽ More
Pre-trained transformers exhibit the capability of adapting to new tasks through in-context learning (ICL), where they efficiently utilize a limited set of prompts without explicit model optimization.
The canonical communication problem of estimating transmitted symbols from received observations can be modelled as an in-context learning problem: Received observations are essentially a noisy function of transmitted symbols, and this function can be represented by an unknown parameter whose statistics depend on an (also unknown) latent context. This problem, which we term in-context estimation (ICE), has significantly greater complexity than the extensively studied linear regression problem.
The optimal solution to the ICE problem is a non-linear function of the underlying context. In this paper, we prove that, for a subclass of such problems, a single layer softmax attention transformer (SAT) computes the optimal solution of the above estimation problem in the limit of large prompt length. We also prove that the optimal configuration of such transformer is indeed the minimizer of the corresponding training loss. Further, we empirically demonstrate the proficiency of multi-layer transformers in efficiently solving broader in-context estimation problems. Through extensive simulations, we show that solving ICE problems using transformers significantly outperforms standard approaches. Moreover, just with a few context examples, it achieves the same performance as an estimator with perfect knowledge of the latent context.
△ Less
Submitted 14 June, 2024; v1 submitted 31 October, 2023;
originally announced November 2023.
-
LLMZip: Lossless Text Compression using Large Language Models
Authors:
Chandra Shekhara Kaushik Valmeekam,
Krishna Narayanan,
Dileep Kalathil,
Jean-Francois Chamberland,
Srinivas Shakkottai
Abstract:
We provide new estimates of an asymptotic upper bound on the entropy of English using the large language model LLaMA-7B as a predictor for the next token given a window of past tokens. This estimate is significantly smaller than currently available estimates in \cite{cover1978convergent}, \cite{lutati2023focus}. A natural byproduct is an algorithm for lossless compression of English text which com…
▽ More
We provide new estimates of an asymptotic upper bound on the entropy of English using the large language model LLaMA-7B as a predictor for the next token given a window of past tokens. This estimate is significantly smaller than currently available estimates in \cite{cover1978convergent}, \cite{lutati2023focus}. A natural byproduct is an algorithm for lossless compression of English text which combines the prediction from the large language model with a lossless compression scheme. Preliminary results from limited experiments suggest that our scheme outperforms state-of-the-art text compression schemes such as BSC, ZPAQ, and paq8h.
△ Less
Submitted 26 June, 2023; v1 submitted 6 June, 2023;
originally announced June 2023.
-
Scalable Cell-Free Massive MIMO Unsourced Random Access System
Authors:
Michail Gkagkos,
Jean-Francois Chamberland,
Costas N. Georghiades,
Krishna R. Narayanan
Abstract:
Cell-Free Massive MIMO systems aim to expand the coverage area of wireless networks by replacing a single high-performance Access Point (AP) with multiple small, distributed APs connected to a Central Processing Unit (CPU) through a fronthaul. Another novel wireless approach, known as the unsourced random access (URA) paradigm, enables a large number of devices to communicate concurrently on the u…
▽ More
Cell-Free Massive MIMO systems aim to expand the coverage area of wireless networks by replacing a single high-performance Access Point (AP) with multiple small, distributed APs connected to a Central Processing Unit (CPU) through a fronthaul. Another novel wireless approach, known as the unsourced random access (URA) paradigm, enables a large number of devices to communicate concurrently on the uplink. We consider a quasi-static Rayleigh fading channel paired to a scalable cell-free system, wherein a small number of receive antennas in the distributed APs serve devices equipped with a single antenna each. The goal of the study is to extend previous URA results to more realistic channels by examining the performance of a scalable cell-free system. To achieve this goal, we construct a coding scheme that adapts the URA paradigm to various cell-free scenarios. Empirical evidence suggests that using a cell-free architecture can improve the performance of a URA system, especially when taking into account large-scale attenuation and fading.
△ Less
Submitted 10 November, 2023; v1 submitted 12 April, 2023;
originally announced April 2023.
-
PolarAir: A Compressed Sensing Scheme for Over-the-Air Federated Learning
Authors:
Michail Gkagkos,
Krishna R. Narayanan,
Jean-Francois Chamberland,
Costas N. Georghiades
Abstract:
We explore a scheme that enables the training of a deep neural network in a Federated Learning configuration over an additive white Gaussian noise channel. The goal is to create a low complexity, linear compression strategy, called PolarAir, that reduces the size of the gradient at the user side to lower the number of channel uses needed to transmit it. The suggested approach belongs to the family…
▽ More
We explore a scheme that enables the training of a deep neural network in a Federated Learning configuration over an additive white Gaussian noise channel. The goal is to create a low complexity, linear compression strategy, called PolarAir, that reduces the size of the gradient at the user side to lower the number of channel uses needed to transmit it. The suggested approach belongs to the family of compressed sensing techniques, yet it constructs the sensing matrix and the recovery procedure using multiple access techniques. Simulations show that it can reduce the number of channel uses by ~30% when compared to conveying the gradient without compression. The main advantage of the proposed scheme over other schemes in the literature is its low time complexity. We also investigate the behavior of gradient updates and the performance of PolarAir throughout the training process to obtain insight on how best to construct this compression scheme based on compressed sensing.
△ Less
Submitted 24 January, 2023;
originally announced January 2023.
-
On Sparse Regression LDPC Codes
Authors:
Jamison R. Ebert,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Belief propagation applied to iterative decoding and sparse recovery through approximate message passing (AMP) are two research areas that have seen monumental progress in recent decades. Inspired by these advances, this article introduces sparse regression LDPC codes and their decoding. Sparse regression codes (SPARCs) are a class of error correcting codes that build on ideas from compressed sens…
▽ More
Belief propagation applied to iterative decoding and sparse recovery through approximate message passing (AMP) are two research areas that have seen monumental progress in recent decades. Inspired by these advances, this article introduces sparse regression LDPC codes and their decoding. Sparse regression codes (SPARCs) are a class of error correcting codes that build on ideas from compressed sensing and can be decoded using AMP. In certain settings, SPARCs are known to achieve capacity; yet, their performance suffers at finite block lengths. Likewise, LDPC codes can be decoded efficiently using belief propagation and can also be capacity achieving. This article introduces a novel concatenated coding structure that combines an LDPC outer code with a SPARC-inspired inner code. Efficient decoding for such a code can be achieved using AMP with a denoiser that performs belief propagation on the factor graph of the outer LDPC code. The proposed framework exhibits performance improvements over SPARCs and standard LDPC codes for finite block lengths and results in a steep waterfall in error performance, a phenomenon not observed in uncoded SPARCs. Findings are supported by numerical results.
△ Less
Submitted 4 January, 2023;
originally announced January 2023.
-
HashBeam: Enabling Feedback Through Downlink Beamforming in Unsourced Random Access
Authors:
Jamison R. Ebert,
Krishna R. Narayanan,
Jean-Francois Chamberland
Abstract:
Unsourced random access (URA) has emerged as a candidate paradigm for massive machine-type communication (MTC) in next-generation wireless networks. While many excellent uplink schemes have been developed for URA, these schemes do not specify a mechanism for providing feedback regarding whether a user's message was successfully decoded. While this may be acceptable in some MTC scenarios, the lack…
▽ More
Unsourced random access (URA) has emerged as a candidate paradigm for massive machine-type communication (MTC) in next-generation wireless networks. While many excellent uplink schemes have been developed for URA, these schemes do not specify a mechanism for providing feedback regarding whether a user's message was successfully decoded. While this may be acceptable in some MTC scenarios, the lack of feedback is inadequate for applications that demand a high level of reliability. However, the problem of providing feedback to active users is complicated by the fact that the base station does not know the identities of the active users. In this paper, a novel downlink beamforming scheme called HashBeam is presented that enables the base station to provide feedback to the active users within URA, despite not knowing their identities. The key idea of this scheme is that the users' channels and hashes of their messages may be used as proxies for their true identities. The proposed scheme may be adapted to any number of antennas at the base station and it is shown that the required number of channel uses is linear in the number of users to acknowledge. The idea of using channel gains in conjunction with user hashes as discriminating attributes of active users is novel and expands the design space of URA schemes.
△ Less
Submitted 3 June, 2022;
originally announced June 2022.
-
Coded Demixing for Unsourced Random Access
Authors:
Jamison R. Ebert,
Vamsi K. Amalladinne,
Stefano Rini,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Unsourced random access (URA) is a recently proposed multiple access paradigm tailored to the uplink channel of machine-type communication networks. By exploiting a strong connection between URA and compressed sensing, the massive multiple access problem may be cast as a compressed sensing (CS) problem, albeit one in exceedingly large dimensions. To efficiently handle the dimensionality of the pro…
▽ More
Unsourced random access (URA) is a recently proposed multiple access paradigm tailored to the uplink channel of machine-type communication networks. By exploiting a strong connection between URA and compressed sensing, the massive multiple access problem may be cast as a compressed sensing (CS) problem, albeit one in exceedingly large dimensions. To efficiently handle the dimensionality of the problem, coded compressed sensing (CCS) has emerged as a pragmatic signal processing tool that, when applied to URA, offers good performance at low complexity. While CCS is effective at recovering a signal that is sparse with respect to a single basis, it is unable to jointly recover signals that are sparse with respect to separate bases. In this article, the CCS framework is extended to the demixing setting, yielding a novel technique called coded demixing. A generalized framework for coded demixing is presented and a low-complexity recovery algorithm based on approximate message passing (AMP) is developed. Coded demixing is applied to heterogeneous multi-class URA networks and traditional single-class networks. Its performance is analyzed and numerical simulations are presented to highlight the benefits of coded demixing.
△ Less
Submitted 27 June, 2022; v1 submitted 1 March, 2022;
originally announced March 2022.
-
FASURA: A Scheme for Quasi-Static Massive MIMO Unsourced Random Access Channels
Authors:
Michail Gkagkos,
Krishna R. Narayanan,
Jean-Francois Chamberland,
Costas N. Georghiades
Abstract:
This article considers the massive MIMO unsourced random access problem on a quasi-static Rayleigh fading channel. Given a fixed message length and a prescribed number of channel uses, the objective is to construct a coding scheme that minimizes the energy-per-bit subject to a fixed probability of error. The proposed scheme differs from other state-of-the-art schemes in that it blends activity det…
▽ More
This article considers the massive MIMO unsourced random access problem on a quasi-static Rayleigh fading channel. Given a fixed message length and a prescribed number of channel uses, the objective is to construct a coding scheme that minimizes the energy-per-bit subject to a fixed probability of error. The proposed scheme differs from other state-of-the-art schemes in that it blends activity detection, single-user coding, pilot-aided and temporary decisions-aided iterative channel estimation and decoding, minimum-mean squared error (MMSE) estimation, and successive interference cancellation (SIC). We show that an appropriate combination of these ideas can substantially outperform state-of-the-art coding schemes when the number of active users is more than 100, making this the best performing scheme known for this regime.
△ Less
Submitted 8 March, 2022; v1 submitted 22 February, 2022;
originally announced February 2022.
-
DOPE: Doubly Optimistic and Pessimistic Exploration for Safe Reinforcement Learning
Authors:
Archana Bura,
Aria HasanzadeZonuzy,
Dileep Kalathil,
Srinivas Shakkottai,
Jean-Francois Chamberland
Abstract:
Safe reinforcement learning is extremely challenging--not only must the agent explore an unknown environment, it must do so while ensuring no safety constraint violations. We formulate this safe reinforcement learning (RL) problem using the framework of a finite-horizon Constrained Markov Decision Process (CMDP) with an unknown transition probability function, where we model the safety requirement…
▽ More
Safe reinforcement learning is extremely challenging--not only must the agent explore an unknown environment, it must do so while ensuring no safety constraint violations. We formulate this safe reinforcement learning (RL) problem using the framework of a finite-horizon Constrained Markov Decision Process (CMDP) with an unknown transition probability function, where we model the safety requirements as constraints on the expected cumulative costs that must be satisfied during all episodes of learning. We propose a model-based safe RL algorithm that we call Doubly Optimistic and Pessimistic Exploration (DOPE), and show that it achieves an objective regret $\tilde{O}(|\mathcal{S}|\sqrt{|\mathcal{A}| K})$ without violating the safety constraints during learning, where $|\mathcal{S}|$ is the number of states, $|\mathcal{A}|$ is the number of actions, and $K$ is the number of learning episodes. Our key idea is to combine a reward bonus for exploration (optimism) with a conservative constraint (pessimism), in addition to the standard optimistic model-based exploration. DOPE is not only able to improve the objective regret bound, but also shows a significant empirical performance improvement as compared to earlier optimism-pessimism approaches.
△ Less
Submitted 17 October, 2022; v1 submitted 1 December, 2021;
originally announced December 2021.
-
An Enhanced Decoding Algorithm for Coded Compressed Sensing with Applications to Unsourced Random Access
Authors:
Vamsi K. Amalladinne,
Jamison R. Ebert,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Unsourced random access (URA) has emerged as a pragmatic framework for next-generation distributed sensor networks. Within URA, concatenated coding structures are often employed to ensure that the central base station can accurately recover the set of sent codewords during a given transmission period. Many URA algorithms employ independent inner and outer decoders, which can help reduce computatio…
▽ More
Unsourced random access (URA) has emerged as a pragmatic framework for next-generation distributed sensor networks. Within URA, concatenated coding structures are often employed to ensure that the central base station can accurately recover the set of sent codewords during a given transmission period. Many URA algorithms employ independent inner and outer decoders, which can help reduce computational complexity at the expense of a decay in performance. In this article, an enhanced decoding algorithm is presented for a concatenated coding structure consisting of a wide range of inner codes and an outer tree-based code. It is shown that this algorithmic enhancement has the potential to simultaneously improve error performance and decrease the computational complexity of the decoder. This enhanced decoding algorithm is applied to two existing URA algorithms and the performance benefits of the algorithm are characterized. Findings are supported by numerical simulations.
△ Less
Submitted 30 November, 2021;
originally announced December 2021.
-
LDPC Codes with Soft Interference Cancellation for Uncoordinated Unsourced Multiple Access
Authors:
Asit Kumar Pradhan,
Vamsi K. Amalladinne,
Krishna R. Narayanan,
Jean-Francois Chamberland
Abstract:
This article presents a novel enhancement to the random spreading based coding scheme developed by Pradhan et al.\ for the unsourced multiple access channel. The original coding scheme features a polar outer code in conjunction with a successive cancellation list decoder (SCLD) and a hard-input soft-output MMSE estimator. In contrast, the proposed scheme employs a soft-input soft-output MMSE estim…
▽ More
This article presents a novel enhancement to the random spreading based coding scheme developed by Pradhan et al.\ for the unsourced multiple access channel. The original coding scheme features a polar outer code in conjunction with a successive cancellation list decoder (SCLD) and a hard-input soft-output MMSE estimator. In contrast, the proposed scheme employs a soft-input soft-output MMSE estimator for multi-user detection. This is accomplished by replacing the SCLD based polar code with an LDPC code amenable to belief propagation decoding. This novel framework is leveraged to successfully pass pertinent soft information between the MMSE estimator and the outer code. LDPC codes are carefully designed using density evolution techniques to match the iterative process. This enhanced architecture exhibits significant performance improvements and represents the state-of-the-art over a wide range of system parameters.
△ Less
Submitted 28 May, 2021;
originally announced May 2021.
-
Approximate Support Recovery using Codes for Unsourced Multiple Access
Authors:
Michail Gkagkos,
Asit Kumar Pradhan,
Vamsi Amalladinne,
Krishna Narayanan,
Jean-Francois Chamberland,
Costas N. Georghiades
Abstract:
We consider the approximate support recovery (ASR) task of inferring the support of a $K$-sparse vector ${\bf x} \in \mathbb{R}^n$ from $m$ noisy measurements. We examine the case where $n$ is large, which precludes the application of standard compressed sensing solvers, thereby necessitating solutions with lower complexity. We design a scheme for ASR by leveraging techniques developed for unsourc…
▽ More
We consider the approximate support recovery (ASR) task of inferring the support of a $K$-sparse vector ${\bf x} \in \mathbb{R}^n$ from $m$ noisy measurements. We examine the case where $n$ is large, which precludes the application of standard compressed sensing solvers, thereby necessitating solutions with lower complexity. We design a scheme for ASR by leveraging techniques developed for unsourced multiple access. We present two decoding algorithms with computational complexities $\mathcal{O}(K^2 \log n+K \log n \log \log n)$ and $\mathcal{O}(K^3 +K^2 \log n+ K \log n \log \log n)$ per iteration, respectively. When $K \ll n$, this is much lower than the complexity of approximate message passing with a minimum mean squared error denoiser% (AMP-MMSE) ,which requires $\mathcal{O}(mn)$ operations per iteration. This gain comes at a slight performance cost. Our findings suggest that notions from multiple access %such as spreading, matched filter receivers and codes can play an important role in the design of measurement schemes for ASR.
△ Less
Submitted 26 May, 2021;
originally announced May 2021.
-
Coded Compressed Sensing with Successive Cancellation List Decoding for Unsourced Random Access with Massive MIMO
Authors:
Vamsi K. Amalladinne,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Unsourced random access (URA) is an increasingly popular communication paradigm attuned to machine driven data transfers in \textit{Internet-of-Things} (IoT) networks. In a typical URA setting, a small subset of active devices within a very large population wish to transmit short messages to a central base station. Originally defined for base stations equipped with a single antenna, the URA paradi…
▽ More
Unsourced random access (URA) is an increasingly popular communication paradigm attuned to machine driven data transfers in \textit{Internet-of-Things} (IoT) networks. In a typical URA setting, a small subset of active devices within a very large population wish to transmit short messages to a central base station. Originally defined for base stations equipped with a single antenna, the URA paradigm has recently been extended to practical scenarios involving base stations with a massive number of antennas by Fengler et al. The proposed concatenated coding scheme therein utilizes a non-Bayesian sparse recovery algorithm coupled with the tree code introduced by Amalladinne et al. in the context of coded compressed sensing. Currently, the existing MIMO implementation uses these two components in isolation. This article introduces an enhanced successive cancellation list decoding style scheme that facilitates dynamic interactions between the sparse recovery algorithm and the tree decoder. This modification can reduce the search space of the AD algorithm drastically; and it results in significant improvements both in terms of error performance and computational complexity. Simulation results reveal that, for a system with 100 active users, the proposed decoder reduces the number of required antennas at the base station by 23\% to achieve a performance akin to the scheme by Fengler et al.
△ Less
Submitted 5 May, 2021;
originally announced May 2021.
-
Stochastic Binning and Coded Demixing for Unsourced Random Access
Authors:
Jamison R. Ebert,
Vamsi K. Amalladinne,
Stefano Rini,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Unsourced random access is a novel communication paradigm designed for handling a large number of uncoordinated users that sporadically transmit very short messages. Under this model, coded compressed sensing (CCS) has emerged as a low-complexity scheme that exhibits good error performance. Yet, one of the challenges faced by CCS pertains to disentangling a large number of codewords present on a s…
▽ More
Unsourced random access is a novel communication paradigm designed for handling a large number of uncoordinated users that sporadically transmit very short messages. Under this model, coded compressed sensing (CCS) has emerged as a low-complexity scheme that exhibits good error performance. Yet, one of the challenges faced by CCS pertains to disentangling a large number of codewords present on a single factor graph. To mitigate this issue, this article introduces a modified CCS scheme whereby active devices stochastically partition themselves into groups that utilize separate sampling matrices with low cross-coherence for message transmission. At the receiver, ideas from the field of compressed demixing are employed for support recovery, and separate factor graphs are created for message disambiguation in each cluster. This reduces the number of active users on a factor graph, which improves performance significantly in typical scenarios. Indeed, coded demixing reduces the probability of error as the number of groups increases, up to a point. Findings are supported with numerical simulations.
△ Less
Submitted 21 July, 2021; v1 submitted 12 April, 2021;
originally announced April 2021.
-
Multi-Class Unsourced Random Access via Coded Demixing
Authors:
Vamsi K. Amalladinne,
Allen Hao,
Stefano Rini,
Jean-Francois Chamberland
Abstract:
Unsourced random access (URA) is a recently proposed communication paradigm attuned to machine-driven data transfers. In the original URA formulation, all the active devices share the same number of bits per packet. The scenario where several classes of devices transmit concurrently has so far received little attention. An initial solution to this problem takes the form of group successive interfe…
▽ More
Unsourced random access (URA) is a recently proposed communication paradigm attuned to machine-driven data transfers. In the original URA formulation, all the active devices share the same number of bits per packet. The scenario where several classes of devices transmit concurrently has so far received little attention. An initial solution to this problem takes the form of group successive interference cancellation, where codewords from a class of devices with more resources are recovered first, followed by the decoding of the remaining messages. This article introduces a joint iterative decoding approach rooted in approximate message passing. This framework has a concatenated coding structure borrowed from the single-class coded compressed sensing and admits a solution that offers performance improvement at little added computational complexity. Our findings point to new connections between multi-class URA and compressive demixing. The performance of the envisioned algorithm is validated through numerical simulations.
△ Less
Submitted 15 February, 2021;
originally announced February 2021.
-
An Exploration of the Heterogeneous Unsourced MAC
Authors:
Allen Hao,
Stefano Rini,
Vamsi Amalladinne,
Asit Kumar Pradhan,
Jean-Francois Chamberland
Abstract:
The unsourced MAC model was originally introduced to study the communication scenario in which a number of devices with low-complexity and low-energy wish to upload their respective messages to a base station. In the original problem formulation, all devices communicate using the same information rate. This may be very inefficient in certain wireless situations with varied channel conditions, powe…
▽ More
The unsourced MAC model was originally introduced to study the communication scenario in which a number of devices with low-complexity and low-energy wish to upload their respective messages to a base station. In the original problem formulation, all devices communicate using the same information rate. This may be very inefficient in certain wireless situations with varied channel conditions, power budgets, and payload requirements at the devices. This paper extends the original problem setting so as to allow for such variability. More specifically, we consider the scenario in which devices are clustered into two classes, possibly with different SNR levels or distinct payload requirements. In the cluster with higher power,devices transmit using a two-layer superposition modulation. In the cluster with lower energy, users transmit with the same base constellation as in the high power cluster. Within each layer, devices employ the same codebook. At the receiver, signal grou**s are recovered using Approximate Message Passing(AMP), and proceeding from the high to the low power levels using successive interference cancellation (SIC). This layered architecture is implemented using Coded Compressed Sensing(CCS) within every grou**. An outer tree code is employed to stitch fragments together across times and layers, as needed.This pragmatic approach to heterogeneous CCS is validated numerically and design guidelines are identified.
△ Less
Submitted 21 November, 2020;
originally announced November 2020.
-
A Hybrid Approach to Coded Compressed Sensing where Coupling Takes Place via the Outer Code
Authors:
Jamison R. Ebert,
Vamsi K. Amalladinne,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
This article seeks to advance coded compressed sensing (CCS) as a practical scheme for unsourced random access. The original CCS algorithm features a concatenated structure where an inner code is tasked with support recovery, and an outer tree code conducts message disambiguation. Recently, a link between CCS and sparse regression codes was established, leading to the application of approximate me…
▽ More
This article seeks to advance coded compressed sensing (CCS) as a practical scheme for unsourced random access. The original CCS algorithm features a concatenated structure where an inner code is tasked with support recovery, and an outer tree code conducts message disambiguation. Recently, a link between CCS and sparse regression codes was established, leading to the application of approximate message passing (AMP) to CCS. This connection was subsequently strengthened by integrating AMP and belief propagation on the outer code through a dynamic denoiser. Along these lines, this work shows how block diagonal sensing matrices akin to those used in traditional CCS, together with the aforementioned dynamic denoiser, form an effective means to get good performance at low-complexity. This novel architecture can be used to scale this scheme to dimensions that were previously impractical. Findings are supported by numerical simulations.
△ Less
Submitted 21 October, 2020;
originally announced October 2020.
-
Unsourced Random Access with Coded Compressed Sensing: Integrating AMP and Belief Propagation
Authors:
Vamsi K. Amalladinne,
Asit Kumar Pradhan,
Cynthia Rush,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Sparse regression codes with approximate message passing (AMP) decoding have gained much attention in recent times. The concepts underlying this coding scheme extend to unsourced random access with coded compressed sensing (CCS), as first demonstrated by Fengler, Jung, and Caire. Specifically, their approach employs a concatenated coding framework with an inner AMP decoder followed by an outer tre…
▽ More
Sparse regression codes with approximate message passing (AMP) decoding have gained much attention in recent times. The concepts underlying this coding scheme extend to unsourced random access with coded compressed sensing (CCS), as first demonstrated by Fengler, Jung, and Caire. Specifically, their approach employs a concatenated coding framework with an inner AMP decoder followed by an outer tree decoder. In their original implementation, these two components work independently of each other, with the tree decoder acting on the static output of the AMP decoder. This article introduces a novel framework where the inner AMP decoder and the outer tree decoder operate in tandem, dynamically passing information back and forth to take full advantage of the underlying CCS structure. This scheme necessitates the redesign of the tree code as to enable belief propagation in a computationally tractable manner. The enhanced architecture exhibits significant performance benefits over a range of system parameters. The error performance of the proposed scheme can be accurately predicted through a set of equations, known as state evolution of AMP. These findings are supported both analytically and through numerical methods.
△ Less
Submitted 9 October, 2020;
originally announced October 2020.
-
On Approximate Message Passing for Unsourced Access with Coded Compressed Sensing
Authors:
Vamsi K. Amalladinne,
Asit Kumar Pradhan,
Cynthia Rush,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Sparse regression codes with approximate message passing (AMP) decoding have gained much attention in recent times. The concepts underlying this coding scheme extend to unsourced access with coded compressed sensing (CCS), as first pointed out by Fengler, Jung, and Caire. More specifically, their approach uses a concatenated coding framework with an inner AMP decoder followed by an outer tree deco…
▽ More
Sparse regression codes with approximate message passing (AMP) decoding have gained much attention in recent times. The concepts underlying this coding scheme extend to unsourced access with coded compressed sensing (CCS), as first pointed out by Fengler, Jung, and Caire. More specifically, their approach uses a concatenated coding framework with an inner AMP decoder followed by an outer tree decoder. In the original implementation, these two components work independently of each other, with the tree decoder acting on the static output of the AMP decoder. This article introduces a novel framework where the inner AMP decoder and the outer tree decoder operate in tandem, dynamically passing information back and forth to take full advantage of the underlying CCS structure. The enhanced architecture exhibits significant performance benefit over a range of system parameters. Simulation results are provided to demonstrate the performance benefit offered by the proposed access scheme over existing schemes in the literature.
△ Less
Submitted 10 January, 2020;
originally announced January 2020.
-
Polar Coding and Random Spreading for Unsourced Multiple Access
Authors:
Asit Kumar Pradhan,
Vamsi K. Amalladinne,
Krishna R. Narayanan,
Jean-Francois Chamberland
Abstract:
This article presents a novel transmission scheme for the unsourced, uncoordinated Gaussian multiple access problem. The proposed scheme leverages notions from single-user coding, random spreading, minimum-mean squared error (MMSE) estimation, and successive interference cancellation. Specifically, every message is split into two parts: the first fragment serves as the argument to an injective fun…
▽ More
This article presents a novel transmission scheme for the unsourced, uncoordinated Gaussian multiple access problem. The proposed scheme leverages notions from single-user coding, random spreading, minimum-mean squared error (MMSE) estimation, and successive interference cancellation. Specifically, every message is split into two parts: the first fragment serves as the argument to an injective function that determines which spreading sequence should be employed, whereas the second component of the message is encoded using a polar code. The latter coded bits are then spread using the sequence determined during the first step. The ensuing signal is transmitted through a Gaussian multiple-access channel (GMAC). On the receiver side, active sequences are detected using a correlation-based energy detector, thereby simultaneously recovering individual signature sequences and their generating information bits in the form of preimages of the sequence selection function. Using the set of detected active spreading sequences, an MMSE estimator is employed to produce log-likelihood ratios (LLRs) for the second part of the messages corresponding to these detected users. The LLRs associated with each detected user are then passed to a list decoder of the polar code, which performs single-user decoding to decode the second portion of the message. This decoding operation proceeds iteratively by subtracting the interference due to the successfully decoded messages from the received signal, and repeating the above steps on the residual signal. At this stage, the proposed algorithm outperforms alternate existing low-complexity schemes when the number of active uses is below 225.
△ Less
Submitted 3 November, 2019;
originally announced November 2019.
-
An enhanced decoding algorithm for coded compressed sensing
Authors:
Vamsi K. Amalladinne,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
Coded compressed sensing is an algorithmic framework tailored to sparse recovery in very large dimensional spaces. This framework is originally envisioned for the unsourced multiple access channel, a wireless paradigm attuned to machine-type communications. Coded compressed sensing uses a divide-and-conquer approach to break the sparse recovery task into sub-components whose dimensions are amenabl…
▽ More
Coded compressed sensing is an algorithmic framework tailored to sparse recovery in very large dimensional spaces. This framework is originally envisioned for the unsourced multiple access channel, a wireless paradigm attuned to machine-type communications. Coded compressed sensing uses a divide-and-conquer approach to break the sparse recovery task into sub-components whose dimensions are amenable to conventional compressed sensing solvers. The recovered fragments are then stitched together using a low complexity decoder. This article introduces an enhanced decoding algorithm for coded compressed sensing where fragment recovery and the stitching process are executed in tandem, passing information between them. This novel scheme leads to gains in performance and a significant reduction in computational complexity. This algorithmic opportunity stems from the realization that the parity structure inherent to coded compressed sensing can be used to dynamically restrict the search space of the subsequent recovery algorithm.
△ Less
Submitted 21 October, 2019;
originally announced October 2019.
-
Sparse IDMA: A Joint Graph-Based Coding Scheme for Unsourced Random Access
Authors:
Asit Pradhan,
Vamsi Amalladinne,
Avinash Vem,
Krishna R. Narayanan,
Jean-Francois Chamberland
Abstract:
This article introduces a novel communication paradigm for the unsourced, uncoordinated Gaussian multiple access problem. The major components of the envisioned framework are as follows. The encoded bits of every message are partitioned into two groups. The first portion is transmitted using a compressive sensing scheme, whereas the second set of bits is conveyed using a multi-user coding scheme.…
▽ More
This article introduces a novel communication paradigm for the unsourced, uncoordinated Gaussian multiple access problem. The major components of the envisioned framework are as follows. The encoded bits of every message are partitioned into two groups. The first portion is transmitted using a compressive sensing scheme, whereas the second set of bits is conveyed using a multi-user coding scheme. The compressive sensing portion is key in sidestep** some of the challenges posed by the unsourced aspect of the problem. The information afforded by the compressive sensing is employed to create a sparse random multi-access graph conducive to joint decoding. This construction leverages the lessons learned from traditional IDMA into creating low-complexity schemes for the unsourced setting and its inherent randomness. Under joint message-passing decoding, the proposed scheme offers comparable performance to existing low-complexity alternatives. Findings are supported by numerical simulations.
△ Less
Submitted 20 November, 2020; v1 submitted 12 June, 2019;
originally announced June 2019.
-
Asynchronous Neighbor Discovery Using Coupled Compressive Sensing
Authors:
Vamsi K. Amalladinne,
Krishna R. Narayanan,
Jean-Francois Chamberland,
Dongning Guo
Abstract:
The neighbor discovery paradigm finds wide application in Internet of Things networks, where the number of active devices is orders of magnitude smaller than the total device population. Designing low-complexity schemes for asynchronous neighbor discovery has recently gained significant attention from the research community. Concurrently, a divide-and-conquer framework, referred to as coupled comp…
▽ More
The neighbor discovery paradigm finds wide application in Internet of Things networks, where the number of active devices is orders of magnitude smaller than the total device population. Designing low-complexity schemes for asynchronous neighbor discovery has recently gained significant attention from the research community. Concurrently, a divide-and-conquer framework, referred to as coupled compressive sensing, has been introduced for the synchronous massive random access channel. This work adapts this novel algorithm to the problem of asynchronous neighbor discovery with unknown transmission delays. Simulation results suggest that the proposed scheme requires much fewer transmissions to achieve a performance level akin to that of state-of-the-art techniques.
△ Less
Submitted 1 November, 2018;
originally announced November 2018.
-
A Coded Compressed Sensing Scheme for Uncoordinated Multiple Access
Authors:
Vamsi K. Amalladinne,
Jean-Francois Chamberland,
Krishna R. Narayanan
Abstract:
This article introduces a novel communication scheme, termed coded compressed sensing, for unsourced multiple-access communication. The proposed divide-and-conquer approach leverages recent advances in compressed sensing and forward error correction to produce a novel uncoordinated access paradigm, along with a computationally efficient decoding algorithm. Within this framework, every active devic…
▽ More
This article introduces a novel communication scheme, termed coded compressed sensing, for unsourced multiple-access communication. The proposed divide-and-conquer approach leverages recent advances in compressed sensing and forward error correction to produce a novel uncoordinated access paradigm, along with a computationally efficient decoding algorithm. Within this framework, every active device partitions its data into several sub-blocks and, subsequently, adds redundancy using a systematic linear block code. Compressed sensing techniques are then employed to recover sub-blocks up to a permutation of their order, and the original messages are obtained by stitching fragments together using a tree-based algorithm. The error probability and computational complexity of this access paradigm are characterized. An optimization framework, which exploits the tradeoff between performance and computational complexity, is developed to assign parity-check bits to each sub-block. In addition, two emblematic parity bit allocation strategies are examined and their performances are analyzed in the limit as the number of active users and their corresponding payloads tend to infinity. The number of channel uses needed and the computational complexity associated with these allocation strategies are established for various scaling regimes. Numerical results demonstrate that coded compressed sensing outperforms other existing practical access strategies over a range of operational scenarios.
△ Less
Submitted 25 June, 2019; v1 submitted 12 September, 2018;
originally announced September 2018.
-
A Coupled Compressive Sensing Scheme for Unsourced Multiple Access
Authors:
Vamsi K. Amalladinne,
Avinash Vem,
Dileep Kumar Soma,
Krishna R. Narayanan,
Jean-Francois Chamberland
Abstract:
This article introduces a novel paradigm for the unsourced multiple-access communication problem. This divide-and-conquer approach leverages recent advances in compressive sensing and forward error correction to produce a computationally efficient algorithm. Within the proposed framework, every active device first partitions its data into several sub-blocks, and subsequently adds redundancy using…
▽ More
This article introduces a novel paradigm for the unsourced multiple-access communication problem. This divide-and-conquer approach leverages recent advances in compressive sensing and forward error correction to produce a computationally efficient algorithm. Within the proposed framework, every active device first partitions its data into several sub-blocks, and subsequently adds redundancy using a systematic linear block code. Compressive sensing techniques are then employed to recover sub-blocks, and the original messages are obtained by connecting pieces together using a low-complexity tree-based algorithm. Numerical results suggest that the proposed scheme outperforms other existing practical coding schemes. Measured performance lies approximately $4.3$~dB away from the Polyanskiy achievability limit, which is obtained in the absence of complexity constraints.
△ Less
Submitted 31 May, 2018;
originally announced June 2018.
-
A Systematic Approach to Incremental Redundancy over Erasure Channels
Authors:
Anoosheh Heidarzadeh,
Jean-Francois Chamberland,
Parimal Parag,
Richard D. Wesel
Abstract:
As sensing and instrumentation play an increasingly important role in systems controlled over wired and wireless networks, the need to better understand delay-sensitive communication becomes a prime issue. Along these lines, this article studies the operation of data links that employ incremental redundancy as a practical means to protect information from the effects of unreliable channels. Specif…
▽ More
As sensing and instrumentation play an increasingly important role in systems controlled over wired and wireless networks, the need to better understand delay-sensitive communication becomes a prime issue. Along these lines, this article studies the operation of data links that employ incremental redundancy as a practical means to protect information from the effects of unreliable channels. Specifically, this work extends a powerful methodology termed sequential differential optimization to choose near-optimal block sizes for hybrid ARQ over erasure channels. In doing so, an interesting connection between random coding and well-known constants in number theory is established. Furthermore, results show that the impact of the coding strategy adopted and the propensity of the channel to erase symbols naturally decouple when analyzing throughput. Overall, block size selection is motivated by normal approximations on the probability of decoding success at every stage of the incremental transmission process. This novel perspective, which rigorously bridges hybrid ARQ and coding, offers a pragmatic means to select code rates and blocklengths for incremental redundancy.
△ Less
Submitted 8 May, 2018;
originally announced May 2018.
-
Rate Selection and Power Adaptation using Maximal Ratio Combining for the Random Access Gaussian Channel
Authors:
Arman Hasanzadeh,
Jean-Francois Chamberland,
Krishna Narayanan
Abstract:
With the emergence of machine-driven communi- cation, there is a renewed interest in the design of random multiple access schemes for networks with large number of active devices. Many of the recently proposed access paradigms are enhancements to slotted ALOHA. One of the popular schemes, irregular repetition slotted ALOHA (IRSA), is based on an analogy between multiple access with successive inte…
▽ More
With the emergence of machine-driven communi- cation, there is a renewed interest in the design of random multiple access schemes for networks with large number of active devices. Many of the recently proposed access paradigms are enhancements to slotted ALOHA. One of the popular schemes, irregular repetition slotted ALOHA (IRSA), is based on an analogy between multiple access with successive interference cancellation and message-passing decoding on bipartite graphs. Most of the results on IRSA and its variants focus on the collision channel and they ignore physical limitations such as transmit power constraints and additive Gaussian noise at the physical layer. As such, naive extensions of IRSA to the Gaussian multiple access channel are not power efficient in the low signal-to-noise- ratio regime. This work introduces a novel paradigm whereby devices adapt their rates and/or transmit powers based on their chosen repetition profiles. The receiver performs maximal ratio combining over all the replicas prior to decoding a message. Numerical results for finite number of users show that the proposed scheme can provide substantial improvements in terms of power efficiency and average rate over standard IRSA.
△ Less
Submitted 10 January, 2018;
originally announced January 2018.
-
Sub-string/Pattern Matching in Sub-linear Time Using a Sparse Fourier Transform Approach
Authors:
Nagaraj T. Janakiraman,
Avinash Vem,
Krishna R. Narayanan,
Jean-Francois Chamberland
Abstract:
We consider the problem of querying a string (or, a database) of length $N$ bits to determine all the locations where a substring (query) of length $M$ appears either exactly or is within a Hamming distance of $K$ from the query. We assume that sketches of the original signal can be computed off line and stored. Using the sparse Fourier transform computation based approach introduced by Pawar and…
▽ More
We consider the problem of querying a string (or, a database) of length $N$ bits to determine all the locations where a substring (query) of length $M$ appears either exactly or is within a Hamming distance of $K$ from the query. We assume that sketches of the original signal can be computed off line and stored. Using the sparse Fourier transform computation based approach introduced by Pawar and Ramchandran, we show that all such matches can be determined with high probability in sub-linear time. Specifically, if the query length $M = O(N^μ)$ and the number of matches $L=O(N^λ)$, we show that for $λ< 1-μ$ all the matching positions can be determined with a probability that approaches 1 as $N \rightarrow \infty$ for $K \leq \frac{1}{6}M$. More importantly our scheme has a worst-case computational complexity that is only $O\left(\max\{N^{1-μ}\log^2 N, N^{μ+λ}\log N \}\right)$, which means we can recover all the matching positions in {\it sub-linear} time for $λ<1-μ$. This is a substantial improvement over the best known computational complexity of $O\left(N^{1-0.359 μ} \right)$ for recovering one matching position by Andoni {\em et al.} \cite{andoni2013shift}. Further, the number of Fourier transform coefficients that need to be computed, stored and accessed, i.e., the sketching complexity of this algorithm is only $O\left(N^{1-μ}\log N\right)$. Several extensions of the main theme are also discussed.
△ Less
Submitted 25 April, 2017;
originally announced April 2017.
-
On the Performance of Short Block Codes over Finite-State Channels in the Rare-Transition Regime
Authors:
Fatemeh Hamidi-Sepehr,
Jean-Francois Chamberland,
Henry D. Pfister
Abstract:
As the mobile application landscape expands, wireless networks are tasked with supporting different connection profiles, including real-time traffic and delay-sensitive communications. Among many ensuing engineering challenges is the need to better understand the fundamental limits of forward error correction in non-asymptotic regimes. This article characterizes the performance of random block cod…
▽ More
As the mobile application landscape expands, wireless networks are tasked with supporting different connection profiles, including real-time traffic and delay-sensitive communications. Among many ensuing engineering challenges is the need to better understand the fundamental limits of forward error correction in non-asymptotic regimes. This article characterizes the performance of random block codes over finite-state channels and evaluates their queueing performance under maximum-likelihood decoding. In particular, classical results from information theory are revisited in the context of channels with rare transitions, and bounds on the probabilities of decoding failure are derived for random codes. This creates an analysis framework where channel dependencies within and across codewords are preserved. Such results are subsequently integrated into a queueing problem formulation. For instance, it is shown that, for random coding on the Gilbert-Elliott channel, the performance analysis based on upper bounds on error probability provides very good estimates of system performance and optimum code parameters. Overall, this study offers new insights about the impact of channel correlation on the performance of delay-aware, point-to-point communication links. It also provides novel guidelines on how to select code rates and block lengths for real-time traffic over wireless communication infrastructures.
△ Less
Submitted 27 March, 2014;
originally announced March 2014.
-
Delay-Sensitive Communication over Fading Channel: Queueing Behavior and Code Parameter Selection
Authors:
Fatemeh Hamidi-Sepehr,
Henry D. Pfister,
Jean-Francois Chamberland
Abstract:
This article examines the queueing performance of communication systems that transmit encoded data over unreliable channels. A fading formulation suitable for wireless environments is considered where errors are caused by a discrete channel with correlated behavior over time. Random codes and BCH codes are employed as means to study the relationship between code-rate selection and the queueing per…
▽ More
This article examines the queueing performance of communication systems that transmit encoded data over unreliable channels. A fading formulation suitable for wireless environments is considered where errors are caused by a discrete channel with correlated behavior over time. Random codes and BCH codes are employed as means to study the relationship between code-rate selection and the queueing performance of point-to-point data links. For carefully selected channel models and arrival processes, a tractable Markov structure composed of queue length and channel state is identified. This facilitates the analysis of the stationary behavior of the system, leading to evaluation criteria such as bounds on the probability of the queue exceeding a threshold. Specifically, this article focuses on system models with scalable arrival profiles, which are based on Poisson processes, and finite-state channels with memory. These assumptions permit the rigorous comparison of system performance for codes with arbitrary block lengths and code rates. Based on the resulting characterizations, it is possible to select the best code parameters for delay-sensitive applications over various channels. The methodology introduced herein offers a new perspective on the joint queueing-coding analysis of finitestate channels with memory, and it is supported by numerical simulations.
△ Less
Submitted 12 September, 2013;
originally announced September 2013.
-
Reconfigurable Antennas, Preemptive Switching and Virtual Channel Management
Authors:
Santhosh Kumar,
Jean-Francois Chamberland,
Gregory H. Huff
Abstract:
This article considers the performance of wireless communication systems that utilize reconfigurable or pattern-dynamic antennas. The focus is on finite-state channels with memory and performance is assessed in terms of real-time behavior. In a wireless setting, when a slow fading channel enters a deep fade, the corresponding communication system faces the threat of successive decoding failures at…
▽ More
This article considers the performance of wireless communication systems that utilize reconfigurable or pattern-dynamic antennas. The focus is on finite-state channels with memory and performance is assessed in terms of real-time behavior. In a wireless setting, when a slow fading channel enters a deep fade, the corresponding communication system faces the threat of successive decoding failures at the destination. Under such circumstances, rapidly getting out of deep fades becomes a priority. Recent advances in fast reconfigurable antennas provide new means to alter the statistical profile of fading channels and thereby reduce the probability of prolonged fades. Fast reconfigurable antennas are therefore poised to improve overall performance, especially for delay-sensitive traffic in slow-fading environments. This potential for enhanced performance motivates this study of the temporal behavior of point-to-point communication systems with reconfigurable antennas. Specifically, agile wireless communication schemes over erasure channels are analyzed; situations where using reconfigurable antennas yield substantial performance gains in terms of throughput and average delay are identified. Scenarios where only partial state information is available at the receiver are also examined, naturally leading to partially observable decision processes.
△ Less
Submitted 28 January, 2014; v1 submitted 26 November, 2012;
originally announced November 2012.
-
First-Passage Time and Large-Deviation Analysis for Erasure Channels with Memory
Authors:
Santhosh Kumar,
Jean-Francois Chamberland,
Henry D. Pfister
Abstract:
This article considers the performance of digital communication systems transmitting messages over finite-state erasure channels with memory. Information bits are protected from channel erasures using error-correcting codes; successful receptions of codewords are acknowledged at the source through instantaneous feedback. The primary focus of this research is on delay-sensitive applications, codes…
▽ More
This article considers the performance of digital communication systems transmitting messages over finite-state erasure channels with memory. Information bits are protected from channel erasures using error-correcting codes; successful receptions of codewords are acknowledged at the source through instantaneous feedback. The primary focus of this research is on delay-sensitive applications, codes with finite block lengths and, necessarily, non-vanishing probabilities of decoding failure. The contribution of this article is twofold. A methodology to compute the distribution of the time required to empty a buffer is introduced. Based on this distribution, the mean hitting time to an empty queue and delay-violation probabilities for specific thresholds can be computed explicitly. The proposed techniques apply to situations where the transmit buffer contains a predetermined number of information bits at the onset of the data transfer. Furthermore, as additional performance criteria, large deviation principles are obtained for the empirical mean service time and the average packet-transmission time associated with the communication process. This rigorous framework yields a pragmatic methodology to select code rate and block length for the communication unit as functions of the service requirements. Examples motivated by practical systems are provided to further illustrate the applicability of these techniques.
△ Less
Submitted 25 April, 2013; v1 submitted 15 August, 2012;
originally announced August 2012.
-
On The Performance of Random Block Codes over Finite-State Fading Channels
Authors:
Fatemeh Hamidi-Sepehr,
Jean-Francois Chamberland,
Henry Pfister
Abstract:
As the mobile application landscape expands, wireless networks are tasked with supporting various connection profiles, including real-time communications and delay-sensitive traffic. Among many ensuing engineering challenges is the need to better understand the fundamental limits of forward error correction in non-asymptotic regimes. This article seeks to characterize the performance of block code…
▽ More
As the mobile application landscape expands, wireless networks are tasked with supporting various connection profiles, including real-time communications and delay-sensitive traffic. Among many ensuing engineering challenges is the need to better understand the fundamental limits of forward error correction in non-asymptotic regimes. This article seeks to characterize the performance of block codes over finite-state channels with memory. In particular, classical results from information theory are revisited in the context of channels with rate transitions, and bounds on the probabilities of decoding failure are derived for random codes. This study offers new insights about the potential impact of channel correlation over time on overall performance.
△ Less
Submitted 10 February, 2012; v1 submitted 3 February, 2012;
originally announced February 2012.
-
On the Queueing Behavior of Random Codes over a Gilbert-Elliot Erasure Channel
Authors:
Parimal Parag,
Jean-Francois Chamberland,
Henry D. Pfister,
Krishna R. Narayanan
Abstract:
This paper considers the queueing performance of a system that transmits coded data over a time-varying erasure channel. In our model, the queue length and channel state together form a Markov chain that depends on the system parameters. This gives a framework that allows a rigorous analysis of the queue as a function of the code rate. Most prior work in this area either ignores block-length (e.g.…
▽ More
This paper considers the queueing performance of a system that transmits coded data over a time-varying erasure channel. In our model, the queue length and channel state together form a Markov chain that depends on the system parameters. This gives a framework that allows a rigorous analysis of the queue as a function of the code rate. Most prior work in this area either ignores block-length (e.g., fluid models) or assumes error-free communication using finite codes. This work enables one to determine when such assumptions provide good, or bad, approximations of true behavior. Moreover, it offers a new approach to optimize parameters and evaluate performance. This can be valuable for delay-sensitive systems that employ short block lengths.
△ Less
Submitted 11 June, 2010;
originally announced June 2010.