The present invention relates generally to communication systems and more specifically to communication systems capable of communicating via Gaussian point-to-point, fading point-to-point, Gaussian Multiple Access Channels (MAC), Gaussian Random Access Channels (RAC), Fading MACs, and Fading RACs.
Emerging communication systems such as the Internet of Things, wireless cellular networks, and machine-to-machine communication systems impose two significant requirements on the code design: low latency constraints and random activity involving a large number of communicating devices. Investigators have studied random access channels in the finite blocklength regime, where an unknown number of transmitters is active, and communication delay is finite.
Current random access strategies mostly use either orthogonalization (TDMA, FDMA, and CDMA) or collision avoidance (e.g., slotted ALOHA). Orthogonalization methods divide up resources (e.g., time, frequency, or signals) among the transmitters. In slotted ALOHA, each transmitter randomly chooses a time slot to transmit its message, and the decoder declares an error if two or more transmitters are active in a time slot. For example, slotted ALOHA achieves only 37% of the single-transmitter capacity.
For a single transmitter, the capacity of a Gaussian channel is
C(P)=½ log(1+P) (1)
using codewords with symbols drawn independently and identically distributed (i.i.d.) according to the Gaussian distribution with variance P−δ for a very small value δ; where P is the maximal (per-codeword) power constraint, and the noise variance is 1.
In Claude Shannon, Probability of error for optimal codes in a Gaussian channel, Bell System Technical Journal, 38 (3), pp. 611-656, Shannon shows the performance improvement in the achievable reliability function using codewords drawn uniformly at random on an n-dimensional sphere of radius √{square root over (nP)} and a maximum likelihood decoder.
In Vincent Yan Fu Tan, and Marco Tomamichel, The third-order term in the normal approximation for the AWGN channel, IEEE Transactions on Information Theory 61.5 (2015), 2430-2438, Tan and Tomamichel use the same distribution and decoder to prove the achievability of a maximal rate of
under blocklength n and average error probability ϵ, where
is the dispersion of the point-to-point Gaussian channel.
The first- and second-order terms in (2) remain the same under maximal-error and both maximal- and average-power constraints across codewords; they differ under average-error and average-power constraints.
Extending the asymptotic expansion in (2) to a Gaussian MAC, in which multiple transmitters communicate independent messages to a single receiver over a Gaussian channel with blocklength n, is not trivial. The result in (2) can be generalized to the two-transmitter MAC, bounding the achievable rate as a function of the 3×3 dispersion matrix V(P1,P2), an analogue of V(P) assuming transmitters with per-codeword power constraints P1 and P2.
Communication systems and methods in accordance with various embodiments of the invention can be utilized within a communication scenario where K transmitters are communicating with a single receiver through a Gaussian channel or a Fading channel. In several embodiments, the communication system can be a point-to-point communication system. In a number of embodiments, the communication system is a multiple access communication system in which the identity of active transmitters is known to all transmitters and to the receiver. In certain embodiments, the communication system is a random access communication system in which the set of active transmitters is typically unknown to the transmitters and to the receiver. In many embodiments, a rateless coding strategy is utilized within the communication system in which each encoder utilizes codewords on a restricted subset of a multi-dimensional sphere. In several embodiments, the restricted subset includes codewords that are either on a subset of the surface of the multi-dimensional sphere or close to the subset of the surface of multi-dimensional sphere. In a number of embodiments, at least some of the codewords are on a subset of the surface of the multi-dimensional sphere. In certain embodiments, all codewords are on a subset of the surface of the multi-dimensional sphere. In other embodiments, each encoder utilizes codewords from some internal portion of the sphere close to its surface (e.g., on the surface of a smaller sphere inside the power sphere). In many embodiments, different encoders choose their codewords dependently.
One embodiment of a communication system includes a plurality of transmitters that each have an encoder, where the encoder of a given transmitter is configured to: receive a start of epoch message; encode message data as symbols using a rateless code comprising a set of codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere; and receive feedback messages at a predetermined set of potential decoding times. In addition, the transmitter is configured to transmit symbols until a received feedback message is an end of epoch message. The communication system also includes a receiver comprising a decoder, where the decoder is configured to: cause a broadcast transmitter to transmit at least one start of epoch message; receive observed symbols; and at each of a predetermined set of decode times, determine whether a decoding rule is satisfied. In addition, when the decoding rule is satisfied the receiver is configured to: decode at least one message based upon the received observed symbols based upon the rateless code; and cause the broadcast transmitter to transmit an end of epoch message.
In a further embodiment, the restricted subset of the multi-dimensional sphere includes a subset of a surface of the multi-dimensional sphere and an internal portion of the multi-dimensional sphere proximate the subset of the surface of the multi-dimensional sphere.
In another embodiment, the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere.
In a still further embodiment, the determination of whether a decoding rule is satisfied is based upon the received observed symbols.
In a still further embodiment, the decoding rule combines a threshold rule based on the total received power and a maximum likelihood decoding rule.
In still another embodiment, the codewords located within the restricted subset of the multi-dimensional sphere include a number of codewords M of blocklength nK, and the multi-dimensional sphere is characterized by a radius equal to √{square root over (nKP)}.
In a yet further embodiment, the codewords located within the restricted subset of the multi-dimensional sphere comprise a number of codewords M of blocklength nK that are each concatenated from sub-codewords of blocklengths n1, n2−n1, . . . , nK−nK−1; and each of the sub-codewords of blocklengths n1, n2−1, nK−nK−1 is characterized in that sub-codewords of blocklengths ni−ni−1 lie on a restricted subset of a multi-dimensional sphere of radius √{square root over ((ni−ni−1)P)}.
In yet another embodiment, the codewords located within the restricted subset of the multi-dimensional sphere are further characterized in that, when k transmitters from the plurality of transmitters are active, codewords of blocklength nk formed from concatenating the sub-codewords of blocklengths n1, n2−n1, . . . , nk−nk−1 are located within a restricted subset of a multi-dimensional sphere √{square root over (nkP)}.
In a further embodiment again, multiple transmitters in the plurality of transmitters are configured to select the same rateless code to use in the encoding of message data as symbols.
In another embodiment again, at least two of the plurality of transmitters are configured to select different rateless codes to use in the encoding of message data as symbols.
In a further additional embodiment, the receiver is configured to apply decoding rules at separate predetermined times with respect to each of the different codebooks.
In another additional embodiment, the broadcast transmitter is configured to send a negative feedback message when the decoding rule is not satisfied at a predetermined decode time.
In a still yet further embodiment, the encoder is configured to continue to encode message data as symbols using the rateless code in response to receipt of a negative feedback message.
In still yet another embodiment, the receiver is further configured to measure characteristics of the channel and select the predetermined set of decoding times based upon the measured channel characteristics.
A transmitter in accordance with a still further embodiment again includes: a receiver configured to receive a start of epoch message; an encoder configured to encode message data as symbols using a rateless code including a set of codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere; and a modulator configured to transmit symbols encoded by the encoder. In addition, the receiver is further configured to receive an end of epoch message at one of a predetermined set of times; and the modulator is configured to transmit symbols encoded by the encoder until an end of epoch message is received by the receiver.
In still another embodiment again, the encoder is configured to continue to encode message data as symbols using the rateless code in response to receipt of a negative feedback message.
In a still further additional embodiment, the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere and an internal portion of the multi-dimensional sphere proximate the subset of the surface of the multi-dimensional sphere.
In still another additional embodiment, the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere.
A receiver in accordance with a yet further embodiment again includes: a decoder configured to select at least one codebook; a transmitter configured to transmit at least one start of epoch message; and a receiver configured to receive observed symbols. In addition, the decoder is further configured to determine whether a decoding rule is satisfied at each of a predetermined set of decode times, and when the decoding rule is satisfied: decode at least one message based upon the received observed symbols based upon a rateless code comprising a set of codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere, and cause the transmitter to transmit an end of epoch message.
In yet another embodiment again, the determination of whether a decoding rule is satisfied is based upon the received observed symbols.
In a yet further additional embodiment, the decoding rule combines a threshold rule based on the total received power and a maximum likelihood decoding rule.
In yet another additional embodiment, the broadcast transmitter sends a negative feedback message when the decoding rule is not satisfied at a predetermined decode time.
In a further additional embodiment again, the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere and an internal portion of the multi-dimensional sphere proximate the subset of the surface of the multi-dimensional sphere.
In another additional embodiment again, the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere.
Turning now to the drawings, communication system and methods in accordance with various embodiments of the invention are illustrated that can be utilized within a communication scenario where K transmitters are communicating with a single receiver through a Gaussian channel or a Fading channel. In several embodiments, the communication system can be a point-to-point communication system and the transmitter transmits using a rateless code for a predetermined epoch or until a receiver provides a feedback message indicating the end of an epoch and that the message was successfully decoded. In multiple access communication systems, the identity of active transmitters is typically known to all transmitters and to the receiver. In random access communication systems, the set of active transmitters is typically unknown to the transmitters and to the receiver. Both the MAC and RAC channels are characterized in that multiple transmitters can transmit simultaneously on the same channel (colliding with each other) and a receiver can decode the messages being transmitted by each of the transmitters (despite the messages being transmitted simultaneously).
In a number of embodiments, a rateless coding strategy is utilized within the communication system in which each encoder utilizes codewords on a restricted subset of a multi-dimensional sphere. In several embodiments, the restricted subset includes codewords that are either on a subset of the surface of the multi-dimensional sphere or close to the subset of the surface of multi-dimensional sphere. In a number of embodiments, at least some of the codewords are on a subset of the surface of the multi-dimensional sphere. In certain embodiments, all codewords are on a subset of the surface of the multi-dimensional sphere. In other embodiments, each encoder utilizes codewords from some internal portion of the sphere close to its surface (e.g., on the surface of a smaller sphere inside the power sphere). In many embodiments, different encoders choose their codewords dependently.
In several embodiments, the decoder attempts to decode only at a finite set of decoding times. At each decoding time within the set of decoding times, in some embodiments, the receiver broadcasts the acknowledgment to one or more transmitters indicating whether or not a transmitter can cease transmitting the message being transmitting using a rateless code. When employed in Fading channels, receivers in accordance with many embodiments of the invention estimate channel characteristics (e.g., fading coefficients) and utilize these estimates to determine appropriate codebooks and/or decoding times. In several embodiments, the receiver can transmit messages to the encoders indicating an appropriate codebook(s) and/or a set of decoding times. In certain embodiments, the receiver employs a maximum likelihood decoder to perform decoding. The term maximum likelihood decoder is typically utilized to describe a decoder that performs decoding based upon selecting the received codeword(s) that are the highest probability to have been transmitted given the signal that was received. In several embodiments, the receiver employs other decoding rules such as a single threshold rule or multiple simultaneous threshold rules. In point-to-point communication systems, the transmitter and receiver can also agree in advance on the duration of the epoch and coordinate changes in the duration of an epoch from one epoch to the next to achieve adaptive coding and modulation using the rateless code. In several embodiments, the duration of a specific epoch within a point-to-point communication is unknown at the start of the epoch and determined by the receiver based upon received symbols using one or more decoding rules.
Systems and methods in accordance with many embodiments of the invention utilize this new coding scheme to communicate via a Gaussian RAC in a manner that provides superior performance compared to prior uses of rateless codes. Use of rateless codes to communicate in a random MAC is described in Michelle Effros, Kostina Victoria, and Recep Can Yavas, Random access channel coding in the finite blocklength regime, 2018 IEEE International Symposium on Information Theory (ISIT) and Recep Can Yavas, Victoria Kostina and Michelle Effros, Random access channel coding in the finite blocklength regime, in IEEE Transactions on Information Theory, doi: 10.1109/TIT.2020.3047630, the disclosure of which including the disclosure of rateless codes and their use in communicating via RACs is hereby incorporated by reference in its entirety.
In a number of embodiments, one or more transmitters and a receiver utilize codewords obtained by concatenating K sub-codewords of blocklengths n1, n2−n1, . . . , nK−nK−1, each lies on or near a subset of a surface of a sphere of radius √{square root over ((ni−ni−1)P)}. In RAC communication systems where k transmitters are active, the resulting codewords are located within a restricted subset of the sphere of radius √{square root over (nkP)}. In several embodiments, the sub-codewords of blocklengths n1, n2−n1, . . . , nK−nK−1 are located within a restricted subset of, or in some internal portion of a sphere of radius √{square root over ((ni−ni−1)P)}. The receiver can use output typicality to determine the number of transmitters and then can apply a maximum likelihood decoder. In a number of embodiments, receivers combine maximum likelihood decoding with a single threshold test based on the received power to decode messages from an unknown number of active transmitters.
In several embodiments, an encoder employ random coding. The random codewords are generated by concatenating K sub-codewords of blocklengths n1, n2−n1, . . . , nK−nK−1, each drawn from a uniform distribution on the surface of a sphere of radius √{square root over ((ni−ni−1)P)}. When k transmitters are active, the resulting codewords can be uniformly distributed on a restricted subset of the surface of a sphere of radius √{square root over (nkP)}. In some embodiments, the codewords are distributed uniformly or non-uniformly on a subset of the sphere or on a subset of the internal portion of the sphere (e.g., a smaller sphere inside the power sphere). In several embodiments, the portions of the codewords (i.e., the sub-codewords of sizes n1,n2−n1, . . . ) are drawn according to dependent distributions. In many embodiments, the codewords are drawn from a subset of the surface of the sphere, and/or each sub-codeword is drawn according to a conditional distribution that depends on the values of the symbols in the prior sub-codewords. For example, for any subset of the surface of the K-dimensional power sphere for which the maximal power constraint is satisfied for decoding times n1, . . . , nK, a uniform distribution on that subset can be achieved by an appropriate choice of the conditional distributions from which the sub-codewords are drawn.
In a number of embodiments, the receiver broadcasts a feedback message (e.g., a single bit) to all transmitters at each potential decoding time, indicating whether or not it is ready to decode. In several embodiments, a decoding rule is utilized by the decoder that combines a threshold rule based on the total received power and a maximum likelihood decoder. As is discussed below, communication systems that employ the rateless Gaussian RAC codes described herein can achieve the same performance up to a third-order term as the best known codes for the Gaussian MAC.
In several embodiments, a communication system capable of communicating via a RAC can achieve additional efficiency gains by detecting early within a time epoch that an unusually large number of transmitters have commenced simultaneously transmitting. Instead of requiring all transmitters to continue to transmit with a long blocklength, the receiver can transmit a feedback message ending the epoch and indicating to one or more of the transmitters that they should wait a period of time before attempting to re-transmit. In several embodiments, the period of time that a transmitter waits before attempting to retry transmitting its message can be a number of time epochs specified by the transmitter. In certain embodiments, the period of time can be a random number of time epochs determined by the transmitter.
Systems and methods in accordance with various embodiments of the invention can also be utilized to communicate via point-to-point fading channels and/or the fading RAC. When communicating via the fading RAC, communication systems in accordance with many embodiments of the invention estimate channel characteristics and determine decoding times based upon the estimated channel characteristics. While the discussion herein focuses on Gaussian and fading channels with maximal-power and average-error constraints, the systems and methods described herein may be useful beyond these exemplary channel and communication scenarios. As can be readily appreciated, the specific manner in which data is encoded and decoded when communicating on MACs and/or RACs is largely dependent upon the requirements of specific applications. Communication systems and methods in accordance with various embodiments of the invention are discussed further below.
A receiver configured to control the transmission of transmitters during epochs defined by the receiver in accordance with an embodiment of the invention is conceptually illustrated in
As noted above, the receiver need not continuously transmit its decoding state to the transmitters. In a number of embodiments, the transmitters and the receiver establish a set of potential decoding times and the receiver sends a negative or positive feedback message, at each potential decoding time indicating whether the receiver requires more symbols to be able to decode the messages with a high probability (i.e., a negative feedback message’) or whether the receiver has received enough symbols and has decided to decode the messages and start a new epoch (i.e., a positive feedback message). In a number of embodiments, a feedback bit ‘0’ is utilized to send a negative feedback message, and a feedback bit ‘1’ is utilized to send a positive feedback message.
In many embodiments, the set of potential decoding times is determined based upon channel conditions. As the channel deteriorates and/or experiences fading, the receiver can adapt and choose a set of potential decoding times where the number of symbols required to be received during an epoch for a given estimated number of transmitters increases. In several embodiments, the decoder can first attempt to estimate the channel conditions and then determine a codebook and/or appropriate decoding times, which can be communicated to the transmitters. When the channel improves/changes the receiver can adapt to a set of potential decoding times in which the number of symbols required to be received for a given estimated number of transmitters decreases. In several embodiments where the channel behaviour is changing sufficiently slowly, the receiver estimates the channel parameters after some fixed period and broadcasts these estimates to the transmitters at the end of that fixed period. In many embodiments, transmitters would know when to listen for this feedback signal and also how to calculate the potential decoding tines using that feedback. In other embodiments where the channel behavior is changing more quickly, the receiver sends the updated estimates of the channel parameters and/or updated next feedback times at each time feedback is sent (e.g., at each potential decoding time). In a number of embodiments, the receiver adapts the set of potential decoding times utilized during a particular epoch based upon a measurement of channel conditions including (but not limited to) channel noise and/or fading coefficients. In several embodiments, the receiver periodically signals a guard interval in which transmitters are required to cease activity. During this guard interval, the receiver can measure channel noise and determine an appropriate set of potential decoding times. In a number of embodiments, transmitters transmit a pilot sequence and the receiver can use this known sequence to estimate the fading characteristics of the channel. The receiver can then broadcast the set of potential decoding times and/or an identifier of the set of potential decoding times to the transmitters and can initiate the next epoch via a positive feedback message. The transmitters can then monitor the feedback channel for negative and positive feedback messages based upon the set of potential decoding times communicated by the receiver. Although specific methods are described for adapting between different sets of potential decoding times, it can readily be appreciated that any of a variety of techniques can be utilized for determining an appropriate set of decode times for a given set of channel conditions and coordinating the adoption of such a set of decode times by the receiver and transmitters in accordance with various embodiments of the invention.
In a number of embodiments, all transmitters use the same encoder 102 and the receiver broadcasts an indication of a particular codebook to use in a given epoch. In several embodiments, the transmitters are able to use different codebooks. Using different codebooks can enable the decoder to identify the transmitter that transmitted a specific message decoded by the decoder 106. Using different codebooks can also enable the encoders to transmit different numbers of messages and attain different rates. When transmitters encode using different encoders, the receiver can transmit information indicating the specific codebook to be used by a particular encoder at the start of a particular epoch. The receiver can then utilize knowledge of the different codebooks in the decoding of the transmitted messages from the observed symbols.
Although specific communication systems are described above with reference to
Transmitters in accordance with various embodiments of the invention are configured to wait to transmit data until the start of an epoch and then transmit data throughout the epoch while listening periodically for a positive feedback message that indicates the end of the epoch. In many embodiments, the end of the epoch can be agreed upon from one epoch to the next by one or more transmitters and a receiver. In several embodiments, a transmitter can determine the end of the epoch by listening periodically for a positive feedback message that indicates the end of the epoch. As discussed above, in many embodiments of the invention, the codebook selected for the rateless code is coordinated with the receiver and includes codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere. In several embodiments, the restricted subset includes a subset of the surface of the multi-dimensional sphere and a region proximate the subset of the surface of the multi-dimensional sphere. In many embodiments, the restricted subset is a subset of the surface of the multi-dimensional sphere. In other embodiments, the codewords lie within an internal portion of a smaller multi-dimensional sphere (e.g., a smaller sphere inside the power sphere). In several embodiments, transmitters choose their codewords dependently. In many embodiments, the transmitter monitors a feedback channel for a transmission from a receiver containing a codebook and/or an identifier for a codebook to be utilized within a specified (e.g., the next) epoch.
A process for transmitting data using a rateless code oi a MAC and/or RAC during epochs defined by a receiver in accordance with an embodiment of the invention is illustrated in
The transmitter selects 208 a block of message data to transmit and a codebook to use to encode the message data using a rateless code. In many embodiments, the codebook utilized is a codebook indicated by a receiver that includes codewords in which the codewords are located within a restricted subset of a multi-dimensional sphere. In many embodiments, the codebook constitutes a common randomness between the transmitter and the receiver. In other embodiments, there is only one codebook, and that same codebook is always used to encode the message data using a rateless code. In certain embodiments, the codebook is the same for every transmitter. In many embodiments, the codebook is specific to the transmitter. In order to encode the message data, the transmitter can also reset a clock that is used to count the number of transmitted symbols and a counter that is used to index into the set of potential decoding times. As noted above, in some embodiments, the counter can be considered to correspond to a number of active transmitters.
The transmitter transmits 210 the symbols generated by the rateless code based upon the block of message bits and with each transmitted symbols checks 212 to see whether the number of transmitted symbols corresponds to one of the potential decoding times in the set of potential decoding times. If not, then the transmitter increments 214 the clock. When the number of transmitted symbols corresponds to a potential decoding time from the set of potential decoding times, the transmitter listens 216 for an acknowledgment feedback from the receiver. When a determination 218 is made that the acknowledgment message is a negative feedback message, then the transmitter increments the clock and the counter. The transmitter continues to transmit symbols generated by the rateless code until a determination 218 is made that a positive feedback message is received. At which point the epoch is over and the transmitter determines 222 whether additional message data is available for transmission and 202 whether the transmitter wishes to be active during the next epoch. When no more message data is available for transmission, the process can complete.
Although specific processes for transmitting data are described above with reference to
Receivers in accordance with various embodiments of the invention are configured to receive data transmitted by an unknown number of transmitters and encoded by rateless codes. In some embodiments, these rateless codes are based upon codewords located within a restricted subset of a multi-dimensional sphere. In several embodiments, these rateless codes are fixed. In order to be effective, the receiver must permit the transmitters to transmits symbols for a period of time that is sufficiently long to enable decoding of the transmitted messages with high probability. However, permitting the transmitters to transmit more symbols beyond this required blocklength decreases the rate of the transmitters below capacity of the channel. Accordingly, receivers in accordance with many embodiments of the invention employ decoding rules to determine when a sufficient number of symbols are received to decode the transmitted messages with high probability. In a number of embodiments, a separate potential decoding time is determined for each possible number of active transmitters, and the receiver applies a decoding rule at the each of the potential decoding times to determine whether the transmitted messages can be decoded. In this way, the decoding rule effectively constitutes an attempt to estimate the number of active transmitters. As is discussed below, communication systems in accordance with many embodiments of the invention utilize transmitters that share a common encoder to reduce implementation complexity. In several embodiments, simplicity is traded off for the ability of the receiver to identify the specific messages transmitted by individual transmitters. In a number of embodiments, the receiver can assign a codebook that is specific to a given transmitter to enable identification of the messages transmitted by the transmitter.
The implementation of receivers in accordance with various embodiments of the invention can be influenced by the manner in which the receiver manages the case in which no transmitters are transmitting. The sooner the receiver ends an epoch in which no transmitters are transmitting, the higher the rate achieved across the channel. In a number of embodiments, receivers employ a separate process to determine whether transmitters are active and the receiver simply commences decoding when the receiver knows that transmitters are active. In other embodiments, the receiver incorporates a decoding rule that determines whether any transmitters are active prior to the first potential decoding time period.
A process for detecting whether one or more transmitters are active and/or decoding data transmitted by the one or more active transmitters via a MAC and/or RAC in accordance with an embodiment of the invention is illustrated in
As part of a process of receiving and decoding symbols, the receiver can initialize a clock that is used to count the number of received symbols and a counter that is used to index into the set of potential decoding times. As noted above, in some embodiments, the counter can be considered to correspond to a number of active transmitters. When a receiver determines the estimated number of active transmitters, the receiver can transmit a positive feedback message indicating the end of the epoch. In other embodiments, the counter can be considered an index identifying a specific subset of distinct encoders. When a receiver determines that the counter specifies the estimated set of active transmitters and the time equals the time for decoding that number of active encoders, the receiver will transmit a positive feedback message indicating the end of the epoch.
After the receiver commences receiving observed symbols, the receiver determines 302 whether the number of received symbols corresponds to the potential decoding time indicated by the counter. When the clock indicates that the current time is not one of the potential decoding times, the receiver increments 308 the clock and continues to receive observed symbols. When the clock corresponds to one of the potential decoding times from the set of potential decoding times indicated by the counter, the receiver determines 310 whether a decoding rule is satisfied. The first potential decoding time corresponds to a period of time during which the receiver can determine that there are no active transmitters. A variety of different, decoding rules can be applied to determine that there are no active transmitters and at subsequent potential decoding times to estimate the number of active transmitters. In many embodiments, the decoding rule that is utilized to estimate the number of active transmitters during the epoch can be a simple threshold rule that is applied at each potential decoding time after a determination is made that one or more transmitters are active. As is discussed further below, the specific decoding rule applied in a given receiver in accordance with an embodiment of the invention is largely dependent upon the requirements of a given application.
When the decoding rule is not satisfied, the receiver concludes that the subset of transmitters indexed by t is not the estimated active transmitter subset that is currently active and sends a negative feedback message to the transmitters. The receiver also increments the counter and the clock and continues to receive observed symbols. When the decoding rule is satisfied, the receiver decodes 314 the messages transmitted by the estimated active transmitter set and broadcasts a positive feedback message to the transmitters. In some embodiments, the receiver can determine 316 whether it is prepared to initiate another epoch. In the event that the receiver wishes to commence another epoch, the receiver selects 318 one or more codebooks to be utilized by the transmitters during the next epoch and broadcasts 302 a positive feedback message to the transmitters indicating the commencement of the next epoch and specifying the chosen codebook ID(s). In the event that the receiver completes an epoch and does not want to initiate a new epoch, the process completes. In many embodiments, the receiver transmits a positive feedback message indicating the end of the epoch (so the transmitters can cease transmission), followed by a message indicating that a new epoch has not commenced.
While a number of specific processes are described above for decoding data transmitted by an unknown number of transmitters via a RAC using rateless codes with reference to
While a variety of communication systems, transmitters, and receivers are described above with reference to
Bold symbols are used to denote vectors (e.g., x). For any integer k≥1, [k]{1, . . . , k}. For any set , (){⊆, ≠∅} denotes the set of non-empty subsets of . For any x=(x1, . . . , xn)∈n and ⊆[n], =(xi:i∈) denotes the sub-vector of x with components in . For vectors x1, . . . , xK of the same dimension and index set ∈([K]), =(: s∈) and . The notation for vectors and their collections is summarized in Table 1 below. For vectors x=(x1, . . . , xn) and y=(y1, . . . , yn),
can be written if there exists a permutation π of the elements of y such that x=π(y), and
if x≠π (y) for all permutations π of elements of y. The inner product of x and y is denoted by x,y=Σi=1nxiyi and the Euclidean norm of x by ∥x∥√{square root over (x,x)}. Vector inequalities are understood element-wise, i.e., x≤y if and only if xi≤yi for all i∈[n]. All-zero and all-one vectors are denoted by 0 and 1, respectively.
Matrices are denoted by sans serif font (e.g., A). The n×n identity matrix is denoted by In. Logarithms and exponents are base e. The indicator function is denoted by 1 {·}. Unless specified otherwise, for any scalar function ƒ(·) and any vector x∈n, the vector of function values ƒ(x)=(ƒ(xi):i∈[n]) is formed. For a set ⊆n, a vector c∈n, and a scalar a, a+c{ax+c:x∈}. The sphere with dimension n, radius r, and center at the origin is denoted by n(r){x∈n:∥x∥=r}.
The distribution of a random variable X is denoted by PX. PX→PY|X→PY indicates that PY is the marginal distribution of PXPY|X. To indicate that the random variables (or vectors) X and Y are identically distributed, the notation X˜Y is employed. The multivariate Gaussian distribution with mean μ and covariance matrix Σ is denoted by (μ, Σ). The complementary Gaussian cumulative distribution function
is employed. Furthermore, the functional inverse of Q(·) is denoted by Q−1(·).
Big-O notation ƒ(n)=O(g(n)) is used if and only if there exist constants c and n0 such that |ƒ(n)|≤c|g(n)| for all n>n0; little-o notation ƒ(n)=o(g(n)) is used if and only if for every ϵ>0, there exists a constant n0 such that |ƒ(n)|≤ϵ|g(n)| for all n>n0.
Systems and methods in accordance with many embodiments of the invention utilize a two-transmitter MAC channel code. In several embodiments, an (M1,M2,ϵ)-MAC code for the channel with transition PY
where Y2 is the channel output under inputs X1 and X2, and ϵ is the average-error constraint.
The mutual information densities for a MAC with channel transition law PY
where PX
where (X1, X2, Y2) is distributed according to PX
The performance of the above codes on the Gaussian MAC, can be analyzed using a Random Coding Union (RCU) bound with PX
When the input distributions PX
ϵ≤[min{1,(M1−1)[ι1(
When the codewords X1(m1), m1∈[M1] and X2(m2), m2 ∈[M2] are drawn i.i.d. from PX
where (10) follows the union bound and the bounded nature of probability. The right-hand side of (10) is equal to the right-hand side of (7), since the mutual information density ι1,2(x1, x2; y) can be expanded as
where
i∈{1, 2}. Since the average error probability of randomly generated codewords is bounded by the right-hand side of (7), there exists a code satisfying (7).
In several embodiments of the invention, the system utilizes a MAC code with with an arbitrary K≥2 transmitters. In these embodiments, an (M[K], ϵ)-MAC code for the channel with transition law PY
such that
where YK is the channel output under inputs X1, . . . , XK, and ϵ is the average-error constraint. The above result generalizes to the K-transmitter MAC. The conditional mutual information densities can be defined for the K-transmitter MAC as
where ⊂[K], ≠∅, and c=[K]\, and the unconditional mutual information density as
The inequality in (7) extends to the K-transmitter MAC as
In several embodiments, the code definition incorporates maximal-power constraints (P1, P2) on the channel inputs. When (X1, X2) and Y2 are defined as the MAC inputs and output, respectively, an (n, M1, M2, ϵ, P1, P2)-MAC code for a two-transmitter MAC includes encoding functions ƒ1: [M1]→ and ƒ2: [M2]→, and decoding function g:n→[M1]×[M2] such that
The following notation can be used to present an achievability result for the Gaussian MAC with k≥1 transmitters. Over n channel uses, the channel has inputs X1, . . . , Xk ∈, additive noise Z˜(0, In), and output
Y
k
=
+Z. (16)
The channel transition law induced by (16) can be written as
When Z˜(0, V), and V is a d×d positive semi-definite matrix, the multidimensional analogue of the inverse Q−1(·) of the complementary Gaussian cumulative distribution is
Q
inv(V,ϵ)={z∈d:[Z≤z]≥1−ϵ}. (19)
For d=1, Q−1(ϵ)=min{z:z∈Qinv(1,ϵ)}.
The capacity vector for the two-transmitter Gaussian MAC can be defined as
The dispersion matrix for the two-transmitter Gaussian MAC can be defined as
where V(P) is the dispersion function (3), and
For any ϵ∈(0, 1) and any P1, P2>0, an (n, M1,M2, ϵ, P1, P2)-MAC code for the two-transmitter Gaussian MAC exists provided that
The above result extends to the general K-transmitter Gaussian MAC. An (n, M[K], ϵ, P[K])-MAC code for the K-transmitter Gaussian MAC with message set sizes M1, . . . , MK and power constraints P1, . . . , PK is a natural extension of the two-transmitter MAC code given above. For any ϵ∈(0, 1), and Pi>0, i∈[K], an (n, M[K], ϵ, P[K])-MAC code for the K-transmitter Gaussian MAC exists provided that.
where C(P[K]) is the capacity vector
C(P[K])(C():∈([K]))∈2
and V(P[K]) is the (2K−1)×(2K−1) dispersion matrix with the elements (P[K]), ,∈([K]), given by
For the symmetric setting, that is Pi=P and Mi=M for i∈[K], for any ϵ∈(0, 1), and P>0, an (n, M1, ϵ, P1)-MAC code for the K-transmitter Gaussian MAC exists provided that
K log M≤nC(KP)−√{square root over (n(V(KP)+Vcr(K,P)))}Q−1(ϵ)+½ log n+O(1). (29)
Again, C(·) and V(·) are the capacity (1) and dispersion (3) functions, respectively, and Vcr(K, P) is the cross dispersion term
In order to capture the scenario of a memoryless Gaussian channel with K possible transmitters, a single receiver, and an unknown activity pattern ⊆[K] describing the set of active transmitters, the Gaussian RAC can be described by a family of Gaussian MACs {PY
Systems and methods in accordance with many embodiments of the invention utilize an epoch-based rateless communication strategy to achieve the fundamental limits of the Gaussian RAC. Each transmitter can either be active or silent during a whole epoch. At each of times n0, n1, . . . , the decoder broadcasts to all transmitters a message indicating whether the decoder has been able to decode the messages or not. (e.g., a single bit or symbol—sending value 1 if it can decode and 0 otherwise). The transmission of a message (e.g., a one bit message ‘1’) at time nt ends the current epoch and starts the next. The timing of the end of the epoch is often indicative of the decoder's estimate that the number of transmitters is t.
In several embodiments, identical encoding is employed in which each active transmitter i uses the same encoding function to describe its message Wi ∈[M]. Identical encoding here assumes Pi=P and Mi=M for all i. The task of the decoder is to decode a list of messages sent by the active transmitters but not the identities of those transmitters. Messages A are independent and uniformly distributed on alphabet [M].
Since encoding is identical and the channel is invariant to permutation of its inputs, it can be assumed without loss of generality that |=k implies =[k]. Intuitively, given identical encoding and a Gaussian channel, one would expect that interference increases with the number of active transmitters k, and therefore that the decoding time nk increases with k. Since the capacity per transmitter for the k-transmitter Gaussian MAC,
decreases with k, n0< . . . <nK for M can be chosen to be large enough. In several embodiments, the system designer can choose a different ordering on the decoding times n0, . . . , nK.
As a notational convenience, nK can be used to represent the longest decoding time. At time nK, the decoder sees
Y
k
=
+Z∈
n
for k∈[K], (31)
where X1, . . . , Xk are nK-dimensional channel inputs, Z˜(0, In
An agnostic random access model can be assumed, where the transmitters know nothing about the set of active transmitters except their own membership and the feedback from the receiver. The receiver knows nothing about except what it can learn from the channel output Yk.
In certain embodiments, the transmitters and the receiver utilize a rateless Gaussian RAC code that is an ({nj, ϵj}j=0K, M, P)-RAC code for the Gaussian RAC with K transmitters. Such a code can be implemented using a single encoding function ƒ:×[M]→n
The codewords satisfy the maximal-power constraints
∥ƒ(u,m)[nj]∥2≤njP for m∈[M],u∈,j∈[K]. (32)
If k transmitters are active, then the average probability of error in decoding k messages at time nk is bounded as
where ƒ(U, mi) is the codeword for the message mi∈[M], U is the common randomness random variable and the output Yk is generated according to (31). If no transmitters are active, then the decoder decodes to the unique message {1} with probability of error bounded as
[g0(U,Y0|n
The realization u of the common randomness random variable U initializes the encoders and the decoder. At the start of each communication epoch, u can be shared between all transmitters and the receiver. The alphabet size of U is bounded by K+1.
When K<∞, ϵk∈(0, 1) for k∈{0}∪[K], and M are fixed, an ({nj, ϵj}j=0K, M, P)-RAC code exists for the Gaussian RAC with K possible transmitters provided that
k log M≤nkC(kP)−√{square root over (nk(V(kP)+Vcr(k,P)))}Q−1(ϵk)+½ log nk+O(1) (35)
for k∈[K], and
n
0
≥c log n1+o(log n1) (36)
for some constant c>0, where C(·), V(·), and Vcr(·, ·) are the capacity (1), dispersion (3), and cross dispersion functions (30), respectively. All uses of O(1) and o(1) are taken with respect to n1.
When constants λk>0 for k∈{0}∪[K] and distribution PX on n
for all k∈[K], where X[K],
For the Gaussian RAC, the rateless code described above performs as well in the first-, second-, and third-order terms as the best known communication scheme when the set of active transmitters is known. In other words, the first three terms on the right-hand side of (35) for k active transmitters match the first three terms of the largest achievable sum-rate in our achievability bound in (29) for the k-transmitter MAC.
When the distribution of the random codewords PX is particularized such that the first n1 symbols are drawn uniformly from the n1-dimensional sphere with radius √{square root over (n1P)}, n
In many embodiments including the one that the sub-codewords are drawn independently and uniformly from the surface of multi-dimensional spheres with potentially different sizes, the number of active transmitters in a Gaussian RAC can be reliably estimated from the total received power. This is possible because when k transmitters are active, the average received power
at time nk, concentrates around its mean value, N+kP, where N is the noise power of the channel, and this mean is distinct for each k∈{0}∪[K]. In other embodiments including the ones that the sub-codewords are drawn dependently, some other suitable functions of the received output Yk[n
By choosing n1, . . . , nK such that the inequalities in (35) are satisfied with a constant gap for each k, each nk can be expressed in terms of n1, ϵ1, ϵk, k and P as
where Ck=C(kP) and Vk=V(kP)+Vcr(k, P). Equation (39) can be derived by replacing the inequality in (35) by an equality, computing the Taylor series expansion of nk in (35) in terms of k, P, ϵk, and log M, and then replacing log M by (35) for k=1.
The input distribution used for the Gaussian RAC can also be used to achieve equivalent performance to that which can be achieved for the K-transmitter Gaussian MAC. As long as nj−nj−1≥cnK holds for some constant c>0 for all j∈[K], requiring separate power constraints on each sub-block of the codewords as
∥ƒi(mi)[nj]∥2≤njPi for mi∈[Mi],i∈[K],j∈[K] (40)
does not degrade performance in terms of the first three terms in the expansion of the performance bound. The supports of the distributions from which the codewords are drawn for the Gaussian MAC and RAC are illustrated in
As described above, the number of active transmitters in an epoch is estimated via a sequence of decodability tests. An alternative strategy that is utilized in many embodiments is to estimate the number of active transmitters in one shot from the received power at time n0, and to inform the transmitters about the estimate t of the number of active transmitters via a log(K+1)-bit feedback at time n0. Given this knowledge, the transmitters can modify their encoding function based on t.
While much of the discussion above assumes that each of the transmitters utilize the same codebook. Systems and methods in accordance with a number of embodiments of the invention have the ability to use codebooks that are unique to each transmitter. By using distinct codebooks for each transmitter, the decoder can associate the transmitter identities with the decoded messages.
Multi-transmitter communication over a slowly-varying fading RAC can be considered as a delay-constrained communication, where the duration of a communication epoch is shorter than the channel's coherence time, so the random fading coefficient stays constant during the entire epoch. This channel model is commonly referred as the quasi-static fading channel. As in the Gaussian RAC model, it can be assumed that the number of active transmitters k is unknown to the transmitters and the receiver. For simplicity, single-antenna communication with real inputs are considered in which the real fading coefficient is Hi for transmitter i. When the number of active transmitters is k, the channel output at time n is given by
where Xi∈n is the channel input from transmitter i, Z˜(0, N|n)∈n is the additive Gaussian noise, and Y∈n is the channel output. The value N>0 is the noise power in the fading channel.
In the fixed-length, point-to-point, quasi-static fading channel problem, it is known that the maximum achievable rate in the first-order is
C
ϵ
=sup{R:F(R)≤ϵ}, (42)
which is expressed using a quantity called the outage probability defined as
F(R)[C(H2P)<R]. (43)
The outage probability can be viewed as the probability that the fading gain |H| is too small to allow reliable communication over the channel, i.e., under this model, the fading coefficient H dictates whether reliable communication is possible for the current communication epoch.
Unlike the fixed-length fading RAC codes without feedback, use of a code similar to the codes described above in combination with stop-feedback allows the decoding times n0 . . . , nK to vary with the number of active transmitters k: therefore it can achieve higher rates for each number of active transmitters. Generalizing this idea to the quasi-static fading channel model, the decoder can vary the decoding times n0 . . . , nK according to the estimate of the fading coefficient vector H=(H1, . . . , Hk). This means that to decode k messages, the decoder can decode at a random decoding time nk(H) rather than a fixed nk, so that the system can opportunistically achieve higher coding rates for every realization of the fading coefficient H=h, rather than being penalized by the small fading coefficients h1, . . . , hk as in the fixed-length scenario for the fading channel. As in the Gaussian RAC problem, stop-feedback can be employed in the coding strategy. At time nk(H), a positive feedback message signal can be sent to the transmitters to inform the transmitters that decoding has occurred. Otherwise, a negative feedback signal is sent signaling that the transmission continue until the next decoding time nk(H).
When the fading coefficients H=h is available at the transmitters and the receiver, the channel transition rule can be equivalently expressed as
where the power constraint for the transmitted codewords until time n is
∥Xi∥2≤nhi2Pa.s∀i∈[k]. (45)
This implies that for every realization of H=h, rates can be achieved such that the available power P for transmitter i is replaced by hi2P, and the fixed decoding times {nj}j=0K are replaced by decoding times that vary with h, i.e., {nj(h)}j=0K.
In many embodiments where neither the transmitters nor the receiver knows the fading coefficients H, the fading coefficients H can be accurately estimated as ĥ using the first nF channel outputs Y[n
Confidence Measures with Respect to the Random Decoding Time
As the decoding time is random due to the estimation process, for each j∈[K], it can be desirable to condition on the random decoding times such that
[nj(ĥ)>Nj(h)|H=h]≤δj, for all j∈{0, . . . ,K}. (46)
where Nj(h) is a function of the fading coefficients h.
The inequality in (46) provides a performance measure on the random decoding times for each realization of the fading coefficients. The condition in (46) enables the random decoding time, nj(ĥ), under the realization of the fading coefficients, h, to be below the target decoding time Nj(h) with high probability.
An ({Nj(h), ϵj, δj}j=0K, nF, M, P)-fading RAC code for K transmitters that can be utilized within the fading RAC with stop-feedback can be defined as follows. The decoder estimates the coding coefficient H at time nF as ĥ using the output Y[n
The codewords can satisfy the maximal-power constraints
∥ƒ(u,m)[n
If k transmitters are active, then the average probability of error in decoding k messages at time nk(ĥ) is bounded as
Furthermore, the random decoding times nj(ĥ) satisfy the condition
[nj(ĥ)>Nj(h)|H=h]≤δj for j∈{0, . . . ,K}. (49)
In many embodiments, upon receiving y[n
In many embodiments, the decoder can determine the decoding times {nj(ĥ)}j=0K using the estimate ∥ĥ∥. In a number of embodiments, the receiver sends a quantized or other imprecise description of the estimate ĥ to the transmitters. In a number of embodiments, the transmitters have access to this list of decoding times via one-time feedback at time nF.
At the encoder, the codewords are generated according to the independent, concatenated, spherical random code structure that is used for the Gaussian RAC (see discussion above). Instead of the decoding times nj, j∈[K] utilized within the Gaussian RAC, communication systems that communicate via a fading RAC can utilize decoding times {nj(ĥ)}j=0K.
The decoder at time nj(ĥ) combines a mismatched information density maximum likelihood decoder with an information-density-based threshold rule that involves defining the conditional mutual information density
A threshold λk∈ can then be set. The decoder can apply the following function to make a decision at each subsequent time nk(ĥ):
where λk is a parameter chosen to satisfy the error criterion ϵk. Given that output power is not sufficient to estimate the number of active transmitters in the fading model, an information-density-based threshold rule is utilized.
Although the present invention has been described in certain specific aspects, many additional modifications and variations would be apparent to those skilled in the art. It is therefore to be understood that the present invention can be practiced otherwise than specifically described without departing from the scope and spirit of the present invention. Thus, embodiments of the present invention should be considered in all respects as illustrative and not restrictive. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.
The present invention claims priority to U.S. Provisional Patent Application Ser. No. 62/959,683 entitled “Gaussian Multiple and Random Access in the Finite Blocklength Regime” to Yavas et al., filed Jan. 10, 2020, the disclosures of which is herein incorporated by reference in its entirety.
This invention was made with government support under Grant No. CCF1817241 awarded by the National Science Foundation. The government has certain rights in the invention.
Number | Date | Country | |
---|---|---|---|
62959683 | Jan 2020 | US |