Article

Protocol Coding through Reordering of User Resources, Part I: Capacity Results

02/2012;
Source: arXiv

ABSTRACT The vast existing wireless infrastructure features a variety of systems and
standards. It is of significant practical value to introduce new features and
devices without changing the physical layer/hardware infrastructure, but
upgrade it only in software. A way to achieve it is to apply protocol coding:
encode information in the actions taken by a certain (existing) communication
protocol. In this work we investigate strategies for protocol coding via
combinatorial ordering of the labelled user resources (packets, channels) in an
existing, primary system. Such a protocol coding introduces a new secondary
communication channel in the existing system, which has been considered in the
prior work exclusively in a steganographic context. Instead, we focus on the
use of secondary channel for reliable communication with newly introduced
secondary devices, that are low-complexity versions of the primary devices,
capable only to decode the robustly encoded header information in the primary
signals. We introduce a suitable communication model, capable to capture the
constraints that the primary system operation puts on protocol coding. We have
derived the capacity of the secondary channel under arbitrary error models. The
insights from the information-theoretic analysis are used in Part II of this
work to design practical error-correcting mechanisms for secondary channels
with protocol coding.

0 Bookmarks
 · 
76 Views
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We use the term protocol coding to denote the communication strategies in which information is encoded through the actions taken by a certain communication protocol. In this work we investigate strategies for protocol coding via combinatorial ordering of the labelled user resources (packets, channels) in an existing, primary system. This introduces a new, secondary communication channel in the existing system, which has been considered in the prior work exclusively in a steganographic context. Instead, we focus on the use of secondary channel for reliable communication with newly introduced secondary devices, that are low-complexity versions of the primary devices, capable only to decode the robustly encoded header information in the primary signals. In Part I of the work we have characterized the capacity of the secondary channel through information-theoretic analysis. In this paper we consider practical strategies for protocol coding inspired by the information-theoretic analysis. It turns out that the insights from Part I are instrumental for devising superior design of error-control codes. This is demonstrated by comparing the error performance to the "na"{\i}ve" strategy which is presumably available without carrying out the analysis in Part I. These results are clearly outlining both the conceptual novelty behind the discussed concept of secondary channel as well as its practical applicability.
    02/2012;

Full-text (2 Sources)

View
45 Downloads
Available from
May 21, 2014