entropy-logo

Journal Browser

Journal Browser

Information Theory Applied to Communications and Networking

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: closed (31 July 2012) | Viewed by 58970

Special Issue Editors


E-Mail Website
Guest Editor
Technische Universität Dresden, Chair for Communications Theory, Chemnitzer Str. 48a, 01187 Dresden, Germany
Interests: applied information theory, signal processing for communications and networks, communication theory, physical layer security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Communication Theory Department, School of Electrical Engineering, KTH Royal Institute of Technology, Stockholm, Sweden
Interests: information theory; communication theory; wireless communications
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Special Issue focuses on contributions based on Shannon's information concepts applied to problems in communications and networking.

When Shannon introduced his version of "entropy" and the related concept of "mutual information", he had problems in electrical communication in mind. Since then his theory has found a wide range of applications also outside the central field of telecommunications. The goal of this special issue is however to provide a modern view on problems in communications and networking, and the use of Shannon's notions to understand and characterize fundamental opportunities and limitations.

Prospective contributions should consider theory and problems motivated by the wide area of communications and networking. Shannon's original concepts of entropy and/or mutual information should be of central importance.

Prof. Dr. Eduard Jorswieck
Prof. Dr. Mikael Skoglund
Guest Editors

Keywords

  • shannon entropy
  • mutual information
  • coding theorems
  • capacity
  • communication networks
  • detection and estimation

Published Papers (10 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

191 KiB  
Article
Asymptotic Behavior of the Maximum Entropy Routing in Computer Networks
by Milan Tuba
Entropy 2013, 15(1), 361-371; https://0-doi-org.brum.beds.ac.uk/10.3390/e15010361 - 21 Jan 2013
Cited by 10 | Viewed by 5383
Abstract
Maximum entropy method has been successfully used for underdetermined systems. Network design problem, with routing and topology subproblems, is an underdetermined system and a good candidate for maximum entropy method application. Wireless ad-hoc networks with rapidly changing topology and link quality, where the [...] Read more.
Maximum entropy method has been successfully used for underdetermined systems. Network design problem, with routing and topology subproblems, is an underdetermined system and a good candidate for maximum entropy method application. Wireless ad-hoc networks with rapidly changing topology and link quality, where the speed of recalculation is of crucial importance, have been recently successfully investigated by maximum entropy method application. In this paper we prove a theorem that establishes asymptotic properties of the maximum entropy routing solution. This result, besides being theoretically interesting, can be used to direct initial approximation for iterative optimization algorithms and to speed up their convergence. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
396 KiB  
Article
Shannon’s Sampling Theorem for Bandlimited Signals and Their Hilbert Transform, Boas-Type Formulae for Higher Order Derivatives—The Aliasing Error Involved by Their Extensions from Bandlimited to Non-Bandlimited Signals
by Paul L. Butzer, Gerhard Schmeisser and Rudolf L. Stens
Entropy 2012, 14(11), 2192-2226; https://0-doi-org.brum.beds.ac.uk/10.3390/e14112192 - 05 Nov 2012
Cited by 29 | Viewed by 8168
Abstract
The paper is concerned with Shannon sampling reconstruction formulae of derivatives of bandlimited signals as well as of derivatives of their Hilbert transform, and their application to Boas-type formulae for higher order derivatives. The essential aim is to extend these results to non-bandlimited [...] Read more.
The paper is concerned with Shannon sampling reconstruction formulae of derivatives of bandlimited signals as well as of derivatives of their Hilbert transform, and their application to Boas-type formulae for higher order derivatives. The essential aim is to extend these results to non-bandlimited signals. Basic is the fact that by these extensions aliasing error terms must now be added to the bandlimited reconstruction formulae. These errors will be estimated in terms of the distance functional just introduced by the authors for the extensions of basic relations valid for bandlimited functions to larger function spaces. This approach can be regarded as a mathematical foundation of aliasing error analysis of many applications. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Figure 1

352 KiB  
Article
Optimization of MIMO Systems Capacity Using Large Random Matrix Methods
by Florian Dupuy and Philippe Loubaton
Entropy 2012, 14(11), 2122-2142; https://0-doi-org.brum.beds.ac.uk/10.3390/e14112122 - 01 Nov 2012
Viewed by 6160
Abstract
This paper provides a comprehensive introduction of large random matrix methods for input covariance matrix optimization of mutual information of MIMO systems. It is first recalled informally how large system approximations of mutual information can be derived. Then, the optimization of the approximations [...] Read more.
This paper provides a comprehensive introduction of large random matrix methods for input covariance matrix optimization of mutual information of MIMO systems. It is first recalled informally how large system approximations of mutual information can be derived. Then, the optimization of the approximations is discussed, and important methodological points that are not necessarily covered by the existing literature are addressed, including the strict concavity of the approximation, the structure of the argument of its maximum, the accuracy of the large system approach with regard to the number of antennas, or the justification of iterative water-filling optimization algorithms. While the existing papers have developed methods adapted to a specific model, this contribution tries to provide a unified view of the large system approximation approach. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Graphical abstract

342 KiB  
Article
Network Coding for Line Networks with Broadcast Channels
by Gerhard Kramer and Seyed Mohammadsadegh Tabatabaei Yazdi
Entropy 2012, 14(10), 1813-1828; https://0-doi-org.brum.beds.ac.uk/10.3390/e14101813 - 28 Sep 2012
Viewed by 4552
Abstract
An achievable rate region for line networks with edge and node capacity constraints and broadcast channels (BCs) is derived. The region is shown to be the capacity region if the BCs are orthogonal, deterministic, physically degraded, or packet erasure with one-bit feedback. If [...] Read more.
An achievable rate region for line networks with edge and node capacity constraints and broadcast channels (BCs) is derived. The region is shown to be the capacity region if the BCs are orthogonal, deterministic, physically degraded, or packet erasure with one-bit feedback. If the BCs are physically degraded with additive Gaussian noise then independent Gaussian inputs achieve capacity. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Graphical abstract

444 KiB  
Article
Some New Results on the Wiretap Channel with Side Information
by Bin Dai and Yuan Luo
Entropy 2012, 14(9), 1671-1702; https://0-doi-org.brum.beds.ac.uk/10.3390/e14091671 - 07 Sep 2012
Cited by 23 | Viewed by 5512
Abstract
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a noncausal manner (termed here noncausal side information) or [...] Read more.
In this paper, the model of wiretap channel has been reconsidered for the case that the main channel is controlled by channel state information (side information), and it is available at the transmitter in a noncausal manner (termed here noncausal side information) or causal manner (termed here causal side information). Inner and outer bounds are derived on the capacity-equivocation regions for the noncausal and causal manners, and the secrecy capacities for both manners are described and bounded, which provide the best transmission rate with perfect secrecy. Moreover, for the case that the side information is available at the transmitter in a memoryless manner (termed here memoryless side information), both the capacity-equivocation region and the secrecy capacity are determined. The results of this paper extend the previous work on wiretap channel with noncausal side information by providing an outer bound on the capacity-equivocation region. In addition, we find that the memoryless side information can not help to obtain the same secrecy capacity as that of the causal case, and this is different from the well known fact that the memoryless manner can achieve the capacity of the channel with causal side information. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Figure 1

422 KiB  
Article
On the Information Transmission Ability of Nonlinear Stochastic Dynamic Networks
by Bor-Sen Chen and Ying-Po Lin
Entropy 2012, 14(9), 1652-1670; https://0-doi-org.brum.beds.ac.uk/10.3390/e14091652 - 06 Sep 2012
Cited by 3 | Viewed by 4848
Abstract
The major function of dynamic networks is to sense information from the environment and process the information to the downstream. Therefore how to measure the information transmission ability of a dynamic network is an important topic to evaluate network performance. However, the dynamic [...] Read more.
The major function of dynamic networks is to sense information from the environment and process the information to the downstream. Therefore how to measure the information transmission ability of a dynamic network is an important topic to evaluate network performance. However, the dynamic behavior of a dynamic network is complex and, despite knowledge of network components, interactions and noises, it is a challenge to measure the information transmission ability of a dynamic network, especially a nonlinear stochastic dynamic network. Based on nonlinear stochastic dynamic system theory, the information transmission ability can be investigated by solving a Hamilton-Jacobi inequality (HJI)-constrained optimization problem. To avoid difficulties associated with solving a complex HJI-constrained optimization problem for information transmission ability, the Takagi-Sugeno (T-S) fuzzy model is introduced to approximate the nonlinear stochastic dynamic network by interpolating several local linear stochastic dynamic networks so that a HJI-constrained optimization problem can be replaced by the linear matrix inequalities (LMIs)-constrained optimization problem. The LMI problem can then be efficiently solved for measuring information transmission ability. We found that a more stable (robust) dynamic network has less information transmission ability, and vice versa. Finally, an example of a biochemical network in cellular communication is given to illustrate the measurement of information transmission ability and to confirm the results by using Monte Carlo simulations. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Figure 1

255 KiB  
Article
Impact of Interference in Coexisting Wireless Networks with Applications to Arbitrarily Varying Bidirectional Broadcast Channels
by Rafael F. Wyrembelski and Holger Boche
Entropy 2012, 14(8), 1357-1398; https://0-doi-org.brum.beds.ac.uk/10.3390/e14081357 - 02 Aug 2012
Cited by 2 | Viewed by 5180
Abstract
The paradigm shift from an exclusive allocation of frequency bands, one for each system, to a shared use of frequencies comes along with the need of new concepts since interference will be an ubiquitous phenomenon. In this paper, we use the concept of [...] Read more.
The paradigm shift from an exclusive allocation of frequency bands, one for each system, to a shared use of frequencies comes along with the need of new concepts since interference will be an ubiquitous phenomenon. In this paper, we use the concept of arbitrarily varying channels to model the impact of unknown interference caused by coexisting wireless systems which operate on the same frequencies. Within this framework, capacity can be zero if pre-specified encoders and decoders are used. This necessitates the use of more sophisticated coordination schemes where the choice of encoders and decoders is additionally coordinated based on common randomness. As an application we study the arbitrarily varying bidirectional broadcast channel and derive the capacity regions for different coordination strategies. This problem is motivated by decode-and-forward bidirectional or two-way relaying, where a relay establishes a bidirectional communication between two other nodes while sharing the resources with other coexisting wireless networks. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Figure 1

119 KiB  
Article
A Rotated Quasi-Orthogonal Space-Time Block Code for Asynchronous Cooperative Diversity
by Liang-Fang Ni, Fu-Kui Yao and Li Zhang
Entropy 2012, 14(4), 654-664; https://0-doi-org.brum.beds.ac.uk/10.3390/e14040654 - 29 Mar 2012
Cited by 2 | Viewed by 5458
Abstract
The rotated quasi-orthogonal space-time block code (RQSTBC) for asynchronous cooperative diversity is proposed in this paper. The source selects half of the symbols from a signal constellation set and the other half of them from that constellation rotated with the optimum angle. Meanwhile, [...] Read more.
The rotated quasi-orthogonal space-time block code (RQSTBC) for asynchronous cooperative diversity is proposed in this paper. The source selects half of the symbols from a signal constellation set and the other half of them from that constellation rotated with the optimum angle. Meanwhile, it constructs orthogonal frequency division multiplexing (OFDM) frames to counterbalance time delays of the signals. Then, relays create the frequency domain quasi-orthogonal space-time block transmitted signals matrix in such a way that its items are staggered to take on the Jafarkhani code structure or time-reversion of it. These three stages let the received signals at the destination take on RQSTBC structure with diversity order 4, which results in the fast symbol-pair-wise maximum likelihood (ML) decoder. Simulation results have shown that the proposed scheme outperforms the other asynchronous cooperative diversity schemes considered in this paper. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Figure 1

126 KiB  
Article
Minimum Error Entropy Filter for Fault Detection of Networked Control Systems
by Jianhua Zhang, Lilong Du, Mifeng Ren and Guolian Hou
Entropy 2012, 14(3), 505-516; https://0-doi-org.brum.beds.ac.uk/10.3390/e14030505 - 06 Mar 2012
Cited by 10 | Viewed by 6075
Abstract
In this paper, fault detection of networked control systems with random delays, packet dropout and noises is studied. The filter is designed using a minimum error entropy criterion. The residual generated by the filter is then evaluated to detect faults in networked control [...] Read more.
In this paper, fault detection of networked control systems with random delays, packet dropout and noises is studied. The filter is designed using a minimum error entropy criterion. The residual generated by the filter is then evaluated to detect faults in networked control systems. An illustrative networked control system is used to verify the effectiveness of the proposed approach. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Figure 1

Review

Jump to: Research

249 KiB  
Review
A Survey on Interference Networks: Interference Alignment and Neutralization
by Sang-Woon Jeon and Michael Gastpar
Entropy 2012, 14(10), 1842-1863; https://0-doi-org.brum.beds.ac.uk/10.3390/e14101842 - 28 Sep 2012
Cited by 27 | Viewed by 6500
Abstract
In recent years, there has been rapid progress on understanding Gaussian networks with multiple unicast connections, and new coding techniques have emerged. The essence of multi-source networks is how to efficiently manage interference that arises from the transmission of other sessions. Classically, interference [...] Read more.
In recent years, there has been rapid progress on understanding Gaussian networks with multiple unicast connections, and new coding techniques have emerged. The essence of multi-source networks is how to efficiently manage interference that arises from the transmission of other sessions. Classically, interference is removed by orthogonalization (in time or frequency). This means that the rate per session drops inversely proportional to the number of sessions, suggesting that interference is a strong limiting factor in such networks. However, recently discovered interference management techniques have led to a paradigm shift that interference might not be quite as detrimental after all. The aim of this paper is to provide a review of these new coding techniques as they apply to the case of time-varying Gaussian networks with multiple unicast connections. Specifically, we review interference alignment and ergodic interference alignment for multi-source single-hop networks and interference neutralization and ergodic interference neutralization for multi-source multi-hop networks. We mainly focus on the “degrees of freedom” perspective and also discuss an approximate capacity characterization. Full article
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)
Show Figures

Graphical abstract

Back to TopTop