Welcome to the new version of CaltechAUTHORS. Login is currently restricted to library staff. If you notice any issues, please email coda@library.caltech.edu
Published July 2014 | public
Journal Article

A Theory of Network Equivalence - Part II: Multiterminal Channels

Abstract

A technique for bounding the capacities of networks of independent channels is introduced. Parts I and II treat point-to-point and multiterminal channels, respectively. Bounds are derived using a new tool called a bounding model. Channel 1 is an upper (lower) bounding model for channel 2 if replacing channel 2 by channel 1 in any network yields a new network whose capacity region is a superset (subset) of the capacity region of the original network. This paper derives bounding models from noiseless links, with lower bounding models corresponding to points in the channel's capacity region and upper bounding models corresponding to points in a new channel characterization called an emulation region. Replacing all channels in a network by their noiseless upper (lower) bounding models yields a network of lossless links whose capacity region is a superset (subset) of the capacity region for the original network. This converts a general (often stochastic) network into a network coding instance, enabling the application of tools and results derived in that domain. A channel's upper and lower bounding models differ when the channel can carry more information in some networks than in others. Bounding the difference between upper and lower bounding models bounds both the accuracy of the technique and the price of separating source-network coding from channel coding.

Additional Information

© 2014 IEEE. Manuscript received April 14, 2010; revised November 19, 2012; accepted January 30, 2013. Date of publication April 22, 2014; date of current version June 12, 2014. This work was supported in part by the Defense Advanced Research Projects Agency through the Information Theory for Mobile Ad- Hoc Networks Program under Grant W911NF-07-1-0029, in part by the Lee Center for Advanced Networking, Caltech, and in part by the National Science Foundation under Grant CCF-1018741. This paper was presented in part at the 47th Annual Allerton Conference on Communication, Control, and Computing, in 2009, the 2010 Information Theory and Applications Workshop, and the 2012 IEEE Wireless Communications and Networking Conference. R. Koetter was with the Technical University of Munich when the early drafts of this work were written. He spent many of his last working hours pursuing its completion with the loving support of his wife Nuala, to whom this paper is dedicated. The final manuscript was completed after his passing. His co-authors take full responsibility for any errors or omissions.

Additional details

Created:
August 22, 2023
Modified:
October 17, 2023