Consider the following network communication setup, originating in a sensor networking application we refer to as the "sensor reachback" problem. We have a directed graph G = (V, E), where V = {v(0)v(1)...v(...
详细信息
Consider the following network communication setup, originating in a sensor networking application we refer to as the "sensor reachback" problem. We have a directed graph G = (V, E), where V = {v(0)v(1)...v(n)} and E subset of V x V. If (v(i), v(j)) is an element of E, then node i can send messages to node j over a discrete memoryless channel (DMC) (X-ij, p(ij)(y vertical bar X), Y-ij), of capacity C-ij. The channels are independent. Each node v(i) gets to observe a source of information U-i(i = 0...M), with joint distribution p(U0U1...U-M). Our goal is to solve an incast problem in G: nodes exchange messages with their neighbors, and after a finite number of communication rounds, one of the M + 1 nodes (v(0) by convention) must have received enough information to reproduce the entire field of observations (U0U1...U-M), with arbitrarily small probability of error. In this paper, we prove that such perfect reconstruction is possible if and only if H(U-S vertical bar U-Sc) < Sigma(i is an element of S,j is an element of Sc) C-ij for all S subset of {0...M}, S not equal circle divide, 0 is an element of S-c. Our main finding is that in this setup;a general source/channel separation theorem holds, and that Shannon information behaves as a classical network flow, identical in nature to the flow of water in pipes. At first glance, it might seem surprising that separation holds in a fairly general network situation like the one we study. A. closer look, however, reveals that the reason for this is that our model allows only for independent point-to-point channels between pairs of nodes, and not multiple-access and/or broadcast channels, for which separation is well known not to hold. This "information as flow" view provides an algorithmic interpretation for our results, among which perhaps the most important one is the optimality of implementing codes using a layered protocol stack.
暂无评论