Systems and methods for random access communication

Information

  • Patent Grant
  • 10951292
  • Patent Number
    10,951,292
  • Date Filed
    Friday, January 25, 2019
    5 years ago
  • Date Issued
    Tuesday, March 16, 2021
    3 years ago
Abstract
Systems and methods for random access communication in accordance with various embodiments of the invention are described in which receivers can handle uncoordinated transmissions of a large and unknown number of transmitters. Communication systems in accordance with many embodiments of the invention include a plurality of transmitters that encode message data as symbols using a rateless code. During transmission, the transmitters receive feedback messages at a predetermined set of potential decoding times until an end of epoch message is received. A receiver transmits at least one start of epoch message and, at each of a predetermined set of decoding times, determines whether a decoding rule is satisfied. When the decoding rule is satisfied, the receiver can decode at least one message from observed symbols based upon the rateless code. The receiver can end the transmission epoch by transmitting an end of epoch message.
Description
FIELD OF THE INVENTION

The present invention generally relates to communication systems and more specifically to communication systems that enable simultaneous transmission by multiple transmitters on a random access channel.


BACKGROUND

Random access is a common medium access control scheme utilized when multiple transmitters share a common channel. In a random access channel, sometimes called a multiple access channel, the channel is shared by multiple transmitters (i.e. a multiple-transmitter channel). Random access channels are multiple-transmitter channels characterized in that messages are not scheduled in advance. Each transmitter that has access to a random access channel can attempt to transmit at any time (or time slot), which can cause collisions that typically result in the transmitters being denied access to the channel and/or information loss.


Wireless access points including (but not limited to) WiFi hot spots and cellular base stations often utilize random access channels to setup communications via channels requiring scheduled access. In heavily utilized networks, random access channels utilized to schedule network resources are often the network's most critical bottleneck.


Multiple-transmitter channels are understood in information theory when the number and identities of transmitters are fixed and known. Even in this known-transmitter regime, information-theoretic solutions are often too complex to implement. As a result, orthogonalization methods, such as TDMA, FDMA, and orthogonal CDMA, are often used instead. Orthogonalization strategies simplify coding by scheduling the transmitters, but such methods can at best attain sum-rate equal to the single-transmitter capacity of the channel, which is significantly smaller than the maximal multi-transmitter sum-rate.


Most random access protocols currently in use rely on collision avoidance, which typically cannot surpass the single-transmitter capacity of the channel and may be significantly worse since an unknown transmitter set can make it difficult to schedule or coordinate among transmitters. Collision avoidance can be achieved through variations of the legacy (slotted) ALOHA and carrier sense multiple access (CSMA) algorithms. ALOHA, which uses random transmission times and back-off schedules, achieves only about 37% of the single-transmitter capacity of the channel. In CSMA, each transmitter tries to avoid collisions by verifying the absence of other traffic before starting a transmission over the shared channel. When collisions do occur, for example because two transmitters begin transmission at the same time, all transmissions are aborted, and a jamming signal is sent to be sure that all transmitters are aware of the collision. The procedure starts again at a random time, which again introduces inefficiencies.


The state of the art in random access coding is “treating interference as noise,” which is part of newer CDMA-based standards. While this strategy can deal with random access better than ALOHA, it is still far inferior to the theoretical limits. Two-layer MAC decoders, with outer layer codes that work to remove channel noise and inner layer codes that work to resolve conflicts have been proposed. However, these systems rely on codes designed for a predetermined number of transmitters, k; it is not clear how robust they are to randomness in the transmitters' arrivals and departures.


SUMMARY OF THE INVENTION

Systems and methods in accordance with various embodiments of the invention enable a receiver to simultaneously receive messages transmitted over a random access channel by an unknown number of transmitters. In many embodiments, reliable decoding is possible in this regime, but, it is possible to attain both the capacity and the dispersion of the multiple access channel (MAC) in operation. In a number of embodiments, the communication systems do as well in first- and second-order performance as if the transmitter activity were known everywhere a priori.


Since the capacity region of a MAC varies with the number of transmitters, it is tempting to believe that the transmitters of a random access system must somehow vary their codebook size in order to match their transmission rate to the capacity region of the MAC in operation. Instead, communication systems in accordance with various embodiments of the invention employ rateless codes, which are codes that can accommodate variable decoding times. Due to the use of rateless codes, decoders in accordance with a number of embodiments of the invention can effectively control the rate at which each transmitter transmits by varying decoding time depending on the observed channel output. In this way, the rate at which each transmitter communicates is determined at the receiver by changing not the size but the blocklength of each transmitter's codebook.


While many rateless codes allow truly arbitrary decoding times, systems and methods in accordance with a number of embodiments of the invention only allow decoding at a predetermined list of possible times n0, n1, n2, . . . . This strategy can both ease practical implementation and reduce feedback. In a number of embodiments, the decoder transmits a single-bit acknowledgment message to the encoder(s) at the end of every potential decoding time period that indicates whether or not the decoder is ready to decode the transmitted message at that time. If the decoder is not yet ready to decode the message, then the transmitters continue to transmit the message using the rateless code. When the decoder is ready to decode, receipt of the appropriate message indicating this fact by the transmitters indicates that active transmitters can commence transmitting a new message using the rateless code. If the decoding time is random, this so-called “single-bit” feedback forces the transmitter(s) to listen to the channel constantly, at every time step trying to discern whether or not a transmission was received. This either requires full-duplex devices or doubles the effective blocklength and can be quite expensive. Thus while the receiver technically sends only “one bit” of feedback, the transmitters receive one bit of feedback (with the alphabet {“transmission”, “no transmission”}) in every time step, giving a feedback rate of 1 bit per channel use rather than a total of 1 bit. Accordingly, communication systems in accordance with many embodiments of the invention only send acknowledgment bits at times n0, n1, n2, . . . , nt, and thus the transmitters need only listen at a finite collection of time steps, giving a total number of feedback bits equal to one plus (the receiver's estimate of) the number of transmitters, a feedback rate that can approach 0 bits per channel use as the blocklength grows.


A communication system in accordance with one embodiment of the invention includes a plurality of transmitters that each comprise an encoder, wherein the encoder of a given transmitter is configured to: receive a start of epoch message; select a codebook; encode message data as symbols using a rateless code determined using the selected codebook; and receive feedback messages at a predetermined set of potential decoding times. In addition, the transmitter is configured to transmit symbols until a received feedback message is an end of epoch message. The communication system also includes a receiver comprising a decoder, where the decoder is configured to: select at least one codebook; cause a broadcast transmitter to transmit at least one start of epoch message; receive observed symbols; and at each of a predetermined set of decode times, determine whether a decoding rule is satisfied. When the decoding rule is satisfied, the decoder is configured to decode at least one message based upon the received observed symbols based upon the rateless code and the selected at least one codebook and cause the broadcast transmitter to transmit an end of epoch message.


In a further embodiment, the determination of whether a decoding rule is satisfied is based upon the received observed symbols.


In another embodiment, the transmitter is configured to select a codebook based upon the start of epoch message.


In a still further embodiment, the broadcast transmitter transmits the at least one start of epoch message based upon the selected at least one codebook.


In still another embodiment, the broadcast transmitter is further configured to transmit at least one additional message based upon the selected at least one codebook.


In a yet further embodiment, multiple transmitters in the plurality of transmitters are configured to select the same codebook to use in the encoding of message data as symbols using a rateless code.


In yet another embodiment, at least two of the plurality of transmitters are configured to select different codebooks to use in the encoding of message data as symbols using a rateless code.


In a further embodiment again, the receiver applies decoding rules at separate predetermined times with respect to each of the different codebooks.


In another embodiment again, the broadcast transmitter sends a negative acknowledgement feedback message when the decoding rule is not satisfied at a predetermined decode time.


In a further additional embodiment, the encoder is configured to continue to encode message data as symbols using a rateless code determined using the selected codebook in response to receipt of a negative acknowledgement feedback message.


A transmitter system in accordance with one embodiment of the invention includes: a receiver configured to receive a start of epoch message; an encoder; and a modulator configured to transmit symbols encoded by the encoder. In addition, the encoder is configured to: select a codebook; and encode message data as symbols using a rateless code determined using the selected codebook. Furthermore, the receiver is further configured to receive an end of epoch message at one of a predetermined set of times, and the modulator is configured to transmit symbols encoded by the encoder until an end of epoch message is received by the receiver.


In a further embodiment, the transmitter is configured to select a codebook based upon the start of epoch message.


In another embodiment, the encoder is configured to continue to encode message data as symbols using a rateless code determined using the selected codebook in response to receipt of a negative acknowledgement feedback message.


A receiver system in accordance with one embodiment of the invention includes: a decoder configured to select at least one codebook; a transmitter configured to transmit at least one start of epoch message; and a receiver configured to receive observed symbols. In addition, the decoder is further configured to: determine whether a decoding rule is satisfied at each of a predetermined set of decode times; and when the decoding rule is satisfied, decode at least one message based upon the received observed symbols based upon a rateless code determined using the selected at least one codebook and cause the transmitter to transmit an end of epoch message.


In a further embodiment, the determination of whether a decoding rule is satisfied is based upon the received observed symbols.


In another embodiment, the transmitter transmits the at least one start of epoch message based upon the selected at least one codebook.


In a still further embodiment, the transmitter is further configured to transmit at least one additional message based upon the selected at least one codebook.


In still another embodiment, the decoder is configured to select a single codebook and determines whether the decoding rule is satisfied assuming that all transmitters are using the single codebook.


In a yet further embodiment, the decoder is configured to select a plurality of different codebooks and and applies decoding rules at separate predetermined times with respect to each of the different codebooks.


In yet another embodiment, the broadcast transmitter sends a negative acknowledgement feedback message when the decoding rule is not satisfied at a predetermined decode time.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 conceptually illustrates a receiver configured to control the transmission of transmitters during epochs defined by the receiver in accordance with an embodiment of the invention.



FIG. 2 is a flow chart illustrating a process for transmitting data using a rateless code on a Random Access Channel during epochs defined by a receiver in accordance with an embodiment of the invention.



FIG. 3 is a flow chart illustrating a process for detecting whether one or more transmitters are active and/or decoding data transmitted by the one or more active transmitters via a Random Access Channel in accordance with an embodiment of the invention.



FIG. 4 is a chart illustrating sum-rate capacity Ik achievable by a system in accordance with an embodiment of the invention in nats for the adder-erasure RAC with δ=0.2.



FIG. 5 is a chart illustrating dispersion Vk achievable by a system in accordance with an embodiment of the invention in nats2 for the adder-erasure RAC with δ=0.2.



FIG. 6 is a chart illustrating the capacity and achievable rates per user







{


R
k

=


log





M


n
k



}


k
=
1

15





of a system in accordance with an embodiment of the invention for the adder-erasure RAC with erasure probability δ=0.2 for the target error probability ϵk=10−6 for all k. For each curve, the message size M is fixed such that the rates {Rk} are achievable with n1 equal to 20, 100, 500, and 2500, respectively.





DETAILED DESCRIPTION

Turning now to the drawings, systems and methods for random access communication in accordance with various embodiments of the invention are illustrated. In many embodiments, receivers can handle uncoordinated transmissions of a large and unknown number of transmitters. Systems and methods in accordance with many embodiments of the invention utilize an agnostic random access model, in which each transmitter knows nothing about the set of active transmitters beyond what it learns from limited feedback from the receiver, and the receiver knows nothing about the set of active transmitters beyond what it learns from the channel output. In several embodiments, a rateless coding strategy is utilized within the communication system in which the decoder attempts to decode only at a finite set of decoding times. At each decoding time within the set of decoding times, in some embodiments, the receiver broadcasts the acknowledgment to all transmitters indicating whether or not the transmitters can cease transmitting the messages that they have been transmitting using rateless codes. It can be proven that for a nontrivial class of channels, when k transmitters are active, communication systems that employ codes similar to those described herein perform as well in terms of capacity and dispersion as the best known code for the k-transmitter MAC in which the transmitter activity is known a priori.


In a number of embodiments, a random access channel (RAC) communication strategy is utilized in which communication occurs in epochs, with each epoch beginning in the time step following the previous epoch's end. In several embodiments, each epoch ends with a positive acknowledgment bit (ACK), which the receiver broadcasts to all transmitters as described below. At the beginning of each epoch, each transmitter independently decides whether to be active or silent in that epoch. In some embodiments, the decision is binding for the length of the epoch, meaning that a transmitter must either actively transmit for all time steps in the epoch or remain silent for the same period. Thus, in these embodiments, while the total number of transmitters is potentially unlimited, the number of active transmitters stays constant during the entire transmission period between two positive ACKs.


In a number of embodiments, the single-bit feedback strategy described above is employed within a communication system that utilizes rateless coding to deal with the agnostic nature of random access. Specifically, the code design fixes a number of different blocklengths of increasing size that each correspond to an increasingly large number of transmitters. When the receiver has a reliable estimate of the number of active transmitters, the receiver sends a positive ACK when the decoder determines that a decoding rule is satisfied. In addition to sending the positive ACK, many embodiments of the invention also transmit a string that indicates a codebook to be utilized by active transmitters during the next epoch. As is discussed further below, the string provides a common randomness between the transmitters and the receiver indicating the codebook for the rateless code that should be utilized in the next epoch. In many embodiments, the decoding rule indicates whether the messages transmitted by the active transmitters can be decoded with high probability. Naturally, the greater the number of active transmitters, the longer it takes to decode. In many embodiments, a single codebook is utilized during each epoch by all transmitters, which can be referred to as identical encoding. Some embodiments that employ identical encoding utilize a single threshold as a decoding rule at the decoder instead of 2k−1 simultaneous threshold rules. Other embodiments that employ non-identical encoding also utilize a single threshold rule. The use of decoding rules is discussed further below.


The main idea behind rateless coding is to have a continuous transmission that can be used to recover the original message. When the receiver decodes the message, it provides feedback to stop further transmission. The name “rateless” is due to the fact that the data rate of the transmission is only defined when the receiver decodes the message and sends feedback. Rateless codes were originally analyzed in Burnashev, M. V., 1976, Data transmission over a discrete channel with feedback, Random transmission time, Problemy peredachi informatsii, 12(4), pp. 10-30, which computed the error exponent of variable-length coding over a known point-to-point channel. A dispersion-style analysis of the same scenario is provided in Polyanskiy, Y., Poor, H. V. and Verdú, S., 2011, Feedback in the non-asymptotic regime, IEEE Transactions on Information Theory, 57(8), pp. 4903-4925. A practical implementation of rateless codes for an erasure channel with an unknown erasure probability appeared in Luby, M., 2002, November, LT codes, In Proceedings 43rd Annual IEEE Symposium on Foundations of Computer Science (p. 271-280), IEEE. An analysis of rateless coding over an unknown binary symmetric channel appeared in Tchamkerten, A. and Telatar, E., 2002, A feedback strategy for binary symmetric channels, In Information Theory, 2002, Proceedings, 2002 IEEE international Symposium on (p. 362). IEEE, and is extended to an arbitrary discrete memoryless channel in Draper, S. C. Frey, B. J. and Kschischang, F. R., 2004, Efficient variable length channel coding for unknown DMCs, In Information Theory, 2004, ISIT 2004, Proceedings, International Symposium on (pp. 379-379), IEEE; and Shulman, N. and Feder, M., 2003, Communication over an unknown channel via common broadcasting (Doctoral dissertation, Tel Aviv University). The approaches of Draper et al. and Schulman et al. both used a decoder that tracks Goppa's empirical mutual information and decodes once that quantity passes a threshold. In Blits, N. and Feder, M., 2012, July, Universal rateless coding with finite message set, In Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on (pp. 1772-1776), IEEE, Jeffrey's prior is used to weigh unknown channels. The relevant disclosure including disclosure related to encoding and decoding of message data using rateless codes from the above papers is incorporated by reference herein in its entirety.


In several embodiments, the communication system assumes a random access communication model that is built from a family of permutation-invariant MACs and the receiver employs identity-blind decoding. Although not critical for the feasibility of a communication system in accordance with various embodiments of the invention, these assumptions can lead to a number of pleasing simplifications of both system implementation and analysis. For example, the collection of MACs comprising the compound random access channel model can be parameterized by the number of active transmitters rather than by the full transmitter activity pattern. If the maximum number of transmitters is finite, the analysis of identity-blind decoding differs little from traditional analyses that use independent realizations of a random codebook at each transmitter. Rather than requiring a unique encoder for every transmitter, in many embodiments all transmitters can use the same encoder. Systems in which all transmitters use the same encoder can be said to employ identical encoding, which enables a single encoder design to be used no matter how many transmitters are active.


In order to evaluate the benefits of using a random access communication scheme in accordance with certain embodiments of the invention, a second-order analysis is presented below of the rate that can be universally achieved by multiuser schemes over all transmitter activity patterns, taking into account the possibility that the decoder may misdetect the current activity pattern and decode for the wrong channel. Leveraging the observation that for a symmetric MAC, the fair rate point is not a corner point of the capacity region, it is possible to show that the single-threshold decoding rule referenced above attains the fair rate point.


Systems and methods for random access communication in accordance with various embodiments of the invention are discussed further below.


Random Access Channel Model

Communication systems in accordance with various embodiments of the invention impose restrictions on active transmitters. Specifically, the receiver uses positive acknowledgment messages to define epochs. During each epoch, transmitters must decide whether or not they wish to be active. An active transmitter transmits symbols for the duration of the epoch, where each symbol is generated based upon a set of message data bits using a rateless code. A receiver configured to control the transmission of transmitters during epochs defined by the receiver in accordance with an embodiment of the invention is conceptually illustrated in FIG. 1.


The communication system 100 includes a number of transmitters that each includes an encoder 102. Each transmitter that has message data to transmit can choose to become active during any given epoch. When a transmitter is active, the transmitter can provide a sequence of message bits to a rateless encoder 102, which generates a sequence of output symbols that are transmitted over a channel 104. When multiple transmitters are active, the active transmitters simultaneously transmit over the RAC channel 104 to a receiver. As discussed above, the use of rateless codes enables the receiver to continue to receive symbols (i.e., extend the duration of a particular epoch) until the receiver's decoder 106 has observed enough symbols to decode the transmitted messages with high probability. In many embodiments, the decoder employs a decoding rule that is applied at a predetermined set of potential decoding times. In several embodiments, each potential decoding time in the set of potential decoding times corresponds to a number of symbols determined to be required for the decoder to be able to decode messages from a specific number of transmitters. In certain embodiments, application of the decoding rule essentially involves attempting to decode a number of messages at each potential decoding time, which indirectly provides an estimate of the number of transmitters that are active during an epoch. Based upon the decoding rule, the decoder tries decoding at each subsequent decoding time in the set of potential decoding times. It chooses the first decoding time from that set for which it finds a collection of messages consistent with its received symbols and with the activity set or sets corresponding to that decoding time.


As noted above, the receiver need not continuously transmit its decoding state to the transmitters. In a number of embodiments, the transmitters and the receiver establish a set of potential decoding times and the receiver sends a positive or negative ACK at each potential decoding time indicating whether the receiver requires more symbols to be able to decode the messages with a high probability (i.e. a negative ACK) or whether the receiver has received enough symbols and has decided to decode the messages and start a new epoch (i.e. a positive ACK).


In many embodiments, the set of potential decoding times is determined based upon channel conditions. As the channel deteriorates, the receiver can adapt and choose a set of potential decoding times where the number of symbols required to be received during an epoch for a given estimated number of transmitters increases. When the channel improves the receiver can adapt to a set of potential decoding times in which the number of symbols required to be received for a given estimated number of transmitters decreases. In a number of embodiments, the receiver adapts the set of potential decoding times utilized during a particular epoch based upon a measurement of channel conditions including (but not limited to) channel noise. In several embodiments, the receiver periodically signals a guard interval in which transmitters are required to cease activity. During this guard interval, the receiver can measure channel noise and determine an appropriate set of potential decoding times. The receiver can then broadcast the set of potential decoding times and/or an identifier of the set of potential decoding times to the transmitters and can initiate the next epoch via a positive ACK. The transmitters can then monitor the feedback channel for positive and negative ACKs based upon the set of potential decoding times communicated by the receiver. Although specific methods are described for adapting between different sets of potential decoding times, it can readily be appreciated that any of a variety of techniques can be utilized for determining an appropriate set of decode times for a given set of channel conditions and coordinating the adoption of such a set of decode times by the receiver and transmitters in accordance with various embodiments of the invention.


In a number of embodiments, all transmitters use the same encoder 102 and the receiver broadcasts an indication of a particular codebook to use in a given epoch. In several embodiments, the transmitters are able to use different codebooks. Using different codebooks can enable the decoder to identify the transmitter that transmitted a specific message decoded by the decoder 106. Using different codebooks can also enable the encoders to transmit different numbers of messages and attain different rates. When transmitters encode using different encoders, the receiver can transmit information indicating the specific codebook to be used by a particular encoder at the start of a particular epoch. The receiver can then utilize knowledge of the different codebooks in the decoding of the transmitted messages from the observed symbols.


Although specific communication systems are described above with reference to FIG. 1, any of a variety of transmitters and receivers that employ rateless codes to transmit data over a RAC channel can be utilized as appropriate to the requirements of a given application in accordance with various embodiments of the invention. Indeed, communication systems in accordance with various embodiments of the invention are in no way limited to any particular communication medium, spectral band, and/or modulation or demodulation scheme. Symbols encoded in accordance with various embodiments of the invention can be transmitted using any number of different modulation schemes appropriate to the requirements of a given application and/or can employ additional outer codes to correct bit errors in the messages decoded by the receiver. The transmitters and receivers described herein should be understood as being capable of being deployed in any communication system in which an unknown number of transmitters utilize a shared channel to communicate with a receiver. A number of specific encoding and decoding processes in accordance with different embodiments of the invention are discussed below.


Processes for Encoding Data for Transmission Via a RAC

Transmitters in accordance with various embodiments of the invention are configured to wait to transmit data until the start of an epoch and then transmit data throughout the epoch while listening periodically for a positive acknowledgment message that indicates the end of the epoch. As discussed above, the codebook selected for the rateless code is coordinated with the receiver. Therefore, the transmitter must also monitor a feedback channel for a transmission from a receiver containing a codebook and/or an identifier for a codebook to be utilized within a specified (e.g. the next) epoch.


A process for transmitting data using a rateless code on a RAC during epochs defined by a receiver in accordance with an embodiment of the invention is illustrated in FIG. 2. The process 200 involves the transmitter determining 202 whether or not to become active during the next epoch. When the transmitter wishes to transmit, the transmitter commences monitoring 204 a feedback channel to determine 206 whether the receiver has broadcast a positive ACK message indicating the start time of the next epoch. As noted above, in many embodiments of the invention the receiver is limited to only transmitting feedback messages at a set of times (e.g. the set of potential decoding times) that are known to the transmitter. Accordingly, the transmitter may only monitor the feedback channel at those specific set of times until a positive ACK is received.


The transmitter selects 208 a block of message data to transmit and a codebook to use to encode the message data using a rateless code. In many embodiments, the codebook utilized is a codebook indicated by a receiver and constitutes a common randomness between the transmitter and the receiver. In other embodiments, there is only one codebook, and that same codebook is always used to encode the message data using a rateless code. In certain embodiments, the codebook is the same for every transmitter. In many embodiments, the codebook is specific to the transmitter. In order to encode the message data, the transmitter also resets a clock n that is used to count the number of transmitted symbols and a counter t that is used to index into the set of potential decoding times. As noted above, in some embodiments, the counter t can be considered to correspond to a number of active transmitters. When a receiver determines that t equals the estimated number of active transmitters and n equals the time nt for decoding when t transmitters are active, the receiver will transmit a positive ACK indicating the end of the epoch. In other embodiments, the counter t can be considered an index identifying a specific subset of distinct encoders. When a receiver determines that t specifies the estimated set of active transmitters and n equals the time nt for decoding when subset t of the transmitters are active, the receiver will transmit a positive ACK indicating the end of the epoch.


The transmitter transmits 210 the symbols generated by the rateless code based upon the block of message bits and with each transmitted symbols checks 212 to see whether the number of transmitted symbols corresponds to one of the potential decoding times in the set of potential decoding times. If not, then the transmitter increments 214 the clock n=n+1. When the number of transmitted symbols corresponds to a potential decoding time (nt) from the set of potential decoding times, the transmitter listens 216 for an ACK message feedback from the receiver. When a determination 218 is made that the ACK message is a negative ACK message, then the transmitter increments the clock n=n+1 and the counter t−t+1. The transmitter continues to transmit symbols generated by the rateless code until a determination 218 is made that a positive ACK is received. At which point the epoch is over and the transmitter determines 222 whether additional message data is available for transmission and 202 whether the transmitter wishes to be active during the next epoch. When no more message data is available for transmission, the process can complete.


Although specific processes for transmitting data are described above with reference to FIG. 2, any of a variety of processes can be utilized to transmit data as appropriate to the requirements of specific applications in accordance with various embodiments of the invention. Processes for receiving and decoding data transmitted by an unknown number of transmitters via a RAC in accordance with a number of embodiments of the invention are discussed below.


Processes for Decoding Data Transmitted by an Unknown Number of Transmitters Via a RAC

Receivers in accordance with various embodiments of the invention are configured to receive data transmitted by an unknown number of transmitters and encoded by rateless codes. In some embodiments, these rateless codes are based upon a common randomness between the transmitter and the receivers. In other embodiments, these rateless codes are fixed. In order to be effective, the receiver must permit the transmitters to transmits symbols for a period of time that is sufficiently long to enable decoding of the transmitted messages with high probability. However, permitting the transmitters to transmit more symbols beyond this required blocklength decreases the rate of the transmitters below capacity of the channel. Accordingly, receivers in accordance with many embodiments of the invention employ decoding rules to determine when a sufficient number of symbols are received to decode the transmitted messages with high probability. In a number of embodiments, a separate potential decoding time is determined for each possible number of active transmitters, and the receiver applies a decoding rule at the each of the potential decoding times to determine whether the transmitted messages can be decoded. In this way, the decoding rule effectively constitutes an attempt to estimate the number of active transmitters. As is discussed below, communication systems in accordance with many embodiments of the invention utilize transmitters that share a common encoder to reduce implementation complexity. In several embodiments, simplicity is traded off for the ability of the receiver to identify the specific messages transmitted by individual transmitters. In a number of embodiments, the receiver can assign a codebook that is specific to a given transmitter to enable identification of the messages transmitted by the transmitter.


The implementation of receivers in accordance with various embodiments of the invention can be influenced by the manner in which the receiver manages the case in which no transmitters are transmitting. The sooner the receiver ends an epoch in which no transmitters are transmitting, the higher the rate achieved across the channel. In a number of embodiments, receivers employ a separate process to determine whether transmitters are active and the receiver simply commences decoding when the receiver knows that transmitters are active. In other embodiments, the receiver incorporates a decoding rule that determines whether any transmitters are active prior to the first potential decoding time period.


A process for detecting whether one or more transmitters are active and/or decoding data transmitted by the one or more active transmitters via a RAC in accordance with an embodiment of the invention is illustrated in FIG. 3. The process 300 commences when the receiver broadcasts 302 a positive ACK feedback message to the transmitters indicating the commencement of an epoch. The positive ACK message can be accompanied by a message indicating one or more codebooks that should be utilized by one, some, or all of the transmitters to encode message data using rateless codes during the epoch.


As part of a process of receiving and decoding symbols, the receiver initializes a clock n that is used to count the number of received symbols and a counter t that is used to index into the set of potential decoding times (nt). As noted above, in some embodiments, the counter t can be considered to correspond to a number of active transmitters. When a receiver determines that t equals the estimated number of active transmitters and n=nt, the receiver will transmit a positive ACK indicating the end of the epoch. In other embodiments, the counter t can be considered an index identifying a specific subset of distinct encoders. When a receiver determines that t specifies the estimated set of active transmitters and n equals the time nt for decoding when subset t of the encoders are active, the receiver will transmit a positive ACK indicating the end of the epoch.


After the receiver commences receiving observed symbols, the receiver determines 302 whether the number of received symbols corresponds to the potential decoding time (nt) indicated by the counter (t). When the clock indicates that the current time is not one of the potential decoding times, the receiver increments 308 the clock n=n+1 and continues to receive observed symbols. When the clock corresponds to one of the potential decoding times (nt) from the set of potential decoding times indicated by the counter (t), the transmitter determines 310 whether a decoding rule is satisfied. The first potential decoding time (n0) corresponds to a period of time during which the receiver can determine that there are no active transmitters. As is discussed further below, a variety of different decoding rules can be applied at (n0) to determine that there are no active transmitters and at subsequent potential decoding times to estimate the number of active transmitters. In many embodiments, the decoding rule that is utilized to estimate the number of active transmitters during the epoch can be a simple threshold rule that is applied at each potential decoding time after a determination is made that one or more transmitters are active. As is discussed further below, the specific decoding rule applied in a given receiver in accordance with an embodiment of the invention is largely dependent upon the requirements of a given application.


When the decoding rule is not satisfied, the receiver concludes that the subset of transmitters indexed by t is not the estimated active transmitter subset that is currently active and sends a negative ACK to the transmitters. The receiver also increments the counter t=t+1 and the clock n=n+1 and continues to receive observed symbols. When the decoding rule is satisfied, the receiver decodes 314 the messages transmitted by the estimated active transmitter set t and broadcasts a positive ACK feedback message to the transmitters. In some embodiments, the receiver can determine 316 whether it is prepared to initiate another epoch. In the event that the receiver wishes to commence another epoch, the receiver selects 318 one or more codebooks to be utilized by the transmitters during the next epoch and broadcasts 302 a positive ACK message to the transmitters indicating the commencement of the next epoch and specifying the chosen codebook ID(s). In the event that the receiver completes an epoch and does not want to initiate a new epoch, the process completes. In many embodiments, the receiver transmits a positive ACK indicating the end of the epoch (so the transmitters can cease transmission), followed by a message indicating that a new epoch has not commenced.


While a number of specific processes are described above for decoding data, transmitted by an unknown number of transmitters via a RAC using rateless codes with reference to FIG. 3, any of a variety of process can be utilized in the decoding of data transmitted by multiple transmitters using rateless codes during epochs having durations determined by a receiver as appropriate to the requirements of specific applications in accordance with various embodiments of the invention. For example, a positive ACK can indicate both the end of one epoch and the start of another epoch. In many embodiments, the transmitter and receivers commence a new epoch at a fixed time offset from the transmission of a positive ACK message by the receiver. In certain embodiments, the receiver transmits a first positive ACK message to end an epoch and a second message to commence the next epoch. Accordingly, it should be appreciated that receivers in accordance with various embodiments of the invention are not limited to any particular feedback mechanism and/or protocol.


While a variety of communication systems, transmitters, and receivers are described above with reference to FIGS. 1-3, as will be appreciated based upon the discussion below, any of a variety of transmitters and receivers that employ rateless codes can be utilized in accordance with various embodiments of the invention. The discussion that follows presents a variety of approaches that can be utilized to design communication systems and to determine the set of possible decoding times to be utilized by the decoder in decoding the messages from the transmitters in a given application. Furthermore, the threshold that can be applied as a decoding rule in some embodiments is derived. In order to discuss communication systems in accordance with various embodiments of the invention in more detail, it is helpful to define a set of notations that can be helpful in describing the memoryless symmertric random access channel model employed in designing communication systems in accordance with many embodiments of the invention and the resulting communication systems.


Notation

The discussion of the communication systems that follows relies upon a number of notation conventions. Specifically, for any positive integers i,j let [i]={1, . . . , i} and [i:j]={i, . . . , j}, where [i:j]=∅ when i>j. For any sequence x=(x1,x2, . . . ) and any ordered set custom charactercustom character, vector xccustom character(xc:c∈custom character). For any vectors a and b with the same dimension, we write acustom characterb if and only if there exists a permutation π of b such that a=π(b) and acustom characterb if a≠π(b) for all permutations π of b. For any set custom character,







(



𝒜




k



)

=


{






:





𝒜

,






=
k


}

.





Memoryless Symmetric Random Access Channel Model

In order to analyze the performance of communication systems in accordance with a number of embodiments of the invention, a memoryless symmetric random access channel model is presented and the performance of various communication systems that employ rateless codes to enable the simultaneous transmission of data by an unknown set of multiple transmitters is considered.


A memoryless symmetric random access channel (henceforth called simply a RAC) is a memoryless channel with one receiver and an unknown number of transmitters. It can be described by a family of stationary, memoryless MACs

{(Xk,PYk|X[k](yk|x[k]),custom characterk)}k=0K,  (1)

each indexed by a number of transmitters, k, where the maximal number of transmitters is K for some K≤∞. The situation when no transmitters are active (i.e. k=0) is discussed separately below. For k≥1, the k-transmitter MAC has input alphabet Xk, output alphabet custom characterk, and conditional distribution PYk|X[k]. When k transmitters are active, the RAC output is Y=Yk.


By assumption, the impact of a channel input on the channel output is independent of the transmitter from which it comes; therefore each channel in (1) is assumed to be permutation-invariant, giving

PYk|X[k](yk|x[k])=PYk|X[k](yk|{circumflex over (x)}[k])∀{circumflex over (x)}[k]custom characterx[k].  (2)

Since, for any s<k, MAC-s is physically identical to MAC-k operated with s active and k−s silent transmitters, 0∈X can be used to represent transmitter silence and require reducibility:

PYs|X[s](y|x[s])=PYk|X[k](y|x[s],0k−s)  (3)

for all s<k, x[s]∈X[s], and y∈custom characters. An immediate consequence of reducibility is that custom characterscustom characterk for any s<k. Another consequence is that when no transmitters are active, k=0 and the MAC (X0,PY0|X[0](y|x[0]),custom character0) satisfies X0={0} and PY0|X[0](y|x[0])=PYk|X[k](y|0k) for all k.


As noted above, communication systems in accordance with many embodiments communicate during epochs, where each epoch begins in the time step following the previous epoch's end. In several embodiments, each epoch ends with a positive acknowledgment bit, which the receiver broadcasts to all transmitters as described below. At the beginning of each epoch, each transmitter independently decides whether to be active or silent in that epoch. In certain embodiments, a transmitter is required to either actively transmit for all time steps in the epoch or remain silent for the same period. Thus while the total number of transmitters is potentially unlimited and may change arbitrarily from one epoch to the next, the number of active transmitters, k, stays constant during the entire transmission period between two positive ACKs.


Each transmitter uses the epoch to describe a message W from the alphabet [M]. When the active transmitters are [k], the messages W[k]∈[M]k are independent and uniformly distributed. The receiver makes a decision at each potential decoding time in the set of potential decoding times n0, n1, . . . , whether to end the epoch. At time n0 the receiver ends the epoch if it believes no transmitters are active. In the event the receiver determines that at least one transmitter is active during the epoch, the receiver will end the epoch and decode the transmitted messages at a decode time nt from the set of potential decoding times n0, n1, . . . , when a decoding rule is satisfied. As discussed below, in some embodiments, each decoding time nt in the set of potential decoding times is selected so that messages transmitted by a number of active transmitters t can be decoded at decode time nt by the decoder with high probability. Therefore, decoding rules in accordance with many embodiments of the invention attempt to estimate the number of active transmitters t and select a decoding time nt accordingly. The receiver signals the decoder's decision about when to stop transmitting by broadcasting a single-bit acknowledgment Zi to all active transmitters at each potential decoding time ni from the set of potential decoding times n0, n1, . . . , nt that occurs prior to the end of the epoch; here Zi=0 for all i<t and Zt=1, with “1” signaling the end of one epoch and the beginning of the next.


Agnostic Random Access

It is important to stress that in this domain, each transmitter knows nothing about the set of active transmitters custom charactercustom character beyond its own membership and what it learns from the receiver's feedback, and the receiver knows nothing about custom character beyond what it learns from the channel output Y; which can be referred to as agnostic random access. In addition, since designing a different encoder for each transmitter is expensive from the perspective of both code design and code operation, communication systems in accordance with many embodiments of the invention employ the same encoder in every transmitter; which can be referred to as identical encoding. Under these assumptions, what the transmitters and receiver can learn about custom character is quite limited. In particular, when the properties of permutation-invariance and identical encoding are satisfied, together, they imply that the decoder can at best distinguish which messages were transmitted rather than by whom they were sent. In practice, transmitter identity could be included in the header of each log M-bit message or at some other layer of the stack. Transmitter identity need not, however, be handled by the RAC code (although examples where the RAC code includes transmitter identity are discussed below). Instead, when the channel output statistics depend on the dimension of the channel input but not the identity of the active transmitters, the receiver's task is to decode the messages transmitted but not necessarily the identities of their senders. In these scenarios, it can therefore be assumed without loss of generality that |custom character|=k implies custom character=[k], and thus the family of k-transmitter MACs in (2) indeed fully describes the behavior of a RAC. While identical encoding and/or permutation-invariance can be utilized to simplify implementation, it should be readily appreciated that these features are by no means requirements of systems in accordance with embodiments of the invention. The various ways in which message data can be encoded in accordance with certain embodiments of the invention is discussed further below.


Employing Rateless Coding to Encode Message Data

The single-bit feedback strategy described above uses rateless coding to deal with the agnostic nature of random access. Specifically, the code design fixes the blocklengths n0≤n1≤n2≤ . . . ≤nK, where in some embodiments, nt is the decoding blocklength when the decoder believes that the number of active transmitters k is equal to t, and in other embodiments, nt is the decoding blocklength associated with the subset(s) of active transmitters with the t-th shortest decoding time. With an appropriately designed decoding rule, correct decoding is performed at the time nk associated with the true subset(s) of active encoders with high probability. Naturally, under the assumptions of permutation-invariance and identical encoding, the greater the number of active transmitters, the longer it takes to decode. For embodiments other than that the assumptions of permutation-invariance and identical encoding are satisfied, the decoding blocklengths for different subsets of active transmitters depend on the number of possible messages and channel qualities from those transmitters. Since the argument employed to bound the performance of our proposed codes relies on a random design algorithm, in some embodiments, we index the family of possible codes by the elements of some set custom character and include u∈custom character as an argument for both the RAC encoder and the RAC decoder. We then represent random encoding as the application of a code indexed by some random variable U∈custom character chosen independently for each new epoch. Deterministic codes are represented under this code definition by setting the distribution on U as custom character[U=u0]=1 for some u0custom character. The following definition formalizes such rateless codes for agnostic random access.


Definition 1. An (M,{(nkk)}k=0K) RAC code comprises a (rateless) random encoding function

ƒ:custom character×[M]→XnK  (4)

and a collection of random decoding functions:

gk:custom character×custom characterknk→[M]k∪e, k=0,1, . . . ,K.  (5)

At the start of each epoch, a random, variable U on custom character with probability distribution PU is generated independently of the transmitter activity and revealed to the transmitters and the receiver to initialize the encoders and the decoder. If k transmitters are active, then, with probability at least 1−ϵk, the k messages are correctly decoded at time nk. If k=0 transmitters are active, the unique message in set [M]0={0} is decoded at time n0, with probability at least 1−ϵ0. That is,










1

M
k











[
M
]

k





[




g
k



(

U
,

Y
k

n
k



)





π









W

[
k
]


=







ϵ
k


,







(
6
)








where W[k] are the independent and equiprobable messages of transmitters [k], and the given probability is calculated using the conditional distribution







P


Y
k

n
k




X

[
k
]


n
k




=

P


Y
k

|

X

[
k
]




n
k







where Xsnk=ƒ(U,Ws)[nk],s=1, . . . , k.


Implementing a RAC code with random code choice U can, in some embodiments, be accomplished by treating the random variable U as common randomness available to the transmitters and the receiver that specifies the codebook U used in the current epoch. One means of operationally implementing this common randomness is to allow the receiver to choose random instance U at the start of each epoch and broadcast that value to the transmitters just after the ACK bit that ends the previous epoch. While broadcasting the value of U increases the epoch-ending feedback from 1 bit to [log|custom character|]+1 bits, the bound |custom character|≤K+1 on the size of the alphabet of U applies in some embodiments, ensuring that the feedback required remains small when K<∞. When |custom character|=1, the single codebook is fixed and known, and log|custom character|=0, meaning that no codebook description is needed. At the start of each epoch, transmitters decide whether to be active or silent independently of the codebook indicated by the log|custom character|-bit string. We employ a general random coding argument to show that a given error vector (ϵ0, . . . , ϵK) is achievable when averaged over the ensemble of codes. Unfortunately, this traditional approach does not show the existence of a deterministic RAC code, i.e. a code with |custom character|=1, that achieves the given error vector (ϵ0, . . . , ϵK), since showing that the random code's expected error probability meets each of our K+1 error constraints, does not show directly that any of the codes in the ensemble meets all of our error constraints simultaneously. Nonetheless, in some embodiments of the invention, |custom character| is set to 1 and a single, fixed code is employed. The manner in which sets of potential decoding times or decoding lengths can be developed for RACs with different characteristics in accordance with various embodiments of the invention is discussed further.


The code model introduced in Definition 1 employs identical encoding in addition to common randomness. Under identical encoding, each transmitter uses the same encoder, ƒ, to form a codeword of length nK (nK≤∞). In the absence of identical encoding and/or permutation invariance, a system may employ as many as 2K−1 different decode times, with the codeword lengths being equal the longest of the decode times.


A transmitter transmits a codeword via the channel symbol by symbol. According to Definition 1, if k transmitters are active, then with probability at least 1−ϵk, the decoder recovers the sent messages correctly after observing the first nk channel outputs. As noted previously, the decoder gk does not attempt to recover transmitter identity when identical encoding is utilized by the transmitters; successful decoding means that the list of messages it outputs coincides with the list of messages sent.


Determining Sets of Potential Decoding Times

The following definitions are useful for the discussion that follows. When k transmitters are active, marginal distribution PYk is determined by input distribution PX[k]. The information density and conditional information density are defined as











ι
k



(

;

y
k


)




=




log




P


Y
k

|

X
𝒜





(


y
k

|

)




P

Y
k




(

y
k

)








(
7
)









ι
k



(

;


y
k

|


)




=




log




P



Y
k

|

X
𝒜


,

X












(



y
k

|

,

)




P


Y
k

|

X












(


y
k

|

)













(
8
)








for any custom character,custom charactercustom character[k], custom charactercustom character, xBcustom character, and ykcustom characterk; here ik(custom character;yk|custom character)custom characterik(custom character;yk) when custom character=∅ and ik(custom character;yk|custom character)custom character0 when ykcustom characterk or custom character=∅. The corresponding mutual informations are

Ik(XA;Yk)custom charactercustom character[ik(custom character;Yk)]  (9)
Ik(XA;Yk|XB)custom charactercustom character[ik(custom character;Yk|XB)].  (10)

The following is used for brevity throughout the discussion that follows

Ikcustom characterIk(X[k];Yk),  (11)
Vkcustom characterVar[ik(X[k];Yk)].  (12)


Since the decoder does not know the number of transmitters (k), the decoder may evaluate the information density it(custom character;yk) for more than one candidate value t of the number of transmitters. The expected value of the tth information density it(custom character;yt) evaluated on channel output Yk is denoted by custom character[it(custom character;Yk)].


To ensure the existence of codes satisfying the error constraints in Definition 1, it is assumed that there exists a PX such that when X1,X2, . . . , XK are distributed i.i.d. PX, then the conditions in (13)-(18) below are satisfied. It is important to note that these assumptions are made to assist with analysis and that systems and methods in accordance with various embodiments of the invention are not necessarily constrained by these assumptions. Indeed, the specific manner in which a system or method in accordance with an embodiment of the invention is implemented will largely depend upon the requirements of a given application.


The friendliness assumption states that for all k≤K,

Ik(X[s];Yk|X[s+1:k]=0k−s)≥Ik(X[s];Yk|X[s+1:k]).  (13)


Friendliness implies that a transmitter that remains silent is at least as good from the perspective of the decoder as a transmitter that reveals its transmission to the decoder. Naturally, (13) can always be satisfied with an appropriate designation of the “silence” symbol.


The interference assumption states that for any s and t, X[s] and X[s+1:t] are conditionally dependent given Yk, giving

PX[t]|Yk≠PX[s]|Yk·PX[s+1:t]|Yk ∀1≤s<t≤k,∈k.  (14)

Assumption (14) eliminates all trivial RACs in which different transmitters do not interfere.


In order to distinguish the time-n0 output Y0n0, when no transmitters are active, from the time-n0 output Ykn0, when k≥1 transmitters are active, we assume that the output distributions satisfy

PY0≠PYk  (15)

for all k≥1, where PYk is the output distribution of the channel PYk|X[k] under the input distribution PXk for k≥1 and PY0=PY0|X[0] is the output distribution with no active transmitter. It is important to notice that this assumption is only needed to detect the scenario when no transmitters are active; the remainder of the code functions proceed unhampered when (15) fails. Therefore, we can design codes for such scenarios we can design codes for such scenarios either by setting ϵ0=1 or employing other mechanisms, such as a short start-up phase prior to encoding in which active encoders signal their presence, for determining whether k=0.


Finally, the following moment assumptions enable the second-order analysis presented in Theorem 1 below:

Var[ik(X[k];Yk)]>0  (16)
custom character[|ik(X[k];Yk)−Ik(X[k];Yk)|3]<∞.  (17)


Furthermore, in the case when it(X[s];Yk)>−∞ almost surely, it should also be required that

Var[it(X[s];Yk)]<∞ ∀s≤t≤k.  (18)

All discrete memoryless channels (DMCs) satisfy (17)-(18) as do Gaussian noise channels. Common channel models from the literature typically satisfy (16) as well.


Example channels meeting (2), (3), (13)-(18) include: the Additive White Gaussian Noise (AWGN) RAC,











Y
k

=





i
=
1

k







X
i


+
Z


,




(
19
)








where each Xicustom character operates under a power constraint P and Z˜custom character(0,N) for some N>0; and the adder-erasure RAC,










Y
k

=

{








i
=
1

k







X
i


,





w
.
p
.




1

-
δ





e




w
.
p
.




δ

,









(
20
)








where Xi∈{0,1} and Yk∈{0, . . . , k}∪e.


For the AWGN RAC, it(X[s];Yk)>−∞ almost surely and (18) is satisfied, while for the adder-erasure RAC, it(X[s];Yk)=−∞ for some channel realizations and user activity patterns, and (18) is not required.


A series of lemmata that describe the natural orderings possessed by RACs that satisfy (2), (3), (13), and (14) can be articulated. These properties are key to the feasibility of various examples of the achievability scheme described herein, which appears in the next section. It is important to appreciate that while these features are helpful to analyzing the performance of a certain class of systems and methods, the inventions disclosed herein are by no means limited to these simplifying assumptions. Accordingly, it should be understood that systems and methods implemented in accordance with embodiments of the invention are not limited to these requirements and can be implemented in any manner appropriate to the requirements of a given application.


The first lemma shows that the quality of the channel for each active transmitter deteriorates as more transmitters join (even though the sum capacity may increase).


Lemma 1. Let X1,X2, . . . , Xk be i.i.d. Under permutation-invariance (2), reducibility (3), friendliness (13), and interference (14),











I
k

k

<



I
s

s






for





k

>
s

1.




(
21
)







The second lemma shows that a similar relationship holds even when the number of transmitters is fixed.


Lemma 2. Let X1,X2, . . . , Xk be i.i.d. Under permutation-invariance (2), reducibility (3) and interference (14),











1
k




I
k



(


X

[
k
]


;

Y
k


)



<


1
s




I
k



(


X

[
s
]


;


Y
k

|

X

[


s
+
1

:
k

]




)







for





k

>
s

1.




(
22
)







The third lemma compares the expected values of the mutual information density computed under various possible channels and conditional distributions observed by the decoder.


Lemma 3. Let X1,X2, . . . , Xk be i.i.d. If a RAC is permutation-invariant (2), reducible (3), friendly (13), and exhibits interference (14), then for any 1≤s≤t<k, we have

custom character[it(X[s];Yk)]≤Ik(X[s];Yk)<It(X[s];Yi).  (23)


It is the orderings in Lemma 1-3 that enable analysis of the case of agnostic multiple access. As noted above, the Lemmas do not constitute limitations on the manner in which practical systems and methods in accordance with various embodiments of the invention can be implemented.


Theoretical Performance Bound for RAC Codes

In order to evaluate the performance of communication systems that employ rateless codes to communicate on a RAC using techniques similar to those described herein, it is helpful to develop an understanding of the theoretically achievable performance of such a system. Theorem 1 bounds the performance of a finite blocklength RAC code. For any number k≥1 of active transmitters, the code achieves a rate vector R[k]=(R, . . . , R),







R
=


log





M


n
k



,





with sum-rate kR converging as






O


(

1


n
k



)






to Ik(X[k];Yk) for some input distribution PX[k](x[k])=Πi=1kPX(xi) with PX(x) independent of k. For any family of MACs for which a single PX maximizes Ik(X[k];Yk) for all k, the rate of the proposed sequence of codes converges to the symmetrical rate point on the capacity region of the MAC with the same number of transmitters.


Theorem 1. (Achievability) For any RAC

{(Xk,PYk|X[k](yk|x[k]),custom characterk)}k=0K,

satisfying (2), (3), any K<∞ and any fixed PX satisfying (13)-(18), there exists an (M,{(nkk)}k=0K) code provided that











log





M




1
k



{



n
k



I
k


-




n
k



V
k






-
1




(

ϵ
k

)


-


1
2


log






n
k


+

O


(
1
)



}



,




(
24
)








for all 1≤k≤K, and

n0≥O(log n1),  (25)

where









(
x
)




=





1


2

π







x




exp


{


-

u
2


2

}









du is the Gaussian complementary cumulative distribution function.


To shed light on the statement of Theorem 1, consider a channel satisfying (13)-(18) for which the same distribution PX achieves the maximum of Ik for all k. For example, for the adder-erasure RAC in (20), Bernoulli-½ PX attains max Ik for all k. Thanks to Lemma 1, for M large enough and any ϵ12, . . . , ϵK, one can pick n1<n2< . . . <nK so that the right side of (24) is equal to log M, for all k.


Therefore, somewhat counter-intuitively, Theorem 1 certifies that for some channels, rateless codes with encoders that are, until acknowledgment, agnostic to the transmitter activity pattern perform as well (in both first and second order terms in (24)) as the best known transmission scheme designed with complete knowledge of transmitter activity. Moreover, the state of no active transmitters is correctly detected at time n0=O(log n1), with probability 1−ϵ0, for any fixed 0<ϵ0<1, allowing a new epoch to begin very quickly when no transmitters are active in the current epoch.


The achievable error region given in Theorem 1 is consistent with the general achievability results for 2-transmitter MACs (when no time-sharing is allowed). For the 2-transmitter MAC, the second-order achievability region is expressed in terms of dispersion matrix, V2, defined as the covariance matrix of the random vector










ι
2



=





[





ι
2



(


X
1

;

Y
|

X
2



)








ι
2



(


X
2

;

Y
|

X
1



)








ι
2



(


X
1

,


X
2

;
Y


)





]

.





(
26
)








Let Z be a k-dimensional Gaussian vector with mean 0 and covariance matrix K. For ϵ∈(0,1), define the multidimensional counterpart of the Q−1 function

custom characterinv(K,ϵ)custom character{τ∈custom characterk:custom character[Z≤τ]≥1−ϵ}.  (27)


It can be shown that the achievable rate region satisfies










R
1

,


R
2

:


[




R
1






R
2







R
1

+

R
2





]







P

X
1


,

P

X
2







{


𝔼


[

ι
2

]


-


1

n




inv



(


V
2

,
ϵ

)


+


O


(


log





n

n

)







1


}

.








(
28
)







For the rate points (R1, R2) lying on the sum-rate boundary, the achievable region defined in (28) reduces to the following scalar inequality which is consistent with Theorem 1.












R
1

+

R
2






I
2



(


X
1

,


X
2

;
Y


)


-




V
2

n





-
1




(
ϵ
)


+

O


(


log





n

n

)




,




(
29
)








where V2=Var[i2(X1,X2;Y)].


Although time-sharing is not included in the coding strategies described above, it is worth mentioning that there exist RACs such that the equal rate point of the capacity region can only be achieved by time-sharing. As an example, consider the following permutation-invariant, 2-transmitter MAC with input and output alphabets X1=X2=custom character={0,1}:








P

Y
|


X
1



X
2






(


0
|
0

,
0

)


=



P

Y
|


X
1



X
2






(


1
|
0

,
1

)


=



P

Y
|


X
1



X
2






(


1
|
1

,
0

)


=
1










P

Y
|


X
1



X
2






(


1
|
1

,
1

)


=


1
2

.





Let the inputs be X1˜Bern(p1) and X2˜Bern(p2) and be independent of each other. For this channel, the equal rate point (½,½) can be achieved by taking the convex combination of achievable points (0,1) and (1,0); however, no (p1,p2) achieves (½,½). The issue with performing time-sharing in the code design is that the required time-sharing random variable U may depend on the number of active transmitters; therefore, a different codebook would be necessary for each possible number of active transmitters. To solve this issue, a training phase can be employed, in which each of the active transmitters sends a pre-determined training sequence to the decoder and the decoder feeds back its estimate t of the active transmitters at the end of the training phase to the encoders. By the knowledge of the number of active transmitters, time-sharing that achieves the target rate point can be determined and the codebook can be formed accordingly.


Achievable Rates for Adder-Erasure RAC

The following example investigates the achievable rates of the adder-erasure RAC in (20).


Example 1

For the adder-erasure RAC, the capacity achieving distribution is the equiprobable (Bernoulli-½) distribution for all k. Although one can exactly calculate Ik and Vk for this channel for a fixed k (see FIG. 4 and FIG. 5), it is more insightful to consider the following characterization:
















I
k



(


X

[
k
]


;

Y
k


)


=



(

1
-
δ

)



(



1
2


ln



π





e





k

2


-

1

12






k
2




)


+


O


(

k

-
3


)







nats







(
30
)








V
k



(


X

[
k
]


;

Y
k


)


=



(

1
-
δ

)



[



δ
4



ln
2




π





e





k

2


+

1
2

-

1

2





k


-


(


1
2

+


δ





ln



π





e





k

2


12


)



1

k
2




]


+


O


(


ln





k


k
3


)









nats
2

.







(
31
)








Dropping the O(⋅) terms, the approximations (30)-(31) are quite tight even for small k, as shown in FIG. 4 and FIG. 5. These approximations capture the first- and second-order behavior of Ik and Vk in k and demonstrate how each depends on k and δ. Namely, both Ik and √{square root over (Vk)} are of order O(ln k), indicating that as k grows, the sum-rate capacity grows (albeit slowly, so that the per-user rate vanishes as








O


(


ln





k

k

)


)

,





while the dispersion Vk also grows, and the speed of approach to the sum-rate capacity is slower. Interestingly, the dispersion behavior is different for the pure adder RAC (δ=0), in which case







V
k

=


1
2

+

O


(

1
k

)








is almost constant as a function of k. The derivation of (30) and (31) relies on an approximation for the probability mass function of the






(

k
,

1
2


)





Binomial distribution using a higher order Stirling's approximation.



FIG. 6 shows the rate per transmitter,








R
k

=


log





M


n
k



,





achieved by the proposed scheme as a function of the number of active transmitters, k, and the choice of blocklength n1 for a fixed error probability ϵk=10−6 for all k. Fixing n1 and ϵk fixes the maximum achievable message size, M, according to (24) and the remaining nk for k≥2 are found by choosing nk to achieve equality in (24) using the given M and ϵk. Each curve illustrates the decrease in the rate per transmitter (Rk) as the number of active users k increases. The curves differ in their choice of blocklength n1 when 1 user is active (and the resulting changes in M and n0, n2, . . . , nK); here n1 is fixed to 20, 100, 500 and 2500. For a fixed k, the points on the same vertical line demonstrate how the gap between the per-user capacity and the finite-blocklength achievable rate decreases as blocklength is increased.


Theorem 1 follows from Theorem 2, which bounds the error probability of the finite-blocklength RAC code defined below. When k transmitters are active, the error probability ϵk captures both errors in the estimate t of k and errors in the reproduction Ŵ[t] of W[k] when t=k. Theorem 2 below is formulated for an arbitrary choice of the statistic h:custom characterncustom charactercustom character used to decide whether there are any active transmitters.


Theorem 2. For any RAC{(Xk,PYk|X[k](yk|x[k]),custom characterk)}k=1K satisfying (2) and (3), any K≤∞, and a fixed input distribution PX, there exists an (M,{(nkk)}k=0K) code with










ϵ
0





[


h


(

Y
0

n
0


)


>

γ
0


]






(
32
)







ϵ
k





[



i
k



(


X

[
k
]


n
k


;

Y
k

n
k



)




log






γ
k



]






(
33
)






+



[


h


(

Y
k

n
0


)




γ
0


]






(
34
)







+
1

-





l
=
1


k
-
1








(

M
-
i

)



M
k






(
35
)






+




t
=
1


k
-
1









(



k




t



)





[



i
t



(


X

[
t
]


n
t


;

Y
k

n
t



)


>

log






γ
t



]








(
36
)









+




t
=
1

k










s
=
1


t
-
1









(



k





t
-
s




)



(





i
t



(


X

[

s
+

1


:


t


]


n
t


;

Y
k

n
t



)






>


n
t





i
t



(


X

[

s
+

1


:


t


]


;

Y
k


)





]





+

λ

s
,
t

k


]

)




(
37
)







+




t
=
1

k










s
=
1

t








(



k





t
-
s




)



(




M
-
k





s



)



(








i
t

(



X
_


[
s
]


n
t


;

Y
k

n
t







X

[

s
+

1


:


t


]



)






>


log






γ
t


-


n
t





[


i
t



(


X

[

s
+

1


:


t


]


;

Y
k


)


]



-

λ

s
,
t

k



]





)




(
38
)








for all k≥1, where the λs,tk and γt values are constants, and for any n, (X[k]n,X[k]n,Ykn) represents a random sequence drawn i.i.d. according to PX[k]X[k]Yk(x[k],x[k],yk)=(Πi=1kPX(xi)PX(xi))PYk|X[k](yk|x[k]).


For k=0, the only error term in (32) is the probability that the decoder does not correctly estimate that the number of active transmitters as 0 at time n0. For k≥1, in the operational regime of interest, that is when (24) is satisfied with equality, the dominating term is (33), which is the probability that the true codeword set produces a low information density. The remaining terms can all be shown to be negligible. The remaining terms bound the probability that: the decoder incorrectly estimates the number of active transmitters as 0 (34); the probability that two or more transmitters send the same message (35); the probability that the decoder estimates the number of active transmitters as t for some 1≤t<k and decodes those t messages correctly (36); and the probability that the decoder estimates the number of active transmitters as t for some 1≤t≤k and decodes the messages from s of those t transmitters incorrectly and the messages from the remaining t−s of those transmitters correctly (37)-(38). While specific operational regimes of interest are described above, it should be readily appreciated that operational regimes of systems and methods in accordance with embodiments of the invention are not limited to these regimes and can be operated in any manner that is appropriate to the requirements of a given application.


One advantage of Theorem 2 is that the bound on the error probability for k active transmitters is not a function of the maximum number of active transmitters, K; it only depends on the RACs up to k active transmitters. For k=1,2, the expression in (33)-(38) particularizes to








ϵ
1






[



i
1



(


X
1

n
1


;

Y
1

n
1



)




log






γ
1



]


+



[


h


(

Y
1

n
0


)




γ
0


]


+


(

M
-
1

)





[



i
1



(



X
_

1

n
1


;

Y
1

n
1



)


>


log






γ
1


-

λ

1
,
1

1



]





,


ϵ
2






[



i
2



(


X

[
2
]


n
2


;

Y
2

n
2



)




log






γ
2



]


+



[


h


(

Y
2

n
0


)




γ
0


]


+

1
M

+

2




[



i
1



(


X
1

n
1


;

Y
2

n
1



)


>

log






γ
1



]



+

2




[



i
2



(


X
2

n
2


;

Y
2

n
2



)






n
2




I
2



(


X
2

;

Y
2


)



+

λ

1
,
2

2



]



+


(

M
-
1

)





[



i
1



(



X
_

1

n
1


;

Y
2

n
1



)


>


log






γ
1


-

λ

1
,
1

2



]



+

2


(

M
-
2

)





[



i
2



(



X
_

1

n
2


;


Y
2

n
2




X
2



)


>


log






γ
2


-


n
2




I
2



(


X
2

;

Y
2


)



-

λ

1
,
2

2



]



+




(

M
-
2

)



(

M
-
3

)


2






[



i
2



(



X
_


[
2
]


n
2


;

Y
2

n
2



)


>


log






γ
2


-

λ

2
,
2

2



]


.








The following presents an upper-bound on the sum-rate with blocklength n and average error probability ϵ, for 2-transmitter DM-MAC:











n


(


R
1

+

R
2


)





nI


(


X
1

,


X
2

;
Y


)


+


c


(
ϵ
)




n


log





n



,




where




(
39
)







c


(
ϵ
)


=




6





χ
1





χ
2




𝓎




+

2

ϵ



1
-
ϵ


+

log



1
+
ϵ


1
-
ϵ



+
C





(
40
)








and C is a positive constant depending on X1,X2,custom character.


A description of the proposed RAC code and the proofs of Theorems 1 and 2 appear in U.S. Provisional Patent Application Ser. No. 62/797,089, the disclosure of which is incorporated by reference above.


The RAC Code and Its Performance

In a number of embodiments of the invention, an encoder design is utilized based upon defining the finite-blocklength RAC code used in the proofs of Theorem 1 and Theorem 2 as follows.


Exemplary Encoder Design: the common randomness random variable can be specified as follows U=(U1, . . . , UM) as

custom charactercustom charactercustom character1× . . . ×custom characterM  (41)
PUcustom characterPU1× . . . ×PUM,  (42)

where custom characteri=XnK and PUi=PXnK for i=1, . . . , M, and PX is a fixed distribution on alphabet X. Note that the cardinality of custom character is |X|MnK; however, |custom character| can be bounded by K+1. The realization of U defines M i.i.d. vectors U1, . . . , UM with length nK. The encoder ƒ(U,⋅) depends on U as

ƒ(U,w)=Uw for w=1, . . . ,M.  (43)

For brevity, U is omitted in the encoding function, which is written as ƒ(U,w)=ƒ(w) for w=1, . . . , M.


As described above, in some embodiments, an (M,{(nkk)}k=0K) RAC code can employ the same encoder ƒ(⋅) at every transmitter. For any w[k]∈[M]k,ƒ(w[k]) can be used to denote the encoded description of w[k], giving ƒ(w[k])=(ƒ(w1), . . . , ƒ(wk)).


The analysis that follows employs Shannon's random encoder design with codewords drawn i.i.d. as










f


(
1
)


,

f


(
2
)


,





,


f


(
M
)




i
.
i
.
d
.




i
=
1


n
K










P
X



(

x
i

)


.








(
44
)








Exemplary Decoder Design: Upon receiving n0 i.i.d. samples of the output Y, the decoder runs the following composite hypothesis test to decide whether there are any active transmitters:











g
0



(

U
,

y

n
0



)


=

{



0




if






h


(

y

n
0


)





γ
0






e




otherwise
.














(
45
)








Here, 0 signifies that the “silence” message has been decoded and a positive ACK is sent to all transmitters signifying the start of a new coding epoch, while e means that there are active transmitters, and thus the transmission must continue and a negative ACK is sent to all transmitters.


For each k≥1, after observing the output ynk, decoder gk employs a single threshold rule











g
k



(

U
,

y

n
k



)


=

{




w

[
k
]






if







i
k



(



f


(

w

[
k
]


)



[

n
k

]


;

y

n
k



)



>

log






γ
k














and






w
i


<


w
j









i
<
j








e



otherwise













(
46
)








for some constant γk chosen before the transmission starts. The transmission stops and a positive ACK is sent to all transmitters once a non-erasure is decoded in (46). For k≥1, the decoder gk(U,ynk) depends on U through the encoding function ƒ(w[k]), while g0(U,yn0) does not depend on U. For brevity, in both cases, the following notation is employed: gk(U,ynk)=gk(ynk).


By permutation-invariance (2) and identical encoding, all permutations of the message vector w[k] give the same mutual information density. The ordered permutation specified in (46) can be used as a representative of the equivalence class with respect to the binary relation custom character. The choice of a representative is immaterial since decoding is identity-blind (when all transmitters use the same encoder).


When there is more than one ordered w[k] that satisfies the threshold condition, decoder gk chooses among them uniformly at random. All such events are counted as errors in the error probability bound below.


A RAC Code that Decodes Transmitter Identity

While the use of the same encoder at all transmitters has a number of advantages for practical implementations, communication systems in accordance with many embodiments of the invention are not limited to that case, nor are they limited to channels that are permutation-invariant. In several embodiments, distinct encoders are utilized at some or all transmitters of a RAC. Under permutation-invariance (2) and identical encoding, the decoder typically cannot distinguish which transmitter sent each of the decoded messages without the message data itself containing bits (e.g. a header) that identifies the transmitter. Maintaining permutation-invariance, but replacing prior identical encoders with a different instance of the same random codebook for each of the encoders, a code can be obtained that achieves the same first- and second-order terms as in Theorem 1 with a decoder that can also associate the corresponding transmitter identity to each decoded message. The following definition formalizes the resulting RAC codes.


Definition 1′. An (M,{(nkk)}k=0K) code with non-identical encoding is a collection of random encoding functions

ƒi:custom character×[M]→XnK, i=1, . . . ,K  (47)

and a collection of random decoding functions:












g
k



:


𝒰
×

𝓎
k

n
k






{



[
M
]

k

×

(




[
K
]





k



)


}


e


,

k
=
0

,
1
,





,

K
.





(
48
)








At the start of each epoch, a random variable U on custom character with probability distribution PU is generated independently of the transmitter activity and revealed to the transmitters and the receiver to initialize the encoders and the decoder. If k transmitters in custom character are active, then, with probability at least 1−ϵk, k messages and their corresponding transmitters' identities are correctly decoded at time nk, and if k=0 transmitters are active, the unique message in set [M]0={0} is decoded at time n0, with probability at least 1−ϵ0. That is












1

M
k











[
M
]

k





[






g
k



(

U
,

Y
k

n
k



)




(


,
𝒜

)




W

[
k
]



=


,






=
k


]





ϵ
k


,




(
49
)








where W[k] are the independent and equiprobable messages of transmitters [k], and the given probability is calculated using the conditional distribution







P


Y
k

n
k




X
𝒜

n
k




=

P


Y
k



X
𝒜



n
k







where Xsnks(U,Ws)[nk],s∈custom character.


In the discussion that follows, permutation-invariance (2) and employment of the input distribution PX at all encoders are assumed. As can readily be appreciated, these assumptions are not necessarily requirements of systems and methods in accordance with various embodiments of the invention, but are instead assumptions that can simplify analysis of a particular class of systems. Under these assumptions, the channel output statistics depend on the dimension of the channel input but not the identity of the active transmitters. For simplicity, it is assumed in the analysis that the set of active transmitters as custom character=[k], when |custom character|=k.


The following theorem modifies Theorem 2 so that the transmitters' identities are also decoded by the decoder.


Theorem 2′. For any RAC{(Xk,PYk|X[k](yk|x[k]),custom characterk)}k=1K satisfying (2), (3), any K<∞, and a fixed input distribution PX, there exists an (M,{(nkk)}k=0K) RAC code given in Definition 1′ with
















ϵ
0





[


h


(

Y
0

n
0


)


>

γ
0


]










ϵ
k






[



i
k



(


X

[
k
]


n
k


;

Y
k

n
k



)




log






γ
k



]


+



[


h


(

Y
k

n
0


)




γ
0


]


+




t
=
1


k
-
1









(



k




t



)





[



i
t



(


X

[
t
]


n
t


;

Y
k

n
k



)


>

log






γ
t



]




+




t
=
1

k










s
=
1


t
-
1









(



k





t
-
s




)



(



[



i
t



(


X

[

s
+

1


:


t


]


n
t


;

Y
k

n
t



)


>



n
t





[


i
t



(


X

[

s
+

1


:


t


]


;

Y
k


)


]



+

λ

s
,
t

k



]


)




+




t
=
1

k










s
=
1

t








(



k





t
-
s




)



(




K
-

(

t
-
s

)






s



)





M
s





(



[



i
t



(



X
_


[
s
]


n
t


;


Y
k

n
t




X

[

s
+

1


:


t


]




)


>


log






γ
t


-


n
t





[


i
t



(


X

[

s
+

1


:


t


]




Y
k


)


]



-

λ

s
,
t

k



]


)

.











(
50
)








for all k, where the λs,tk and γt values are constants, and for any n, (X[k]n,X[k]n,Ykn) represents a random sequence drawn i.i.d. according to PX[k]X[k]Yk(x[k],x[k],yk)=(Πi=1kPX(xi)PX(xi))PYk|X[k](yk|x[k]).


Exemplary Encoder Design: The common randomness random variable U is modified as follows:









𝒰
=


×

i
=
1

K



×

j
=
1

M



𝒰
ij






(
51
)








P
U

=


×

i
=
1

K



×

j
=
1

M



P

U
ij




,




(
52
)








where custom characterij=XnK and PUij=PXnK for i=1, . . . , K, j=1, . . . , M for a fixed PX, and realization of U=(Uij:1≤i≤K,1≤j≤M), distributed according to PU, determines the encoders and the decoder. For any to w∈[M], we use ƒi(U,w) to denote the encoded description of w for transmitter i∈[K]. The codewords depend on U as

ƒi(U,w)=ƒi(w)=Uiw  (53)

for every encoder i∈[K]. Let custom character(custom character)custom charactera(wa):a∈custom character} denote the encoded description of message vector wA at the subset of encoders custom character⊂[K].


Exemplary Decoder Design: For k=0, the decoder uses the same rule g0(⋅) as Theorem 2 given in (45). For each k≥1, after observing the output ynk, decoder gk employs a single threshold rule











g
k



(

y

n
k


)


=

{




(


w
𝒜

,
𝒜

)





if







i
k



(




f
𝒜



(

w
𝒜

)



[

n
k

]


;

y

n
k



)



>

log






γ
k















for





some





𝒜



[
K
]


,



𝒜


=
k






e



otherwise













(
54
)








for some constant γk. Recall that the pair (wA,custom character) refers to the set of transmitters custom character with individual messages custom character.


To perform the task of decoding transmitter identity at the decoder, the condition of message ordering (wi<wj∀i<j) in the decoding rule (46) is removed. Therefore, at time nt, the decoder can check the threshold rule for







(



K




t



)



M
t






(instead of








(



M




t



)

)







message vectors. Once a message vector with size t passes the threshold rule, the identity of t active transmitters and their individual messages are decoded. Note that when K is finite,







(



K




t



)







is a finite constant by assumption; therefore, the increased size of the message set does not affect the second-order term in our achievability result.


Tests for No Active Transmitters

Various processes including the Kolmogorov-Smirnov, Hoeffding, and Zeitouni-Gutman tests for determining an absence of active transmitters are described in U.S. Provisional Application Ser. No. 62/797,089, the disclosure of which is incorporated by reference above. In this section, an analysis is performed of the error probabilities of the composite binary hypothesis test used to decide between H0:no active transmitters, and H1:1,2, . . . , K active transmitters, which can be expressed following the notation in U.S. Provisional Application Ser. No. 62/797,089 as:

H0:Yn0˜PY0n0
H1:Yn0˜PYin0 for some 1≤i≤K.  (55)

In the context of Theorem 2, the maximal number of transmitters can be unbounded. In that case, enumerating all alternative possibilities as in (55) becomes infeasible. Therefore, a universal (goodness-of-fit) test can be employed:

H0:Yn˜PY0n.
H1:Yn˜PY0n.  (56)


The Lévy metric dL between distributions P and Q defined on the same measurable space can be given by

dL(P,Q)=inf{ϵ>0:P[X≤x−ϵ]−ϵ≤Q[X≤x]≤P[X≤x+ϵ]+ϵ,∀x∈custom character}.  (57)


The Lévy ball centered at P with radius δ can be defined as

BL(P,δ)={Q:dL(P,Q)≤δ}.  (58)


The epirical distribution of an observed sequence y1, . . . , yn can be defined by













P
^


y
n




(
a
)


=


1
n






i
=
1

n







1


{


y
i

=
a

}





,

a


𝓎
.






(
59
)







A test statistic h:custom characterncustom charactercustom character is a function that takes the observed sequence yn as its input. A decision rule Ω=(Ω01) for the binary hypothesis test is a sequence of partitions of custom charactern, i.e. custom charactern0(n)∪Ω1(n), n=1,2, . . . and Ω0(n)∩Ω1(n)=∅. The decision rule Ω corresponding to h(⋅) is given by

Ω0(n)={yncustom charactern:h(yn)≤γ0}
Ω1(n)=custom charactern0(n),  (60)

where γ0 is a constant determined by the desired error criterion.


Type-I and type-II errors of the decision rule Ω are defined as

α(Ω(n))custom characterPY0[Yn∈Ω1(n)]  (61)
β(Ω(n))custom characterQ[Yn∈Ω0(n)],  (62)

where Q is the unknown alternative distribution of Y, which is one of PY1, . . . , PYK.


Determining Initial Decoding Time n0 for Use in Composite Hypothesis Tests

It can be shown that there exists a positive constant C such that n0≥C log n1+o(log n1) suffices to meet the error requirements for an effective composite hypothesis test. Theorem 2 allows a decoder in accordance with an embodiment of the invention to decode any message set of k≤K active transmitters without knowing the total number of transmitters K. The question can be asked “For a finite K, what is the smallest constant C>0 and the smallest second-order term o(log n1) that can be achieved if the composite hypothesis test is allowed to depend on the alternative distributions PY1, . . . , PYK ?”


In a number of embodiments the duration of n0 is determined using the following test statistic hLRTT:custom characterncustom charactercustom characterK, known as the log-likelihood ratio threshold test (LRTT), which is given by











h
LRTT



(

y
n

)


=

-


[







i
=
1

n







log




P

Y
0




(

y
i

)




P

Y
1




(

y
i

)













i
=
1

n







log




P

Y
0




(

y
i

)




P

Y
2




(

y
i

)


















i
=
1

n







log




P

Y
0




(

y
i

)




P

Y
K




(

y
i

)








]

.






(
63
)







The corresponding decision rule ΩLRTT with a threshold vector τ∈custom characterK is defined as

Ω0LRTT(n)={yncustom charactern:hLRTT(yn)≥−τ}
Ω1LRTT(n)=custom charactern0LRTT(n),  (64)

where the inequality between vectors is element-wise.


The set of achievable type-II error vectors for any composite hypothesis test in the form of (55) with a type-I error not exceeding ϵ0∈(0,1) can be defined as

εϵ0(PY0,{PYj}j=1K)custom character{[e1, . . . ,eK]T:∃ a decision rule
Ω(n) such that
custom character[Y0n∈Ω1(n)]≤ϵ0,
custom character[Yjn∈Ω0(n)]=ej,1≤j≤k},  (65)

where Y0n˜PY0n and Yjn˜PYjn. Denote by eϵ0(PY0,{PYj}j=1K) the minimax type-II error among the alternative distributions PY1, . . . , PYK given by











e

ϵ
0




(


P

Y
0


,


{

P

Y
j


}


j
=
1

K


)




=
Δ




min

b



ɛ

ϵ
0




(


P

Y
0


,


{

P

Y
j


}


j
=
1

K


)







max

j


[
K
]






b
j

.







(
66
)








The log-likelihood random vector can also be defined










L


=
Δ



[




log




P

Y
0




(
Y
)




P

Y
1




(
Y
)









log




P

Y
0




(
Y
)




P

Y
2




(
Y
)














log




P

Y
0




(
Y
)




P

Y
K




(
Y
)







]


,

1

i

n





(
67
)








and the sum










S


=
Δ






i
=
1

n







L
i



,




(
68
)








where Y˜P for an arbitrary distribution P on custom character, and L1, . . . , Ln are i.i.d. copies of L. The mean vector and covariance matrix of L with respect to PY0 are given by









D


=
Δ





𝔼

P

Y
0





[
L
]


=


[


D


(


P

Y
0









P

Y
1



)


,





,

D


(


P

Y
0









P

Y
K



)



]

T






(
69
)






K


=
Δ





Cov

P

Y
0





[
L
]


.





(
70
)








Denote for brevity











D
j

=

D


(


P

Y
0









P

Y
j



)










D
min

=


min

i


[
K
]





D
i











min

=

{


j



[
K
]



:



D
j



=

D
min


}









L
min

=



[


log




P

Y
0




(
Y
)




P

Y
j




(
Y
)





:


j




min


]

T

.






(
71
)







The following theorem gives the asymptotics of the error region defined in Definition (65).


Theorem 3. Assume that PY0<<PYj for j=1, . . . , K,0<Dj∞ for j=1, . . . , K, K is positive definite, and






T
=



𝔼

P

Y
0





[




L
-
D



2
3

]


<


.







Then for any ϵ0∈(0,1), it holds that












ɛ

ϵ
0




(


P

Y
0


,


{

P

Y
j


}


j
=
1

K


)








exp


{


-
nD

+


n



inv



(

K
,

ϵ
0


)


-


1
2


log





n





1

+


O


(
1
)



1


}



,




and




(
72
)









ɛ

ϵ
0




(


P

Y
0


,


{

P

Y
j


}


j
=
1

K


)








exp



{


-
nD

+


n



inv



(

K
,

ϵ
0


)


+


o


(

n

)



1


}

.




Moreover



,




(
73
)








e

ϵ
0




(


P

Y
0


,


{

P

Y
j


}


j
=
1

K


)


=

exp



{


-

nD
min


+


n


b

+

o


(

n

)



}

;






(
74
)








where b is the solution of

custom character[Z≤b1]=1−ϵ0,  (75)







Z
~

𝒩


(

0
,


Cov

P

Y
0





[

L

m





i





n


]



)



.




In many embodiments, the best second-order term can be achieved by the LRTT and for these tests, the maximum achievable type-II error is bounded by












max

k


[
K
]






β
k



(

Ω
LRTT

)









exp


{



-
n








min

k


[
K
]









D


(


P

Y
0









P

Y
k



)




+

b


n


+

o


(

n

)



}



,




(
76
)








where b is the solution of

custom character[Z≤b1]=1−ϵ0,  (77)

and







Z
~

𝒩


(

0
,


Cov

P

Y
0





[

L
min

]



)



.




Rewriting (76), it can be seen that










n
0





1

2







min

k


[
K
]









D


(


P

Y
0









P

Y
k



)






log






n
1






+


b


2



(


min

k


[
K
]









D


(


P

Y
0









P

Y
k



)



)

3







log






n
1




+


o


(


log






n
1



)


.






(
78
)








Theorem 3 implies that the coefficients of log n1 and √{square root over (log n1)} in (78) are indeed optimal.


While specific decision rules are described above, it can be readily appreciated that any of a variety of techniques can be utilized to determine that no transmitters are transmitting including (but not limited to) measuring the noise floor and/or other characteristics of a RAC channel. Furthermore, decoders in accordance with various embodiments of the invention can utilize an initial period n0 determined using any of a variety techniques appropriate to the requirements of a given communication system to determine whether any transmitters are active in accordance with various embodiments of the invention.


Although the present, invention has been described in certain specific aspects, many additional modifications and variations would be apparent to those skilled in the art. It is therefore to be understood that the present invention can be practiced otherwise than specifically described including any of a variety of rateless codes, sets of decoding durations, and/or point-to-point or broadcast feedback communication channels between the transmitter and receiver including (but not limited to) the receiver transmitting feedback on the same channel being used to transmit without departing from the scope and spirit of the present invention. Thus, embodiments of the present invention should be considered in all respects as illustrative and not restrictive. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.

Claims
  • 1. A communication system, comprising: a plurality of transmitters that each comprise an encoder, wherein the encoder of a given transmitter is configured to: receive a start of epoch message;select a codebook;encode message data as symbols using a rateless code determined using the selected codebook; andreceive feedback messages at a predetermined set of potential decoding times;wherein the transmitter is configured to transmit symbols until a received feedback message is an end of epoch message; anda receiver configured to simultaneously receive messages from the plurality of transmitters, where the receiver comprises a decoder configured to: select at least one codebook;cause a broadcast transmitter to transmit at least one start of epoch message;receive observed symbols;at each of a predetermined set of decode times, determine whether a decoding rule is satisfied; andwhen the decoding rule is satisfied: decode a plurality of messages received simultaneously from at least two of the plurality of transmitters based upon the received observed symbols and based upon the rateless code and the selected at least one codebook; andcause the broadcast transmitter to transmit an end of epoch message.
  • 2. The communication system of claim 1, wherein the determination of whether a decoding rule is satisfied is based upon the received observed symbols.
  • 3. The communication system of claim 1, wherein the transmitter is configured to select a codebook based upon the start of epoch message.
  • 4. The communication system of claim 1, wherein the broadcast transmitter transmits the at least one start of epoch message based upon the selected at least one codebook.
  • 5. The communication system of claim 1, wherein the broadcast transmitter is further configured to transmit at least one additional message based upon the selected at least one codebook.
  • 6. The communication system of claim 1, wherein multiple transmitters in the plurality of transmitters include encoders that are configured to select the same codebook to use in the encoding of message data as symbols using a rateless code.
  • 7. The communication system of claim 1, wherein at least two of the plurality of transmitters include encoders that are configured to select different codebooks to use in the encoding of message data as symbols using a rateless code.
  • 8. The communication system of claim 7, wherein the receiver applies decoding rules at separate predetermined times with respect to each of the different codebooks.
  • 9. The communication system of claim 1, wherein the broadcast transmitter sends a negative acknowledgement feedback message when the decoding rule is not satisfied at a predetermined decode time.
  • 10. The communication system of claim 1, wherein the encoder is configured to continue to encode message data as symbols using a rateless code determined using the selected codebook in response to receipt of a negative acknowledgement feedback message.
  • 11. A receiver system, comprising: a decoder configured to select at least one codebook;a transmitter configured to transmit at least one start of epoch message;a receiver configured to receive observed symbols;wherein the decoder is further configured to: determine whether a decoding rule is satisfied at each of a predetermined set of decode times; andwhen the decoding rule is satisfied: decode a plurality of messages received simultaneously from a plurality of transmitters based upon the received observed symbols and based upon a rateless code and the selected at least one codebook; andcause the transmitter to transmit an end of epoch message.
  • 12. The receiver system of claim 11, wherein the determination of whether a decoding rule is satisfied is based upon the received observed symbols.
  • 13. The receiver system of claim 11, wherein the transmitter transmits the at least one start of epoch message based upon the selected at least one codebook.
  • 14. The receiver system of claim 11, wherein the transmitter is further configured to transmit at least one additional message based upon the selected at least one codebook.
  • 15. The receiver system of claim 11, wherein the decoder is configured to select a single codebook.
  • 16. The receiver system of claim 11, wherein the decoder is configured to select a plurality of different codebooks and applies decoding rules at separate predetermined times with respect to each of the different codebooks.
  • 17. The receiver system of claim 11, wherein the transmitter sends a negative acknowledgement feedback message when the decoding rule is not satisfied at a predetermined decode time.
CROSS-REFERENCE TO RELATED APPLICATIONS

The present invention claims priority to U.S. Provisional Patent Application Ser. No. 62/622,271 entitled “Method for Random Access Communication” to Michelle Effros et al., filed Jan. 26, 2018 and U.S. Provisional Patent Application Ser. No. 62/797,089 entitled “Random Access Channel Coding in the Finite Blocklength Regime” to Michelle Effros et al., filed Jan. 25, 2019. The disclosures of U.S. Provisional Patent Application Ser. Nos. 62/622,271 and 62/797,089 are herein incorporated by reference in their entirety.

STATEMENT OF FEDERALLY SPONSORED RESEARCH

This invention was made with government support under Grant Nos. CCF1527524, CCF1566567 & CCF1817241 awarded by the National Science Foundation. The government has certain rights in the invention.

US Referenced Citations (18)
Number Name Date Kind
8169954 Usuda et al. May 2012 B2
20060165190 Tamaki et al. Jul 2006 A1
20070094580 Livshitz Apr 2007 A1
20070223620 Kalhan Sep 2007 A1
20080043771 Cho et al. Feb 2008 A1
20080049685 Becker et al. Feb 2008 A1
20080247336 Sugitani Oct 2008 A1
20090305690 Yuda et al. Dec 2009 A1
20110194478 Lee et al. Aug 2011 A1
20110216733 Han Sep 2011 A1
20120117446 Taghavi Nasrabadi May 2012 A1
20140369250 Ren Dec 2014 A1
20150341146 Chunlong et al. Nov 2015 A1
20160212507 Du Jul 2016 A1
20170054453 Kim et al. Feb 2017 A1
20170257195 Maaref Sep 2017 A1
20190021131 Zhang et al. Jan 2019 A1
20190297649 Lahouti et al. Sep 2019 A1
Foreign Referenced Citations (3)
Number Date Country
2447943 May 2016 EP
2014025366 Feb 2014 WO
2019183601 Sep 2019 WO
Non-Patent Literature Citations (62)
Entry
Wang et al. “Fountain Communication using Concatenated Codes”, Feb. 2013, IEEE Transactions on communications, vol. 61, No. 2, pp. 443-454.
Shanechi et al. “Rateless Codes for MIMO Channels”, 2008, IEEE. (Year: 2008).
International Preliminary Report on Patentability for International Application PCT/US2019/023755, Report issued Sep. 22, 2020, dated Oct. 1, 2020, 7 Pgs.
Bentkus, “On the dependence of the Berry-Esseen bound on dimension,” Journal of Statistical Planning and Inference, vol. 113, May 2003, pp. 385-402.
Dvoretzky et al., “Asymptotic minimax character of the sample distribution function and of the classical multinomial estimator”, Annals of Mathematical Statistics, vol. 27, Sep. 1956, pp. 642-669.
Mathys, “A class of codes for a T active users out of N multiple-access communication system”, IEEE Transactions on Information Theory, vol. 36, No. 6, Nov. 1990, pp. 1206-1219.
Minero et al., “Random Access: an Information-Theoretic Perspective”, arXiv.org, Retrieved from: https://arxiv.org/pdf/0912.3264.pdf, Dec. 16, 2009.
Roberts, “ALOHA packet system with and without slots and capture”, ACM SIGCOMM Computer Communication Review, vol. 5, No. 2, Apr. 1975, pp. 28-42.
Smirnov, “Approximate laws of distribution of random variables from empirical data”, Usp. Mat. Nauk., vol. 10, 1944, pp. 179-206.
Tschamkerten et al., “Variable length coding over an unknown channel”, IEEE Transactions on Information Theory, vol. 52, May 2006, pp. 2126-2145.
International Search Report and Written Opinion for International Application No. PCT/US2019/023755, Search completed Jul. 10, 2019, dated Jul. 10, 2019, 10 pgs.
Ahlswede, “An elementary proof of the strong converse theorem for the multiple-access channel”, Journal Combinatorics, Information and System Sciences, vol. 7, No. 3, 1982, pp. 1-16.
Bassalygo et al., “Restricted Asynchronous Multiple Access”, Problemy Peredachi lnformatsii, vol. 19, No. 4, 1983, pp. 92-96.
Berger, “The Poisson multiple-access conflict resolution problem”, Multi-user communication systems, 1981, pp. 1-27.
Blackwell et al., “The Capacity of a Class of Channels”, The Annals of Mathematical Statistics, vol. 30, No. 4, Dec. 1959, pp. 1229-1241.
Blits et al., “Universal rateless coding with finite message set”, Proceedings of the IEEE International Symposium on Information Theory, Cambridge, Massachusetts, Jul. 1-6, 2012, pp. 1772-1776.
Burnashev, “Data Transmission over a Discrete Channel with Feedback. Random Transmission Time”, Problems of Information Transmission, vol. 12, No. 4, 1976, pp. 250-265.
Casini et al., “Contention resolution diversity slotted Aloha (CRDSA): An enhances random access scheme for satellite access packet networks”, IEEE Transaction on Wireless Communications, vol. 6, No. 4, 2007, pp. 1408-1419.
Chen et al., “Capacity of Gaussian Many-Access Channels”, IEEE Transactions on Information Theory, vol. 63, No. 6, Jun. 2017, pp. 3516-3539.
Chen et al., “Many-Access Channels: The Gaussian Case with Random User Activities”, arXiv:1405.0893v1 [cs.IT], May 5, 2014, 5 pgs.
Csiszar et al., “Information theory and statistics: A tutorial”, Commun. Inf. Theory, vol. 1, Dec. 2004, pp. 417-528.
D'Yachkov et al., “A coding model for a multiple-access adder channel”, Problems of Information Transmission, vol. 17, No. 2, Apr. 1981, pp. 26-38.
Draper et al., “Efficient variable length channel coding for unknown DMCs”, Proceedings of the International Symposium on Information Theory, Chicago, Illinois, Jun. 27-Jul. 2, 2004, p. 379.
Dueck, “Maximal error capacity regions are smaller than average error capacity regions for multi-user channels”, Problems of Control and Information Theory, 1978, vol. 7, No. 1, pp. 11-19.
Dueck, “The Strong Converse of the Coding Theorem for the Multiple-access Channel”, Journal of Combinatorics, Information, and System Sciences, 1981, vol. 6, pp. 187-196.
Ebrahimi et al., “Coded random access design for constrained outage”, Proceedings of the IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, Jun. 25-30, 2017, pp. 2732-2736.
Effros et al., “Random Access Channel Coding in the Finite Blocklength Regime”, arXiv.org, Retrieved from: https://arxiv.org/pdf/1801.09018.pdf, Jul. 26, 2019, 9 pgs.
Fong et al., “A proof of the strong converse theorem for gaussian multiple access channels”, IEEE Transactions on Information Theory, vol. 62, Aug. 2016, pp. 4376-4394, arXiv:1509.01380.
Gibbs et al., “On choosing and bounding probability metrics”, International Statistical Review, 2002, vol. 70, No. 3, pp. 419-435.
Gudipati et al., “AutoMAC: Rateless Wireless Concurrent Medium Access”, MobiCom 2012, Istanbul, Turkey, Aug. 22-26, 2012.
Hoeffding, “Asymptotically optimal tests for multinomial distributions”, Annals of Mathematical Statistics, vol. 36, Apr. 1965, pp. 369-401.
Huang et al., “Finite Blocklength Coding for Multiple Access Channels”, Proceedings of the IEEE International Symposium on Information Theory Proceedings, Cambridge, Massachusetts, Jul. 1-6, 2012, 5 pgs.
Huang et al., “Strong large deviations for composite hypothesis testing”, 2014 IEEE International Symposium on Information Theory, Jun. 2014, pp. 556-560.
Kolmogorov, “Sulla Determinazione Empirica di una Legge di Distribuzione”, Giornale dell'Istituto Italiano degli Attuari, vol. 4, 1933, pp. 83-91.
Liva, “Graph-based analysis and optimization of contention resolution diversity slotted Aloha”, IEEE Transactions on Communications, vol. 59, No. 2, Feb. 2011, pp. 477-487.
Luby, “LT Codes”, Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, Vancouver, BC, Canada, Nov. 19, 2002, 10 pgs.
Massart, “The tight constant in the Dvoretzky-Kiefer-Wolfowitz inequality”, Annals of Probability, vol. 18, Jul. 1990, pp. 1269-1283.
Minero et al., “Random Access: An Information-Theoretic Perspective”, IEEE Transactions on Information Theory, vol. 58, No. 2, Feb. 6, 2012, pp. 909-930.
Molavianjazi et al., “Simpler achievable rate regions for multiaccess with finite blocklength”, Proceedings 2012 IEEE International Symposium on Information Theory, Jul. 2012, pp. 36-40.
Molavianjazi et al., “A Second-Order Achievable Rate Region for Gaussian Multi-Access Channels via a Central Limit Theorem for Functions”, IEEE Transactions on Information Theory, vol. 61, No. 12, Dec. 2015, pp. 6719-6733.
Moulin, “A new metaconverse and outer region for finite-blocklength MACs”, Proceedings 2013 Information Theory and Applications Workshop, San Diego, CA, Feb. 2013, pp. 1-8.
Nikopour et al., “Sparse code multiple access”, IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, 2013, pp. 332-336.
Ordentlich et al., “Low Complexity Schemes for the Random Access Gaussian Channel”, Proceedings of the IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, Jun. 25-30, 2017, 10 pgs.
Paolini et al., “High throughput random access via codes on graphs: coded slotted Aloha”, arXiv.org, Retrieved from: https://arxiv.org/pdf/1102.2516.pdf, Feb. 12, 2011, 6 pgs.
Polyanskiy, “A perspective on massive random-access”, Proceedings of the IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, Jun. 25-30, 2017, 5 pgs.
Polyanskiy, “On dispersion of compound DMCs”, Proceedings of the 51st Annual Allerton Conference on Communication, Control, and Computing, Monticello, Illinois, Oct. 2-4, 2013, 8 pgs.
Polyanskiy et al., “Channel Coding Rate in the Finite Blocklength Regime”, IEEE Transactions on Information Theory, vol. 56, No. 5, May 2010, pp. 2307-2359.
Polyanskiy et al., “Feedback in the Non-Asymptotic Regime”, IEEE Transactions on Information Theory, vol. 57, No. 8, Aug. 2011, pp. 4903-4925.
Polyanskiy et al., “Lecture Notes on Information Theory”, MIT (6.441), UIUC (ECE 563), Yale (STAT 664), 2012-2017, 342 pgs.
Popovski et al., “Random access protocols based on rateless codes”, 2013, 7 pgs.
Richardson et al., “Design of capacity-approaching irregular low-density parity-check codes”, IEEE Transaction on Information Theory, vol. 47, No. 2, 2001, pp. 619-637.
Sarwate et al., “Some observations on limited feedback for multiaccess channels”, IEEE International Symposium on Information Theory, Aug. 2009, pp. 394-397.
Scarlett et al., “Second-Order Rate Region of Constant-Composition Codes for the Multiple-Access Channel”, IEEE Transactions on Information Theory, vol. 61, No. 1, Jan. 2015, pp. 157-172.
Shepp et al., “Entropy of the sum of independent bernoulli random variables and of the multinomial distribution”, Contributions to Probability, Academic Press, 1981, pp. 201-206.
Shirvanimoghaddam et al., “Probabilistic rateless multiple access for machine-to-machine communication”, IEEE Transaction on Wireless Communications, vol. 14, No. 12, 2015, pp. 6815-6826.
Shulman, “Communication over an unknown channel via common broadcasting”, PhD thesis, Tel Aviv University, 2003, 145 pgs.
Stefanovic et al., “Aloha Random Access that Operates as a Rateless Code”, arxiv.org, Retrieved from: https://arxiv.org/pdf/1308.1503.pdf, Aug. 7, 2013, 10 pgs.
Storn et al., “Differential evolution—a simple and efficient heuristic for global optimization over continuous spaces”, Global Optimization, vol. 11, No. 4, 1997, pp. 341-359.
Tan et al., “On the Dispersions of Three Network Information Theory Problems”, IEEE Transactions on Information Theory, vol. 60, No. 2, Feb. 2014, pp. 881-903, arXiv:1201.3901.
Tchamkerten et al., “A Feedback Strategy for Binary Symmetric Channels”, Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, Jun. 30-Jul. 5, 2002, pp. 362.
Truong et al., “On the Gaussian MAC with stop-feedback”, Proceedings of the IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, Jun. 25-30, 2017, pp. 2303-2307.
Zeitouni et al., “On universal hypotheses testing via large deviations”, IEEE Transactions on Information Theory, vol. 37, No. 2, Mar. 1991, pp. 285-290.
Related Publications (1)
Number Date Country
20190245604 A1 Aug 2019 US
Provisional Applications (2)
Number Date Country
62797089 Jan 2019 US
62622271 Jan 2018 US