-
Capacity Bounds for Broadcast Channels with Bidirectional Conferencing Decoders
Authors:
Reza K. Farsani,
Wei Yu
Abstract:
The two-user broadcast channel (BC) with receivers connected by bidirectional cooperation links of finite capacities, known as conferencing decoders, is considered. A novel capacity region outer bound is established based on multiple applications of the Csiszár-Körner identity. Achievable rate regions are derived by using Marton's coding as the transmission scheme, together with different combinat…
▽ More
The two-user broadcast channel (BC) with receivers connected by bidirectional cooperation links of finite capacities, known as conferencing decoders, is considered. A novel capacity region outer bound is established based on multiple applications of the Csiszár-Körner identity. Achievable rate regions are derived by using Marton's coding as the transmission scheme, together with different combinations of decode-and-forward and quantize-bin-and-forward strategies at the receivers. It is shown that the outer bound coincides with the achievable rate region for a new class of semi-deterministic BCs with degraded message sets; for this class of channels, one-round cooperation is sufficient to achieve the capacity. Capacity result is also derived for a class of more capable semi-deterministic BCs with both common and private messages and one-sided conferencing. For the Gaussian BC with conferencing decoders, if the noises at the decoders are perfectly correlated (i.e., the correlation is either 1 or -1), the new outer bound yields exact capacity region for two cases: i) BC with degraded message sets; ii) BC with one-sided conferencing from the weaker receiver to the stronger receiver. When the noises have arbitrary correlation, the outer bound is shown to be within half a bit from the capacity region for these same two cases. Finally, for the general Gaussian BC, a one-sided cooperation scheme based on decode-and-forward from the stronger receiver to the weaker receiver is shown to achieve the capacity region to within $\frac{1}{2}\log (\frac{2}{1-|λ|})$ bits, where $λ$ is the noise correlation. An interesting implication of these results is that for a Gaussian BC with perfectly negatively correlated noises and conferencing decoders with finite cooperation link capacities, it is possible to achieve a strictly positive rate using only infinitesimal amount of transmit power.
△ Less
Submitted 13 March, 2025; v1 submitted 28 June, 2024;
originally announced June 2024.
-
Capacity Limits of Full-Duplex Cellular Network
Authors:
Kaiming Shen,
Reza K. Farsani,
Wei Yu
Abstract:
This paper aims to characterize the capacity limits of a wireless cellular network with a full-duplex (FD) base-station (BS) and half-duplex user terminals, in which three independent messages are communicated: the uplink message $m_1$ from the uplink user to the BS, the downlink message $m_2$ from the BS to the downlink user, and the device-to-device (D2D) message $m_3$ from the uplink user to th…
▽ More
This paper aims to characterize the capacity limits of a wireless cellular network with a full-duplex (FD) base-station (BS) and half-duplex user terminals, in which three independent messages are communicated: the uplink message $m_1$ from the uplink user to the BS, the downlink message $m_2$ from the BS to the downlink user, and the device-to-device (D2D) message $m_3$ from the uplink user to the downlink user. From an information theoretical perspective, the overall network can be viewed as a generalization of the FD relay broadcast channel with a side message transmitted from the relay to the destination. We begin with a simpler case that involves the uplink and downlink transmissions of $(m_1,m_2)$ only, and propose an achievable rate region based on a novel strategy that uses the BS as a FD relay to facilitate the interference cancellation at the downlink user. We also prove a new converse, which is strictly tighter than the cut-set bound, and characterize the capacity region of the scalar Gaussian FD network without a D2D message to within a constant gap. This paper further studies a general setup wherein $(m_1,m_2,m_3)$ are communicated simultaneously. To account for the D2D message, we incorporate Marton's broadcast coding into the previous scheme to obtain a larger achievable rate region than the existing ones in the literature. We also improve the cut-set bound by means of genie and show that by using one of the two simple rate-splitting schemes, the capacity region of the scalar Gaussian FD network with a D2D message can already be reached to within a constant gap. Finally, a generalization to the vector Gaussian channel case is discussed. Simulation results demonstrate the advantage of using the BS as relay in enhancing the throughput of the FD cellular network.
△ Less
Submitted 7 December, 2020; v1 submitted 2 May, 2019;
originally announced May 2019.
-
Novel Techniques to Derive Capacity Results for Multi-User Interference Channels
Authors:
Reza K. Farsani,
Amir K. Khandani
Abstract:
The Interference Channels (ICs) represent fundamental building blocks of wireless communication networks. Despite considerable progress in network information theory, available capacity results for ICs, specifically those with more than two users, are still very limited. One of the main difficulties in the analysis of these networks is how to establish useful capacity outer bounds for them. In thi…
▽ More
The Interference Channels (ICs) represent fundamental building blocks of wireless communication networks. Despite considerable progress in network information theory, available capacity results for ICs, specifically those with more than two users, are still very limited. One of the main difficulties in the analysis of these networks is how to establish useful capacity outer bounds for them. In this paper, novel techniques requiring subtle sequential application of Csiszar-Korner identity are developed to establish efficient single-letter outer bounds on the sum-rate capacity of interference networks. By using the outer bounds, a full characterization of the sum-rate capacity is then derived for various multi-user ICs under specific conditions. Our capacity results hold for both discrete and Gaussian networks.
△ Less
Submitted 19 February, 2017;
originally announced February 2017.
-
Novel Outer Bounds and Capacity Results for the Interference Channel with Conferencing Receivers
Authors:
Reza K. Farsani,
Amir K. Khandani
Abstract:
In this paper, capacity bounds for the two-user Interference Channel (IC) with cooperative receivers via conferencing links of finite capacities is investigated. The capacity results known for this communication scenario are limited to a very few special cases of the one-sided IC. One of the major challenges in analyzing such cooperative networks is how to establish efficient capacity outer bounds…
▽ More
In this paper, capacity bounds for the two-user Interference Channel (IC) with cooperative receivers via conferencing links of finite capacities is investigated. The capacity results known for this communication scenario are limited to a very few special cases of the one-sided IC. One of the major challenges in analyzing such cooperative networks is how to establish efficient capacity outer bounds for them. In this paper, by applying new techniques, novel capacity outer bounds are presented for the ICs with conferencing users. Using the outer bounds, several new capacity results are proved for interesting channels with unidirectional cooperation in strong and mixed interference regimes. A fact is that the conferencing link (between receivers) may be utilized to provide one receiver with information about its corresponding signal or its non-corresponding signal (interference signal). As a remarkable consequence, it is demonstrated that both strategies can be helpful to achieve the capacity of the channel. Finally, for the case of Gaussian IC, it is mathematically shown that our outer bound is strictly tighter than the previous one derived by Wang and Tse.
△ Less
Submitted 16 December, 2015;
originally announced December 2015.
-
Capacity Bounds for Wireless Ergodic Fading Broadcast Channels with Partial CSIT
Authors:
Reza K. Farsani
Abstract:
The two-user wireless ergodic fading Broadcast Channel (BC) with partial Channel State Information at the Transmitter (CSIT) is considered. The CSIT is given by an arbitrary deterministic function of the channel state. This characteristic yields a full control over how much state information is available, from perfect to no information. In literature, capacity derivations for wireless ergodic fadi…
▽ More
The two-user wireless ergodic fading Broadcast Channel (BC) with partial Channel State Information at the Transmitter (CSIT) is considered. The CSIT is given by an arbitrary deterministic function of the channel state. This characteristic yields a full control over how much state information is available, from perfect to no information. In literature, capacity derivations for wireless ergodic fading channels, specifically for fading BCs, mostly rely on the analysis of channels comprising of parallel sub-channels. This technique is usually suitable for the cases where perfect state information is available at the transmitters. In this paper, new arguments are proposed to directly derive (without resorting to the analysis of parallel channels) capacity bounds for the two-user fading BC with both common and private messages based on the existing bounds for the discrete channel. Specifically, a novel approach is developed to adapt and evaluate the well-known UV-outer bound for the Gaussian fading channel using the entropy power inequality. Our approach indeed sheds light on the role of broadcast auxiliaries in the fading channel. It is shown that the derived outer bound is optimal for the channel with perfect CSIT as well as for some special cases with partial CSIT. Our outer bound is also directly applicable to the case without CSIT which has been recently considered in several papers. Next, the approach is developed to analyze for the fading BC with secrecy. In the case of perfect CSIT, a full characterization of the secrecy capacity region is derived for the channel with common and confidential messages. This result completes a gap in a previous work by Ekrem and Ulukus. For the channel without common message, the secrecy capacity region is also derived when the transmitter has access only to the degradedness ordering of the channel.
△ Less
Submitted 22 February, 2013;
originally announced February 2013.
-
On the Capacity Region of the Two-User Interference Channel
Authors:
Reza K. Farsani
Abstract:
One of the key open problems in network information theory is to obtain the capacity region for the two-user Interference Channel (IC). In this paper, new results are derived for this channel. As a first result, a noisy interference regime is given for the general IC where the sum-rate capacity is achieved by treating interference as noise at the receivers. To obtain this result, a single-letter o…
▽ More
One of the key open problems in network information theory is to obtain the capacity region for the two-user Interference Channel (IC). In this paper, new results are derived for this channel. As a first result, a noisy interference regime is given for the general IC where the sum-rate capacity is achieved by treating interference as noise at the receivers. To obtain this result, a single-letter outer bound in terms of some auxiliary random variables is first established for the sum-rate capacity of the general IC and then those conditions under which this outer bound is reduced to the achievable sum-rate given by the simple treating interference as noise strategy are specified. The main benefit of this approach is that it is applicable for any two-user IC (potentially non-Gaussian). For the special case of Gaussian channel, our result is reduced to the noisy interference regime that was previously obtained. Next, some results are given on the Han-Kobayashi (HK) achievable rate region. The evaluation of this rate region is in general difficult. In this paper, a simple characterization of the HK rate region is derived for some special cases, specifically, for a novel very weak interference regime. As a remarkable characteristic, it is shown that for this very weak interference regime, the achievable sum-rate due to the HK region is identical to the one given by the simple treating interference as noise strategy.
△ Less
Submitted 7 February, 2013;
originally announced February 2013.
-
The Capacity Region of the Wireless Ergodic Fading Interference Channel with Partial CSIT to Within One Bit
Authors:
Reza K. Farsani
Abstract:
Fundamental capacity limits are studied for the two-user wireless ergodic fading IC with partial Channel State Information at the Transmitters (CSIT) where each transmitter is equipped with an arbitrary deterministic function of the channel state (this model yields a full control over how much state information is available). One of the main challenges in the analysis of fading networks, specifica…
▽ More
Fundamental capacity limits are studied for the two-user wireless ergodic fading IC with partial Channel State Information at the Transmitters (CSIT) where each transmitter is equipped with an arbitrary deterministic function of the channel state (this model yields a full control over how much state information is available). One of the main challenges in the analysis of fading networks, specifically multi-receiver networks including fading ICs, is to obtain efficient capacity outer bounds. In this paper, a novel capacity outer bound is established for the two-user ergodic fading IC. For this purpose, by a subtle combination of broadcast channel techniques (i.e., manipulating mutual information functions composed of vector random variables by Csiszar-Korner identity) and genie-aided techniques, first a single-letter outer bound characterized by mutual information functions including some auxiliary random variables is derived. Then, by novel arguments the derived bound is optimized over its auxiliaries only using the entropy power inequality. Besides being well-described, our outer bound is efficient from several aspects. Specifically, it is optimal for the fading IC with uniformly strong interference. Also, it is sum-rate optimal for the channel with uniformly mixed interference. More importantly, it is proved that when each transmitter has access to any amount of CSIT that includes the interference to noise ratio of its non-corresponding receiver, the outer bound differs by no more than one bit from the achievable rate region given by Han-Kobayashi scheme. This result is viewed as a natural generalization of the ETW to within one bit capacity result for the static channel to the wireless ergodic fading case.
△ Less
Submitted 14 February, 2013; v1 submitted 7 February, 2013;
originally announced February 2013.
-
Capacity Theorems for the Cognitive Radio Channel with Confidential Messages
Authors:
Reza K. Farsani,
Reza Ebrahimpour
Abstract:
As a brain inspired wireless communication scheme, cognitive radio is a novel approach to promote the efficient use of the scarce radio spectrum by allowing some users called cognitive users to access the under-utilized spectrum licensed out to the primary users. Besides highly reliable communication and efficient utilization of the radio spectrum, the security of information transmission against…
▽ More
As a brain inspired wireless communication scheme, cognitive radio is a novel approach to promote the efficient use of the scarce radio spectrum by allowing some users called cognitive users to access the under-utilized spectrum licensed out to the primary users. Besides highly reliable communication and efficient utilization of the radio spectrum, the security of information transmission against eavesdropping is critical in the cognitive radios for many potential applications. In this paper, this problem is investigated from an information theoretic viewpoint. Capacity limits are explored for the Cognitive Radio Channel (CRC) with confidential messages. As an idealized information theoretic model for the cognitive radio, this channel includes two transmitters which send independent messages to their corresponding receivers such that one transmitter, i.e., the cognitive transmitter, has access non-causally to the message of the other transmitter, i.e., the primary transmitter. The message designated to each receiver is required to be kept confidential with respect to the other receiver. The secrecy level for each message is evaluated using the equivocation rate. Novel inner and outer bounds for the capacity-equivocation region are established. It is shown that these bounds coincide for some special cases. Specifically, the capacity-equivocation region is derived for a class of less-noisy CRCs and also a class of semi-deterministic CRCs. For the case where only the message of the cognitive transmitter is required to be kept confidential, the capacity-equivocation region is also established for the Gaussian CRC with weak interference.
△ Less
Submitted 20 February, 2014; v1 submitted 20 July, 2012;
originally announced July 2012.
-
How Much Rate Splitting Is Required for a Random Coding Scheme? A new Achievable Rate Region for the Broadcast Channel with Cognitive Relays
Authors:
Reza K. Farsani
Abstract:
In this paper, it is shown that for any given single-hop communication network with two receivers, splitting messages into more than two sub-messages in a random coding scheme is redundant. To this end, the Broadcast Channel with Cognitive Relays (BCCR) is considered. A novel achievability scheme is designed for this network. Our achievability design is derived by a systematic combination of the b…
▽ More
In this paper, it is shown that for any given single-hop communication network with two receivers, splitting messages into more than two sub-messages in a random coding scheme is redundant. To this end, the Broadcast Channel with Cognitive Relays (BCCR) is considered. A novel achievability scheme is designed for this network. Our achievability design is derived by a systematic combination of the best known achievability schemes for the basic building blocks included in the network: the Han-Kobayashi scheme for the two-user interference channel and the Marton coding scheme for the broadcast channel. Meanwhile, in our scheme each private message is split into only two sub-messages which is identically exploited also in the Han-Kobayashi scheme. It is shown that the resultant achievable rate region includes previous results as well. More importantly, the procedure of the achievability design is described by graphical illustrations based on directed graphs. Then, it is argued that by extending the proposed scheme on the MACCM plan of messages, one can derive similar achievability schemes for any other single-hop communication network.
△ Less
Submitted 7 February, 2013; v1 submitted 12 July, 2012;
originally announced July 2012.
-
The K-User Interference Channel: Strong Interference Regime
Authors:
Reza K. Farsani
Abstract:
This paper gives a solution to one of the long-standing open problems in network information theory: "What is the generalization of the strong interference regime to the K-user interference channel?"
This paper gives a solution to one of the long-standing open problems in network information theory: "What is the generalization of the strong interference regime to the K-user interference channel?"
△ Less
Submitted 16 July, 2013; v1 submitted 12 July, 2012;
originally announced July 2012.
-
Fundamental Limits of Communications in Interference Networks-Part IV: Networks with a Sequence of Less-Noisy Receivers
Authors:
Reza K. Farsani
Abstract:
In this fourth part of our multi-part papers, classes of interference networks with a sequence of less-noisy receivers are identified for which a successive decoding scheme achieve the sum-rate capacity. First, the two-receiver networks are analyzed: it is demonstrated that the unified outer bounds derived in Part III of our multi-part papers are sum-rate optimal for network scenarios which satisf…
▽ More
In this fourth part of our multi-part papers, classes of interference networks with a sequence of less-noisy receivers are identified for which a successive decoding scheme achieve the sum-rate capacity. First, the two-receiver networks are analyzed: it is demonstrated that the unified outer bounds derived in Part III of our multi-part papers are sum-rate optimal for network scenarios which satisfy certain less-noisy conditions. Then, the multi-receiver networks are considered. These networks are far less understood. One of the main difficulties in the analysis of such scenarios is how to establish useful capacity outer bounds. In this paper, a novel technique requiring a sequential application of the Csiszar-Korner identity is developed to establish powerful single-letter outer bounds on the sum-rate capacity of multi-receiver interference networks which satisfy certain less-noisy conditions. By using these outer bounds, a full characterization of the sum-rate capacity is derived for general interference networks of arbitrary large sizes with a sequence of less-noisy receivers. Some generalizations of these outer bounds are also presented each of which is efficient to obtain the exact sum-rate capacity for various scenarios.
△ Less
Submitted 15 February, 2013; v1 submitted 12 July, 2012;
originally announced July 2012.
-
Fundamental Limits of Communications in Interference Networks-Part III: Information Flow in Strong Interference Regime
Authors:
Reza K. Farsani
Abstract:
This third part of the paper is related to the study of information flow in networks with strong interference. First, the two-receiver networks are considered. A unified outer bound for the capacity region of these networks is established. It is shown that this outer bound can be systematically translated into simple capacity outer bounds for special cases such as the two-user Classical Interferen…
▽ More
This third part of the paper is related to the study of information flow in networks with strong interference. First, the two-receiver networks are considered. A unified outer bound for the capacity region of these networks is established. It is shown that this outer bound can be systematically translated into simple capacity outer bounds for special cases such as the two-user Classical Interference Channel (CIC) and the Broadcast Channel with Cognitive Relays (BCCR) with common information. For these channels, special cases are presented where our outer bounds are tight, which yield the exact capacity. More importantly, by using the derived outer bounds, a strong interference regime is identified for the general two-receiver interference networks with any arbitrary topology. This strong interference regime, which is represented by only two conditions, includes all previously known results for simple topologies such as the two-user CIC, the cognitive radio channel, and many others. Then, networks with arbitrary number of receivers are considered. Finding non-trivial strong interference regime for such networks, specifically for the CICs with more than two users, has been one of the open problems in network information theory. In this paper, we will give a solution to this problem. Specifically, a new approach is developed based on which one can obtain strong interference regimes not only for the multi-user CICs but also for any interference network of arbitrary large sizes. For this development, some new technical lemmas are proved which have a central role in the derivations. As a result, this paper establishes the first non-trivial capacity result for the multi-user classical interference channel. A general formula is also presented to derive strong interference conditions for any given network topology.
△ Less
Submitted 15 February, 2013; v1 submitted 12 July, 2012;
originally announced July 2012.
-
Fundamental Limits of Communications in Interference Networks-Part II: Information Flow in Degraded Networks
Authors:
Reza K. Farsani
Abstract:
In this second part of our multi-part papers, the information flow in degraded interference networks is studied. A full characterization of the sum-rate capacity for the degraded networks with any possible configuration is established. It is shown that a successive decoding scheme is sum-rate optimal for these networks. Also, it is proved that the transmission of only a certain subset of messages…
▽ More
In this second part of our multi-part papers, the information flow in degraded interference networks is studied. A full characterization of the sum-rate capacity for the degraded networks with any possible configuration is established. It is shown that a successive decoding scheme is sum-rate optimal for these networks. Also, it is proved that the transmission of only a certain subset of messages is sufficient to achieve the sum-rate capacity in such networks. Algorithms are presented to determine this subset of messages explicitly. According to these algorithms, the optimal strategy to achieve the sum-rate capacity in degraded networks is that the transmitters try to send information for the stronger receivers and, if possible, avoid sending the messages with respect to the weaker receivers. The algorithms are easily understood using our graphical illustrations for the achievability schemes based on directed graphs. The sum-rate expression for the degraded networks is then used to derive a unified outer bound on the sum-rate capacity of arbitrary non-degraded networks. Several variations of the degraded networks are identified for which the derived outer bound is sum-rate optimal. Specifically, noisy interference regimes are derived for certain classes of multi-user/multi-message interference networks. Also, for the first time, network scenarios are identified where the incorporation of both successive decoding and treating interference as noise achieves their sum-rate capacity. Finally, by taking insight from our results for degraded networks, we establish a unified outer bound on the entire capacity region of the general interference networks. These outer bounds for a broad range of network scenarios are tighter than the existing cut-set bound.
△ Less
Submitted 15 February, 2013; v1 submitted 12 July, 2012;
originally announced July 2012.
-
Fundamental Limits of Communications in Interference Networks-Part I: Basic Structures
Authors:
Reza K. Farsani
Abstract:
In these series of multi-part papers, a systematic study of fundamental limits of communications in interference networks is established. Here, interference network is referred to as a general single-hop communication scenario with arbitrary number of transmitters and receivers, and also arbitrary distribution of messages among transmitters and receivers. It is shown that the information flow in s…
▽ More
In these series of multi-part papers, a systematic study of fundamental limits of communications in interference networks is established. Here, interference network is referred to as a general single-hop communication scenario with arbitrary number of transmitters and receivers, and also arbitrary distribution of messages among transmitters and receivers. It is shown that the information flow in such networks follows similar derivations from many aspects. This systematic study is launched by considering the basic building blocks in Part I. The Multiple Access Channel (MAC), the Broadcast Channel (BC), the Classical Interference Channel (CIC) and the Cognitive Radio Channel (CRC) are proposed as the main building blocks for all interference networks. First, a brief review of existing results regarding these basic structures is presented. New observations are also presented in this regard. Specifically, it is shown that the well-known strong interference conditions for the two-user CIC do not change if the inputs are dependent. Next, new capacity outer bounds are established for the basic structures with two receivers. These outer bounds are all derived based on a unified framework. By using the derived outer bounds, some new capacity results are proved for the CIC and the CRC; a mixed interference regime is identified for the two-user discrete CIC where the sum-rate capacity is established. Also, a noisy interference regime is derived for the one-sided discrete CIC. For the CRC, a full characterization of the capacity region for a class of more-capable channels is obtained. Moreover, it is shown that the derived outer bounds are useful to study the channels with one-sided receiver side information wherein one of the receivers has access to the non-intended message; capacity bounds are also discussed in details for such scenarios.
△ Less
Submitted 15 February, 2013; v1 submitted 12 July, 2012;
originally announced July 2012.
-
Interference Networks with General Message Sets: A Random Coding Scheme
Authors:
Reza K. Farsani,
Farokh Marvasti
Abstract:
In this paper, the Interference Network with General Message Sets (IN-GMS) is introduced in which several transmitters send messages to several receivers: Each subset of transmitters transmit an individual message to each subset of receivers. For such a general scenario, an achievability scheme is presented using the random coding. This scheme is systematically built based on the capacity achievin…
▽ More
In this paper, the Interference Network with General Message Sets (IN-GMS) is introduced in which several transmitters send messages to several receivers: Each subset of transmitters transmit an individual message to each subset of receivers. For such a general scenario, an achievability scheme is presented using the random coding. This scheme is systematically built based on the capacity achieving scheme for the Multiple Access Channel (MAC) with common message as well as the best known achievability scheme for the Broadcast Channel (BC) with common message. A graphical illustration of the random codebook construction procedure is also provided, by using which the achievability scheme is easily understood. Some benefits of the proposed achievability scheme are described. It is also shown that the resulting rate region is optimal for a class of orthogonal INs-GMS, which yields the capacity region. Finally, it is demonstrated that how this general achievability scheme can be used to derive capacity inner bounds for interference networks with different distribution of messages; in most cases, the proposed achievability scheme leads to the best known capacity inner bound for the underlying channel. Capacity inner bounds can also be derived for new communication scenarios.
△ Less
Submitted 10 July, 2011;
originally announced July 2011.
-
The Capacity Region of p-Transmitter/q-Receiver Multiple-Access Channels with Common Information
Authors:
Ali Haghi,
Reza K. Farsani,
Mohammad Reza Aref,
Farokh Marvasti
Abstract:
This paper investigates the capacity problem for some multiple-access scenarios with cooperative transmitters. First, a general Multiple-Access Channel (MAC) with common information, i.e., a scenario where p transmitters send private messages and also a common message to q receivers and each receiver decodes all of the messages, is considered. The capacity region of the discrete memoryless channel…
▽ More
This paper investigates the capacity problem for some multiple-access scenarios with cooperative transmitters. First, a general Multiple-Access Channel (MAC) with common information, i.e., a scenario where p transmitters send private messages and also a common message to q receivers and each receiver decodes all of the messages, is considered. The capacity region of the discrete memoryless channel is characterized. Then, the general Gaussian fading MAC with common information wherein partial Channel State Information (CSI) is available at the transmitters (CSIT) and perfect CSI is available at the receivers (CSIR) is investigated. A coding theorem is proved for this model that yields an exact characterization of the throughput capacity region. Finally, a two-transmitter/one-receiver Gaussian fading MAC with conferencing encoders with partial CSIT and perfect CSIR is studied and its capacity region is determined. For the Gaussian fading models with CSIR only (transmitters have no access to CSIT), some numerical examples and simulation results are provided for Rayleigh fading.
△ Less
Submitted 16 February, 2011;
originally announced February 2011.
-
Capacity Bounds for Multiuser Channels with Non-Causal Channel State Information at the Transmitters
Authors:
Reza K. Farsani,
Farokh Marvasti
Abstract:
In this paper, capacity inner and outer bounds are established for the multiuser channels with Channel State Information (CSI) known non-causally at the transmitters: The Multiple Access Channel (MAC), the Broadcast Channel (BC) with common information, and the Relay Channel (RC). For each channel, the actual capacity region is also derived in some special cases. Specifically, it is shown that for…
▽ More
In this paper, capacity inner and outer bounds are established for the multiuser channels with Channel State Information (CSI) known non-causally at the transmitters: The Multiple Access Channel (MAC), the Broadcast Channel (BC) with common information, and the Relay Channel (RC). For each channel, the actual capacity region is also derived in some special cases. Specifically, it is shown that for some deterministic models with non-causal CSI at the transmitters, similar to Costa's Gaussian channel, the availability of CSI at the deterministic receivers does not affect the capacity region.
△ Less
Submitted 17 May, 2011; v1 submitted 16 February, 2011;
originally announced February 2011.
-
Multiple Access Channels with Cooperative Encoders and Channel State Information
Authors:
Reza K. Farsani,
Farokh Marvasti
Abstract:
The two-user Multiple Access Channel (MAC) with cooperative encoders and Channel State Information (CSI) is considered where two different scenarios are investigated: A two-user MAC with common message (MACCM) and a two-user MAC with conferencing encoders (MACCE). For both situations, the two cases where the CSI is known to the encoders either non-causally or causally are studied. Achievable rate…
▽ More
The two-user Multiple Access Channel (MAC) with cooperative encoders and Channel State Information (CSI) is considered where two different scenarios are investigated: A two-user MAC with common message (MACCM) and a two-user MAC with conferencing encoders (MACCE). For both situations, the two cases where the CSI is known to the encoders either non-causally or causally are studied. Achievable rate regions are established for both discrete memoryless channels and Gaussian channels with additive interference. The achievable rate regions derived for the Gaussian models with additive interference known non-causally to the encoders are shown to coincide with the capacity region of the same channel with no interference. Therefore, the capacity region for such channels is established.
△ Less
Submitted 29 September, 2010;
originally announced September 2010.
-
Two-Way Writing on Dirty Paper
Authors:
Reza K. Farsani
Abstract:
In this paper, the Two-Way Channel (TWC) with Cannel State Information (CSI) is investigated. First, an achievable rate region is derived for the discrete memoryless channel. Then by extending the result to the Gaussian TWC with additive interference noise, it is shown that the capacity region of the later channel is the same as the capacity when there is no interference, i.e. a two-way version of…
▽ More
In this paper, the Two-Way Channel (TWC) with Cannel State Information (CSI) is investigated. First, an achievable rate region is derived for the discrete memoryless channel. Then by extending the result to the Gaussian TWC with additive interference noise, it is shown that the capacity region of the later channel is the same as the capacity when there is no interference, i.e. a two-way version of Costa's writing on dirty paper problem is established.
△ Less
Submitted 19 May, 2010;
originally announced May 2010.
-
Achievable Rate Regions for Dirty Tape Channels and "Joint Writing on Dirty Paper and Dirty Tape"
Authors:
Reza K. Farsani,
Bahareh Akhbari,
Mohammad Reza Aref
Abstract:
We consider the Gaussian Dirty Tape Channel (DTC) Y=X+S+Z, where S is an additive Gaussian interference known causally to the transmitter. The general expression [max]\_top(P_U,f(.),X=f(U,S))I(U;Y) is presented for the capacity of this channel. For linear assignment to f(.), i.e. X=U-βS, this expression leads to the compensation strategy proposed previously by Willems to obtain an achievable rate…
▽ More
We consider the Gaussian Dirty Tape Channel (DTC) Y=X+S+Z, where S is an additive Gaussian interference known causally to the transmitter. The general expression [max]\_top(P_U,f(.),X=f(U,S))I(U;Y) is presented for the capacity of this channel. For linear assignment to f(.), i.e. X=U-βS, this expression leads to the compensation strategy proposed previously by Willems to obtain an achievable rate for the DTC. We show that linear assignment to f(.) is optimal, under the condition that there exists a real number β^* such that the pair (X+β^* S,U) is independent of interference S. Furthermore, by applying a time-sharing technique to the achievable rate derived by linear assignment to f(.), an improved lower bound on the capacity of DTC is obtained. We also consider the Gaussian multiple access channel with additive interference, and study two different scenarios for this system. In the first case, both transmitters know interference causally while in the second, one transmitter has access to the interference noncausally and the other causally. Achievable rate regions for these two scenarios are then established.
△ Less
Submitted 15 April, 2010;
originally announced April 2010.