Results 1  10
of
53
TwoUnicast Wireless Networks: Characterizing the DegreesofFreedom
, 2012
"... We consider twosource twodestination (i.e., twounicast) multihop wireless networks that have a layered structure with arbitrary connectivity. We show that, if the channel gains are chosen independently according to continuous distributions, then, with probability 1, twounicast layered Gaussi ..."
Abstract

Cited by 34 (9 self)
 Add to MetaCart
We consider twosource twodestination (i.e., twounicast) multihop wireless networks that have a layered structure with arbitrary connectivity. We show that, if the channel gains are chosen independently according to continuous distributions, then, with probability 1, twounicast layered Gaussian networks can only have 1, 3/2 or 2 sum degreesoffreedom (unless both sourcedestination pairs are disconnected, in which case no degreesoffreedom can be achieved). We provide sufficient and necessary conditions for each case based on network connectivity and a new notion of sourcedestination paths with manageable interference. Our achievability scheme is based on forwarding the received signals at all nodes, except for a small fraction of them in at most two key layers. Hence, we effectively create a “condensed network” that has at most four layers (including the sources layer and the destinations layer). We design the transmission strategies based on the structure of this condensed network. The converse results are obtained by developing informationtheoretic inequalities that capture the structures of the network connectivity. Finally, we extend this result and characterize the full degreesoffreedom region of twounicast layered wireless networks.
Degrees of freedom of twohop wireless networks: Everyone gets the entire cake
 IEEE Trans. Inf. Theory
, 2014
"... Abstract—We show that fully connected twohop wireless networks with K sources, K relays and K destinations have K degrees of freedom for almost all values of constant channel coefficients. Our main contribution is a new interferencealignmentbased achievability scheme which we call aligned network ..."
Abstract

Cited by 19 (1 self)
 Add to MetaCart
(Show Context)
Abstract—We show that fully connected twohop wireless networks with K sources, K relays and K destinations have K degrees of freedom for almost all values of constant channel coefficients. Our main contribution is a new interferencealignmentbased achievability scheme which we call aligned network diagonalization. This scheme allows the data streams transmitted by the sources to undergo a diagonal linear transformation from the sources to the destinations, thus being received free of interference by their intended destination. I.
Secure Degrees of Freedom of Onehop Wireless Networks
, 2012
"... We study the secure degrees of freedom (d.o.f.) of onehop wireless networks by considering four fundamental wireless network structures: Gaussian wiretap channel, Gaussian broadcast channel with confidential messages, Gaussian interference channel with confidential messages, and Gaussian multiple a ..."
Abstract

Cited by 19 (12 self)
 Add to MetaCart
We study the secure degrees of freedom (d.o.f.) of onehop wireless networks by considering four fundamental wireless network structures: Gaussian wiretap channel, Gaussian broadcast channel with confidential messages, Gaussian interference channel with confidential messages, and Gaussian multiple access wiretap channel. The secrecy capacity of the canonical Gaussian wiretap channel does not scale with the transmit power, and hence, the secure d.o.f. of the Gaussian wiretap channel with no helpers is zero. It has been known that a strictly positive secure d.o.f. can be obtained in the Gaussian wiretap channel by using a helper which sends structured cooperative signals. We show that the exact secure d.o.f. of the Gaussian wiretap channel with a helper is 1 2. Our achievable scheme is based on real interference alignment and cooperative jamming, which renders the message signal and the cooperative jamming signal separable at the legitimate receiver, but aligns them perfectly at the eavesdropper preventing any reliable decoding of the message signal. Our converse is based on two key lemmas. The first lemma quantifies the secrecy penalty by showing that the net effect of an eavesdropper on the system is that it eliminates one of the independent channel inputs. The second lemma quantifies the role of a helper by developing a direct relationship between the cooperative jamming signal of a helper and the message rate. We extend this result to the case of M helpers, and show that the exact secure d.o.f. in this case is M M+1. We then generalize this approach to more general network structures with multiple messages. We show that the sum secure d.o.f. of the Gaussian broadcast channel with confidential messages and M helpers is 1, the sum secure d.o.f. of the twouser interference channel with confidential messages is 2 3, the sum secure d.o.f. of the twouser interference channel with confidential messages and M helpers is 1, and the sum secure d.o.f. of the Kuser multiple access wiretap channel is
On the Sum Secure Degrees of Freedom of TwoUnicast Layered Wireless Networks
"... Abstract—In this paper, we study the sum secure degrees of freedom (d.o.f.) of twounicast layered wireless networks. Without a secrecy constraint, the sum d.o.f. of this class of networks was studied by [1] and shown to take only one of three possible values: 1, 3/2 and 2, for all network configura ..."
Abstract

Cited by 7 (4 self)
 Add to MetaCart
(Show Context)
Abstract—In this paper, we study the sum secure degrees of freedom (d.o.f.) of twounicast layered wireless networks. Without a secrecy constraint, the sum d.o.f. of this class of networks was studied by [1] and shown to take only one of three possible values: 1, 3/2 and 2, for all network configurations. We consider the setting where the message of each sourcedestination pair must be kept informationtheoretically secure from the unintended receiver. We show that the sum secure d.o.f. can take 0, 1, 3/2, 2 and at most countably many other positive values, which we enumerate. s1 u1 u2 u3 t1 t2 s2 w1 w2 w3
Approximate ergodic capacity of a class of fading 2user 2hop networks,” in preparation
"... Abstract—We consider a fading AWGN 2user 2hop network in which the channel coefficients are independently and identically distributed (i.i.d.) drawn from a continuous distribution and vary over time. For a broad class of channel distributions, we characterize the ergodic sum capacity within a cons ..."
Abstract

Cited by 5 (2 self)
 Add to MetaCart
(Show Context)
Abstract—We consider a fading AWGN 2user 2hop network in which the channel coefficients are independently and identically distributed (i.i.d.) drawn from a continuous distribution and vary over time. For a broad class of channel distributions, we characterize the ergodic sum capacity within a constant number of bits/sec/Hz, independent of signaltonoise ratio. The achievability follows from the analysis of an interference neutralization scheme where the relays are partitioned into K pairs, and interference is neutralized separately by each pair of relays. For K =1, we previously proved a gap of 4 bits/sec/Hz for i.i.d. uniform phase fading and approximately 4.7 bits/sec/Hz for i.i.d. Rayleigh fading. In this paper, we give a result for general K. In the limit of large K, we characterize the ergodic sum capacity within 4((log π) − 1) ≃ 2.6 bits/sec/Hz for i.i.d. uniform phase fading and 4(4 − log 3π) ≃ 3.1 bits/sec/Hz for i.i.d. Rayleigh fading. I.
1Layered Interference Networks with Delayed CSI: DoF Scaling with Distributed Transmitters
"... The layered interference network is investigated with delayed channel state information (CSI) at all nodes. It is demonstrated how multihopping can be utilized to increase the achievable degrees of freedom (DoF). In particular, a multiphase transmission scheme is proposed for the Kuser 2Khop int ..."
Abstract

Cited by 5 (4 self)
 Add to MetaCart
(Show Context)
The layered interference network is investigated with delayed channel state information (CSI) at all nodes. It is demonstrated how multihopping can be utilized to increase the achievable degrees of freedom (DoF). In particular, a multiphase transmission scheme is proposed for the Kuser 2Khop interference network in order to systematically exploit the layered structure of the network and delayed CSI to achieve DoF values that scale with K. This result provides the first example of a network with distributed transmitters and delayed CSI whose DoF scales with the number of users. I.
Avestimehr, “Twohop interference channels: Impact of linear timevarying schemes
 In preparation
"... Abstract—We consider the twohop interference channel (IC) with constant real channel coefficients, which consists of two sourcedestination pairs, separated by two relays. We analyze the achievable degrees of freedom (DoF) of such network when relays are restricted to perform scalar amplifyforward ..."
Abstract

Cited by 5 (2 self)
 Add to MetaCart
(Show Context)
Abstract—We consider the twohop interference channel (IC) with constant real channel coefficients, which consists of two sourcedestination pairs, separated by two relays. We analyze the achievable degrees of freedom (DoF) of such network when relays are restricted to perform scalar amplifyforward (AF) operations, with possibly timevarying coefficients. We show that, somewhat surprisingly, by providing the flexibility of choosing timevarying AF coefficients at the relays, it is possible to achieve 4/3 sumDoF. We also develop a novel outer bound that matches our achievability, hence characterizing the sumDoF of twohop interference channels with timevarying AF relaying strategies. I.
On the role of deterministic models in K × K × K wireless networks
 Science, University of California
, 2012
"... Abstract—This paper establishes a connection between the capacity region of the K ⇥ K ⇥ K wireless network under the AWGN channel model and under a truncated deterministic channel model, which allows any outer bound on the capacity region of the truncated network to be translated into an outer bound ..."
Abstract

Cited by 4 (2 self)
 Add to MetaCart
(Show Context)
Abstract—This paper establishes a connection between the capacity region of the K ⇥ K ⇥ K wireless network under the AWGN channel model and under a truncated deterministic channel model, which allows any outer bound on the capacity region of the truncated network to be translated into an outer bound on the capacity region of the AWGN network. The result is obtained through the utilization of a recent worstcase noise theorem [1], which shows that perturbing the noise distribution in AWGN networks only increases the capacity region. I.
Incremental relaying for the Gaussian interference channel with a degraded broadcasting relay
 in Proc. FortyNinth Annual Allerton Conf. Commun, Control and Computing
, 2011
"... ar ..."
Review A Survey on Interference Networks: Interference Alignment
, 2012
"... entropy ..."
(Show Context)