-
A Multistage Method for SCMA Codebook Design Based on MDS Codes
Authors:
Bruno Fontana da Silva,
Danilo Silva,
Bartolomeu F. Uchôa-Filho,
Didier Le Ruyet
Abstract:
Sparse Code Multiple Access (SCMA) has been recently proposed for the future generation of wireless communication standards. SCMA system design involves specifying several parameters. In order to simplify the procedure, most works consider a multistage design approach. Two main stages are usually emphasized in these methods: sparse signatures design (equivalently, resource allocation) and codebook…
▽ More
Sparse Code Multiple Access (SCMA) has been recently proposed for the future generation of wireless communication standards. SCMA system design involves specifying several parameters. In order to simplify the procedure, most works consider a multistage design approach. Two main stages are usually emphasized in these methods: sparse signatures design (equivalently, resource allocation) and codebook design. In this paper, we present a novel SCMA codebook design method. The proposed method considers SCMA codebooks structured with an underlying vector space obtained from classical block codes. In particular, when using maximum distance separable (MDS) codes, our proposed design provides maximum signal-space diversity with a relatively small alphabet. The use of small alphabets also helps to maintain desired properties in the codebooks, such as low peak-to-average power ratio and low-complexity detection.
△ Less
Submitted 7 May, 2019;
originally announced May 2019.
-
Secrecy Outage Probability of Network-Coded Cooperative Communication
Authors:
João Luiz Rebelatto,
Richard Demo Souza,
Rodrigo Tsuneyoshi Kaido,
Ohara Kerusauskas Rayel,
Bartolomeu F. Uchôa-Filho
Abstract:
We evaluate the secrecy performance of a multiple access cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, on the top of improving the error performance of the legitimate communication, already demonstrated in the literatu…
▽ More
We evaluate the secrecy performance of a multiple access cooperative network where the destination node is wiretapped by a malicious and passive eavesdropper. We propose the application of the network coding technique as an alternative to increase the secrecy at the destination node, on the top of improving the error performance of the legitimate communication, already demonstrated in the literature. Network coding is leveraged by assuming that the legitime cooperative nodes are able to perform non-binary linear combinations of different frames before the transmission. Different scenarios with and without channel state information (CSI) at the transmitter side are evaluated. The effectiveness of the proposed schemes is evaluated in terms of secrecy outage probability through theoretic and numerical analyses. It is shown that, even when the legitimate transmitters do not have any CSI, the secrecy can be increased through the use of network coding when compared to the direct transmission and traditional cooperative techniques.
△ Less
Submitted 30 June, 2014;
originally announced June 2014.
-
Time-Switching Uplink Network-Coded Cooperative Communication with Downlink Energy Transfer
Authors:
Guilherme Luiz Moritz,
João Luiz Rebelatto,
Richard Demo Souza,
Bartolomeu F. Uchôa-Filho,
Yonghui Li
Abstract:
In this work, we consider a multiuser cooperative wireless network where the energy-constrained sources have independent information to transmit to a common destination, which is assumed to be externally powered and responsible for transferring energy wirelessly to the sources. The source nodes may cooperate, under either decode-and-forward or network coding-based protocols. Taking into account th…
▽ More
In this work, we consider a multiuser cooperative wireless network where the energy-constrained sources have independent information to transmit to a common destination, which is assumed to be externally powered and responsible for transferring energy wirelessly to the sources. The source nodes may cooperate, under either decode-and-forward or network coding-based protocols. Taking into account the fact that the energy harvested by the source nodes is a function of the fading realization of inter-user channels and user-destination channels, we obtain a closed-form approximation for the system outage probability, as well as an approximation for the optimal energy transfer period that minimizes such outage probability. It is also shown that, even though the achievable diversity order is reduced due to wireless energy transfer process, it is very close to the one achieved for a network without energy constraints. Numerical results are also presented to validate the theoretical results.
△ Less
Submitted 30 July, 2014; v1 submitted 9 December, 2013;
originally announced December 2013.
-
On Multiplicative Matrix Channels over Finite Chain Rings
Authors:
Roberto W. Nóbrega,
Chen Feng,
Danilo Silva,
Bartolomeu F. Uchôa-Filho
Abstract:
Motivated by physical-layer network coding, this paper considers communication in multiplicative matrix channels over finite chain rings. Such channels are defined by the law $Y =A X$, where $X$ and $Y$ are the input and output matrices, respectively, and $A$ is called the transfer matrix. It is assumed a coherent scenario in which the instances of the transfer matrix are unknown to the transmitte…
▽ More
Motivated by physical-layer network coding, this paper considers communication in multiplicative matrix channels over finite chain rings. Such channels are defined by the law $Y =A X$, where $X$ and $Y$ are the input and output matrices, respectively, and $A$ is called the transfer matrix. It is assumed a coherent scenario in which the instances of the transfer matrix are unknown to the transmitter, but available to the receiver. It is also assumed that $A$ and $X$ are independent. Besides that, no restrictions on the statistics of $A$ are imposed. As contributions, a closed-form expression for the channel capacity is obtained, and a coding scheme for the channel is proposed. It is then shown that the scheme can achieve the capacity with polynomial time complexity and can provide correcting guarantees under a worst-case channel model. The results in the paper extend the corresponding ones for finite fields.
△ Less
Submitted 19 November, 2013;
originally announced November 2013.
-
On the Capacity of Multiplicative Finite-Field Matrix Channels
Authors:
Roberto W. Nóbrega,
Danilo Silva,
Bartolomeu F. Uchôa-Filho
Abstract:
This paper deals with the multiplicative finite-field matrix channel, a discrete memoryless channel whose input and output are matrices (over a finite field) related by a multiplicative transfer matrix. The model considered here assumes that all transfer matrices with the same rank are equiprobable, so that the channel is completely characterized by the rank distribution of the transfer matrix. Th…
▽ More
This paper deals with the multiplicative finite-field matrix channel, a discrete memoryless channel whose input and output are matrices (over a finite field) related by a multiplicative transfer matrix. The model considered here assumes that all transfer matrices with the same rank are equiprobable, so that the channel is completely characterized by the rank distribution of the transfer matrix. This model is seen to be more flexible than previously proposed ones in describing random linear network coding systems subject to link erasures, while still being sufficiently simple to allow tractability. The model is also conservative in the sense that its capacity provides a lower bound on the capacity of any channel with the same rank distribution. A main contribution is to express the channel capacity as the solution of a convex optimization problem which can be easily solved by numerical computation. For the special case of constant-rank input, a closed-form expression for the capacity is obtained. The behavior of the channel for asymptotically large field size or packet length is studied, and it is shown that constant-rank input suffices in this case. Finally, it is proved that the well-known approach of treating inputs and outputs as subspaces is information-lossless even in this more general model.
△ Less
Submitted 17 April, 2013; v1 submitted 30 May, 2011;
originally announced May 2011.
-
Multi-User Cooperative Diversity through Network Coding Based on Classical Coding Theory
Authors:
João Luiz Rebelatto,
Bartolomeu F. Uchôa-Filho,
Yonghui Li,
Branka Vucetic
Abstract:
In this work, we propose and analyze a generalized construction of distributed network codes for a network consisting of $M$ users sending different information to a common base station through independent block fading channels. The aim is to increase the diversity order of the system without reducing its throughput. The proposed scheme, called generalized dynamic-network codes (GDNC), is a genera…
▽ More
In this work, we propose and analyze a generalized construction of distributed network codes for a network consisting of $M$ users sending different information to a common base station through independent block fading channels. The aim is to increase the diversity order of the system without reducing its throughput. The proposed scheme, called generalized dynamic-network codes (GDNC), is a generalization of the dynamic-network codes (DNC) recently proposed by Xiao and Skoglund. The design of the network codes that maximize the diversity order is recognized as equivalent to the design of linear block codes over a nonbinary finite field under the Hamming metric. We prove that adopting a systematic generator matrix of a maximum distance separable block code over a sufficiently large finite field as the network transfer matrix is a sufficient condition for full diversity order under link failure model. The proposed generalization offers a much better tradeoff between rate and diversity order compared to the DNC. An outage probability analysis showing the improved performance is carried out, and computer simulations results are shown to agree with the analytical results.
△ Less
Submitted 15 February, 2011; v1 submitted 16 April, 2010;
originally announced April 2010.
-
Generalized Distributed Network Coding Based on Nonbinary Linear Block Codes for Multi-User Cooperative Communications
Authors:
João Luiz Rebelatto,
Bartolomeu F. Uchôa-Filho,
Yonghui Li,
Branka Vucetic
Abstract:
In this work, we propose and analyze a generalized construction of distributed network codes for a network consisting of M users sending different information to a common base station through independent block fading channels. The aim is to increase the diversity order of the system without reducing its code rate. The proposed scheme, called generalized dynamic network codes (GDNC), is a generaliz…
▽ More
In this work, we propose and analyze a generalized construction of distributed network codes for a network consisting of M users sending different information to a common base station through independent block fading channels. The aim is to increase the diversity order of the system without reducing its code rate. The proposed scheme, called generalized dynamic network codes (GDNC), is a generalization of the dynamic network codes (DNC) recently proposed by Xiao and Skoglund. The design of the network codes that maximizes the diversity order is recognized as equivalent to the design of linear block codes over a nonbinary finite field under the Hamming metric. The proposed scheme offers a much better tradeoff between rate and diversity order. An outage probability analysis showing the improved performance is carried out, and computer simulations results are shown to agree with the analytical results.
△ Less
Submitted 21 March, 2010; v1 submitted 17 March, 2010;
originally announced March 2010.
-
Multishot Codes for Network Coding using Rank-Metric Codes
Authors:
Roberto W. Nobrega,
Bartolomeu F. Uchoa-Filho
Abstract:
The multiplicative-additive finite-field matrix channel arises as an adequate model for linear network coding systems when links are subject to errors and erasures, and both the network topology and the network code are unknown. In a previous work we proposed a general construction of multishot codes for this channel based on the multilevel coding theory. Herein we apply this construction to the r…
▽ More
The multiplicative-additive finite-field matrix channel arises as an adequate model for linear network coding systems when links are subject to errors and erasures, and both the network topology and the network code are unknown. In a previous work we proposed a general construction of multishot codes for this channel based on the multilevel coding theory. Herein we apply this construction to the rank-metric space, obtaining multishot rank-metric codes which, by lifting, can be converted to codes for the aforementioned channel. We also adapt well-known encoding and decoding algorithms to the considered situation.
△ Less
Submitted 12 April, 2010; v1 submitted 12 January, 2010;
originally announced January 2010.
-
The Capacity of Random Linear Coding Networks as Subspace Channels
Authors:
Bartolomeu F. Uchoa-Filho,
Roberto W. Nobrega
Abstract:
In this paper, we consider noncoherent random linear coding networks (RLCNs) as a discrete memoryless channel (DMC) whose input and output alphabets consist of subspaces. This contrasts with previous channel models in the literature which assume matrices as the channel input and output. No particular assumptions are made on the network topology or the transfer matrix, except that the latter may…
▽ More
In this paper, we consider noncoherent random linear coding networks (RLCNs) as a discrete memoryless channel (DMC) whose input and output alphabets consist of subspaces. This contrasts with previous channel models in the literature which assume matrices as the channel input and output. No particular assumptions are made on the network topology or the transfer matrix, except that the latter may be rank-deficient according to some rank deficiency probability distribution. We introduce a random vector basis selection procedure which renders the DMC symmetric. The capacity we derive can be seen as a lower bound on the capacity of noncoherent RLCNs, where subspace coding suffices to achieve this bound.
△ Less
Submitted 12 January, 2010; v1 submitted 6 January, 2010;
originally announced January 2010.
-
Multishot Codes for Network Coding: Bounds and a Multilevel Construction
Authors:
Roberto W. Nobrega,
Bartolomeu F. Uchoa-Filho
Abstract:
The subspace channel was introduced by Koetter and Kschischang as an adequate model for the communication channel from the source node to a sink node of a multicast network that performs random linear network coding. So far, attention has been given to one-shot subspace codes, that is, codes that use the subspace channel only once. In contrast, this paper explores the idea of using the subspace…
▽ More
The subspace channel was introduced by Koetter and Kschischang as an adequate model for the communication channel from the source node to a sink node of a multicast network that performs random linear network coding. So far, attention has been given to one-shot subspace codes, that is, codes that use the subspace channel only once. In contrast, this paper explores the idea of using the subspace channel more than once and investigates the so called multishot subspace codes. We present definitions for the problem, a motivating example, lower and upper bounds for the size of codes, and a multilevel construction of codes based on block-coded modulation.
△ Less
Submitted 12 January, 2009;
originally announced January 2009.