Professional Documents
Culture Documents
Communicafionr. Urbana, IL: Univ. of Illinois, 1949. 1’71 J. B. Anderson and S. Mohan, “A systematic analysis of cost for
I121 T. Berger, Rate Disfortion Theoty. Englewood Cliffs, NJ: Pren- sequential coding alaorithms,” Commun. Res. Lab.. Facultv of
tice-Hall, 1971. En&, McMaster-Univ., Hamilton, ON, Canada, Tech. Rep.-No. .,
I131 R. E. Blahut, “Computation of channel capacity and rate-distor- CRL-56, July 1978.
tion functions,” IEEE Trans. Inform. Theory, vol. IT-18, pp. I181 J. B. Anderson, “Algorithms for tree coding with a fidelity criter-
460-473, July 1972. ion,” Ph.D. dissertation, School of Elec. Eng., Cornell Univ.,
[I41 W . A. Finamore, “Optimal encoding of continuous-amplitude Ithaca, NY, May 1972.
sources with constrained size output alphabet,” Ph.D. dissertation, 1191 T. Berger, F. Jelinek, and J. K. Wolf, “Permutation codes for
Dep. Elec. Comput. Eng., Univ. Wisconsin-Madison, Madison, sources,” IEEE Trans. Inform. Theoty, vol. IT-18, pp. 160-169,
W I, May 1978. Jan. 1972.
iI51 A. J. Viterbi and J. K. Omura, “Trellis encoding of memoryless 1201Y. Linde and R. M. Gray, “A fake process approach to data
discrete-time sources with a fidelity criterion,” IEEE Trans. In- compression,” IEEE Trans. Comm., vol. COM-26, pp. 840-847,
form. Theory, vol. IT-20, pp. 325-332, May 1974. June, 1978.
1161 C. R. Davis and M. E. Hellman, “On tree coding with a fidelity Pll F. Jelinek and J. B. Anderson, “Instrumentable tree encoding of
criterion,” IEEE Trans. Inform. Theory, vol. IT-21, pp. 373-378, information sources,” IEEE Trans. Inform. Theory, vol. IT-17, pp.
July 1975. 118-l 19. Jan. 1971.
Absttzzct-A unified approach to muhitermlnal source codll problem fied sources from the codewords it has received. A prob-
not lnvolvlng rate4Jistortlon theory is presented. It is shown that, for
determlnlng the achievable rate region, attention may be restricted to
lem of primary interest is to determine the achievable rate
source networks of a relatively simple structure. A product space char- region, i.e., those rates of the individual encoders for
acterization of the achievable rate region pinpoints the mathematical which the reproduction requirements can be met. These
problem to be solved for getting a single letter characterization. The m u ltiterminal source coding problems are substantially
complex&y of this problem depends on a structural condltiou, viz., the more difficult than the standard textbook material ‘con-
number of encoders of a certain kind in the source network. Tbls approach
cerning the encoding of a single source. An essential
yields all the known slugle-letter cbaracterizatious of achievable rate
regions and a number of new ones for more complex networks. As a feature is that the answer cannot be given in terms of the
digression, for a class of source networks including that of Slepiau and individual sources only; rather, it strongly depends on the
Wolf, exponential error bounds are derived which are attainable by unlver- joint statistics of the sources, which are assumed to be
sal codes. These huunds are tight lu a neighborhood of the boundary of the known.
achievable rate region. The first m a jor contribution to m u ltiterminal source
coding was the paper of Slepian and W o lf [l]. They
I. INTRODUCTION
considered the case when each source is connected to a
separate encoder, and these encoders are connected to a
ANY COMMUNICATION situations can be single destination which must be able to reproduce all the
M m o d e led by a graph (or network) having informa-
tion sources, encoders, and destinations located at its
sources with a small probability of error. They derived the
surprising result that the sum of the rates of the individual
vertices. Each encoder operates on messages from the encoders can be m a d e as small as the rate of a common
sources connected to it, and the resulting codeword is encoder connected with all sources, i.e., as small as the
m a d e available (without noise) to all destinations to which joint entropy of these sources. M u ltiterminal source
the encoder is connected. Each destination must be able coding theory has been further developed by Wyner and
to reproduce accurately the messagesfrom certain speci- Z iv [2], Ahlswede and Kiirner [3], Wyner [4], Cover [5],.
and quite a few others, cf. the surveys by Korner [6],
Manuscript received January 19, 1979. This paper was presented at the Berger [7], and G e lfand and Prelov 181.
Czech-Hungarian-Soviet Seminar on Information Theory, Tsahkadsor, Most of the presently known m u ltiterminal source
Armenian SSR, USSR, September 1978, and at the IEEE International coding theorems have been obtained by rather similar
Symposium on Information Theory, Grignano, Italy, June 25-29, 1979.
The authors are with the Mathematical Institute of the Hungarian methods. This suggeststhat a general theory should exist
Academy of Sciences, H-1053 Budapest, Realtanoda u. 13-15, Hungary. containing them as special cases.One aim of this paper is
inequalities (1) for every c E 6?, lZ c 5, are achievable rate where zs={??b}bES runs over all IS I-tuples of RV’s with
vectors. This can be done easily by the random partition values in xb, b E 5, and Itl+ e max(t,O).
method of Cover [5]. We omit the details as we shall prove
a stronger result in Theorem 2 (cf. the remark following Remark: One immediately sees that the exponents
that theorem). E,(R,XS ) are all positive whenever X, satisfies the condi-
tions (1)’with strict inequalities for every c E e, l? c 5,.
We now derive universally attainable exponential error Thus the codes of Theorem 2, which are independent of
bounds for NSN’s without helpers. These results will not the source statistics, yield exponentially small error proba-
be needed in further sections. For the case I@I = 2 the bilities whenever R is an inner point of the achievable rate
results below were obtained jointly with K. Marton. Par- region of the source network with the particular X,.
tial results for that case (with nonuniversal decoding) had
been derived earlier by Gallager [ 1l] and KoSelev [12]. Consider the family ‘% of of all 1%I-tuples of
Proof
Universally attainable error exponents in channel coding mappingsf=ifb)bEB where fb: %~+-Gx, for some fixed
have been given by Csiszar, Korner, and Marton [13], cf. sets 9Rb satisfying
also Csiszar and Korner [14].
We need some notation. For any pair of Rys ? and Y
with values in the same finite set 9, let D( Y II Y) be the
informational divergence of their distributions, i.e., ForeveryfE%andsets0#CcSc% let G(S,C,f)be
Pr{ ?=r} the set of those 1%(-tuples U= { ?i?b} bEJ of k-length
D( YII P) A x Pr{ f=y}log sequences XbE 3Eg for which the ME decoder correspond-
Pr{ Y=y} ’
YEY
ing to the Cartesian product of the mappings f,, bES,
For any k-length sequence YE qk let q,-(y) denote the yields a correct reproduction of the sequences Xb if b E
relative frequency of the symbol y in this sequence. The S\C but not if bEC.
distribution P7 A { PY_(y)}YEq is the type of J. The entropy Let $? be the set of those distributions on 96%which are
of the sequencejj is defined as the entropy of its type, i.e., possible types of sequences U E %$. For every P E 9, let
Tp denote the set of U of type P. Since clearly
H(j) A H(Pj).
A minimum entropy (ME) decoder corresponding to a
19 I< (k+ l)‘%‘, (5)
mapping f: qk --+a is a mapping ‘p: %-+qk such that it follows from Lemma A of the Appendix that for
sufficiently large k
=yiff(y)=mandH(y)<H(.?‘)
o(m) whenever f( j7) = m for f #j,
1 is arbitrary if there is no such YE ‘?Jk.
For NSN’s without helpers, we shall consider codes with
.exp( k( b~~R,-H(P,)+H(P,“))) <l,
ME decoders. These codes are determined by the en-
coders fb: %~--+9?& b E %I, letting ‘p, be an ME decoder
corresponding to the Cartesian product fsc: g, + where P, is the marginal distribution of P on !?&
XbE5, ?&, of the mappings fb, b E S,, for every output = x xb. This implies the existence of an f E 9 such
CEt?. thabt?& every P E 9 and every 0# C c 5 c 91 we have
Theorem 2: Given the set xb, b E ‘% , and any S > 0,
for sufficiently large k (depending only on the sizes I’%,] IqwLf)r--lET,I
Rb-H(-?,.#s,I?) ,
and S) to every vector R = { Rb} bEb with nonnegative ITPI
Using (9) and Fano’s inequality the last term is lower i-length block code for S with rates
bounded by
Y, p X,“, if bBX,
if bEX,
fb(Xt37
Y,+ 42 x;, if bEXn&. It follows that for some ZE!?&” we have e.., ;<elel08 for
Let $ be the NSN without helpers uniquely defined by
lx
every c E e. This completes the proof of our ilaim con-
thi assignment.
this cerning (11).
W e claim that if a vector 2,
R, with components ib,
Now the direct part of the theorem will follow if we
show that whenever E satisfies the inequality of the state-
b E 3, and %+, b E X n & isanachieva
bE%,andi?b+,bEXn& is an achievable rate vector for ment of the theorem then
$ then ,
R, g
$%, if b@Xn&,
(11)
kb+ = nRb - H( fb(X:)),
if bEYC,
if b@X,
_ if b E X n & ,
(13)
;( ib + ib+), if bEXn&,
defines an achievable rate vector d for 5. Notice that $ is
defines an achievable rate vector i k { Rb} bEb for S . an NSN without helpers for which the set of intermediate
TO, see this, observe first that every I-length block code vertices connected with an output vertex c E e is S, u &:,
for S gives rise to an In-length block code with at most where
the same error probabilities for S ; further, the rates of
this code for S are related to the rates of the code for S G: b {b+; bE&,nX},
asin(ll).Infact,theencodersf?,,b_E%,and~~+,bEXf Further, the outputs of 5 not belonging to e are in
G , of any I-length block code for S define m a p p ings Fb one-to-one correspondence with the elements of X, each
resp. Fb+ with d o m a in Xk such that being connecte$only with the corresponding b E x. Thus
I;,+(X’“) =fb+( Y;+). by Theorem 1 R is an achievable rate vector for $, if
&ix”) =fb( ybl)p
Consider the m a p p ings Fb, b 6 % n G , resp. the pairs &, 2 H( y,,), bEX, (14)
(Fb,Fb+), b EX n G , as encoders of an In-length block
and
code for S. Every decoder I$~ of the code for S which
corresponds to an output vertex c E e has a range defined x ‘b+ x kb+ >H(Y,Y,+IYS,\e,Y,:,,+) (15)
as a Cartesian product containing all the sets % F , b E F,, bEf? b+EfZ.+
as components. Thus one can define the corresponding for every C c S, \X, C+ c G : such that C u C+ is disjoint
decoders of the code for S by projecting the value of @c from every S, u G : properly contained in S, u &: . Since
on % tc. Clearly the code obtained in this manner for the S,\X=&,\X and S,u&~cS,u&,+ if and only if S,
source network S d_oeshave the announced properties. c S,, the inequalities (14) and (15) follow from (6), (7),
This proves that if R” is an achievable rate vector for 5 and (13) by the definition of the RV’s Y, and Y,+.
and E is defined by (1 l), then to every e > 0, 6 > 0, and Notice that Definition 4 of the achievable rate region
sufficiently large integral m u ltiple k^= In of n there exists a represents a “pessimistic” viewpoint. Instead of postulat-
162 IEEE TRANSACTIONS
ON INFORMATIONTHEORY,VOL. 1~26, NO. 2, MARCH 1980
ing the existence of good codes for every sufficiently large Clearly, if this problem could be solved for every
k, an optimist would already call an F an achievable rate DMMS, then Theorem 5 would yield a single-letter char-
vector if to every E> 0 and 6 > 0 there exists a k-length acterization of the achievable rate region of every NSN
block code (for just one k) satisfying the inequalities of with one helper. More generally, the same is true for
Definition 4. This alternative definition is quite common NSN’s with any number of helpers provided that no
in the literature. output is connected with two helpers and no helper is
An equivalent way of formulating the “optimistic” defi- connected with two outputs.
nition is to say that E is an achievable rate vector if for Similarly, one could formulate an r-parameter entropy
some sequence of positive integers k, there exist k,-length characterization problem, the solution of which would yield
block codes of rates converging to the components of R a single-letter characterization of the achievable rate re-
and error probabilities converging to zero. The point is gion of every NSN with r helpers. Unfortunately, even the
that here k,, may be any sequence, for example, even two-parameter entropy characterization problem is be-
k,+,/k,+w is possible. yond the reach of our present methods. In particular, it
Corollary: For every source network the optimistic and seems already very hard to give a computable characteri-
pessimistic definitions lead to the same achievable rate zation of the set of all three-dimensional vectors
region.
f ~(X”lf(X”)), ; NY7 g( Y”)),
Proof: As in the reduction of the problem of de- (
termining achievable rate regions to the special case of
NSN’s, one sees that it is enough to prove the theorem for ; H(Z”lf(X”M Y ”)))
normal source networks. Thus it suffices to prove that
Theorem 5 holds also with the optimistic definition of the for a D M M S with generic variables X, Y, Z. Such a
achievable rate region. As the optimist’s rate region could characterization would lead to that of the achievable rate
only be larger, the statement follows since the proof of the region of the “two-help-one” source network of Fig. 3; the
converse part of Theorem 5 applies literally to the “opti- difficulties of the latter problem are discussed in Korner
m istic” case. and Marton [16], cf. also Csiszar and KSrner [14].
While we believe that entropy characterization prob-
VI. THE ENTROPY CHARACTERIZATION PROBLEM lems are the mathematical core of source network theory,
it is not the aim of this paper to enter into them in detail.
Because of Theorem 5, to give a single-letter characteri- We lim it ourselves to illustrating the power of our ap-
zation of the achievable rate region of an NSN it is proach by showing (in the next section) that even the
sufficient to characterize the range of certain vectors of presently available partial results on the one-parameter
information quantities involving as many arbitrary func- entropy characterization problem yield the achievable rate
tions as there are helpers in this NSN. region of quite a few source networks. For this purpose we
In particular, in the case of one helper, it suffices to now state without proof two results from Csiszar and
determine the set of all possible vectors of form Kiirner [14] which were obtained jointly with K. Marton.
The first one is the solution of the one-parameter entropy
characterization problem for D M M S ’s with three compo-
nents. The second result, a slight generalization of the
first, is a partial result on the same problem for D M M S ’s
Here n ranges over the positive integers and f ranges over with four components.
functions with domain Fb,, where b, is the helper. In fact
the information quantities figuring in (6) and (7) for Theorem 6: Given a D M M S with generic variables X,
X = {b,} can be immediately expressed in terms of the Y, 2, the closure of the set of all vectors of the form
components of such a vector and the known joint entro-
pies of the generic variables X,, b E ‘33. Since the RV’s X,, (+wlf(X”))>; w~nlf(x"))?~ H(z"lfW)),
J c $i3 can be considered as the generic variables of a new
DMMS, it will be convenient to formulate the following. (with arbitrary positive integer n and function f) consists
One-Parameter Entropy Characterization Problem: For of the vectors (a, b, c) satisfying
an arbitrary D M M S with generic variables Y, taking
values in finite sets % ,, a E @ , give a single-letter char- max[I(X/\YlU),I(X/\ZIU)]+t<a<H(XIU)+t
acterization of the set of all J&]-dimensional vectors of the b=H(Y(U)+t, c=H(Z(U)+t
form
for some RV U and nonnegative number t where
i) the range % of U satisfies 1% I < 1% I + 2,
ii) the RV’s U, X, YZ form a Markov chain in this
where n=1,2;-. and f ranges over functions with order, and
domain 9:,, a, being some fixed element of 8. iii) 0 < t < m in[1( U/\ Y), I( U/\ Z)].
CSISZuiR AND KiiRNER: GENERAL THE?ORY OF SOURCE NETWORKS 163
mapping f satisfy
R,=(YIX),
Rx + R, > H(XY),
Fig. 7. Source network and corresponding NSN.
R, 2 $ H(Z”(f(X”)).