12,107 research outputs found
Incremental Relaying for the Gaussian Interference Channel with a Degraded Broadcasting Relay
This paper studies incremental relay strategies for a two-user Gaussian
relay-interference channel with an in-band-reception and
out-of-band-transmission relay, where the link between the relay and the two
receivers is modelled as a degraded broadcast channel. It is shown that
generalized hash-and-forward (GHF) can achieve the capacity region of this
channel to within a constant number of bits in a certain weak relay regime,
where the transmitter-to-relay link gains are not unboundedly stronger than the
interference links between the transmitters and the receivers. The GHF relaying
strategy is ideally suited for the broadcasting relay because it can be
implemented in an incremental fashion, i.e., the relay message to one receiver
is a degraded version of the message to the other receiver. A
generalized-degree-of-freedom (GDoF) analysis in the high signal-to-noise ratio
(SNR) regime reveals that in the symmetric channel setting, each common relay
bit can improve the sum rate roughly by either one bit or two bits
asymptotically depending on the operating regime, and the rate gain can be
interpreted as coming solely from the improvement of the common message rates,
or alternatively in the very weak interference regime as solely coming from the
rate improvement of the private messages. Further, this paper studies an
asymmetric case in which the relay has only a single single link to one of the
destinations. It is shown that with only one relay-destination link, the
approximate capacity region can be established for a larger regime of channel
parameters. Further, from a GDoF point of view, the sum-capacity gain due to
the relay can now be thought as coming from either signal relaying only, or
interference forwarding only.Comment: To appear in IEEE Trans. on Inf. Theor
On the Capacity Region of the Two-user Interference Channel with a Cognitive Relay
This paper considers a variation of the classical two-user interference
channel where the communication of two interfering source-destination pairs is
aided by an additional node that has a priori knowledge of the messages to be
transmitted, which is referred to as the it cognitive relay. For this
Interference Channel with a Cognitive Relay (ICCR) In particular, for the class
of injective semi-deterministic ICCRs, a sum-rate upper bound is derived for
the general memoryless ICCR and further tightened for the Linear Deterministic
Approximation (LDA) of the Gaussian noise channel at high SNR, which disregards
the noise and focuses on the interaction among the users' signals. The capacity
region of the symmetric LDA is completely characterized except for the regime
of moderately weak interference and weak links from the CR to the destinations.
The insights gained from the analysis of the LDA are then translated back to
the symmetric Gaussian noise channel (GICCR). For the symmetric GICCR, an
approximate characterization (to within a constant gap) of the capacity region
is provided for a parameter regime where capacity was previously unknown. The
approximately optimal scheme suggests that message cognition at a relay is
beneficial for interference management as it enables simultaneous over the air
neutralization of the interference at both destinations
Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel
In this paper, we study the impact of different channel output feedback
architectures on the capacity of the two-user interference channel. For a
two-user interference channel, a feedback link can exist between receivers and
transmitters in 9 canonical architectures (see Fig. 2), ranging from only one
feedback link to four feedback links. We derive the exact capacity region for
the symmetric deterministic interference channel and the constant-gap capacity
region for the symmetric Gaussian interference channel for all of the 9
architectures. We show that for a linear deterministic symmetric interference
channel, in the weak interference regime, all models of feedback, except the
one, which has only one of the receivers feeding back to its own transmitter,
have the identical capacity region. When only one of the receivers feeds back
to its own transmitter, the capacity region is a strict subset of the capacity
region of the rest of the feedback models in the weak interference regime.
However, the sum-capacity of all feedback models is identical in the weak
interference regime. Moreover, in the strong interference regime all models of
feedback with at least one of the receivers feeding back to its own transmitter
have the identical sum-capacity. For the Gaussian interference channel, the
results of the linear deterministic model follow, where capacity is replaced
with approximate capacity.Comment: submitted to IEEE Transactions on Information Theory, results
improved by deriving capacity region of all 9 canonical feedback models in
two-user interference channe
Interference Mitigation Through Limited Receiver Cooperation: Symmetric Case
Interference is a major issue that limits the performance in wireless
networks, and cooperation among receivers can help mitigate interference by
forming distributed MIMO systems. The rate at which receivers cooperate,
however, is limited in most scenarios. How much interference can one bit of
receiver cooperation mitigate? In this paper, we study the two-user Gaussian
interference channel with conferencing decoders to answer this question in a
simple setting. We characterize the fundamental gain from cooperation: at high
SNR, when INR is below 50% of SNR in dB scale, one-bit cooperation per
direction buys roughly one-bit gain per user until full receiver cooperation
performance is reached, while when INR is between 67% and 200% of SNR in dB
scale, one-bit cooperation per direction buys roughly half-bit gain per user.
The conclusion is drawn based on the approximate characterization of the
symmetric capacity in the symmetric set-up. We propose strategies achieving the
symmetric capacity universally to within 3 bits. The strategy consists of two
parts: (1) the transmission scheme, where superposition encoding with a simple
power split is employed, and (2) the cooperative protocol, where
quantize-binning is used for relaying.Comment: To appear in IEEE Information Theory Workshop, Taormina, October
2009. Final versio
- …