The Z Channel. Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA

Similar documents
Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless

5984 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

Block Markov Encoding & Decoding

DEGRADED broadcast channels were first studied by

Joint Relaying and Network Coding in Wireless Networks

Degrees of Freedom of the MIMO X Channel

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

COOPERATION via relays that forward information in

WIRELESS communication channels vary over time

SHANNON S source channel separation theorem states

Power and Bandwidth Allocation in Cooperative Dirty Paper Coding

Reflections on the Capacity Region of the Multi-Antenna Broadcast Channel Hanan Weingarten

SHANNON showed that feedback does not increase the capacity

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 7, JULY This channel model has also been referred to as unidirectional cooperation

The Capacity Region of the Strong Interference Channel With Common Information

Broadcast Networks with Layered Decoding and Layered Secrecy: Theory and Applications

State of the Cognitive Interference Channel

Capacity of Multiantenna Gaussian Broadcast Channel

Exploiting Interference through Cooperation and Cognition

Symmetric Decentralized Interference Channels with Noisy Feedback

Computing and Communications 2. Information Theory -Channel Capacity

Optimal Power Allocation over Fading Channels with Stringent Delay Constraints

State Amplification. Young-Han Kim, Member, IEEE, Arak Sutivong, and Thomas M. Cover, Fellow, IEEE

Interference Mitigation Through Limited Transmitter Cooperation I-Hsiang Wang, Student Member, IEEE, and David N. C.

On Secure Signaling for the Gaussian Multiple Access Wire-Tap Channel

Capacity and Optimal Resource Allocation for Fading Broadcast Channels Part I: Ergodic Capacity

Diversity Gain Region for MIMO Fading Multiple Access Channels

Degrees of Freedom in Multiuser MIMO

CORRELATED data arises naturally in many applications

I. INTRODUCTION. Fig. 1. Gaussian many-to-one IC: K users all causing interference at receiver 0.

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter

MOST wireless communication systems employ

Bounds on Achievable Rates for Cooperative Channel Coding

On the Capacity Regions of Two-Way Diamond. Channels

Interference: An Information Theoretic View

Capacity and Cooperation in Wireless Networks

Error Performance of Channel Coding in Random-Access Communication

Multicasting over Multiple-Access Networks

The Reachback Channel in Wireless Sensor Networks

WIRELESS or wired link failures are of a nonergodic nature

Rab Nawaz. Prof. Zhang Wenyi

On the Optimum Power Allocation in the One-Side Interference Channel with Relay

BANDWIDTH-PERFORMANCE TRADEOFFS FOR A TRANSMISSION WITH CONCURRENT SIGNALS

A unified graphical approach to

CONSIDER a sensor network of nodes taking

IN RECENT years, wireless multiple-input multiple-output

Capacity Gain from Two-Transmitter and Two-Receiver Cooperation

Cooperative Strategies and Capacity Theorems for Relay Networks

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Scheduling in omnidirectional relay wireless networks

THE emergence of multiuser transmission techniques for

State-Dependent Relay Channel: Achievable Rate and Capacity of a Semideterministic Class

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom Region for the MIMO X Channel

Cloud-Based Cell Associations

arxiv: v1 [cs.it] 26 Oct 2009

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 6, JUNE

Degrees of Freedom of Bursty Multiple Access Channels with a Relay

4118 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Zhiyu Yang, Student Member, IEEE, and Lang Tong, Fellow, IEEE

On Information Theoretic Interference Games With More Than Two Users

MIMO Interference Management Using Precoding Design

Coding Techniques and the Two-Access Channel

OPTIMAL POWER ALLOCATION FOR MULTIPLE ACCESS CHANNEL

Role of a Relay in Bursty Multiple Access Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Low Complexity Power Allocation in Multiple-antenna Relay Networks

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

ECE 4400:693 - Information Theory

Random Beamforming with Multi-beam Selection for MIMO Broadcast Channels

Cooperation in Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Energy Efficiency in Relay-Assisted Downlink

Computing functions over wireless networks

506 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Masoud Sharif, Student Member, IEEE, and Babak Hassibi

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Approximately Optimal Wireless Broadcasting

When Network Coding and Dirty Paper Coding meet in a Cooperative Ad Hoc Network

Maximising Average Energy Efficiency for Two-user AWGN Broadcast Channel

Feedback via Message Passing in Interference Channels

SNR Scalability, Multiple Descriptions, and Perceptual Distortion Measures

MIMO Z CHANNEL INTERFERENCE MANAGEMENT

The Multi-way Relay Channel

Two Models for Noisy Feedback in MIMO Channels

Capacity of Two-Way Linear Deterministic Diamond Channel

Information Theoretic Analysis of Cognitive Radio Systems

Performance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband

ISSN Vol.03,Issue.17 August-2014, Pages:

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL

Capacity of Linear Two-hop Mesh Networks with Rate Splitting, Decode-and-forward Relaying and Cooperation

MATHEMATICS IN COMMUNICATIONS: INTRODUCTION TO CODING. A Public Lecture to the Uganda Mathematics Society

Transmit Power Adaptation for Multiuser OFDM Systems

TWO-WAY communication between two nodes was first

Interference Management in Wireless Networks

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Overlay Systems. Results around Improved Scheme Transmission for Achievable Rates. Outer Bound. Transmission Strategy Pieces

Low Complexity Multiuser Scheduling in MIMO Broadcast Channel with Limited Feedback

Relay-Assisted Downlink Cellular Systems Part II: Practical Design

Transcription:

The Z Channel Sriram Vishwanath Dept. of Elec. and Computer Engg. Univ. of Texas at Austin, Austin, TX E-mail : sriram@ece.utexas.edu Nihar Jindal Department of Electrical Engineering Stanford University, Stanford, CA E-mail :njindal@wsl.stanford.edu Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford, CA E-mail :andrea@wsl.stanford.edu Abstract We consider a two transmitter two receiver channel where independent data is sent on each communication link of the system. We consider a three-link system, termed the Z channel, in which one transmitter is connected to both receivers while the other transmitter is only connected to one of the receivers. Thus, the Z channel has a three dimensional capacity region. We characterize the capacity region of a special class of degraded Z channels and establish an achievable region for the Gaussian Z channels. Finally, we use genie-aided techniques previously used for the interference and broadcast channels to obtain an outer bound for general Z channels. I. INTRODUCTION Historically, the study of information theory has been primarily motivated by wireline systems and cellular systems. Since interference channels are a common occurrence in such systems, they have been the primary two transmit two receive systems investigated in the past [], [4], [5]. As the importance of non-centralized ( ad-hoc ) wireless networks increases, there are many new multiuser channel configurations that are of increasing importance. In this paper, we define the two transmitter, two-receiver Z channels that is relevant in the ad-hoc wireless network scenario. We obtain the capacity region of the Z channel for the degraded, discrete-memoryless Z channel and we establish an achievable region for a special case of the Gaussian version of this channel. Lastly, we find an outer bound on the capacity region of the general, nondegraded Z channel. II. SYSTEM MODEL The Z channel has two transmitters, labeled and, and two receivers and. The channel is characterized by input alphabets, channel p.d.f.s and, and output alphabets, where and are transmitted from and respectively, and and are received at the receivers and. An code for a two user channel consists of three sets of message indices,, two encoding functions and, and two decoding functions and. An error is made if any of,, or. The capacity region for this Z channel is a three dimensional region, which contains the capacity region of the Z interference channel, the broadcast channel and the multiple access channel as some of its bounding planes. The Z channel is a special case of the X channel. In the X channel, " " Fig.. The Z Channel affects both and, and there is a message from to corresponding to. For simplicity, we consider only the Z channel in this paper. Note that similar to the broadcast channel, the capacity region of both the X and Z channels depends only on the marginals and, and not on the joint channel distribution. III. DEGRADED Z CHANNEL We consider a discrete memoryless Z channel in which the received signal at is a degraded version of the received signal at. This degraded condition must be satisfied for all input distributions at transmitter, i.e. for every, equals # for some. We term such a Z channel a degraded Z channel. For this case, the capacity region is the closure of the convex hull of all satisfying $ % $ % & () ' $ % & $ % & for some distribution ( (. Achievability of this region is described in Appendix A and the converse is presented in Appendix B. The degraded nature of the channel allows to decode the signal intended for. Thus, the rates of transmission to must lie in the multiple-access capacity region (given the message for, which is the auxiliary random variable & ) defined by. The structure of these equations is quite similar to the degraded broadcast channel capacity region, but the channel corresponding to the stronger user ( ) is a multiple-access channel instead of a single-user channel.

As a special case, we can also obtain the capacity region of the interference channel embedded in the degraded Z channel as $ % (2) $ % for some distribution. Again, the degraded nature of the channel allows to decode the intended for. The two pairs and thus act as independent parallel channels, with the resulting capacity region given by (2). IV. GAUSSIAN Z CHANNEL The Z channel can be simplified in the Gaussian case and represented as in Figure 2 with power constraints and on the two transmitters. When ', the Fig. 2. The Gaussian Z Channel channel is degraded for Gaussian inputs. In this special case, an achievable region can be obtained by using Gaussian inputs and successive decoding at. Transmitter 2 generates two independent Gaussian codebooks, one intended for with average power and one intended for with average power. Transmitter 2 chooses a codeword from each codebook and sends the sum of these codewords. Transmitter generates one Gaussian codebook with average power. Receiver 2 decodes its intended message while treating the codeword intended for as noise. Due to the degraded nature of the channel, can also decode the message intended for while treating all other signals as noise. Receiver then subtracts this message off, leaving a Gaussian multiple-access channel from (with power ) and (with power ). The corresponding achievable region is: $ $ ' $ ' $ ' for varying between and. Note that this region is simply that of () with Gaussian inputs. The achievable region is a combination of a Gaussian R.8.6.4.2.8 Fig. 3..6.4 R22.2 2.5 R2 Achievable Region for the Gaussian Z channel broadcast channel (between and ) and a Gaussian multiple-access channel (between and ). When, the channel becomes a Z interference channel. The conditions ' corresponds to the very strong interference case. This is why both and can simultaneously achieve their single-user capacities (when ). The achievable region for a Gaussian Z channel with and is illustrated in Figure 3. The optimality of Gaussian inputs is still an open problem. It can easily be seen that ' is a necessary condition for the Z channel to be degraded, but a sufficient condition is not yet known. V. GENIE AIDED OUTER BOUNDS FOR THE Z CHANNEL Along the lines of the outer bounds for the interference [8] and the broadcast channels [9], we can obtain genie aided bounds for the non-degraded Z channel. In this outer Fig. 4. The Z Channel.5 bound, the channel output of receiver 2 is made available to receiver, as seen in Figure 4. Thus, we obtain a new Z channel (which we call the Z " channel), where the received word at receiver is a vector # $ while that at receiver 2 is. The Z " channel clearly is degraded for every choice of. Thus, from our earlier results we know that the capacity region of Z " is given by the closure of

the convex hull of: $ % $ % & ' $ % & $ % & over distributions ( (. As mentioned earlier, the capacity region of the Z channel depends only on the marginals and not on the joint distribution of the channel. However, the capacity region of the Z " channel depends on the joint distribution. Thus, we can tighten this upper bound by minimizing over all joint distributions while retaining the same marginals and. An achievable region for the general Z channel can be constructed by extending the arguments of Marton [6], [7], but we defer this to a later paper. VI. CONCLUSION In this paper we defined a new two transmit, two receive channel - the Z channel. We find the capacity region of the degraded Z channel and we use this capacity region to construct an outer bound to the general Z channel. We also considered the Gaussian version of the Z channel and established an achievable region which is a combination of broadcast and multiple-access channel capacity regions. A. Achievability of () APPENDIX Fix ( ( and. Generate independent codewords of length,, according to, and independent codewords of length, (, according to (. For each codeword (, generate independent codewords according to (. Decoding: Receiver declares to be the received message if it, along with some is the only set such that ( is jointly typical. Receiver 2 declares was sent if there exists a unique such that ( is jointly typical. & & & Let us define the events: As usual, we assume was sent. Similar to the degraded broadcast channel achievability, % & implies that the probability of error at receiver 2 goes to zero. Notice that $ ' ' ' ' since implies. The first term goes to zero by the A.E.P. and from degradedness we have % & % & for all, and thus the second term goes to zero. Thus, we need to concentrate only on the events,, and for and. Now, & ( $ " Thus if % &, # #. Similarly, & ( ( $ " $ " " " $ " $ Thus if % &, # #. Lastly, we have & % ( ( $ " $ $ " " "$ "$ Thus if ' % &, # #. As usual, time-sharing allows for achievability of the convex hull. B. Converse for () In this section we prove that the region given in () is the actual capacity region for the Z channel where for all input distributions the output is a stochastically degraded version of the output. By Fano s inequality we clearly have the following: & ' $ ( & ' $ ( & ' $ ( We first bound using the same argument as used in the MAC converse proof. Following the MAC converse proof in [2, p. 4] where we replace ' with ' ', we get $ % '(

We bound ' by ' & ' ' % ' ' '& ' ' $ % ' ' '( $ % ' ' ' '( % ' ' ' '( % ' ' & '( $ % ' ' & '( % & '( (3) where & ', and we get (3) from the memoryless nature of the channel. Now we bound by the following: & ' % ' '& ' $ % ' '( % ' '( & & ' '( $ & & ' '( & & ' '( (4) % & '( where we used the degraded property of the channel to get (4). We bound by & ' % ' '& ' $ % ' '( Note that % ' can be bounded above by % ' ' $ % ' & ' & ' $ & ' & ' (5) % ' & ' & ' & ' & ' & & & & & & & & $ & & & & % & where (5) follows from the independence of and, and (6) follows from the memoryless nature of the channel. Thus, we have $ % '( $ % & '( ' $ % & '( $ % & '( with & ', which satisfies the property that &# # be a Markov chain. Using a time-sharing variable (similar to the MAC converse), we finally get $ % $ % & ' $ % & $ % & for some ( (. REFERENCES [] H. Sato, Two-user communication channels, IEEE Trans. Inform. Theory, vol. 23, pp. 295-34, May 977. [2] T. Cover and J. Thomas, Elements of information theory, John Wiley, New York, 99. (6)

[3] E. C. van der Meulen, A survey of multi-way channels in information theory : 96-976, IEEE Trans. Inform. Theory, vol. 23, pp. -37, Jan. 977. [4] A. C. Carleial, On the capacity of multiple-terminal communication networks, Ph.D. Thesis, Stanford University, 975. [5] M. H. M. Costa and A. A. El Gamal, The capacity region of the discrete memoryless interference channel with strong interference (corresp.), IEEE Trans. Inform. Theory, vol. 33, pp. 7-7, Sept. 987. [6] K. Marton, A coding theorem for the discrete memoryless broadcast channel,ieee Trans. Inform. Theory, vol. 25, pp. 36-3, May 979. [7] A. A. El Gamal and E. C. van der Meulen, A proof of Marton s coding theorem for the discrete memoryless broadcast channel, IEEE Trans. Inform. Theory, vol. 27, pp. 2-22, Jan 98. [8] G. Kramer, Genie-aided outer bounds on the capacity of interference channels, Proc. IEEE Symp. Inform. Theory, (Washington, D.C.), p. 3, June 24-29, 2. [9] S. Vishwanath, G. Kramer, S. Shamai, S. Jafar and A. Goldsmith, Outer bounds for Gaussian vector broadcast channels,proc. DIMACS workshop on Signal Proc. for Wireless, Oct. 22.