Systems and methods for communicating using random codewords located within a restricted subset of a multi-dimensional sphere
11689318 · 2023-06-27
Assignee
Inventors
- Recep Can Yavas (Pasadena, CA, US)
- Victoria Kostina (Pasadena, CA, US)
- Michelle Effros (Pasadena, CA, US)
Cpc classification
H04L12/1868
ELECTRICITY
H04L2001/0092
ELECTRICITY
H04L1/16
ELECTRICITY
International classification
Abstract
Communication systems and methods in accordance with various embodiments of the invention employ a rateless coding strategy in which an encoder utilizes codewords located within a restricted subset of a multi-dimensional sphere. In one embodiment, a transmitter is configured to encode message data as symbols using a rateless code until an end of epoch message is received, where the rateless code comprises a set of codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere. A receiver receives observed symbols and at each of a predetermined set of decode times, determines whether a decoding rule is satisfied. When the decoding rule is satisfied, the receiver decodes at least one message using the rateless code and transmits an end of epoch message.
Claims
1. A communication system, comprising: a plurality of transmitters that each comprise an encoder, wherein the encoder of a given transmitter is configured to: receive a start of epoch message; encode message data as symbols using a rateless code comprising a set of codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere; and receive feedback messages at a predetermined set of potential decoding times; wherein the transmitter is configured to transmit the symbols until a received feedback message is an end of epoch message; and a receiver comprising a decoder, where the decoder is configured to: cause a broadcast transmitter to transmit at least one start of epoch message; receive observed symbols; at each of a predetermined set of decode times, determine whether a decoding rule is satisfied; and when the decoding rule is satisfied: decode at least one message based upon the received observed symbols based upon the rateless code; and cause the broadcast transmitter to transmit an end of epoch message.
2. The communication system of claim 1, wherein the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere and an internal portion of the multi-dimensional sphere proximate the subset of the surface of the multi-dimensional sphere.
3. The communication system of claim 1, wherein the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere.
4. The communication system of claim 1, wherein the determination of whether the decoding rule is satisfied is based upon the received observed symbols.
5. The communication system of claim 4, wherein the decoding rule combines a threshold rule based on a total power received and a maximum likelihood decoding rule.
6. The communication system of claim 1, wherein: the codewords located within the restricted subset of the multi-dimensional sphere comprise a number of codewords M of blocklength n.sub.K; and the multi-dimensional sphere is characterized by a radius equal to √{square root over (n.sub.KP)}, wherein P is a maximal (per-codeword) power constraint.
7. The communication system of claim 1, wherein: the codewords located within the restricted subset of the multi-dimensional sphere comprise a number of codewords M of blocklength nK that are each concatenated from sub-codewords of blocklengths n.sub.1, n.sub.2−n.sub.1, . . . , n.sub.K−n.sub.K−1; and each of the sub-codewords of blocklengths n.sub.1, n.sub.2−n.sub.1, . . . , n.sub.K−n.sub.K−1 is characterized in that sub-codewords of blocklengths n.sub.i−n.sub.i−1 lie on a restricted subset of a multi-dimensional sphere of radius √{square root over ((n.sub.i−n.sub.i−1)P)}. wherein P is a maximal (per-codeword) power constraint.
8. The communication system of claim 7, wherein the codewords located within the restricted subset of the multi-dimensional sphere are further characterized in that, when k transmitters from the plurality of transmitters are active, codewords of blocklength nk formed from concatenating the sub-codewords of blocklengths n.sub.1, n.sub.2−n.sub.1, . . . , n.sub.K−n.sub.K−1 are located within a restricted subset of a multi-dimensional sphere √{square root over (n.sub.KP)}.
9. The communication system of claim 1, wherein multiple transmitters in the plurality of transmitters are configured to select the same rateless code to use in the encoding of the message data as the symbols.
10. The communication system of claim 1, wherein at least two of the plurality of transmitters are configured to select different rateless codes to use in the encoding of the message data as the symbols.
11. The communication system of claim 10, wherein the receiver is further configured to apply the decoding rules at separate predetermined times with respect to each of a set of different codebooks.
12. The communication system of claim 1, wherein the broadcast transmitter is configured to send a negative feedback message when the decoding rule is not satisfied at a predetermined decode time.
13. The communication system of claim 1, wherein the encoder is configured to continue to encode the message data as the symbols using the rateless code in response to receipt of a negative feedback message.
14. The communication system of claim 1, wherein the receiver is further configured to measure channel characteristics and select the predetermined set of decoding times based upon the measured channel characteristics.
15. A transmitter system, comprising: a receiver configured to receive a start of epoch message; an encoder configured to: encode message data as symbols using a rateless code comprising a set of codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere; and a modulator configured to transmit the symbols encoded by the encoder; wherein the receiver is further configured to receive an end of epoch message at one of a predetermined set of times; and wherein the modulator is configured to transmit the symbols encoded by the encoder until an end of epoch message is received by the receiver.
16. The transmitter system of claim 15, wherein the encoder is configured to continue to encode message data as symbols using the rateless code in response to receipt of a negative feedback message.
17. The transmitter system of claim 15, wherein the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere and an internal portion of the multi-dimensional sphere proximate the subset of the surface of the multi-dimensional sphere.
18. The transmitter system of claim 15, wherein the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere.
19. A receiver system, comprising: a decoder configured to select at least one codebook; a transmitter configured to transmit at least one start of epoch message; a receiver configured to receive observed symbols; wherein the decoder is further configured to: determine whether a decoding rule is satisfied at each of a predetermined set of decode times; and when the decoding rule is satisfied: decode at least one message based upon the received observed symbols based upon a rateless code comprising a set of codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere; and cause the transmitter to transmit an end of epoch message.
20. The receiver system of claim 19, wherein the determination of whether the decoding rule is satisfied is based upon the received observed symbols.
21. The receiver system of claim 19, wherein the decoding rule combines a threshold rule based on a total power received and a maximum likelihood decoding rule.
22. The receiver system of claim 19, wherein the transmitter is configured to send a negative feedback message when the decoding rule is not satisfied at a predetermined decode time.
23. The receiver system of claim 19, wherein the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere and an internal portion of the multi-dimensional sphere proximate the subset of the surface of the multi-dimensional sphere.
24. The receiver system of claim 19, wherein the restricted subset of the multi-dimensional sphere comprises a subset of a surface of the multi-dimensional sphere.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
DETAILED DESCRIPTION
(5) Turning now to the drawings, communication system and methods in accordance with various embodiments of the invention are illustrated that can be utilized within a communication scenario where K transmitters are communicating with a single receiver through a Gaussian channel or a Fading channel. In several embodiments, the communication system can be a point-to-point communication system and the transmitter transmits using a rateless code for a predetermined epoch or until a receiver provides a feedback message indicating the end of an epoch and that the message was successfully decoded. In multiple access communication systems, the identity of active transmitters is typically known to all transmitters and to the receiver. In random access communication systems, the set of active transmitters is typically unknown to the transmitters and to the receiver. Both the MAC and RAC channels are characterized in that transmitters can transmit simultaneously on the same channel (colliding with each other) and a receiver can decode the messages being transmitted by each of the transmitters (despite the messages being transmitted simultaneously).
(6) In a number of embodiments, a rateless coding strategy is utilized within the communication system in which each encoder utilizes codewords on a restricted subset of a multi-dimensional sphere. In several embodiments, the restricted subset includes codewords that are either on a subset of the surface of the multi-dimensional sphere or close to the subset of the surface of multi-dimensional sphere. In a number of embodiments, at least some of the codewords are on a subset of the surface of the multi-dimensional sphere. In certain embodiments, all codewords are on a subset of the surface of the multi-dimensional sphere. In other embodiments, each encoder utilizes codewords horn some internal portion of the sphere close to its surface (e.g., on the surface of a smaller sphere inside the power sphere). In many embodiments, different encoders choose their codewords dependently.
(7) In several embodiments, the decoder attempts to decode only at a finite set of decoding times. At each decoding time within the set of decoding times, in sonic embodiments, the receiver broadcasts the acknowledgment to one or more transmitters indicating whether or not a transmitter can cease transmitting the message being transmitting using a rateless code. When employed in Fading channels, receivers in accordance with many embodiments of the invention estimate channel characteristics (e.g., fading coefficients) and utilize these estimates to determine appropriate codebooks and/or decoding times. In several embodiments, the receiver can transmit messages to the encoders indicating an appropriate codebook(s) and/or a set of decoding times. In certain embodiments, the receiver employs a maximum likelihood decoder to perform decoding. The term maximum likelihood decoder is typically utilized to describe a decoder that performs decoding based upon selecting the received codeword(s) that are the highest probability to have been transmitted given the signal that was received. In several embodiments, the receiver employs other decoding rules such as a single threshold rule or multiple simultaneous threshold rules. In point-to-point communication systems, the transmitter and receiver can also agree in advance on the duration of the epoch and coordinate changes in the duration of an epoch from one epoch to the next to achieve adaptive coding and modulation using the rateless code. In several embodiments, the duration of a specific epoch within a point-to-point communication is unknown at the start of the epoch and determined by the receiver based upon received symbols using one or more decoding rules.
(8) Systems and methods in accordance with many embodiments of the invention utilize this new coding scheme to communicate via a Gaussian RAC in a manner that provides superior performance compared to prior uses of rateless codes. Use of rateless codes to communicate in a random MAC is described in Michelle Effros, Kostina Victoria, and Recep Can Yavas, Random access channel coding in the finite blocklength regime, 2018 IEEE International Symposium on Information Theory (ISIT) and Recep Can Yavas, Victoria Kostina, and Michelle Effros, Random access channel coding in the finite blocklength regime, in IEEE Transactions on Information Theory, doi: 10.1109/TIT.2020.3047630, the disclosure of which including the disclosure of rateless codes and their use in communicating via RACs is hereby incorporated by reference in its entirety.
(9) In a number of embodiments, one or more transmitters and a receiver utilize codewords obtained by concatenating K sub-codewords of blocklengths n.sub.1, n.sub.2−n.sub.1, . . . , b.sub.K−n.sub.K−1, each lies on or near a subset of a surface of a sphere of radius √{square root over ((n.sub.i−n.sub.i−1)P)}. In RAC communication systems where k transmitters are active, the resulting codewords are located within a restricted subset of the sphere of radius √{square root over (n.sub.KP)}. In several embodiments, the sub-codewords of blocklengths n.sub.1, n.sub.2−n.sub.1, . . . , n.sub.K−n.sub.K−1 are located within a restricted subset of, or in some internal portion of a sphere of radius √{square root over ((n.sub.i−n.sub.i−1)P)}. The receiver can use output typicality to determine the number of transmitters and then can apply a maximum likelihood decoder. In a number of embodiments, receivers combine maximum likelihood decoding with a single threshold test based on the received power to decode messages from unknown number of active transmitters.
(10) In several embodiments, an encoder employ random coding. The random codewords are generated by concatenating K sub-codewords of blocklengths n.sub.1, n.sub.2−n.sub.1, . . . , n.sub.K−n.sub.K−1, each drawn from a uniform distribution on the surface of a sphere of radius √{square root over ((n.sub.i−n.sub.i−1)p)}. When k transmitters are active, the resulting codewords can be uniformly distributed on a restricted subset of the surface of a sphere of radius √{square root over (n.sub.lP)}. In some embodiments, the codewords are distributed uniformly or non-uniformly on a subset of the sphere or on a subset of the internal portion of the sphere (e.g., a smaller sphere inside the power sphere). In several embodiments, the portions of the codewords (i.e., the sub-codewords of sizes n.sub.1, n.sub.2−n.sub.1, . . . ) are drawn according to dependent distributions. In many embodiments, the codewords are drawn from a subset of the surface of the sphere, and/or each sub-codeword is drawn according to a conditional distribution that depends on the values of the symbols in the prior sub-codewords. For example, for any subset of the surface of the n.sub.K-dimensional power sphere for which the maximal power constraint is satisfied for decoding times n.sub.1, . . . , n.sub.K, a uniform distribution on that subset can be achieved by an appropriate choice of the conditional distributions from which the sub-codewords are drawn.
(11) In a number of embodiments, the receiver broadcasts a feedback message (e.g., a single bit) to all transmitters at each potential decoding time, indicating whether or not it is ready to decode. In several embodiments, a decoding rule is utilized by the decoder that combines a threshold rule based on the total received power and a maximum likelihood decoder. As is discussed below, communication systems that employ the rateless Gaussian RAC codes described herein can achieve the same performance up to a third-order term as the best known codes for the Gaussian MAC.
(12) In several embodiments, a communication system capable of communicating via a RAC can achieve additional efficiency gains by detecting early within a time epoch that an unusually large number of transmitters have commenced simultaneously transmitting. Instead of requiring all transmitters to continue to transmit with a long blocklength, the receiver can transmit a feedback message ending the epoch and indicating to one or more of the transmitters that they should wait a period of time before attempting to re-transmit. In several embodiments, the period of time that a transmitter waits before attempting to retry transmitting its message can be a number of time epochs specified by the transmitter. In certain embodiments, the period of time can be a random number of time epochs determined by the transmitter.
(13) Systems and methods in accordance with various embodiments of the invention can also be utilized to communicate via point-to-point fading channels and/or the fading RAC. When communicating via the fading RAC, communication systems in accordance with many embodiments of the invention estimate channel characteristics and determine decoding times based upon the estimated channel characteristics. While the discussion herein focuses on Gaussian and fading channels with maximal-power and average-error constraints, the systems and methods described herein may be useful beyond these exemplary channel and communication scenarios. As can be readily appreciated, the specific manner in which data is encoded and decoded when communicating on MACs and/or RACs is largely dependent upon the requirements of specific application. communication systems and methods in accordance with various embodiments of the invention are discussed further below.
Systems and Methods for Communicating Using Rateless Codes
(14) A receiver configured to control the transmission of transmitters during epochs defined by the receiver in accordance with an embodiment of the invention is conceptually illustrated in
(15) As noted above, the receiver need not continuously transmit its decoding state to the transmitters. In a number of embodiments, the transmitters and the receiver establish a set of potential decoding times and the receiver sends a negative or positive feedback message, at each potential decoding time indicating whether the receiver requires more symbols to be able to decode the messages with a high probability (i.e., a negative feedback message') or whether the receiver has received enough symbols and has decided to decode the messages and start a new epoch (i.e., a positive feedback message). In a number of embodiments, a feedback bit ‘0’ is utilized to send a negative feedback message, and a feedback bit ‘1’ is utilized to send a positive feedback message.
(16) In many embodiments, the set of potential decoding times is determined based upon channel conditions. As the channel deteriorates and/or experiences fading, the receiver can adapt and choose a set of potential decoding times where the number of symbols required to be received during an epoch for a given estimated number of transmitters increases. In several embodiments, the decoder can first attempt to estimate the channel conditions and then determine a codebook and/or appropriate decoding times, which can be communicated to the transmitters. When the channel improves/changes the receiver can adapt to a set of potential decoding times in which the number of symbols required to be received for a given estimated number of transmitters decreases. In several embodiments where the channel behaviour is changing sufficiently slowly, the receiver estimates the channel parameters after some fixed period and broadcasts these estimates to the transmitters at the end of that fixed period. In many embodiments, transmitters would know when to listen for this feedback signal and also how to calculate the potential decoding times using that feedback. In other embodiments where the channel behavior is changing more quickly, the receiver sends the updated estimates of the channel parameters and/or updated next feedback times at each time feedback is sent (e.g., at each potential decoding time). In a number of embodiments, the receiver adapts the set of potential decoding times utilized during a particular epoch based upon a measurement of channel conditions including (but not limited to) channel noise and/or fading coefficients. In several embodiments, the receiver periodically signals a guard interval in which transmitters are re fired to cease activity. During this guard interval, the receiver can measure channel noise and determine an appropriate set of potential decoding times. In a number of embodiments, transmitters transmit a pilot sequence and the receiver can use this known sequence to estimate the fading characteristics of the channel. The receiver can then broadcast the set of potential decoding times and/or an identifier of the set of potential decoding times to the transmitters and can initiate the next epoch via a positive feedback message. The transmitters can then monitor the feedback channel for negative and positive feedback messages based upon the set of potential decoding times communicated by the receiver. Although specific methods are described for adapting between different sets of potential decoding times, it can readily be appreciated that any of a variety of techniques can be utilized for determining an appropriate set of decode times for a given set of channel conditions and coordinating the adoption of such a set of decode times by the receiver and transmitters in accordance with various embodiments of the invention.
(17) In a number of embodiments, all transmitters use the same encoder 102 and the receiver broadcasts an indication of a particular codebook to use in a given epoch. In several embodiments, the transmitters are able to use different codebooks. Using different codebooks can enable the decoder to identify the transmitter that transmitted a specific message decoded by the decoder 106. Using different codebooks can also enable the encoders to transmit different numbers of messages and attain different rates. When transmitters encode rising different encoders, the receiver can transmit information indicating the specific codebook to be used by a particular encoder at the start of a particular epoch. The receiver can then utilize knowledge of the different codebooks in the decoding of the transmitted messages from the observed symbols.
(18) Although specific communication systems are described above with reference to
Processes for Encoding Data for Transmission
(19) Transmitters in accordance with various embodiments of the invention are configured to wait to transmit data until the start of an epoch and then transmit data throughout the epoch while listening periodically for a positive feedback message that indicates the end of the epoch. In many embodiments, the end of the epoch can be agreed upon from one epoch to the next by one or more transmitters and a receiver. In several embodiments, a transmitter can determine the end of the epoch by listening periodically for a positive feedback message that indicates the end of the epoch. As discussed above, in many embodiments of the invention, the codebook selected for the rateless code is coordinated with the receiver and includes codewords characterized in that they are located within a restricted subset of a multi-dimensional sphere. In several embodiments, the restricted subset includes a subset of the surface of the multi-dimensional sphere and a region proximate the subset of the surface of the multi-dimensional sphere. In many embodiments, the restricted subset is a subset of the surface of the multi-dimensional sphere. In other embodiments, the codewords lie within an internal portion of a smaller multi-dimensional sphere (e.g., a smaller sphere inside the power sphere). In several embodiments, transmitters choose their codewords dependently. In many embodiments, the transmitter monitors a feedback channel for a transmission from a receiver containing a codebook and/or an identifier for a codebook to be utilized within a specified (e.g., the next) epoch.
(20) A process for transmitting data using a rateless code on a MAC and/or RAC during epochs defined by a receiver in accordance with an embodiment of the invention is illustrated in
(21) The transmitter selects 208 a block of message data to transmit and a codebook to use to encode the message data, using a rateless code. In many embodiments, the codebook utilized is a codebook indicated by a receiver that includes codewords in which the codewords are located within a restricted subset of a multi-dimensional sphere. In many embodiments, the codebook constitutes a common randomness between the transmitter and the receiver. In other embodiments, there is only one codebook, and that same codebook is always used to encode the message data using a rateless code. In certain embodiments, the codebook is the same for every transmitter. In many embodiments, the codebook is specific to the transmitter. In order to encode the message data, the transmitter can also reset a clock that is used to count the number of transmitted symbols and a counter that is used to index into the set of potential decoding times. As noted above, in some embodiments, the counter can be considered to correspond to a number of active transmitters.
(22) The transmitter transmits 210 the symbols generated by the rateless code based upon the block of message bits and with each transmitted symbols checks 212 to see whether the number of transmitted symbols corresponds to one of the potential decoding times in the set of potential decoding times. If not, then the transmitter increments 214 the clock. When the number of transmitted symbols corresponds to a potential decoding time from the set of potential decoding times, the transmitter listens 216 for an acknowledgment feedback from the receiver. When a determination 218 is made that the acknowledgment message is a negative feedback message, then the transmitter increments the clock and the counter. The transmitter continues to transmit symbols generated by the rateless code until a determination 218 is made that a positive feedback message is received. At which point the epoch is over and the transmitter determines 222 whether additional message data is available for transmission and 202 whether the transmitter wishes to be active during the next epoch. When no more message data is available for transmission, the process can complete.
(23) Although specific processes for transmitting data are described above with reference to
Processes for Decoding Data, Transmitted by an Unknown Number of Transmitters
(24) Receivers in accordance various embodiments of the invention are configured to receive data transmitted by an unknown number of transmitters and encoded by rateless codes. In some embodiments, these rateless codes are based upon codewords located within a restricted subset of a multi-dimensional sphere. In several embodiments, these rateless codes are fixed. In order to be effective, the receiver must permit the transmitters to transmits symbols for a period of time that is sufficiently long to enable decoding of the transmitted messages with high probability. However, permitting the transmitters to transmit more symbols beyond this required blocklength decreases the rate of the transmitters below capacity of the channel. Accordingly, receivers in accordance with many embodiments of the invention employ decoding rules to determine when a sufficient number of symbols are received to decode the transmitted messages with high probability. In a number of embodiments, a separate potential decoding time is determined for each possible number of active transmitters, and the receiver applies a decoding rule at the each of the potential decoding times to determine whether the transmitted messages can be decoded. In this way, the decoding rule effectively constitutes an attempt to estimate the number of active transmitters. As is discussed below, communication systems in accordance with many embodiments of the invention utilize transmitters that share a common encoder to reduce implementation complexity. In several embodiments, simplicity is traded off for the ability of the receiver to identify the specific messages transmitted by individual transmitters. In a number of embodiments, the receiver can assign a codebook that is specific to a given transmitter to enable identification of the messages transmitted by the transmitter.
(25) The implementation of receivers in accordance with various embodiments of the invention can be influenced by the manner in which the receiver manages the case in which no transmitters are transmitting. The sooner the receiver ends an epoch in which no transmitters are transmitting, the higher the rate achieved across the channel. In a number of embodiments, receivers employ a separate process to determine whether transmitters are active and the receiver simply commences decoding when the receiver knows that transmitters are active. In other embodiments, the receiver incorporates a decoding rule that determines whether any transmitters are active prior to the first potential decoding time period.
(26) A process for detecting whether one or more transmitters are active and/or decoding data transmitted by the one or more active transmitters via a MAC and or RAC in accordance with an embodiment of the invention is illustrated in
(27) As part of a process of receiving and decoding symbols, the receiver can initialize a clock that is used to count the number of received symbols and a counter that is used to index into the set of potential decoding times. As noted above, in some embodiments, the counter can be considered to correspond to a number of active transmitters. When a receiver determines the estimated number of active transmitters, the receiver can transmit a positive feedback message indicating the end of the epoch. In other embodiments, the counter can be considered an index identifying a specific subset of distinct encoders. Where a receiver determines that the counter specifies the estimated set of active transmitters and the time equals the time for decoding that number of active encoders, the receiver will transmit a positive feedback message indicating the end of the epoch.
(28) After the receiver commences receiving observed symbols, the receiver determines 302 whether the number of received symbols corresponds to the potential decoding time indicated by the counter. When the clock indicates that the current time is not one of the potential decoding times, the receiver increments 308 the clock and continues to receive observed symbols. When the clock corresponds to one of the potential decoding times from the set of potential decoding times indicated by the counter, the receiver determines 310 whether a decoding rule is satisfied. The first potential decoding time corresponds to a period of time during which the receiver can determine that there are no transmitters. A variety of different decoding rules can be applied to determine that there are no active transmitters and at subsequent potential decoding times to estimate the number of active transmitters. In many embodiments, the decoding rule that is utilized to estimate the number of active transmitters during the epoch can be a simple threshold rule that is applied at each potential decoding time after a determination is made that one or more transmitters are active. As is discussed further below, the specific decoding rule applied in a given receiver in accordance with an embodiment of the invention is largely dependent upon the requirements of a given application.
(29) When the decoding rule is not satisfied, the receiver concludes that the subset of transmitters indexed by t is not the estimated active transmitter subset that is currently active and sends a negative feedback message to the transmitters. The receiver also increments the counter and the clock and continues to receive observed symbols. When the decoding rule is satisfied, the receiver decodes 314 the messages transmitted by the estimated active transmitter set and broadcasts a positive feedback message to the transmitters. In some embodiments, the receiver can determine 316 whether it is prepared to initiate another epoch. In the event that the receiver wishes to commence another epoch, the receiver selects 318 one or more codebooks to be utilized by the transmitters during the next epoch and broadcasts 302 a positive feedback message to the transmitters indicating the commencement of the next epoch and specifying the chosen codebook ID(s). In the event that the receiver completes an epoch and does not want to initiate a new epoch, the process completes. In many embodiments, the receiver transmits a positive feedback message indicating the end of the epoch (so the transmitters can cease transmission), followed by a message indicating that a new epoch has not commenced.
(30) While a number of specific processes are described above for decoding data transmitted by an unknown number of transmitters via a RAC using rateless codes with reference to
(31) While a variety of communication systems, transmitters, and receivers are described above with reference to
Notation
(32) Bold symbols are used to denote vectors (e.g., x). For any integer k≥1, [k]{1, . . . , k}. For any set
.Math.
≠0}denotes the set of non-empty subsets of
. For any x=(x.sub.1, . . . , x.sub.n) ∈
.sup.n and
.Math.[n], x.sup.N=(x.sub.i: i∈
) denotes the sub-vector of x with components in
. For vectors x.sub.1, . . . , x.sub.K of the same dimensions and index set
∈
([K]), x.sub.s=(x.sub.s: s∈
) and x.sub.(s)
Σ.sub.s∈Sx.sub.s. The notation for vectors and their collections is summarized in Table 1 below. For vectors x=(x.sub.1, . . . ,x.sub.n) and y=(y.sub.1, . . . , y.sub.n)
(33)
can be written if there exists a permutation π of the elements of y such that x=π(y), and
(34)
if x≠π(y) for all permutations π of elements of y. The inner product of x and y is denoted by
(35)
and the Euclidean norm of x by ∥x∥=√{square root over ((x,x))}. Vector inequalities are understood element-wise, i.e., x≥y if and only if x.sub.i≤y.sub.i for all i∈[n]. All-zero and all-one vectors are denoted by 0 and 1, respectively.
(36) Matrices are denoted by sans serif font (e.g., A), The n×n matrix is denoted by |.sub.n. Logarithms and exponents are base e. The indicator function is denoted by 1 {.Math.}. Unless specified otherwise, for any scalar function ƒ(.Math.) and any vector x∈.sup.n, the vector of function values ƒ(x)=(ƒ(x.sub.i): i∈[n]) is formed. For a set
.Math.
.sup.n, a vector c∈
.sup.n, and a scalar α, α
+c
{αx+c: x∈
}. The sphere with dimension n, radius r, and center at the origin is denoted by
.sup.n(r)
{x∈
.sup.n:∥x∥=r}.
(37) The distribution of a random variable X is denoted by P.sub.X. P.sub.X.fwdarw.P.sub.Y|X.fwdarw.P.sub.Y indicates that P.sub.Y is the marginal distribution of P.sub.XP.sub.Y|X. To indicate that the random variables (or vectors) X and Y are identically distributed, the notation X˜Y is employed. The multivariate Gaussian distribution with mean μ and covariance matrix Σ is denoted by (μ, Σ). The complementary Gaussian cumulative distribution function
(38)
is employed, Furthermore, the functional inverse of Q(.Math.) is denoted by Q.sup.−1(.Math.).
(39) Big-O notation ƒ(n)=O(g(n)) is used if and only if there exist constants c and n.sub.0 such that |ƒ(n)|≤c|g (n)|for al n>n.sub.0; little-o notation ƒ(n)=o(g(n)) is used if and only if for every ϵ>0, there exists a constant n.sub.0 such that |ƒ(n)|≤ϵ|g(n)| for all n >n.sub.0.
(40) TABLE-US-00001 TABLE 1 Vector Notation Notation Linear form Description x.sub.s (x.sub.s,1, . . . , x.sub.s,n) The length-n vector that is a member of a collection indexed by s ∈ S x.sub.S (x.sub.S: s ∈ S) The size-|S| ordered collection of length-n vectors x.sub.S.sup.N ((x.sub.s,t : t ∈ N): s ∈ S) The size-|S| ordered collection of length-|N| vectors with time indices in N .Math. [n] x.sub.(S) Σ.sub.s∈S x.sub.s Summation of length-n vectors from the collection S
System and Methods for Communicating Via a Gaussian Multiple Access Channel
(41) Systems and methods in accordance with many embodiments of the invention utilize a two-transmitter MAC channel code. In several embodiments, an (M.sub.1, M.sub.2, γ)-MAC code for the channel with transition law P.sub.Y.sub.
(42)
where Y.sub.2 is the channel output under inputs X.sub.1 and X.sub.2, and ϵ is the average-error constraint.
(43) The mutual information densities for a MAC with channel transition law P.sub.Y.sub.
(44)
where P.sub.X.sub.
(45)
where (X.sub.1, X.sub.2, Y.sub.2) is distributed according to P.sub.X.sub.
(46) The performance of the above codes on the Gaussian MAC, can be analyzed using a Random Coding Union (RCU) bound with P.sub.X.sub.
Random Coding Union Bound for the Multiple Access Channel
(47) When the input distributions P.sub.X.sub.
ϵ≥[min {1, (M.sub.1−1)
[i.sub.1(
[i.sub.1(
[i.sub.1,2(
(48) When the codewords X.sub.1(m.sub.1), m.sub.1 ∈[M.sub.1] and X.sub.2(m.sub.2), m.sub.2∈[M.sub.2] are drawn i.i.d. from P.sub.X.sub.
(49)
where (10) follows the union bound and the bounded nature of probability. The right-hand side of (10) is equal to the right-hand side of (7), since the mutual information density i.sub.1,2(x.sub.1, x.sub.2; y) can be expanded as
(50)
where
(51)
i∈{1,2}. Since the average error probability of randomly generated codewords is bounded by the right-hand side of (7), there exists a code satisfying (7).
(52) In several embodiments of the invention, the system utilizes a MAC code with with an arbitrary K≥2 transmitters. In these embodiments, an (M.sub.[K], ϵ)-MAC code for the channel with transition law P.sub.Y.sub.
(53)
such that
(54)
where Y.sub.K is the channel output under inputs X.sub.1, . . . X.sub.K , and ϵ is the average-error constraint. The above result generalizes to the K-transmitter MAC. The conditional mutual information densities can be defined for the K-transmitter MAC as
(55)
where ⊂[K],
≠0, and
.sup.c[K]\
, and the unconditional mutual information density as
(56)
(57) The inequality in (7) extends to the K-transmitter MAC as
(58)
A Third-order Achievability Bound for the Gaussian MAC
(59) In several embodiments, the code definition incorporates maximal-power constraints (P.sub.1, P.sub.2) on the channel inputs. When (X.sub.1, X.sub.2) and Y.sub.2 are defined as the MAC inputs and output, respectively, an (n, M.sub.1, M.sub.2, ϵ,P.sub.1, P.sub.2)-MAC code for a two-transmitter MAC includes encoding functions f.sub.1:[M.sub.1].fwdarw..sup.n and f.sub.2: [M.sub.2].fwdarw.
.sup.n, and decoding function g:
.sup.n.fwdarw.[M.sub.1]×[M.sub.2] such that
(60)
(61) The following notation can be used to present an achievability result for the Gaussian MAC with k≥1 transmitters. Over n channel uses, the channel has inputs X.sub.1, . . . , X.sub.k∈.sup.n, additive noise Z≠
(0,|.sub.n), and output
Y.sub.l=X.sub.([k])+Z. (16)
The channel transition law induced by (16) can be written as
(62)
(63) When Z≠(0, V), and V is a d×d positive semi -definite matrix, the multidimensional analogue of the inverse Q.sup.−1(.Math.) of the complementary Gaussian cumulative distribution is
Q.sub.inv(V, ϵ)={z∈.sup.d:
[Z≤z]≥1−ϵ}. (19)
For d=1, Q.sup.−1(ϵ)=min{z:z ∈Q.sub.inv(1, ϵ)}.
(64) The capacity vector for the two-transmitter GGaussian MAC can be defined as
(65)
(66) The dispersion matrix for the two-transmitter Gaussian MAC can be defined as
(67)
where V(P) is the dispersion function (3), and
(68)
(69) For any ϵ∈(0, 1) and any P.sub.1, P.sub.2>0, an (n, M.sub.1, M.sub.2, ϵ, P.sub.1, P.sub.2)-MAC code for the two-transmitter Gaussian MAC exists provided that
(70)
(71) The above result extends to the general K-transmitter Gaussian MAC. An n, M.sub.[K], ϵ, P.sub.[K])-MAC code for the K-transmitter Gaussian MAC with message set sizes M.sub.1, . . . , M.sub.K and power constraints P.sub.1, . . . , P.sub.K is a natural extension of the two-transmitter MAC code given above. For any ϵ∈(0, 1) , and P.sub.i>0, i∈[K], an (n, M.sub.[K], ϵ, P.sub.[K])-MAC code for the K-transmitter Gaussian MAC exists provided that
(72)
where C(P.sub.[K]) is the capacity vector
X(P.sub.[K])(C(P.sub.(S)):
∈
([K]))∈
.sup.2.sup.
and V(P.sub.[K]) is the (2.sup.K−1)×(2.sup.K−1) dispersion matrix with the elements V.sub.S.sub..sub.1,
.sub.2∈
([K]), given by
(73)
(74) For the symmetric setting, that is P.sub.i=P and M.sub.i=M for i∈[K], for any ϵ∈(0, 1), and P>0, an (n, M1, ϵP1)-MAC code for the K-transmitter Gaussian MAC exists provided that
(75)
Again, C(.Math.) and V(.Math.) are the capacity (1) and dispersion (3) functions, respectively, and V.sub.cr(K,P) is the cross dispersion term
(76)
Communications Systems for Communicating via Gaussian Random Access Channels
(77) In order to capture the scenario of a memoryless Gaussian channel with K possible transmitters, a single receiver, and an unknown activity pattern .Math.[K] describing the set of active transmitters, the Gaussian RAC can be described by a family of Gaussian MACs {P.sub.Y.sub.
. In other embodiments, the system designer assigns a prior probability of being active or other forms of priorities to each activity pattern
.
(78) Systems and methods in accordance with many embodiments of the invention utilize an epoch-based rateless communication strategy to achieve the fundamental limits of the Gaussian RAC. Each transmitter can either be active or silent during a whole epoch. At each of times n.sub.0, n.sub.1, . . . , the decoder broadcasts to all transmitters a message indicating whether the decoder has been able to decode the messages or not (e.g., a single bit or symbol-sending value 1 if it can decode and 0 otherwise). The transmission of a message (e.g., a one bit message ‘1’) at time n.sub.t ends the current epoch and starts the next. The timing of the end of the epoch is often indicative of the decoder's estimate that the number of transmitters is t.
(79) In several embodiments, identical encoding is employed in which each active transmitter i uses the same encoding function to describe its message W.sub.i∈[M]. Identical encoding here assumes P.sub.i=P and M.sub.i=M for all i. The task of the decoder is to decode a list of messages sent by the active transmitters but not the identities of those transmitters. Messages W.sub.A are independent and uniformly distributed on alphabet [M].
(80) Since encoding is identical and the channel is invariant to permutation of its inputs, it can be assumed without loss of generality that ||=k implies
=[k]. Intuitively, given identical encoding and a Gaussian channel, one would expect that interference increases with the number of active transmitters k, and therefore that the decoding time n.sub.k increases with k. Since the capacity per transmitter for the k-transmitter Gaussian MAC,
(81)
decreases with k, n.sub.0< . . . <n.sub.K for M can be chosen to be large enough. In several embodiments, the system designer can choose a different ordering on the decoding times n.sub.0, . . . , n.sub.K.
(82) As a notational convenience, n.sub.K can be used to represent the longest decoding time. At time n.sub.K, the decoder sees
Y.sub.l=X.sub.(|k|)+Z∈.sup.n.sup.
where X.sub.1, . . . , X.sub.k are n.sub.K-dimensional channel inputs, Z˜(0, 1.sub.n.sub.
(83) An agnostic random access model can be assumed, where the transmitters know nothing about the set of active transmitters except their own membership and the feedback from the receiver. The receiver knows nothing about
except what it can learn from the channel output Y.sub.k.
(84) In certain embodiments, the transmitters and the receiver utilize a rateless Gaussian RAC code that is an ({n.sub.j, ϵ.sub.j}.sub.j=0.sup.K, M, P)-RAC code for the Gaussian RAC with K transmitters. Such a code can be implemented using a single encoding function f: ×[M].fwdarw.
.sup.n.sup.
×
.sup.n.sup.
(85) The codewords satisfy the maximal-power constraints
∥f(u,m).sup.[n.sup., j∈[K]. (32)
If k transmitters are active, then the average probability of error in decoding k messages at time n.sub.k is bounded as
(86)
where f(U, m.sub.i) is the codeword for the message m.sub.i∈[M], U is the common randomness randon variable and the output Y.sub.k is generated according to (31). If no transmitters are active, then the decoder decodes to the unique message {1} with probability of error bounded as[g.sub.0(U, Y.sub.0.sup.[n.sup.
(87) The realization u, of the common randomness random variable U initializes the encoders and the decoder. At the start of each communication epoch, u can be shared between all transmitters and the receiver. The alphabet size of U is bounded by K+1.
A Third-Order Achievability Result for the Gaussian RAC
(88) When K<∞, ϵ.sub.k∈(0, 1) for k∈{0}∪[K], and M are fixed, an ({n.sub.j, ϵ.sub.j}.sub.j=0.sup.K, M, P)-RAC code exists for the Gaussian RAC with K possible transmitters provided that
(89)
for k∈[K], and
n.sub.0≥clog n.sub.1+o(log n.sub.1) (36)
for some constant c>0, where C(.Math.), V(.Math.), and V.sub.cr(.Math., .Math.) the capacity (1) dispersion (3), and cross dispersion functions (30), respectively. All uses of O(1) and o(1) are taken with. respect to n.sub.1.
(90) When constants λ.sub.k>0 for k∈{0} [K] and distribution P.sub.X on .sup.n.sup.
(91)
for all k∈[K], where X.sub.[K], .sup.n.sup.
(92) For the Gaussian RAC, the rateless code described above performs as well in the first-, second-, and third-order terms as the best known communication scheme when the set of active transmitters is known. In other words, the first three terms on the right-hand side of (35) for k active transmitters match the first three terms of the largest achievable sum-rate in our achievability bound in (29) for the k-transmitter MAC.
(93) When the distribution of the random codewords P.sub.X is particularized such that the first n.sub.1 symbols are drawn uniformly from the n.sub.1-dimensional sphere with radius √{square root over (n.sub.1p)}, .sup.n.sup.
.sup.n.sup.
(94) In many embodiments including the one that the sub-codewords are drawn independently and uniformly from the surface of multi-dimensional spheres with potentially different sizes, the number of active transmitters in a Gaussian RAC can be reliably estimated from the total received power. This is possible because when k transmitters are active, the average received power
(95)
at time n.sub.k, concentrates around its mean value, N+kP, where N is the noise power of the channel, and this mean is distinct for each k∈{0}∪[K]. In other embodiments including the ones that the sub-codewords are drawn dependently, some other suitable functions of the received output Y.sub.k.sup.[n.sup.
(96) By choosing n.sub.1, . . . , n.sub.K such that the inequalities in (35) are satisfied with a constant gap for each k, each n.sub.k can be expressed in terms of n.sub.1,ϵ.sub.1, ϵ.sub.k, k, and P as
(97)
where C.sub.k=C(kP) and V.sub.k=V(kP)+V.sub.cr(k, P). Equation (39) can be dervied by replacing the inequality in (35) by an equality, computing the Taylor series expansion of n.sub.k, in (35) in terms of k, P, ϵ.sub.k, and log M, and then replacing log M by (35) for k=1.
(98) The input distribution used for the Gaussian RAC can also be used to achieve equivalent performance to that which can be achieved for the K-transmit ter Gaussian MAC. As long as n.sub.j−n.sub.j−1≥cn.sub.K holds for some constant c>0 for all j∈[K], requiring separate power constraints on each sub-block of the codewords as
∥f.sub.i(m.sub.i).sup.[n.sup.
does not degrade performance in terms of the first three terms in the expansion of the performance bound. The supports of the distributions from which the codewords are drawn for the Gaussian MAC and RAC are illustrated in
(99) .sup.n.sup.
.sup.n.sup.
.sup.n.sup.
(100) As described above, the number of active transmitters in an epoch is estimated via a sequence of decodability tests. An alternative strategy that is utilized in many embodiments is to estimate the number of active transmitters in one shot from the received power at time n.sub.0, and to inform the transmitters about the estimate t of the number of active transmitters via a ┌log(K+1)┐-bit feedback at time n.sub.0. Given this knowledge, the transmitters can modify their encoding function based on t.
(101) While much of the discussion above assumes that each of the transmitters utilize the same codebook. Systems and methods in accordance with a number of embodiments of the invention have the ability to use codetsooks that are unique to each transmitter. By using distinct codebooks for each transmitter, the decoder can associate the transmitter identities with the decoded messages.
Systems and Methods for Communicating via the Quasi-Static Fading RAC
(102) Multi-transmitter communication over a slowly-varying fading RAC can be considered as a delay-constrained communication, where the duration of a communication epoch is shorter than the channel's coherence time, so the random fading coefficient stays constant during the entire epoch. This channel model is commonly referred as the quasi-static fading channel. As in the Gaussian RAC model, it can be assumed that the number of active transmitters k is unknown to the transmitters and the receiver. For simplicity, single-antenna communication with real inputs are considered in which the real fading coefficient is H.sub.i for transmitter i. When the number of active transmitters is k, the channel output at time n is given by
(103)
where X.sub.i∈.sup.n s the channel input from transmitter i, Z˜
(0, N|.sub.n) ∈
.sup.n is the additive Gaussian noise, and Y∈
.sup.n is the channel output. The value N>0 is the noise power in the fading channel.
(104) In the fixed-length, point-to-point, quasi-static fading channel problem, it is known that the maximum achievable rate in the first-order is
C.sub.ϵ=sup {R:F(R)≤ϵ}, (42)
which is expressed using a quantity called the outage probability defined as
F(R)[C(H.sup.2P)<R]. (43)
(105) The outage probability can be viewed as the probability that the fading gain |H| is too small to allow reliable communication over the channel, i.e., under this model, the fading coefficient H dictates whether reliable communication is possible for the current communication epoch.
(106) Unlike the fixed-length fading RAC codes without feedback, use of a code similar to the codes described above in combination with stop-feedback allows the decoding times n.sub.0 . . . , n.sub.K to vary with the number of active transmitters k; therefore it can achieve higher rates for each number of active transmitters. Generalizing this idea to the quasi-static fading channel model, the decoder can vary the decoding times n.sub.0 . . . n.sub.K according to the estimate of the fading coefficient vector H=(H.sub.1, . . . , H.sub.k). This means that to decode k messages, the decoder can decode at a random decoding time n.sub.k(H) rather than a fixed n.sub.k, so that the system can opportunistically achieve higher coding rates for every realization of the fading coefficient H=h, rather than being penalized by the small fading coefficients h.sub.1, . . . , h.sub.k as in the fixed-length scenario for the fading channel. As in the Gaussian RAC problem, stop-feedback can be employed in the coding strategy. At time n.sub.k(H), a positive feedback message signal can be sent to the transmitters to inform the transmitters that decoding has occurred. Otherwise, a negative feedback signal is sent signaling that the transmission continue until the next decoding time n.sub.k,(H).
Availability of the Channel Coefficient H at the Transmitters and the Receiver
(107) When the fading coefficients H=h is available at the transmitters and the receiver, the channel transition rule can be equivalently expressed as
(108)
where the power constraint for the transmitted codewords until time n is
∥x.sub.1∥.sup.2 ≤nh.sup.2.sub.iP a. s ∀i∈[k]. (45)
(109) This implies that for every realization of H=h, rates can be achieved such that the available power P for transmitter i is replaced by h.sub.i.sup.2P, and the fixed decoding times {n.sub.j}.sub.j=0.sup.K are replaced by decoding times that vary with h, i.e., {n.sub.j(h)}.sup.K.sub.j=0.
(110) In many embodiments where neither the transmitters nor the receiver knows the fading coefficients H, the fading coefficients H can be accurately estimated as ĥ using the first n.sub.F channel outputs Y.sup.[n.sup.
Confidence Measures with Respect to the Random Decoding Time
(111) As the decoding time is random due to the estimation process, for each j∈[K], it can be desirable to condition on the random decoding times such that[n.sub.j(ĥ)>N.sub.j(h)|H=h]≤δ.sub.j, for all jp531 {0, . . . , K}, (46)
where N.sub.j(h) is a function of the fading coefficients h.
(112) The inequality in (46) provides a performance measure on the random decoding times for each realization of the fading coefficients. The condition in (46) enables the random decoding time, n.sub.j(ĥ), under the realization of the fading coefficients, h, to be below the target decoding time N.sub.j(h) with high probability.
Code Definitions
(113) Ann ({N.sub.j(h), ϵ.sub.jδ.sub.j}.sub.j=0.sup.K, n.sub.F, M, P)-fading RAC code for K transmitters that can be utilized within the fading RAC with stop-feedback can be defined as follows. The decoder estimates the coding coefficient H at time n.sub.F as ĥ using the output Y.sup.[n.sup.×[M].fwdarw.
.sup.n.sup.
×
.sup.n.sup.
.fwdarw.[M].sup.k∪{e} for k=0, . . . , K. The decoder can output the erasure symbol “e” and broadcasts value 0 to the transmitters if it cannot decode at time n.sub.j(ĥ).
(114) The codewords can satisfy the maximal-power constraints
∥f(u, m).sup.[n.sup., j∈[K]. (47)
(115) If k transmitters are active, then the average probability of error in decoding k messages at time n.sub.k(ĥ) is bounded as
(116)
Furthermore, the random decoding times n.sub.j(ĥ) satisfy the condition[n.sub.j(ĥ)>N.sub.j(h)∥H=h]≤δ.sub.j for j∈{0, . . . , K}. (49)
Coding Strategy for the Fading Model
(117) In many embodiments, upon receiving y.sup.[n.sup.
(118)
(119) In many embodiments, the decoder can determine the decoding times {n.sub.j(ĥ)}.sub.j=0.sup.K using the estimate ∥ĥ∥. In a number of embodiments, the receiver sends a quantized or other imprecise description of the estimate ĥ to the transmitters. In a number of embodiments, the transmitters have access to this list of decoding times via one-time feedback at time n.sub.F.
(120) At the encoder, the codewords are generated according to the independent, concatenated, spherical random code structure that is used for the Gaussian RAC (see discussion above). Instead of the decoding times n.sub.j, j∈[K] utilized within the Gaussian RAC, communication systems that communicate via a fading RAC can utilize decoding times {n.sub.j(ĥ)}.sub.j=0.sup.K.
(121) The decoder at time n.sub.j(ĥ) combines a mismatched information density maximum likelihood decoder with an information-density-based threshold rule that involves defining the conditional mutual information density
(122)
(123) A threshold λ.sub.k∈ can then be set. The decoder can apply the following function to make a decision at each subsequent time n.sub.k(ĥ):
(124)
where λ.sub.k is a parameter chosen to satisfy the error criterion ϵ.sub.k. Given that output power is not sufficient to estimate the number of active transmitters in the fading model, an information-density-based threshold rule is utilized.
(125) Although the present invention nas been described in certain specific aspects, many additional modifications and variations would be apparent to those skilled in the art. It is therefore to be understood that the present invention can be practiced otherwise than specifically described without departing from the scope and spirit of the present invention. Thus, embodiments of the present invention should be considered in all respects as illustrative and not restrictive. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.