Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Network Information TheoryJanuary 2012
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-1-107-00873-1
Published:16 January 2012
Pages:
714
Reflects downloads up to 05 Mar 2025Bibliometrics
Skip Abstract Section
Abstract

This comprehensive treatment of network information theory and its applications provides the first unified coverage of both classical and recent results. With an approach that balances the introduction of new models and new coding techniques, readers are guided through Shannon's point-to-point information theory, single-hop networks, multihop networks, and extensions to distributed computing, secrecy, wireless communication, and networking. Elementary mathematical tools and techniques are used throughout, requiring only basic knowledge of probability, whilst unified proofs of coding theorems are based on a few simple lemmas, making the text accessible to newcomers. Key topics covered include successive cancellation and superposition coding, MIMO wireless communication, network coding, and cooperative relaying. Also covered are feedback and interactive communication, capacity approximations and scaling laws, and asynchronous and random access channels. This book is ideal for use in the classroom, for self-study, and as a reference for researchers and engineers in industry and academia.

Cited By

  1. Lin C and Liao W (2024). AoI-Aware Interference Mitigation for Task-Oriented Multicasting in Multi-Cell NOMA Networks, IEEE Transactions on Wireless Communications, 23:9_Part_1, (11341-11356), Online publication date: 1-Sep-2024.
  2. Nema A and Sen P (2024). High Probability Decoupling via Approximate Unitary Designs and Efficient Relative Thermalization, IEEE Transactions on Information Theory, 70:4, (2590-2616), Online publication date: 1-Apr-2024.
  3. Xu Y, Lu J, Guang X and Xu W (2024). Information Embedding With Stegotext Reconstruction, IEEE Transactions on Information Forensics and Security, 19, (1415-1428), Online publication date: 1-Jan-2024.
  4. Ravi A, Vahid A and Shomorony I Capacity of the Shotgun Sequencing Channel 2022 IEEE International Symposium on Information Theory (ISIT), (210-215)
  5. Goukhshtein M, Draper S and Mitra J Rate-Energy Optimal Probabilistic Shaping Using Linear Codes 2022 IEEE International Symposium on Information Theory (ISIT), (790-795)
  6. Qiu M, Huang Y and Yuan J (2021). Discrete Signaling and Treating Interference as Noise for the Gaussian Interference Channel, IEEE Transactions on Information Theory, 67:11, (7253-7284), Online publication date: 1-Nov-2021.
  7. Anderson E, Guha S and Bash B Fundamental Limits of Bosonic Broadcast Channels 2021 IEEE International Symposium on Information Theory (ISIT), (766-771)
  8. Li S, Tuninetti D and Devroye N A Control-Theoretic Linear Coding Scheme for the Fading Gaussian Broadcast Channel with Feedback 2021 IEEE International Symposium on Information Theory (ISIT), (1-6)
  9. Wan K and Caire G (2021). On Coded Caching With Private Demands, IEEE Transactions on Information Theory, 67:1, (358-372), Online publication date: 1-Jan-2021.
  10. Salek F, Hsieh M and Fonollosa J (2020). Single-Serving Quantum Broadcast Channel With Common, Individualized, and Confidential Messages, IEEE Transactions on Information Theory, 66:12, (7752-7771), Online publication date: 1-Dec-2020.
  11. Padakandla A (2020). Communicating Correlated Sources Over MAC and Interference Channels I: Separation-Based Schemes, IEEE Transactions on Information Theory, 66:7, (4104-4128), Online publication date: 1-Jul-2020.
  12. Heidari M and Pradhan S (2020). Structured Mappings and Conferencing Common Information for Multiple-Access Channels, IEEE Transactions on Information Theory, 66:7, (4203-4225), Online publication date: 1-Jul-2020.
  13. Bilgen O and Wagner A Gaussian Multiterminal Source-Coding with Markovity: An Efficiently-Computable Outer Bound 2020 IEEE International Symposium on Information Theory (ISIT), (1-6)
  14. Hirche C Rényi Bounds on Information Combining 2020 IEEE International Symposium on Information Theory (ISIT), (2297-2302)
  15. Guo T and Yeung R (2020). The Explicit Coding Rate Region of Symmetric Multilevel Diversity Coding, IEEE Transactions on Information Theory, 66:2, (1053-1077), Online publication date: 1-Feb-2020.
  16. Liu X, Huang T, Shlezinger N, Liu Y, Zhou J and Eldar Y (2020). Joint Transmit Beamforming for Multiuser MIMO Communications and MIMO Radar, IEEE Transactions on Signal Processing, 68, (3929-3944), Online publication date: 1-Jan-2020.
  17. Qi J, Du J, Siniscalchi S, Ma X and Lee C (2020). Analyzing Upper Bounds on Mean Absolute Errors for Deep Neural Network-Based Vector-to-Vector Regression, IEEE Transactions on Signal Processing, 68, (3411-3422), Online publication date: 1-Jan-2020.
  18. Matthiesen B, Hellings C, Jorswieck E and Utschick W (2020). Mixed Monotonic Programming for Fast Global Optimization, IEEE Transactions on Signal Processing, 68, (2529-2544), Online publication date: 1-Jan-2020.
  19. Rassouli B and Gündüz D (2019). Optimal Utility-Privacy Trade-Off With Total Variation Distance as a Privacy Measure, IEEE Transactions on Information Forensics and Security, 15, (594-603), Online publication date: 1-Jan-2020.
  20. Sohrabi R, Zhu Q and Hua Y (2019). Secrecy Analyses of a Full-Duplex MIMOME Network, IEEE Transactions on Signal Processing, 67:23, (5968-5982), Online publication date: 1-Dec-2019.
  21. Matthiesen B and Jorswieck E (2019). Efficient Global Optimal Resource Allocation in Non-Orthogonal Interference Networks, IEEE Transactions on Signal Processing, 67:21, (5612-5627), Online publication date: 1-Nov-2019.
  22. Zhou L, Vu M, Oechtering T and Skoglund M Fundamental Limits for Biometric Identification Systems without Privacy Leakage 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1105-1112)
  23. Tan J, Ong L and Asadi B Can Marton Coding Alone Ensure Individual Secrecy? 2019 IEEE Information Theory Workshop (ITW), (1-5)
  24. Zappone A, Lin P and Jorswieck E (2019). Secrecy Energy Efficiency for MIMO Single- and Multi-Cell Downlink Transmission With Confidential Messages, IEEE Transactions on Information Forensics and Security, 14:8, (2059-2073), Online publication date: 1-Aug-2019.
  25. Fraigniaud P and Natale E (2019). Noisy rumor spreading and plurality consensus, Distributed Computing, 32:4, (257-276), Online publication date: 1-Aug-2019.
  26. Osia S, Rassouli B, Haddadi H, Rabiee H and Gündüz D Privacy Against Brute-Force Inference Attacks 2019 IEEE International Symposium on Information Theory (ISIT), (637-641)
  27. Estella Aguerri I, Zaidi A, Caire G and Shamai Shitz S (2019). On the Capacity of Cloud Radio Access Networks With Oblivious Relaying, IEEE Transactions on Information Theory, 65:7, (4575-4596), Online publication date: 1-Jul-2019.
  28. Insausti X, Sáez A and Crespo P (2019). A novel scheme inspired by the compute-and-forward relaying strategy for the multiple access relay channel, Wireless Networks, 25:2, (665-673), Online publication date: 1-Feb-2019.
  29. Fong S and Tan V (2019). Strong Converse Theorems for Multimessage Networks with Tight Cut-Set Bound, Problems of Information Transmission, 55:1, (67-100), Online publication date: 1-Jan-2019.
  30. Liu L, Yuen C, Guan Y, Li Y and Huang C (2019). Gaussian Message Passing for Overloaded Massive MIMO-NOMA, IEEE Transactions on Wireless Communications, 18:1, (210-226), Online publication date: 1-Jan-2019.
  31. Liang Y, Ren J and Li T The Worst Jamming Distribution for Securely Precoded OFDM 2018 IEEE Global Communications Conference (GLOBECOM), (1-6)
  32. Wilde M and Qi H (2018). Energy-Constrained Private and Quantum Capacities of Quantum Channels, IEEE Transactions on Information Theory, 64:12, (7802-7827), Online publication date: 1-Dec-2018.
  33. Tan J, Ong L and Asadi B The Secure Two-Receiver Broadcast Channel With One-Sided Receiver Side Information 2018 IEEE Information Theory Workshop (ITW), (1-5)
  34. MolavianJazi E and Yener A (2018). Subset Source Coding, IEEE Transactions on Information Theory, 64:9, (5989-6012), Online publication date: 1-Sep-2018.
  35. Anshu A, Jain R and Warsi N A Hypothesis Testing Approach for Communication Over Entanglement Assisted Compound Quantum Channel 2018 IEEE International Symposium on Information Theory (ISIT), (1794-1798)
  36. Hirche C and Reeb D Bounds on Information Combining with Quantum Side Information 2018 IEEE International Symposium on Information Theory (ISIT), (896-900)
  37. Anshu A, Hayashi M and Warsi N Secure Communication Over Fully Quantum Gel' Fand-Pinsker Wiretap Channel 2018 IEEE International Symposium on Information Theory (ISIT), (2679-2683)
  38. Victor Cheng H, Björnson E and Larsson E Semi-Closed Form Solution for Sum Rate Maximization in Downlink Multiuser MIMO Via Large-System Analysis 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3699-3703)
  39. Wu X and Ozgur A (2018). Cut-Set Bound is Loose for Gaussian Relay Networks, IEEE Transactions on Information Theory, 64:2, (1023-1037), Online publication date: 1-Feb-2018.
  40. Yang Q, Piantanida P and Gündüz D The multi-layer information bottleneck problem 2017 IEEE Information Theory Workshop (ITW), (404-408)
  41. Chen Y, Koyluoglu O and Vinck A Joint secrecy over the K-transmitter multiple access channel 2017 IEEE Information Theory Workshop (ITW), (394-398)
  42. Li J and Lin C (2017). On the Optimal Power Allocation for Two-Way Full-Duplex AF Relay Networks, IEEE Transactions on Signal Processing, 65:21, (5702-5715), Online publication date: 1-Nov-2017.
  43. Abotabl A and Nosratinia A Achieving the secrecy capacity of the AWGN wiretap channel via multilevel coding 2017 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), (894-901)
  44. Tan B, Wu J, Li Y, Cui H, Yu W and Chen C (2017). Analog Coded SoftCast: A Network Slice Design for Multimedia Broadcast/Multicast, IEEE Transactions on Multimedia, 19:10, (2293-2306), Online publication date: 1-Oct-2017.
  45. Padakandla A and Pradhan S (2017). An Achievable Rate Region Based on Coset Codes for Multiple Access Channel With States, IEEE Transactions on Information Theory, 63:10, (6393-6415), Online publication date: 1-Oct-2017.
  46. Gholami Davoodi A and Jafar S (2017). Transmitter Cooperation Under Finite Precision CSIT: A GDoF Perspective, IEEE Transactions on Information Theory, 63:9, (6020-6030), Online publication date: 1-Sep-2017.
  47. Chen Y, Koyluoglu O and Sezgin A (2017). Individual Secrecy for Broadcast Channels With Receiver Side Information, IEEE Transactions on Information Theory, 63:7, (4687-4708), Online publication date: 1-Jul-2017.
  48. Rassouli B, Varasteh M and Gündüz D Capacity region of a one-bit quantized Gaussian multiple access channel 2017 IEEE International Symposium on Information Theory (ISIT), (2633-2637)
  49. Vera M, Vega L and Piantanida P Distributed cooperative information bottleneck 2017 IEEE International Symposium on Information Theory (ISIT), (709-713)
  50. Hu S and Rusek F (2017). A Generalized Zero-Forcing Precoder With Successive Dirty-Paper Coding in MISO Broadcast Channels, IEEE Transactions on Wireless Communications, 16:6, (3632-3645), Online publication date: 1-Jun-2017.
  51. Wu X, Ozgiur A and Xie L (2017). Improving on the Cut-Set Bound via Geometric Analysis of Typical Sets, IEEE Transactions on Information Theory, 63:4, (2254-2277), Online publication date: 1-Apr-2017.
  52. Ben-Yishai A and Shayevitz O (2017). Interactive Schemes for the AWGN Channel with Noisy Feedback, IEEE Transactions on Information Theory, 63:4, (2409-2427), Online publication date: 1-Apr-2017.
  53. Truong L, Fong S and Tan V (2017). On Gaussian Channels With Feedback Under Expected Power Constraints and With Non-Vanishing Error Probabilities, IEEE Transactions on Information Theory, 63:3, (1746-1765), Online publication date: 1-Mar-2017.
  54. Lahouti F and Hassibi B Fundamental limits of budget-fidelity trade-off in label crowdsourcing Proceedings of the 30th International Conference on Neural Information Processing Systems, (5065-5073)
  55. Abotabl A and Nosratinia A Multilevel Coding for the Broadcast Channel: Optimality & Near-Optimal Constructions 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  56. ACM
    Fraigniaud P and Natale E Noisy Rumor Spreading and Plurality Consensus Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, (127-136)
  57. Dai M, Clerckx B, Gesbert D and Caire G (2016). A Rate Splitting Strategy for Massive MIMO With Imperfect CSIT, IEEE Transactions on Wireless Communications, 15:7, (4611-4624), Online publication date: 1-Jul-2016.
  58. Jeong S, Khalili S, Simeone O, Haimovich A and Kang J (2016). Multistatic cloud radar systems, Transactions on Emerging Telecommunications Technologies, 27:5, (716-730), Online publication date: 1-May-2016.
  59. Sarikaya Y, Koksal C and Ercetin O (2016). Dynamic network control for confidential multi-hop communications, IEEE/ACM Transactions on Networking, 24:2, (1181-1195), Online publication date: 1-Apr-2016.
  60. Bai B, Chen W, Letaief K and Cao Z (2016). Distributed WRBG Matching Approach for Multiflow Two-Way D2D Networks, IEEE Transactions on Wireless Communications, 15:4, (2925-2939), Online publication date: 1-Apr-2016.
  61. Bustin R, Schaefer R, Poor H and Shamai Shitz S (2016). On the SNR-Evolution of the MMSE Function of Codes for the Gaussian Broadcast and Wiretap Channels, IEEE Transactions on Information Theory, 62:4, (2070-2091), Online publication date: 1-Apr-2016.
  62. Santacruz P, Aggarwal V and Sabharwal A (2016). Leveraging physical-layer capabilites, IEEE/ACM Transactions on Networking, 24:1, (368-382), Online publication date: 1-Feb-2016.
  63. Renes J, Sutter D and Hassani S (2016). Alignment of Polarized Sets, IEEE Journal on Selected Areas in Communications, 34:2, (224-238), Online publication date: 1-Feb-2016.
  64. Arafa A and Ulukus S (2015). Optimal Policies for Wireless Networks With Energy Harvesting Transmitters and Receivers: Effects of Decoding Costs, IEEE Journal on Selected Areas in Communications, 33:12, (2611-2625), Online publication date: 1-Dec-2015.
  65. Schrammar N and Skoglund M (2015). Approximate Secrecy Capacity of Gaussian Parallel Relay Networks, IEEE Transactions on Information Theory, 61:10, (5525-5534), Online publication date: 1-Oct-2015.
  66. Kuzuoka S and Watanabe S (2015). A Dichotomy of Functions in Distributed Coding: An Information Spectral Approach, IEEE Transactions on Information Theory, 61:9, (5028-5041), Online publication date: 1-Sep-2015.
  67. Feinerman O and Korman A Clock Synchronization and Estimation in Highly Dynamic Networks Post-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 9439, (16-30)
  68. Orhan O, Gunduz D and Erkip E (2015). Source-Channel Coding Under Energy, Delay, and Buffer Constraints, IEEE Transactions on Wireless Communications, 14:7, (3836-3849), Online publication date: 1-Jul-2015.
  69. Ingber A, Courtade T and Weissman T (2015). Compression for Quadratic Similarity Queries, IEEE Transactions on Information Theory, 61:5, (2729-2747), Online publication date: 1-May-2015.
  70. Pen-Shun Lu , Xiaobo Zhou and Matsumoto T (2015). Outage Probabilities of Orthogonal Multiple-Access Relaying Techniques With Imperfect Source-Relay Links, IEEE Transactions on Wireless Communications, 14:4, (2269-2280), Online publication date: 1-Apr-2015.
  71. Goldenbaum M, Boche H and Stanczak S (2015). Nomographic Functions: Efficient Computation in Clustered Gaussian Sensor Networks, IEEE Transactions on Wireless Communications, 14:4, (2093-2105), Online publication date: 1-Apr-2015.
  72. Watanabe S, Kuzuoka S and Tan V (2015). Nonasymptotic and Second-Order Achievability Bounds for Coding With Side-Information, IEEE Transactions on Information Theory, 61:4, (1574-1605), Online publication date: 1-Apr-2015.
  73. Jalali S and Effros M (2015). Separation of Source-Network Coding and Channel Coding in Wireline Networks, IEEE Transactions on Information Theory, 61:4, (1524-1538), Online publication date: 1-Apr-2015.
  74. Farhadi H, Chao Wang and Skoglund M (2015). Distributed Transceiver Design and Power Control for Wireless MIMO Interference Networks, IEEE Transactions on Wireless Communications, 14:3, (1199-1212), Online publication date: 1-Mar-2015.
  75. Dytso A, Tuninetti D and Devroye N (2015). On the Two-User Interference Channel With Lack of Knowledge of the Interference Codebook at One Receiver, IEEE Transactions on Information Theory, 61:3, (1257-1276), Online publication date: 1-Mar-2015.
  76. Mondelli M, Hassani S, Sason I and Urbanke R (2015). Achieving Marton’s Region for Broadcast Channels Using Polar Codes, IEEE Transactions on Information Theory, 61:2, (783-800), Online publication date: 1-Feb-2015.
  77. Park S, Simeone O, Sahin O and Shamai Shitz S (2014). Multi-layer transmission and hybrid relaying for relay channels with multiple out-of-band relays, Transactions on Emerging Telecommunications Technologies, 25:9, (895-904), Online publication date: 1-Sep-2014.
  78. ACM
    Feinerman O, Haeupler B and Korman A Breathe before speaking Proceedings of the 2014 ACM symposium on Principles of distributed computing, (114-123)
  79. Renes J, Renner R and Sutter D Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization Part I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 8269, (194-213)
  80. Raginsky M and Sason I (2013). Concentration of Measure Inequalities in Information Theory, Communications, and Coding, Foundations and Trends in Communications and Information Theory, 10:1-2, (1-247), Online publication date: 23-Oct-2013.
  81. Chaaban A, Sezgin A and Tuninetti D Achieving net feedback gain in the linear-deterministic butterfly network with a full-duplex relay Information Theory, Combinatorics, and Search Theory, (167-208)
  82. Xu S and Wilde M (2013). Sequential, successive, and simultaneous decoders for entanglement-assisted classical communication, Quantum Information Processing, 12:1, (641-683), Online publication date: 1-Jan-2013.
  83. Sadeghi P, Arbabjolfaei F and Kim Y Distributed index coding 2016 IEEE Information Theory Workshop (ITW), (330-334)
  84. Leinonen M, Codreanu M, Juntti M and Kramer G Rate-distortion lower bound for compressed sensing via conditional remote source coding 2016 IEEE Information Theory Workshop (ITW), (275-279)
  85. Bjelakovic I, Mohammadi J and Stańczak S Strong secrecy and stealth for broadcast channels with confidential messages 2016 IEEE International Symposium on Information Theory (ISIT), (2809-2813)
  86. Nafea M and Yener A A new wiretap channel model and its strong secrecy capacity 2016 IEEE International Symposium on Information Theory (ISIT), (2804-2808)
  87. Majhi S and Mitran P On the capacity of a class of dual-band interference channels 2016 IEEE International Symposium on Information Theory (ISIT), (2759-2763)
  88. Zhou L, Tan V and Motani M Second-order coding region for the discrete successive refinement source coding problem 2016 IEEE International Symposium on Information Theory (ISIT), (2414-2418)
  89. Sharifi S, Dabirnia M, Tanc A and Duman T Short block length code design for interference channels 2016 IEEE International Symposium on Information Theory (ISIT), (1909-1913)
  90. Akyol E, Langbort C and Başar T On the role of side information in strategic communication 2016 IEEE International Symposium on Information Theory (ISIT), (1626-1630)
  91. Shahi S, Tuninetti D and Devroye N On the capacity of strong asynchronous multiple access channels with a large number of users 2016 IEEE International Symposium on Information Theory (ISIT), (1486-1490)
  92. Stotz D, Jafar S, Bölcskei H and Shamai S Canonical conditions for K/2 degrees of freedom 2016 IEEE International Symposium on Information Theory (ISIT), (1292-1296)
  93. Zhu Y and Shen C On layered erasure interference channels without CSI at transmitters 2016 IEEE International Symposium on Information Theory (ISIT), (710-714)
  94. Asadi B, Ong L and Johnson S A unified inner bound for the two-receiver memoryless broadcast channel with channel state and message side information 2016 IEEE International Symposium on Information Theory (ISIT), (175-179)
  95. Abotabl A and Nosratinia A Bit-additive superposition coding for the bandwidth limited broadcast channel 2016 IEEE International Symposium on Information Theory (ISIT), (165-169)
  96. Yang Y, Grover P and Kar S Coding for lossy function computation: Analyzing sequential function computation with distortion accumulation 2016 IEEE International Symposium on Information Theory (ISIT), (140-144)
  97. Lin P, Jorswieck E, Schaefer R, Janda C and Mittelbach M Degradedness and stochastic orders of fast fading Gaussian broadcast channels with statistical channel state information at the transmitter 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), (3846-3850)
  98. Aguerri I and Zaidi A Partial compute-compress-and-forward for limited backhaul uplink multicell processing 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (1264-1271)
  99. Yang Y, Grover P and Kar S Information dissipation in noiseless lossy in-network function computation 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton), (445-452)
Contributors

Reviews

Klaus Galensa

Information theory provides a quantitative measure of the information contained in message signals, and allows us to determine the maximum capability of a system to transfer information from the source to the destination. In classical information theory, the system is simply a one-way point-to-point communication channel. Network information theory extends the classical theory from a simple channel to general networks with various sources and destinations and shared resources. Some of the techniques developed in network information theory, like network coding, multiple description coding, and successive cancellation decoding, can be found in real network implementations. This book is divided into 24 chapters. After a very brief introduction, chapters 2 and 3 present background on the information theory used throughout the book, particularly differential entropy and mutual information. The next 11 chapters discuss networks with single-round one-way communication, where each node is either a sender or a receiver. This section starts with a discussion of independent messages over noisy channels in many-to-one and one-to-many communication; continues with a review of multiple, interfering one-to-one communication and multiple-input multiple-output (MIMO) systems; and concludes with a description of correlated sources. The next six chapters deal with multi-hop networks, again beginning with independent messages and continuing to correlated sources. The final four chapters present some extensions of the theory. Of particular practical interest is the treatment of wireless fading channels in chapter 23, because wireless channels are time varying, not time invariant, due to multiple signal paths and user mobility. The wireless fading channel model captures these effects very well. Each chapter concludes with a summary, which is basically a table of contents, bibliographic notes, several exercises (solutions aren't provided), and occasionally an appendix with proofs of lemmas and propositions. As might be expected, the mathematics is sometimes heavy, but at least not obscure. The illustrations are very helpful. The authors cover an impressively large part of information theory; furthermore, they make it accessible. I do not know of any other book on the subject that contains so many topics of practical relevance to communication engineers. I therefore recommend the book to all students, researchers, and practitioners working in the field of communication. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations

Skip Bibliometrics Section