#### DMCA

## 1Towards Full-Duplex Multihop Multiflow — A Study of Non-Layered Two Unicast Wireless Networks

### Citations

447 | Gaussian interference channel capacity to within one bit
- Etkin, Tse, et al.
- 2008
(Show Context)
Citation Context ...proximations in the form of DoF, generalized degrees of freedom (GDoF), capacity within a constant gap and even the exact capacity have been obtained for various single hop interference networks [3], =-=[4]-=-. Manuscript received October 15, 2013; revised March 23, 2014. This work was supported in part by NSF grants CCF-1161418 and CCF-1317351 and by ONR grant N00014-12-10067. This work was presented in p... |

292 | Wireless Network Information Flow: A deterministic approach,” Information Theory
- Avestimehr, Diggavi, et al.
- 2011
(Show Context)
Citation Context ...most important problems of network information theory. Recent years have seen rapid progress on mainly two settings: single flow multihop networks and single hop multiflow (interference) networks. In =-=[1]-=-, it is shown that the capacity (within a constant gap) of the single source multihop multicast network is given by the network min-cut. In [2], the capacity of a wireless multihop broadcast network w... |

208 |
Interference alignment, and the degrees of freedom of the K user interference channel
- Cadambe, Jafar
- 2009
(Show Context)
Citation Context ...ty approximations in the form of DoF, generalized degrees of freedom (GDoF), capacity within a constant gap and even the exact capacity have been obtained for various single hop interference networks =-=[3]-=-, [4]. Manuscript received October 15, 2013; revised March 23, 2014. This work was supported in part by NSF grants CCF-1161418 and CCF-1317351 and by ONR grant N00014-12-10067. This work was presented... |

89 | Real interference alignment: Exploiting the potential of single antenna systems
- Motahari, Gharan, et al.
- 2014
(Show Context)
Citation Context ...· ,M}. Then Relay R1 will find the point in CR1 which has the minimal distance between YR1(2) + YR1(2), and then make a hard decision on xR1,k1 by mapping the point to x̂R1,k1(2). Using Theorem 5 in =-=[22]-=-, it can be shown that the minimum distance between constellation points increases with P . Thus, the demodulation error e(1) in the first time slot goes to zero as P → ∞, which allows the demodulatio... |

71 |
Experiment-driven characterization of full-duplex wireless systems.
- Duarte, Dick, et al.
- 2011
(Show Context)
Citation Context ...l assumption that wireless networks must operate in a half-duplex mode. With the growing interest and remarkable recent progress in building practical full-duplex radios [15], [16], [17], [18], [19], =-=[20]-=-, [21], it is clear that this traditional assumption is no longer valid. Consequently, there is the need to update the theoretical models to include the full-duplex assumption, and to understand the i... |

52 | Aligned interference neutralization and the degrees of freedom of the 2 × 2 × 2 interference channel
- Gou, Jafar, et al.
- 2012
(Show Context)
Citation Context ...s the two — the multihop multiflow setting, starting with the most elemental multihop multiflow network, the 2×2×2 interference channel formed by concatenation of two 2-user interference channels. In =-=[5]-=-, it is shown that the 2 × 2 × 2 interference network achieves the cut-set outer bound value of 2 DoF for almost all channel coefficients. In [6], Shomorony and Avestimehr characterize the DoF for two... |

44 |
Degrees of freedom of wireless networks with relays, feedback, cooperation and full duplex operation
- Cadambe, Jafar
- 2009
(Show Context)
Citation Context ...t two links between any two nodes in the figure represent the forward link (due to transmitting) and the backward link (due to receiving), respectively. For this network, it has already been shown in =-=[24]-=- that if there is a direct interfering link from a source to the other destination, the DoF collapse to one. However, it remains unknown if such DoF collapse still happens without direct interfering l... |

33 | Two-unicast wireless networks: Characterizing the degrees-offreedom - Shomorony, Avestimehr |

29 |
Division-free duplex for wireless applications
- Chen, Beach, et al.
- 1998
(Show Context)
Citation Context ...rt due to the traditional assumption that wireless networks must operate in a half-duplex mode. With the growing interest and remarkable recent progress in building practical full-duplex radios [15], =-=[16]-=-, [17], [18], [19], [20], [21], it is clear that this traditional assumption is no longer valid. Consequently, there is the need to update the theoretical models to include the full-duplex assumption,... |

22 | On the degrees of freedom of the compound mimo broadcast channels with finite states
- Maddah-Ali
- 2009
(Show Context)
Citation Context ... Also note that while the scheme is presented for real channels where all signals, channel coefficients and noises are real values, it can be easily generalized to the complex case using Theorem 7 in =-=[23]-=-. III. 2× 2× 2 INTERFERENCE NETWORKS WITH ARBITRARY CONNECTIVITY In this section, we explore the 2×2×2 interference networks with arbitrary connectivity as shown in Fig. 2. Note that due to full-duple... |

18 |
Degrees of freedom region of a class of multisource Gaussian relay networks
- Jeon, Chung, et al.
- 2011
(Show Context)
Citation Context ...elong to the set {1, 4/3, 3/2, 5/3, 2} almost surely. The 2 × 2 × 2 setting has been successfully extended in several directions, including finite-field settings in [9], timevarying linear schemes in =-=[10]-=-, [11], [12], [13] and to the K × K × K network in [14]. However, the extensions have been limited primarily to layered network models, in large part due to the traditional assumption that wireless ne... |

18 | Avestimehr, “Degrees of freedom of two-hop wireless networks: “Everyone gets the entire cake
- Shomorony, S
- 2013
(Show Context)
Citation Context ...he 2 × 2 × 2 setting has been successfully extended in several directions, including finite-field settings in [9], timevarying linear schemes in [10], [11], [12], [13] and to the K × K × K network in =-=[14]-=-. However, the extensions have been limited primarily to layered network models, in large part due to the traditional assumption that wireless networks must operate in a half-duplex mode. With the gro... |

15 | Multiple Unicast Capacity of 2-source 2-sink Networks
- Wang, Gou, et al.
- 2011
(Show Context)
Citation Context ...cterizes the capacity region for two unicast information flows over a layered linear deterministic network. The DoF result for the layered two unicast problem is generalized by Wang, Gou and Jafar in =-=[8]-=- allowing all possible unicasts between 2 sources and 2 destinations. In this setting, known as 2-source 2-sink all-unicast layered wireless networks (also known as multihop X networks), each source h... |

13 |
Methods for spatial multiplexing of wireless two-way channels,” US patent, filed Oct. 2006 (provisional patent filed Oct. 2005), issued
- Khandani
- 2010
(Show Context)
Citation Context ... to the traditional assumption that wireless networks must operate in a half-duplex mode. With the growing interest and remarkable recent progress in building practical full-duplex radios [15], [16], =-=[17]-=-, [18], [19], [20], [21], it is clear that this traditional assumption is no longer valid. Consequently, there is the need to update the theoretical models to include the full-duplex assumption, and t... |

10 | Approximately Optimal Wireless Broadcasting,”
- Kannan, Raja, et al.
- 2011
(Show Context)
Citation Context ...rks and single hop multiflow (interference) networks. In [1], it is shown that the capacity (within a constant gap) of the single source multihop multicast network is given by the network min-cut. In =-=[2]-=-, the capacity of a wireless multihop broadcast network where a single source sends independent messages to multiple destinations over a multihop network is characterized within a constant gap from th... |

10 | Topological Interference Management with Alternating Connectivity. arXiv:1302.4020
- Sun, Geng, et al.
- 2013
(Show Context)
Citation Context ...1, 4/3, 3/2, 5/3, 2} almost surely. The 2 × 2 × 2 setting has been successfully extended in several directions, including finite-field settings in [9], timevarying linear schemes in [10], [11], [12], =-=[13]-=- and to the K × K × K network in [14]. However, the extensions have been limited primarily to layered network models, in large part due to the traditional assumption that wireless networks must operat... |

9 |
Two unicast information flows over linear deterministic networks
- Wang, Kamath, et al.
- 2011
(Show Context)
Citation Context ...and arbitrary connectivity between adjacent layers. It is shown that 2 unicast layered wireless networks can only have 1, 2 or 3/2 DoF. A related work on 2 unicast networks by Wang, Kamath and Tse in =-=[7]-=- characterizes the capacity region for two unicast information flows over a layered linear deterministic network. The DoF result for the layered two unicast problem is generalized by Wang, Gou and Jaf... |

8 |
Full duplex transmission operation of a 2.45-ghz asynchronous spread spectrum using a san convolver,”
- Tsubouchi, Nakase, et al.
- 1993
(Show Context)
Citation Context ...rge part due to the traditional assumption that wireless networks must operate in a half-duplex mode. With the growing interest and remarkable recent progress in building practical full-duplex radios =-=[15]-=-, [16], [17], [18], [19], [20], [21], it is clear that this traditional assumption is no longer valid. Consequently, there is the need to update the theoretical models to include the full-duplex assum... |

5 | Two-hop interference channels: Impact of linear time-varying schemes
- Issa, Fong, et al.
- 2013
(Show Context)
Citation Context ...to the set {1, 4/3, 3/2, 5/3, 2} almost surely. The 2 × 2 × 2 setting has been successfully extended in several directions, including finite-field settings in [9], timevarying linear schemes in [10], =-=[11]-=-, [12], [13] and to the K × K × K network in [14]. However, the extensions have been limited primarily to layered network models, in large part due to the traditional assumption that wireless networks... |

4 |
On interference networks over finite fields
- Hong, Caire
- 2014
(Show Context)
Citation Context ... between adjacent layers, the DoF belong to the set {1, 4/3, 3/2, 5/3, 2} almost surely. The 2 × 2 × 2 setting has been successfully extended in several directions, including finite-field settings in =-=[9]-=-, timevarying linear schemes in [10], [11], [12], [13] and to the K × K × K network in [14]. However, the extensions have been limited primarily to layered network models, in large part due to the tra... |

3 | Two-Way (True Full-Duplex) Wireless
- Khandani
- 2014
(Show Context)
Citation Context ...itional assumption that wireless networks must operate in a half-duplex mode. With the growing interest and remarkable recent progress in building practical full-duplex radios [15], [16], [17], [18], =-=[19]-=-, [20], [21], it is clear that this traditional assumption is no longer valid. Consequently, there is the need to update the theoretical models to include the full-duplex assumption, and to understand... |