Post Shannon Theory

Vortragende/r (Mitwirkende/r)
Umfang4 SWS
SemesterSommersemester 2023
Stellung in StudienplänenSiehe TUMonline
TermineSiehe TUMonline



After successful completion of the module, students will be able to apply mathematical and conceptual methods to deal with post-Shannon communication models. They can analyse communication scenarios and develop coding sets as well as general and specific strategies.


Nowadays, machine-to-machine communication and machine-to-human communication are essential components of the 5th mobile generation. In order to realize these high demanding applications, the necessary latency resilience and data security requirements must be embedded in the physical domain. Many of these applications are implemented in the sense of the Shannon transfer schemes. For this type of communication, the recipient must be able to decode all messages of the sender. The corresponding communication task is inefficient in many cases. In contrast, new communication models can lead to significant performance increases. An example is the identification scheme of Ahlswede and Dueck when it is suitable for the aforementioned applications. In this scenario, the recipient only wants to decide whether the transmitter has sent a relevant message or not. Of course, the station has no prior information about the news that the recipient keeps important. The relevance of certain messages for the receiver can be changed during the application.

Inhaltliche Voraussetzungen

Interest in mathematical modelling and basic knowledge of information theory.