Post Shannon Theory

Module Number: EIneu

Duration: 1 semester

Occurence: Summer Semester

Language: English

Number of ECTS: 5


Lecturer: Dr. Christian Deppe

Amount of work

Contact hours: 60

Self-study hours: 90

Total: 150

Description of achievement and assessment methods

The module performance will take the form of a 30-minute oral examination. In this, it should be demonstrated that the fundamental conceptual and mathematical connections of the post-Shannon theoretical description of communication systems have been understood. In addition, the exemplarily treated communication scenarios, such as the identification of messages, should be known so that a reflective consideration is possible in the examination discussion.
No further aids are permitted for the examination.

Prerequisites (recommended)

Interest in mathematical modelling and
basic knowledge of information theory.

Combinations of this module with the completion of one of the following modules are recommended:
"EI7431 - Information Theory",
"EI7344 - Information Theory Principles of Information Forensics and Biometric Security",
"EI7345 - Information Theoretical Security",
"EI7353 - Multi-User Information Theory"


Nowadays, machine-to-machine communication and machine-to-human communication are essential components of the 5th mobile generation. In order to realize these high demanding applications, the necessary latency resilience and data security requirements must be embedded in the physical domain.
Many of these applications are implemented in the sense of the Shannon transfer schemes. For this type of communication, the recipient must be able to decode all messages of the sender. The corresponding communication task is inefficient in many cases.
In contrast, new communication models can lead to significant performance increases. An example is the identification scheme of Ahlswede and Dueck when it is suitable for the aforementioned applications. In this scenario, the recipient only wants to decide whether the transmitter has sent a relevant message or not. Of course, the station has no prior information about the news that the recipient keeps important. The relevance of certain messages for the receiver can be changed during the application.

Intended Learning Outcomes

After successful completion of the module, students will be able to apply mathematical and conceptual methods to deal with post-Shannon communication models.
They can analyse communication scenarios and develop coding sets as well as general and specific strategies.

Teaching and Learning Methods

In the lecture, the mathematical and theoretical methods for the treatment of Post Shannon models are explained on the basis of a table lecture and proved fundamental coding rates.

In the exercises, exercises are solved independently and under the guidance of the assistant. In it, the learned evidence strategies should proof and derivation
from coding sets for special communication scenarios.


Blackboard lecture, beamer lecture, exercises.

Reading List

Ahlswede, Alexander; Althöfer, Ingo; Deppe, Christian; Tamm, Ulrich (Eds.),
Identification and Other Probabilistic Models
Rudolf Ahlswede's Lectures on Information Theory 6,
Series: Foundations in Signal Processing, Communications and Networking, Vol. 16
1st Edition, 2021.

Cabrera J.; Boche H.; Deppe C.; Schaefer R.F.; Scheunert C.; Fitzek F.H.P.: 6G and the Post-Shannon-Theory. In: Emmanuel Bertin, Noel Crespi, Thomas Magedanz (Hrsg.): Shaping Future 6g Networks: Needs, Impacts and Technologies. Wiley-Blackwell, 2021.