Abstract
An achievable rate region for line networks with edge and node capacity constraints and broadcast channels (BCs) is derived. The region is shown to be the capacity region if the BCs are orthogonal, deterministic, physically degraded, or packet erasure with one-bit feedback. If the BCs are physically degraded with additive Gaussian noise then independent Gaussian inputs achieve capacity.
1. Introduction
Consider a line network with edge and node capacity constraints as shown in Figure 1. “Supernode” u, , consists of two nodes where the “i” represents “input” and “o” represents “output”. More generally, for N supernodes we have nodes
and directed edges
Every edge is labeled with a capacity constraint and for simplicity we write as .
Figure 1.
A line network with edge and node capacity constraints.
Let
denote a multicast traffic session, where are supernodes. The meaning is that a source message is available at supernode u and is destined for supernodes in the set . Since u takes on N values and can take on values, there are up to multicast sessions. We associate sources with input nodes and sinks with output nodes . Such line networks are special cases of discrete memoryless networks (DMNs) and we use the capacity definition from [1] (Section III.D). The capacity region was recently established in [2]. A binary linear network code achieves capacity and progressive d-separating edge-cut (PdE) bounds [3] provide the converse.
The goal of this work is to extend results from [2] to wireless line networks by using insights from two-way relaying [4], broadcasting with cooperation [5], and broadcasting with side-information [6]. The model is shown in Figure 2 where the difference to Figure 1 is that node transmits over a two-receiver broadcast channel (BC) to nodes and (see [7]). The channel outputs at node are
for some functions and , and where the , , are statistically independent. We permit the noise random variables to be common to and for generality. The edges are the usual links with capacity . Such line networks are again special cases DMNs and we use the capacity definition from [1] (Section III.D).
Figure 2.
A line network with broadcasting and node capacity constraints.
The paper is organized as follows. Section 2 reviews the capacity region for line networks derived in [2]. Section 3 gives our main result: an achievable rate region for line networks with BCs. Section 4 shows that this region is the capacity region for orthogonal, deterministic, and physically degraded BCs, and packet erasure BCs with feedback. We further show that for physically degraded Gaussian BCs the best input distributions are Gaussian. Section 5 relates our work to recent work on relaying and concludes the paper.
2. Review of Wireline Capacity
We review the main result from [2]. Let and denote the message bits and rate, respectively, of traffic session . We collect the bits going through supernode u into the following 8 sets:
The idea is that
- and represent traffic flowing from left-to-right and right-to-left, respectively, through supernode u without being required at supernode u;
- , represent traffic flowing from left-to-right and right-to-left, respectively, through supernode u but required at supernode u also;
- represents traffic from the left and right, respectively, and destined for supernode u but not destined for any nodes on the right and left (so this traffic “stops" at supernode u on its way from the left or right);
- , , and represent traffic originating at supernode u and destined for nodes on both the left and right, right only, and left only, respectively.
Theorem 1 (Theorem 1 in [2])
The capacity region of a line network with supernodes is specified by the inequalities
Remark 1 The converse in [2] follows by PdE arguments [3] and achievability follows by using rate-splitting, routing, copying, and “butterfly” binary linear network coding. We review both the PdE bound and the coding method after Examples 1 and 2 below.
Remark 2 Inequalities (15) and (16) are classic cut bounds [8] (Section 14.10). If we have no node constraints () then (15) and (16) are routing bounds, so routing is optimal for this case (see [9]).
Example 1 Consider for which we have 9 possible multicast sessions. The network is as in Figure 1 but where the nodes and are removed, as well as the edges touching them. For supernode we collect 7 of these sessions into 2 sets as follows. (We abuse notation and write as .)
Sessions and are missing from (17) and (18) because they do not involve supernode 1. Similarly, for supernode 2 we collect the 9 sessions into 8 sets:
Finally, for supernode 3 we have the 2 sets
The inequalities of Theorem 1 are
We discuss the 7 inequalities (23)–(25) in more detail. Consider first the converse. We write a classic cut as , where is the set of nodes on one side of the cut and is the set of nodes on the other side of the cut. The inequalities with the edge capacities , , , are classic cut bounds. For example, the cut gives the bound .
The inequalities with the “node" capacities , , in (23)–(25) are not classic cut bounds. To see this, consider the bound . A classic cut bound would require us to choose because and generally include messages with positive rates for all supernodes. But then the only way to isolate the edge is to choose which gives the too-weak bound .
We require a stronger method and use PdE bounds. We use the notation in [3]: is the edge cut, is the set of sources whose sum-rate we bound, is the permutation that defines the order in which we test the sources. Consider the edge cut , the source set with the traffic sessions (17) and (18), and any permutation for which the sessions (17) appear before the sessions (18). After removing edge the PdE algorithm removes edge because node has no incoming edges. We next test if the sessions (17) are disconnected from one of their destinations; indeed they are because one of these destinations is node . The PdE algorithm now removes the remaining edges in the graph because the nodes are not the sources of messages in (18). As a result, the remaining sessions (18) are disconnected from their destinations and the PdE bound gives . The bound on follows similarly. The bound on is more subtle and we develop it in a more general context below (see the text after Example 2).
For achievability, note that all 7 inequalities are routing bounds except for the bound on in (24). To approach this bound, we use a classic method and XOR the bits in sessions and before sending them through edge . More precisely, we combine and to form
by which we mean the bits formed when the smaller-rate message bits are XORed with a corresponding number of bits of the larger-rate message. The remaining larger-rate message bits are appended so that has rate . The message (26) is sent to node together with the remaining messages received at node . We must thus satisfy the bound on in (24).
For the routing bounds there are two subtleties. First, node forwards to the left the uncoded bits , , and . However, it must treat specially because it cannot necessarily determine and . But if then node can remove the appended bits in (26) and communicate to node at rate , rather than . If then no bits should be removed and node again communicates to node at rate . The bits node forwards to the right are treated similarly. In summary, the rates for messages and on edges and , respectively, are simply the classic routing rates.
The second routing subtlety is more straightforward: after node receives the XORed bits, it can recover by subtracting the bits that it knows. Finally, node transmits to node . Node operates similarly.
Example 2 Consider Figure 1 with for which there are 28 possible multicast sessions. For supernode 1 we collect 19 of these sessions into 2 sets as follows.
The 9 sessions not involving supernode 1 are missing. The rate bounds for supernode 1 are given by (14)–(16) with . The messages and rate bounds for supernode 4 are similar.
Similarly, for supernode 2 we collect 26 of 28 sessions into 8 sets as follows.
Sessions and are missing. The rate bounds for supernode 2 are given by (14)–(16) with . The messages and rate bounds for supernode 3 are similar.
The converse and coding method for are entirely similar to the case . However, we have not yet developed the PdE bound for and edge cut . We do this now but in the more general context of and for any u.
So consider the PdE bound with and having all the traffic sessions (6)–(13) except for (7). We choose so that the sessions (8)–(10) appear first, the sessions (6) and (11)–(12) appear second, and the sessions (13) appear last. The PdE algorithm performs the following steps.
- Remove and then remove and because node has no incoming edges. The resulting graph at supernode u is shown in Figure 3.
- Test if the sessions (8)–(10) (sessions , , ) are disconnected from one of their destinations, which they are because one of these destinations is node .
- Remove all edges to the right of supernode u because the nodes to the right are not the sources of the remaining sessions (6), (11)–(13) (sessions , , , and ).
- Test if the sessions (6), (11) and (12) (sessions , , ) are disconnected from one of their destinations, which they are because one of these destinations is to the right of supernode u.
- Remove all edges to the left of supernode u because the nodes to the left are not the sources of the sessions (13) (sessions ).
- Test if the sessions (13) are disconnected from one of their destinations, which they are.
Figure 3.
Network at supernode u after the PdE bound has removed the edges , , and . The session messages are tested in the order: , , , then , , , and finally .
3. Achievable Rates with Broadcast
We separate channel and network coding, which sounds simple enough. However, every BC receiver has side information about some of the messages being transmitted, so we will need the methods of [6]. We further use the theory in [5] to describe our achievable rate region.
We begin by having each node combine and into the message
by which we mean the same operation as in (26): the smaller-rate message bits are XORed with a corresponding number of bits of the larger-rate message. The remaining larger-rate message bits are appended so that has rate . The message (37) is sent to node together with the remaining messages received at node . As a result, we must satisfy the bound (14).
The bits arriving at node are (37) and (8)–(13). Bits are removed at node since this node is their final destination. The bits (37) and (8)–(9) and (11) must be broadcast to both nodes and . The remaining bits and are destined (or dedicated) for the right and left only, respectively. However, we know from information theory for broadcast channels [7] that it can help to broadcast parts of these dedicated messages to both receivers. So we split and into two parts each, namely the respective and where and are broadcast to both nodes and . The rates of and are the respective and , and similarly for and . We choose a joint distribution and generate a codebook of size
with length-n codewords
by choosing every letter of every codeword independently using .
We next choose “binning" rates and . For every , we choose length-n codewords by choosing the ith letter of via the distribution where is the ith letter of . We label with the arguments of , , and a “bin” index from . Similarly, for every we generate length-n codewords generated via and label with the arguments of , , and a “bin” index from .
Next, the encoder tries to find a pair of bin indices such that is jointly typical according to one’s favorite flavor of typicality. Using standard typicality arguments (see, e.g., [5]) a typical triple exists with high probability if n is large and
Once this triple is found, we transmit a length-n signal that is generated via for .
The receivers use joint typicality decoders to recover their messages. They further use their knowledge (or side-information) about some of the messages. The result is that decoding is reliable if n is large and if the following rate constraints are satisfied (see [5,6]):
Finally, we use Fourier–Motzkin elimination (see [5]) to remove , , , , , and from the above expressions and obtain the following result.
Theorem 2
An achievable rate region for a line network with broadcast channels is given by the bounds
for any choice of and for all u, and where forms a Markov chain for all u.
Remark 3 The bound (43) is the same as (14).
Remark 4 The bounds (44)–(48) are similar to the bounds of [5, Theorem 5]. A few rates are “missing” because nodes and know and , respectively, when decoding.
Example 3 Consider for which we have the sessions (17)–(22). The inequalities of Theorem 2 are
Observe that the channels from node to node , and node to node , are memoryless channels with capacities and , respectively. In fact, from (49) and (51) it is easy to see that we may as well choose , , , and as constants. Moreover, we should choose and , and then choose the input distributions so that and . The inequalities (44)–(48) at node correspond to Marton’s region [10] (Section 7.8) for broadcast channels including a common rate. We will see in the next section that if we specialize to the model of [2] then only the bounds (43)–(45) remain at node 2 because the bounds (46)–(48) are redundant.
4. Special Channels
4.1. Orthogonal Channels
A BC is orthogonal if and (see [8] (p. 419)). In fact, if all BCs in Figure 2 are orthogonal then the model reduces to that of Figure 1 so hopefully we recover Theorem 1 from Theorem 2.
Let and . Suppose and are the respective capacities of the memoryless channels and . We choose , , , and to be independent and capacity-achieving. Inequalities (44)–(48) reduce to
The region of Theorem 1 is therefore achievable. The converse follows by using the same steps as in the converse of Theorem 1.
4.2. Deterministic Channels
A BC is deterministic if and for some functions and . We show that Theorem 2 gives the capacity region if all BCs in Figure 2 are deterministic.
Theorem 3
The capacity region of a line network with deterministic BCs is the union over all , , of the (non-negative) rates satisfying
Proof.
Achievability follows by Theorem 2 with and . For the converse, the constraint (54) is the PdE bound of [11] (Section III.A). The bounds (55) and (56) are cut bounds. For the remaining steps, let be the complement of in . We define
Let be the random message corresponding to , and similarly for the other messages. The messages are independent and have entropy equal to n times their rate, where n is the number of times we use each BC. Let be the set of messages originating at supernodes in . Let to be the set of all network messages except for , and similarly for other messages. We use the notation
For the following, let and . We bound
where steps follow by , step follows by defining Q to be a time-sharing random variable that is uniform over , and follows by defining and . We similarly have
where . Note that our choices for and are appropriate for the cut bounds (55) and (56). Finally, we have
Consider the bound (57). We have
where follows by Fano’s inequality [8] (p. 38) when the block error probability tends to zero, and follows by (61) and (63). This proves (57), and (58) follows in the same way.
Finally, for (59) we use Fano’s inequality to bound
This proves Theorem 3. ■
4.3. Physically Degraded Channels
A BC is said to be physically degraded if either
forms Markov chains (see [8] (p. 422)). For the following theorem, we suppose that forms a Markov chain for all u. However, the direction of degradation can be adjusted either way for any supernode u.
Theorem 4
The capacity region of a line network with physically degraded BCs is the union over all , , of the (non-negative) rates satisfying
and where forms a Markov chain.
Proof.
For achievability, Theorem 2 with and gives the region specified by (66)–(69). For the converse, the bound (66) is based on an extension of PdE bounds to mixed wireline/wireless networks (see [11]). The bound (68) is a cut bound. The other two bounds follow by modifying the steps of [12] as follows.
Consider and let . We then have
where follows by Fano’s inequality and follows by defining and . We similarly define and . Note that our choices for and are appropriate for the cut bound (68).
Finally, for (69) we use (70) to bound
and
where follows because is defined by the messages at supernode u and the past channel outputs at supernode u, and steps follow because
forms a (long) Markov chain. Collecting the bounds (70)–(72) proves Theorem 4. ■
4.4. Physically Degraded Gaussian Channels
The additive white Gaussian noise (AWGN) and physically degraded BC has (see [13])
where is real with power constraint for all u, and and are independent Gaussian random variables with variances and , respectively (again, the direction of degradation can be swapped for any u without changing the results conceptually).
The capacity region is given by Theorem 4 and it remains to optimize . The variances of and are at most and , respectively, so the maximum entropy theorem (see [8] (p. 234)) gives
where and is the differential entropy of Y conditioned on W. Observe that
so there is an , , such that
Furthermore, a conditional version of the entropy power inequality (see [8] (p. 496)) gives
Collecting the bounds, and inserting (79) and (80) into (77), we have
But we achieve equality in (81)–(83) by choosing
where and are independent Gaussian random variables with zero-mean and variances and , respectively. The optimal is therefore zero-mean Gaussian, and the capacity region is given by inserting (81)–(83) with equality into (67)–(69), and taking the union over the rates permitted by varying .
4.5. Packet Erasure Channels with Feedback
A BC is called packet erasure with feedback if X is an L-bit vector and
and all supernodes receive one bit of feedback from each receiver telling them whether the receiver has seen an erasure or not.
Suppose we give receiver 1 both and , which means that the channel is physically degraded. Let be the resulting capacity region. Similarly, let be the capacity region if we (instead) give receiver 2 both and . The authors of [14] (see also [15]) showed that the capacity region of the original BC is . The following theorem slightly generalizes the main result of [14] and gives the capacity of line networks with broadcast erasure channels and feedback. The input has bits and we denote the erasure probabilities for and as and , respectively.
Theorem 5
The capacity region of a line network with broadcast erasure channels and feedback is the union of the (non-negative) rates satisfying (14) and
Proof.
(Sketch) Achievability follows by using the network codes of [14] and [2]. For the converse, the constraint (14) again follows from PdE bounds. For the constraints (86) and (87), we make every BC physically degraded by giving one of the receivers both channel outputs (see [14,16]). Theorem 4 gives a collection of outer bounds for each degradation choice. Finally, we optimize the coding to obtain (86) and (87). ■
5. Discussion
The capacity results in Section 4.1, Section 4.2, Section 4.3, Section 4.4, Section 4.5 imply that decode-forward (DF) relaying suffices, i.e., amplify-forward (AF) and compress-forward (CF) do not improve rates (see also [19] ([Chapter 4])). Quantize-map-forward [17] and noisy network coding [18] also do not improve on DF. In fact, the non-DF methods are suboptimal in general because they do not use superposition coding or binning to treat broadcasting. However, we have found capacity only for BCs that are orthogonal, deterministic, physically degraded, or packet erasure with one-bit feedback. AF and CF strategies are useful for other classes of BCs, as shown in [20] and many further papers.
Finally, our model applies to wireless problems where every node has a dedicated tone and/or time slot for transmission. If nodes use the same tone at the same time, then one must consider the effects of interference. For example, scheduling transmissions with half-duplex protocols is an interesting problem for further study.
Acknowledgments
G. Kramer was supported by an Alexander von Humboldt Professorship endowed by the German Federal Ministry of Education and Research. He was also supported by the Board of Trustees of the University of Illinois Subaward No. 04-217 under NSF Grant No. CCR-0325673, by ARO Grant W911NF-06-1-0182, and by NSF Grant CCF-0905235. S. M. Sadegh Tabatabaei Yazdi was supported by NSF Grant No. CCF-0430201. The material in this paper was presented in part at the 2008 Conference on Information Sciences and Systems, Princeton, NJ, USA, and at the 2009 IEEE Information Theory Workshop, Taormina, Italy. The former paper was co-authored with Serap Savari from Texas A&M University. She declined to be included as a co-author and we are grateful for her contributions.
References
- Kramer, G. Capacity results for the discrete memoryless network. IEEE Trans. Inform. Theor. 2003, 49, 4–21. [Google Scholar] [CrossRef]
- Tabatabaei Yazdi, S.M.S.; Savari, S.A.; Kramer, G. Network coding in node-constrained line and star networks. IEEE Trans. Inform. Theor. 2011, 57, 4452–4468. [Google Scholar] [CrossRef]
- Kramer, G.; Savari, S.A. Edge-cut bounds on network coding rates. J. Netw. Syst. Manag. 2006, 14, 49–67. [Google Scholar] [CrossRef]
- Rankov, B.; Wittneben, A. Spectral efficient protocols for half-duplex fading relay channels. IEEE J. Sel. Area. Comm. 2007, 25, 379–389. [Google Scholar] [CrossRef]
- Liang, Y.; Kramer, G. Rate regions for relay broadcast channels. IEEE Trans. Inform. Theor. 2007, 53, 3517–3535. [Google Scholar] [CrossRef]
- Kramer, G.; Shamai, S. Capacity for classes of broadcast channels with receiver side information. In Proceedings of the IEEE Information Theory Workshop, Tahoe City, CA, USA, 2–6 September 2007; pp. 313–318.
- Cover, T.M. Broadcast channels. IEEE Trans. Inform. Theor. 1972, 18, 2–14. [Google Scholar] [CrossRef]
- Cover, T.M.; Thomas, J.A. Elements of Information Theory; John Wiley & Sons: New York, NY, USA, 1991. [Google Scholar]
- Bakshi, M.; Effros, M.; Gu, W.; Koetter, R. On network coding of independent and dependent sources in line networks. In Proceedings of the IEEE International Symposium on Information Theory, Nice, France, 24–29 June 2007.
- Kramer, G. Topics in multi-user information theory. Found. Trends Commun. Inf. Theory 2007, 4, 265–444. [Google Scholar] [CrossRef]
- Kramer, G.; Savari, S.A. Capacity bounds for relay networks. In Presented at the Workshop on Information Theory and Applications, UCSD Campus, La Holla, CA, USA, 6–10 February 2006.
- Gamal, A.E. The feedback capacity of degraded broadcast channels. IEEE Trans. Inform. Theor. 1978, 24, 379–381. [Google Scholar] [CrossRef]
- Gamal, A.E.; van der Meulen, E.C. A proof of Marton’s coding theorem for the discrete memoryless broadcast channel. IEEE Trans. Inform. Theor. 1981, 27, 120–122. [Google Scholar] [CrossRef]
- Georgiadis, L.; Tassiulas, L. Broadcast erasure channel with feedback—Capacity and algorithms. In Proceedings of the Workshop on Network Coding, Theory, and Applications, Lausanne, Switzerland, 15–16 June 2009.
- Wang, C.C. On the capacity of 1-to-K broadcast packet erasure channels with channel output feedback. IEEE Trans. Inform. Theor. 2012, 58, 931–956. [Google Scholar] [CrossRef]
- Ozarow, L. The capacity of the white Gaussian multiple access channel with feedback. IEEE Trans. Inform. Theor. 1984, 30, 623–629. [Google Scholar] [CrossRef]
- Avestimehr, A.S.; Diggavi, S.N.; Tse, D.N.C. Wireless network information flow: A deterministic approach. IEEE Trans. Inform. Theor. 2011, 57, 1872–1905. [Google Scholar] [CrossRef]
- Lim, S.H.; Kim, Y.H.; Gamal, A.E.; Chung, S.Y. Noisy network coding. IEEE Trans. Inform. Theor. 2011, 57, 3132–3152. [Google Scholar] [CrossRef]
- Kramer, G.; Marić, I.; Yates, R.D. Cooperative communications. Found. Trends Netw. 2006, 1, 271–425. [Google Scholar] [CrossRef]
- Knopp, R. Two-way radio networks with a star topology. In Proceedings of the 2006 International Zurich Seminar on Communications, Zurich, Switzerland, February 2006; pp. 154–157.
© 2012 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).