Next Article in Journal
Interval-Valued Random Matrices
Previous Article in Journal
Study on the Microstructure, Mechanical Properties, and Corrosion Behavior of 900 °C-Annealed CoCrFeMnNiSix (X = 0, 0.3, 0.6, 0.9) High-Entropy Alloys
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Critical Points in the Noiseberg Achievable Region of the Gaussian Z-Interference Channel

1
School of Electrical and Computer Engineering, Universidade Estadual de Campinas (Unicamp), Campinas 13083-852, SP, Brazil
2
Department of Information Engineering, The Chinese University of Hong Kong, Sha Tin, Hong Kong
*
Author to whom correspondence should be addressed.
Entropy 2024, 26(11), 898; https://doi.org/10.3390/e26110898
Submission received: 26 August 2024 / Revised: 15 October 2024 / Accepted: 17 October 2024 / Published: 23 October 2024
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
The Gaussian signaling strategy with power control for the Gaussian Z-interference channel with weak interference is reviewed in this paper. In particular, we study the various communication strategies that may arise at various points of the capacity region and identify the locations of the phase transitions between the various strategies. The Gaussian Z-interference channel with weak interference is known to have two critical points in its capacity region, where the slope of the region shows a sudden change. They occur at the points of the unconditional maximum rate for one of the users and the maximum rate that can be accommodated by the other user. In this paper, we discuss additional critical points (locations of phase transitions) in the achievable region of this channel. These turn out to be second-order phase transitions, i.e., we do not observe a discontinuous slope in the achievable rate region, but there is a discontinuity in the second derivative of the rate contour of the achievable region. This review paper is mainly based on some of our ITA (Information Theory and Applications Workshop, UCSD, San Diego, CA, USA) papers since 2011.

1. Introduction

Many authors have studied scalar Gaussian interference channels since 1974 [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23]. One of the key questions in this area, for which we do not have a definitive answer as yet, is whether Han–Kobayashi inner bound with Gaussian signaling achieves the capacity region.
The model under investigation in this paper is the one-sided interference channel given by Y 1 = X 1 + Z 1 and Y 2 = X 2 + a X 1 + Z 2 , where X 1 and X 2 are transmitter signals constrained to have average powers Q 1 and Q 2 , respectively, a is an interference gain in the interval ( 0 , 1 ) , Z 1 and Z 2 are Gaussian noises of unit variance, and Y 1 and Y 2 are the two received signals. This model is depicted in Figure 1.
The receivers are interested in messages sent by their respective, same-indexed, transmitters. Thus X 1 encodes a message addressed to receiver 1 and X 2 conveys a message to receiver 2. This model is a particular case of the Gaussian interference channel, which exhibits interference in both directions. Like in the more general model, the problem of finding the associated capacity region has been open for almost 50 years. In the case of strong interference, when a 1 , the capacity region is known [6,7]. In this case, the unintended receiver can fully decode the interfering message. Therefore, the rate region coincides with the intersection of the two underlying multiple access channel regions. Also, when a = 0 , the problem has a trivial solution. This paper uses the fact that the Gaussian Z-interference channel with interference parameter a in the range ( 0 , 1 ) can be regarded as a degraded Gaussian interference channel [8], a model shown in Figure 2.
Like the Gaussian Z-interference channel, the degraded Gaussian interference channel is characterized by three parameters: The two powers P 1 and P 2 , and the additional independent noise in the second receiver, power N 2 . These parameters are related to the parameters of the original Z-interference channel by P 1 = Q 1 , P 2 = Q 2 / a 2 and N 2 = ( 1 a 2 ) / a 2 . Moreover, since 0 < a < 1 , the additional noise power N 2 is always positive. For simplicity, we choose to use the more common notation, without the primes, in this channel, which will constitute our working model.
In this review paper, we investigate the behavior of the noiseberg encoding scheme [16], which has recently been shown [24] to coincide with the Han–Kobayashi region with Gaussian signaling. From a communication engineer’s perspective, knowing the optimal Gaussian signaling strategy for a given set of parameters is essential when maximizing R 1 + β R 2 . In particular, we investigate additional critical points in the achievable region of the noiseberg scheme for the Gaussian Z-interference channel with weak interference. These critical points are associated with transitions between different modes of operation. A third critical point happens between the so-called multiplex and the overflow regions produced in the noiseberg encoding scheme [25]. A fourth critical point happens after the overflow mode is in effect, as the evolution of modes leads to a transition to pure superposition or, otherwise, reaches an extreme boundary in the λ × h parameter space.
Another possible transition may happen when the noiseberg region takes up all the power available for P 1 before the noiseberg height reaches the overflow level ( N 2 ). This will be characterized as a transition from Phase 4 to Phase 7. Subsequently, the optimal path in this case will transition to Phase 6 and, finally, to Phase 3.

2. Preliminaries

We focus on the degraded interference channel model depicted in Figure 2. Two extreme points in the channel capacity region have been identified for this channel. One extreme point occurs when X 1 sends information at its maximum possible rate and X 2 uses what is left of the channel, with X 1 ’s interference treated as noise. In this extreme point the achieved rate pair ( R 1 , R 2 ) is given by R 1 = 1 2 log ( 1 + P 1 ) and R 2 = 1 2 log ( 1 + P 2 1 + P 1 + N 2 ) (cf. Figure 3). There is a slope discontinuity for the capacity region at this extreme point, which follows from the capacity region of an associated degraded broadcast channel [5,8], establishing that this extreme point is a critical point. From this, it immediately follows that this point also maximizes R 1 + R 2 , the sum-rate, and therefore, this corner point will be referred to as the sum-rate corner point.
Another extreme point in the achievable region occurs when all the privilege of operating at maximum rate is given to the second transmitter [8,26]. In this case, the first transmitter must lower its rate to the point where the second receiver is sure to decode and eliminate all the interference that its signaling might impose. The first transmitter then uses the noisy channel that sees noise power 1 + N 2 + P 2 . Therefore, we have R 1 = 1 2 log ( 1 + P 1 1 + N 2 + P 2 ) and R 2 = 1 2 log ( 1 + P 2 1 + N 2 ) . There is also a slope discontinuity for the capacity region at this extreme point, which follows from a recent outer bound developed in [27]. This corner point is referred to as the backoff corner point.

2.1. Noisebergs—A Brief Review

A noiseberg transmission scheme is a particular Gaussian signaling strategy with power control, with (only) seven potential phases, depicted in Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10. In a nutshell, it is a scheme that combines superposition coding, non-naïve (i.e., power-controlled) time-sharing, and water filling between the two spectral regions that become multiplexed. More specifically, it is a time-sharing/bandwidth-sharing between two signaling strategies, with the first strategy (depicted on the left) occupying ( 1 λ ) fraction of the time (band) and the second strategy occupying the remaining λ fraction of the time (band). In particular, the strategies in Figure 4, Figure 5 and Figure 6 can be considered as special instances of those in Figure 7, Figure 8 and Figure 9, respectively, by setting λ = 0 . In the leftmost strategy, using band ( 1 λ ) , one allocates part of the power budget to combine transmissions to both decoders in a pure superposition manner, exactly as is known to be optimal for Gaussian broadcast channels. In the second strategy, over band λ , the communication is solely accomplished between the first transmitter and the first receiver. Yet, this strategy can also be interpreted as a particular point of the capacity region of a Gaussian broadcast channel, restricted to maximal R 1 and null R 2 .
Consider the following seven communication strategies, using Gaussian signaling, for the Gaussian interference channel:
  • Phase 1: Treating interference to be noise at the weaker receiver (Sato’s corner point)
    In this phase, the weaker receiver, Y 2 , decodes its message by treating X 1 as noise. This is depicted pictorially in Figure 4. The decoding order in the picture is assumed to go from top to bottom. Any receiver will decode all the messages on top of its message (including its message) in any band by treating those below it as noise. The rate pair achieved in this phase is
    R 1 = 1 2 log 1 + P 1 , R 2 = 1 2 log 1 + P 2 1 + P 1 + N 2 .
Figure 4. Phase 1 (Sato’s corner point).
Figure 4. Phase 1 (Sato’s corner point).
Entropy 26 00898 g004
2.
Phase 2: Partial interference cancellation at the weaker receiver (or pure superposition coding)
In this phase, the weaker receiver, Y 2 , decodes a part of X 1 first, subtracts this from the received signal, and then decodes its own signal X 2 . The rate pair achieved in this phase is
R 1 = 1 2 log 1 + P 1 C 1 + N 2 + P 2 + P 1 A + 1 2 log 1 + P 1 A , R 2 = 1 2 log 1 + P 2 1 + N 2 + P 1 A .
Note that P 1 A + P 1 C = P 1 . This can be seen as a mix of Phase 1 and Phase 3, to be seen next.
Figure 5. Phase 2 (Pure superposition strategy).
Figure 5. Phase 2 (Pure superposition strategy).
Entropy 26 00898 g005
3.
Phase 3: Interference cancellation at the weaker receiver (the backoff corner point)
In this phase, the weaker receiver, Y 2 , decodes X 1 first, subtracts this from the received signal, and finally decodes its own signal X 2 . The rate pair achieved in this phase is
R 1 = 1 2 log 1 + P 1 1 + N 2 + P 2 , R 2 = 1 2 log 1 + P 2 1 + N 2 .
Note that the rate for message 1 is solely determined by the ability of the weaker decoder to decode it. This encoding strategy is similar to that in a degraded message sets Gaussian broadcast channel where message 1 is meant to be communicated to both receivers.
Figure 6. Phase 3 (Backoff corner point).
Figure 6. Phase 3 (Backoff corner point).
Entropy 26 00898 g006
4.
Phase 4: Time-sharing between the following two strategies: Treating interference to be noise at the weaker receiver and transmitting solely to the stronger receiver (or multiplex strategy)
In this phase, there is a time-sharing between two communication schemes. The first scheme, employed for ( 1 λ ) fraction of the time, employs the Phase 1 strategy, and the second scheme consists of transmission only to the stronger receiver. The total average power in each band is indicated in the figure. Therefore, one must divide the power by the band duration to obtain the height. It is this phase that leads to the noiseberg nomenclature. We denote by h the height difference between the N 2 slab in the second band and the power level of P 2 in the first band. This height difference comes from part of the noise spectrum of Z 2 that floats above the signal level in the first band and characterizes what we call a noise-iceberg, or noiseberg. The flotation of the noise slab releases prime-rate space in the power × bandwidth plane, in a fashion that Archimedes would be sure to appreciate. In this phase, we obtain the following:
P 1 = P 1 A + P 1 B P 1 A + P 2 1 λ = P 1 B λ h .
The rate pairs achieved in this scheme are
R 1 = λ ¯ 2 log 1 + λ ¯ P 1 λ λ ¯ h λ P 2 λ ¯ + λ 2 log 1 + P 1 + P 2 + λ ¯ h , R 2 = λ ¯ 2 log 1 + P 2 λ ¯ ( 1 + N 2 ) + λ ¯ P 1 λ λ ¯ h λ P 2 ,
where λ ¯ denotes ( 1 λ ) .
Figure 7. Phase 4 (The noiseberg strategy).
Figure 7. Phase 4 (The noiseberg strategy).
Entropy 26 00898 g007
5.
Phase 5: Time-sharing between the following two strategies: Partial interference cancellation at the weaker receiver and transmitting solely to the stronger receiver (or overflow strategy)
In this phase, as before, there is a time-sharing between two communication schemes. The first scheme, employed for ( 1 λ ) fraction of the time, employs the Phase 2 strategy, and the second scheme consists of transmission only to the stronger receiver. The total average power in each band is indicated in the figure. We denote by h the height difference between the top of the N 2 slab in the second band and the power level of P 2 in the first band. As argued in [16,24], the total heights of the two signal bands must agree via a water-filling argument.
The noise band of height N 2 floats above the signal power band in the rightmost strategy. The floating of the noise band frees up prime frequency (or time) space in the spectrum for signal occupation.
In this phase, we obtain the following:
P 1 = P 1 A + P 1 B + P 1 C P 1 B λ = N 2 + P 2 + P 1 A + P 1 C λ ¯ P 1 C 1 λ = h N 2
R 1 = λ ¯ 2 log 1 + λ ¯ P 1 λ P 2 λ ¯ h + λ ¯ 2 N 2 λ ¯ + λ ¯ 2 log 1 + λ ¯ ( h N 2 ) λ ¯ ( 1 + N 2 ) + λ ¯ P 1 λ P 2 λ ¯ h + λ ¯ 2 N 2 + P 2 + λ 2 log 1 + P 1 + P 2 + λ ¯ N 2 , R 2 = λ ¯ 2 log 1 + P 2 λ ¯ ( 1 + N 2 ) + λ ¯ P 1 λ P 2 λ ¯ h + λ ¯ 2 N 2 .
Figure 8. Phase 5 (The overflow region).
Figure 8. Phase 5 (The overflow region).
Entropy 26 00898 g008
6.
Phase 6: Time-sharing between the following two strategies: Interference cancellation at the weaker receiver and transmitting solely to the stronger receiver (top boundary of the admissible parameter region)
In this phase, there is also a time-sharing between two communication schemes. The first scheme, employed for ( 1 λ ) fraction of the time, employs the Phase 3 strategy, and the second scheme consists of transmission only to the stronger receiver. The total average power in each band is indicated in the figure. As in Phase 5, we denote by h the height difference between the top of the N 2 slab in the second band and the power level of P 2 in the first band. Again, as argued in [16,24], the total heights of the two bands must agree via a water-filling argument. In this phase, we obtain the following:
P 1 = P 1 C + P 1 B P 1 B λ = N 2 + P 2 + P 1 C λ ¯ P 1 C 1 λ = h N 2
R 1 = λ ¯ 2 log 1 + λ ¯ P 1 λ λ ¯ N 2 λ P 2 λ ¯ ( 1 + N 2 ) + P 2 + λ 2 log 1 + P 1 + P 2 + λ ¯ N 2 , R 2 = λ ¯ 2 log 1 + P 2 λ ¯ ( 1 + N 2 ) .
Figure 9. Phase 6 (The top boundary of the admissible ( λ , h ) parameter region).
Figure 9. Phase 6 (The top boundary of the admissible ( λ , h ) parameter region).
Entropy 26 00898 g009
7.
Phase 7: Time-division between transmitting solely to the two receivers
In this phase, for ( 1 λ ) fraction of the time, we transmit solely to the weaker receiver, and for λ fraction of the time, we transmit solely to the stronger receiver. In this phase, we obtain
R 1 = λ 2 log 1 + P 1 λ , R 2 = λ ¯ 2 log 1 + P 2 λ ¯ ( 1 + N 2 ) .
Figure 10. Phase 7 (Essentially, a portion of the so-called non-naïve time sharing).
Figure 10. Phase 7 (Essentially, a portion of the so-called non-naïve time sharing).
Entropy 26 00898 g010
Remark 1. 
A general Gaussian signaling strategy incorporating superposition coding and non-naïve (i.e., power-controlled) time-sharing will have many more phases than those described above. However, it was proposed in [16] and established in [24] that the boundary of the Gaussian signaling region is obtained by restricting observations to these seven strategies.

2.2. The Gaussian Signaling Region

One needs to optimize R 1 + β R 2 for 1 β , among the various signaling strategies or phases to compute the Gaussian signaling region.

2.2.1. Slopes at the Corner Points

It is known [5,8] that R 1 + R 2 (i.e., β = 1 ) is maximized (for the capacity region) at the corner point R 1 = 1 2 log ( 1 + P 1 ) and R 2 = 1 2 log 1 + P 2 1 + N 2 + P 1 (Note that R 1 + β R 2 for 0 β 1 will also pass through the same corner point, as this corresponds to the maximum value of R 1 ). This corresponds to a Phase 1 communication strategy. In particular, it has been shown [28] that the supporting hyperplane, R 1 + β R 2 , will touch the Gaussian signaling region (or equivalently the noiseberg region) at the same corner point if and only if β β S a t o (defined below). Thus, β S a t o marks the first critical (or phase transition) point of the noiseberg region.
Theorem 1 
([28]). For a Gaussian Z-interference channel, let β S a t o be the largest value of β 1 such that
sup ( R 1 , R 2 ) R HK-GS ( R 1 + β R 2 ) = 1 2 log ( 1 + P 1 ) + λ 2 log 1 + P 2 1 + N 2 + P 1 .
Then,
β Sato = min ( N 2 + P 2 ) ( 1 + N 2 + P 1 ) P 2 ( 1 + P 1 ) , β * ,
where β * is the unique positive solution ψ ( β ) = 0 , where
ψ ( β ) : = β log 1 + P 2 1 + N 2 + P 1 N 2 P 2 ( 1 + N 2 + P 1 ) ( 1 + N 2 + P 1 + P 2 ) + log 1 P 2 ( 1 + P 1 ) ( 1 + N 2 + P 1 ) ( 1 + N 2 + P 1 + P 2 ) β .
Remark 2. 
We do not yet have a matching converse (i.e., one that follows from an outer bound to the capacity region) that establishes the slope at this corner point. An interested reader may refer to [22,27] for recent developments along these lines.
On the other hand, it is known that for large enough β the supporting hyperplanes to the Gaussian signaling region, [29], as well as the one to the capacity region [27] pass through the backoff corner point established in [26], namely R 1 = 1 2 log 1 + P 1 1 + N 2 + P 2 and R 2 = 1 2 log 1 + P 2 . This corresponds to a Phase 3 communication strategy. (At this corner point R 2 takes its maximum value.)
Theorem 2 
([29]). Consider a Gaussian Z-interference channel. The smallest β such that the supporting hyperplane of the form R 1 + β R 2 of the Han–Kobayashi signaling scheme with Gaussian inputs passes through the backoff corner point is given by
β b a c k o f f = 1 + max N 2 ( 1 + N 2 + P 2 ) P 2 , log ( 1 + N 2 ) N 2 ( 1 + N 2 + P 1 + P 2 ) log 1 + P 2 + N 2 1 + N 2 P 2 1 + P 2 + N 2 .
Thus, for all β β b a c k o f f , the supporting hyperplane to the Gaussian signaling region (or the noiseberg region) passes through the above corner point.
Remark 3. 
As with the sum-rate point, we do not yet have a matching converse (i.e., one that follows from an outer bound to the capacity region) that establishes the slope at this corner point. An interested reader may refer to [24,27], where upper bounds on the slope have been established. The issue of corner points to the capacity region of two-user Gaussian interference channels in various signal-to-noise ratio regimes has been studied in [30].

2.2.2. The Intermediate Regime, β : β S a t o β β b a c k o f f

The main objective of this paper would be to review the known results for β in the regime : β S a t o β β b a c k o f f . Initially, consider the leftmost (pure superposition coding) strategy, i.e., we only consider Phases 1, 2, and 3. In Phase 2, we need to compute
max 0 P 1 A P 1 1 2 log 1 + P 1 P 1 A 1 + N 2 + P 2 + P 1 A + 1 2 log 1 + P 1 A + β 2 log 1 + P 2 1 + N 2 + P 1 A .
A little bit of calculus shows that optimizing
P 1 A = P 1 if β P 2 + N 2 P 2 1 + P 1 + N 2 1 + P 1 , ( Phase 1 ) 0 if β P 2 + N 2 P 2 ( 1 + N 2 ) , ( Phase 3 ) ( 1 + N 2 ) ( P 2 + N 2 ) β P 2 β P 2 ( P 2 + N 2 ) otherwise . ( Phase 2 ) .
In the above optimization problem, we observe that there are two transition values for β , defined by β 1 = P 2 + N 2 P 2 1 + P 1 + N 2 1 + P 1 (marking the transition from Phase 1 to Phase 2) and β 2 = P 2 + N 2 P 2 ( 1 + N 2 ) (marking the transition from Phase 2 to Phase 3). Note that β 1 corresponds to the first of the two terms in the minimization that defines β S a t o , and β 2 corresponds to the first of the two terms in the maximization that defines β b a c k o f f .
It turns out that the second of the two terms in the minimization that defines β S a t o corresponds to a phase transition from Phase 1 to Phase 4. Similarly, the second of the two terms in the maximization that defines β b a c k o f f corresponds to a phase transition from Phase 6 to Phase 3.
Phases 1, 2, and 3 can be considered special instances of Phases 4, 5, and 6, respectively, by setting λ = 0 . Phase 1 (Sato’s corner point) is associated with the segment λ = 0 and 0 h N 2 . Phase 2 (the pure superposition phase) is related to the middle segment formed by λ = 0 and N 2 h N 2 + P 1 . Finally, Phase 3 (the backoff corner point) is mapped to the single point, λ = 0 , and h = N 2 + P 1 .
Further, the rate pairs ( R 1 , R 2 ) in Phases 4, 5, and 6 can also be expressed in terms of the parameters λ and h as stated before. These parameters λ , h vary over a region, called the region of admissible points, defined by the conditions that P 1 A , P 1 B , and P 1 C are non-negative and sum to P 1 . The region h N 2 and λ > 0 corresponds to Phase 4. If h N 2 , then P 1 C > 0 , and this is called the overflow region. This encompasses Phases 5 and 6.
The admissible region in Phase 4, using (1), can be shown to be restricted by the expressions 0 h N 2 and
0 < λ P 1 + P 2 + h ( P 1 + P 2 + h ) 2 4 P 1 h 2 h .
The admissible region in Phase 5, using (3), can be shown to be restricted by the expressions N 2 < h N 2 + P 1 and
0 < λ < P 1 + P 2 + 2 N 2 h ( P 1 + P 2 + 2 N 2 h ) 2 4 N 2 ( P 1 + N 2 h ) 2 N 2 .
Finally, the admissible region in Phase 6, using (5), can be shown to be restricted by the expressions N 2 < h N 2 + P 1 and
λ = P 1 + P 2 + 2 N 2 h ( P 1 + P 2 + 2 N 2 h ) 2 4 N 2 ( P 1 + N 2 h ) 2 N 2 .
Figure 11 shows the admissible region of λ and h for the parameters P 1 = 1 , P 2 = 4 , and N 2 = 3 . Phases 1, 2, and 3 correspond to λ = 0 and collapse to the Y-axis. Phase 6 corresponds to the upper boundary. The dotted line at h = 3 marks the phase boundary between Phases 4 (noiseberg multiplex) and 5 (overflow). Finally, Phase 7 is the rightmost boundary of the admissible region, which is reached in case the boundary is met before overflow.
To determine the phase, we need to maximize R 1 ( h , λ ) + β R 2 ( h , λ ) (using (2) or (4) depending on h N 2 or h N 2 , respectively) and this leads to a path of optimal extreme points in the admissible region.
Apart from the phase transitions characterized in Theorems 1 and 2, namely, Phase 1 → Phase 2, Phase 1 → Phase 4, Phase 2 → Phase 3, and Phase 6 → Phase 3, the numerical experiments show that there are five more types of phase transitions in the Gaussian signaling scheme. These other ones represent the transitions from Phase 4 → Phase 5, Phase 4 → Phase 7, Phase 7 → Phase 6, Phase 5 → Phase 2, and Phase 5 → Phase 6, and let us define the corresponding β ’s to be β 4 5 , β 4 7 , β 5 6 , β 5 2 , and β 5 6 , respectively. These phase transitions can be implicitly characterized as follows:
  • β 4 5 : This corresponds to the β at which R 1 ( h , λ ) + β R 2 ( h , λ ) is maximized when h = N 2 and λ > 0 . This corresponds to the transition between the multiplex and overflow regions.
  • β 4 7 : This corresponds to the β at which R 1 ( h , λ ) + β R 2 ( h , λ ) is maximized when h < N 2 and λ = P 1 + P 2 + h ( P 1 + P 2 + h ) 2 4 P 1 h 2 h , in other words P 1 A = 0 . This corresponds to the transition from the multiplex region to the non-naïve time-division region.
  • β 7 6 : This corresponds to the β at which R 1 ( h , λ ) + β R 2 ( h , λ ) is maximized when h = N 2 and λ = P 1 + P 2 + h ( P 1 + P 2 + h ) 2 4 P 1 h 2 h . This corresponds to the transition from the time-division phase to the overflow region, with P 1 A = 0 .
  • β 5 2 : This corresponds to the β at which R 1 ( h , λ ) + β R 2 ( h , λ ) is maximized when h > N 2 and λ = 0 . This corresponds to the transition from the overflow region to a pure superposition coding region.
  • β 5 6 : This corresponds to the β at which R 1 ( h , λ ) + β R 2 ( h , λ ) is maximized when h > N 2 and λ = P 1 + P 2 + 2 N 2 h ( P 1 + P 2 + 2 N 2 h ) 2 4 N 2 ( P 1 + N 2 h ) 2 N 2 . This corresponds to the transition from the interior of the admissible ( h , λ ) region to the top boundary of this region.

2.2.3. Trajectories in the Phase Space

In this section, we plot the various trajectories of the optimizing parameters in the phase space of ( h , λ ) as we vary β from β s a t o to β b a c k o f f .
1.
Path 1: For some set of parameters (for example, P 1 = 1 , P 2 = 9 , N 2 = 8 ) numerical simulations indicate that the optimal path is Phase 1 → Phase 2 → Phase 3. This is the path of pure superposition evolution, and the locations of the phase transitions occur at β 1 2 = 9 4 9 and β 2 3 = 17 , respectively. This implies that the trajectory in the admissible region is only along the h-axis, i.e., with λ = 0 .
2.
Path 2: For some set of parameters (for example, P 1 = 1 , P 2 = 4 , N 2 = 1 ) the optimal path seems to be Phase 1 → Phase 4 → Phase 5 → Phase 2 → Phase 3. The phase transitions occur at (approximately) β 1 4 = 1.8422 , β 4 5 = 1.9549 , β 5 2 = 2.0799 , and β 2 3 = 2.5 , respectively. This path is depicted in Figure 12.
As the figure illustrates, it leaves Phase 1 (Sato’s point) and moves into Phase 4. Then, at h = N 2 = 1 , it moves from Phase 4 to Phase 5. Then, at h 1.5 , it moves from Phase 5 to Phase 2. Finally, at h = 2 , the trajectory reaches the other corner point.
3.
Path 3: For some set of parameters (for example P 1 = 1 , P 2 = 2.5 , N 2 = 1 ) the optimal path seems to be Phase 1 → Phase 4 → Phase 5 → Phase 6 → Phase 3. The phase transitions occur at (approximately) β 1 4 = 1.9238 , β 4 5 = 2.4153 , β 5 6 = 2.6987 , and β 6 3 = 3.0023 respectively.
This path is depicted in Figure 13.
As the figure illustrates, it leaves Phase 1 (Sato’s point) and moves into Phase 4. Then, at h = N 2 = 1 , it moves from Phase 4 to Phase 5. At a slightly larger β , it enters Phase 6 and remains there until it reaches the new corner point at Phase 3.
4.
Path 4: For some set of parameters (for example, P 1 = 1 , P 2 = 1 , N 2 = 3 ) the optimal path seems to be Phase 1 → Phase 4 → Phase 7 → Phase 6 → Phase 3. The phase transitions occur at (approximately) β 1 4 = 5.3182 , β 4 7 = 9.5662 , β 7 6 = 23.3434 , and β 6 3 = 39.2955 , respectively.
This path is depicted in Figure 14.

2.3. To Mux or Not to Mux

From the point of view of a converse to the capacity region, it may be helpful to realize that one does not need multiplexing (time-sharing) for some parameters ( Q 1 , Q 2 , a ) . Hence, there is a potential for the existing techniques for proving the optimality of Gaussian distributions to work.
In Theorem 1, the authors computed the slope, β Sato , of the capacity region at the sum-rate corner point. Whenever the first term there is the critical one, it was observed that the optimal trajectory consists only of the pure superposition phases, i.e., Phases 1, 2, and 3. This leads us to propose the following conjecture.
Conjecture 1. 
Consider a degraded Gaussian Z-interference channel with parameters ( P 1 , P 2 , N 2 ) . The noiseberg region consists only of a pure superposition coding strategy (i.e., no time-sharing is required for any β-sum-rate) whenever
( N 2 + P 2 ) ( 1 + N 2 + P 1 ) P 2 ( 1 + P 1 ) β * ,
where β * is the unique positive solution of ψ ( β ) = 0 , where
ψ ( β ) : = β log 1 + P 2 1 + N 2 + P 1 N 2 P 2 ( 1 + N 2 + P 1 ) ( 1 + N 2 + P 1 + P 2 ) + log 1 P 2 ( 1 + P 1 ) ( 1 + N 2 + P 1 ) ( 1 + N 2 + P 1 + P 2 ) β .
This conjecture allows us to identify the regions of parameters Q 1 , Q 2 , and a where we have optimal rate evolution between the extreme points with pure superposition alone, i.e., without the use of noisebergs. The results are shown in Figure 15.

2.4. The Other Critical Points

Figure 16 depicts the achievable rate region for the parameters P 1 = 1 , P 2 = 2.5 , and N 2 = 1 . Clearly, the rate region depicts a discontinuity in the slope at the sum-rate extreme point as well as the backoff extreme point. Even the capacity region has been shown to exhibit this behavior. However, in an earlier section (cf. Figure 13), we claimed that this set of parameters also exhibits a phase transition at (approximately) β 4 5 = 2.415 , where the rates are (approximately) R 1 = 0.238 , R 2 = 0.353 and at (approximately) β 5 6 = 2.699 , where the rates are (approximately) R 1 = 0.149 , R 2 = 0.388 . The achievable rate region does not exhibit a discontinuity in slope at these parameters. However, these are second-order phase transitions of the capacity region, i.e., the second derivative has a discontinuity. This happens because there is a crossing of the curves of β that correspond to two schemes that are involved in the transition. But β is the slope of the normal to the tangent of the achievable rate curve. Therefore the first derivatives of the achievable rate curve will not show a discontinuity at these critical points, but their second derivatives (the slope of the slope) will.
For the noiseberg region, the phase transitions β 4 7 , β 4 5 , β 7 6 , β 5 6 , β 5 2 all appear to be second-order phase transitions of the capacity region. This is also supported by some back-of-the-envelope calculations, but a formal proof is still absent at this point.
It is rather interesting how the β ’s arrange themselves to give an achievable rate region with no kinks other than the two corner points. For a general scalar Gaussian interference channel, in a very weak-interference regime, it is known that the capacity region exhibits a kink [31,32] at the maximum sum-rate point as well. In the Z-interference channel case, the sum-rate point coincides with one of the corner points, perhaps indicating that there are no additional kinks for a general scalar Gaussian interference channel.

3. Conclusions

In this paper, we review new critical points in the noiseberg achievable rate region of the Gaussian Z-interference channel. This region (and the capacity region) has been known to have two critical points at its two corner points. The noiseberg achievable region is observed to have additional points of second-order phase transitions. One of these critical points ( β 4 5 ) marks the transition of the noiseberg multiplex region into the overflow region. Another of these ( β 4 7 ) marks the transition of the noiseberg multiplex region into the time-division region. A third critical point ( β 5 2 ) marks the transition of the overflow region back to the superposition coding region. Finally, a fourth critical point ( β 5 6 ) marks the transition of the overflow region into a phase where the weaker receiver decodes the interfering signal in its band (Phase 6).
It is hoped that the review of the noiseberg region will help the community resolve the following key open-question: does the noiseberg region coincide with the capacity region of the Gaussian Z-interference channel?

Funding

The work described in this paper was substantially supported by grants from FAPESP and CAPES (Brazilian research support foundations), and by the following two grants from the Research Grants Council of the Hong Kong Special Administrative Region, China, CUHK 14221822 and CUHK 14210120.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Acknowledgments

The authors would like to thank Gustavo Fraidenraich, José Cândido Santos Filho, Dustin Wang, and Amin Gohari for their inspiring discussions. Thanks are also due to the anonymous reviewers for some astute remarks.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ahlswede, R. The capacity region of a channel with two senders and two receivers. Ann. Probab. 1974, 2, 805–814. [Google Scholar] [CrossRef]
  2. Carleial, A. A case where interference does not reduce capacity (Corresp.). IEEE Trans. Inf. Theory 1975, 21, 569–570. [Google Scholar] [CrossRef]
  3. Sato, H. Two-user communication channels. IEEE Trans. Inf. Theory 1977, 23, 295–304. [Google Scholar] [CrossRef]
  4. Carleial, A. Interference channels. IEEE Trans. Inf. Theory 1978, 24, 60–70. [Google Scholar] [CrossRef]
  5. Sato, H. On degraded Gaussian two-user channels (Corresp.). IEEE Trans. Inf. Theory 1978, 24, 637–640. [Google Scholar] [CrossRef]
  6. Han, T.S.; Kobayashi, K. A new achievable rate region for the interference channel. IEEE Trans. Inf. Theory 1981, 27, 49–60. [Google Scholar] [CrossRef]
  7. Sato, H. The capacity of the Gaussian interference channel under strong interference (Corresp.). IEEE Trans. Inf. Theory 1981, 27, 786–788. [Google Scholar] [CrossRef]
  8. Costa, M.H.M. On the Gaussian interference channel. IEEE Trans. Inf. Theory 1985, 31, 607–615. [Google Scholar] [CrossRef]
  9. Kramer, G. Outer bounds on the capacity of Gaussian interference channels. IEEE Trans. Inf. Theory 2004, 50, 581–586. [Google Scholar] [CrossRef]
  10. Sason, I. On achievable rate regions for the Gaussian interference channel. IEEE Trans. Inf. Theory 2004, 50, 1345–1356. [Google Scholar] [CrossRef]
  11. Kramer, G. Review of Rate Regions for Interference Channels. In Proceedings of the 2006 International Zurich Seminar on Communications, Zurich, Switzerland, 22–24 February 2006; pp. 162–165. [Google Scholar] [CrossRef]
  12. Etkin, R.H.; Tse, D.N.C.; Wang, H. Gaussian interference channel capacity to within one bit. IEEE Trans. Inf. Theory 2008, 54, 5534–5562. [Google Scholar] [CrossRef]
  13. Motahari, A.S.; Khandani, A.K. Capacity bounds for the Gaussian interference channel. IEEE Trans. Inf. Theory 2009, 55, 620–643. [Google Scholar] [CrossRef]
  14. Shang, X.; Kramer, G.; Chen, B. A new outer bound and the noisy-interference sum-rate capacity for Gaussian interference channels. IEEE Trans. Inf. Theory 2009, 55, 689–699. [Google Scholar] [CrossRef]
  15. Annapureddy, V.S.; Veeravalli, V.V. Gaussian interference networks: Sum capacity in the low-interference regime and new outer bounds on the capacity region. IEEE Trans. Inf. Theory 2009, 55, 3032–3050. [Google Scholar] [CrossRef]
  16. Costa, M.H.M. Noisebergs in Z Gaussian interference channels. In Proceedings of the 2011 Information Theory and Applications Workshop (ITA), La Jolla, CA, USA, 6–11 February 2011; pp. 1–6. [Google Scholar] [CrossRef]
  17. Costa, M.H.M.; Nair, C. On the achievable rate sum for symmetric Gaussian interference channels. In Proceedings of the 2012 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 5–10 February 2012. [Google Scholar]
  18. Mehanna, O.; Marcos, J.; Jindal, N. On achievable rates of the two-user symmetric Gaussian interference channel. In Proceedings of the 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, 29 September–1 October 2010; pp. 1273–1279. [Google Scholar] [CrossRef]
  19. Costa, M.H.M.; Nair, C. Phase transitions in the achievable sum-rate of symmetric Gaussian interference channels. In Proceedings of the 2013 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 10–15 February 2013; pp. 10–15. [Google Scholar]
  20. Costa, M.H.M.; Nair, C.; Ng, D.; Wang, Y.N. On the structure of certain non-convex functionals and the Gaussian Z-interference channel. In Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT), Los Angeles, CA, USA, 21–26 June 2020; pp. 1522–1527. [Google Scholar] [CrossRef]
  21. Gohari, A.; Nair, C.; Ng, D. An information inequality motivated by the Gaussian Z-interference channel. In Proceedings of the 2021 IEEE International Symposium on Information Theory (ISIT), Melbourne, Australia, 12–20 July 2021. [Google Scholar]
  22. Gohari, A.; Nair, C.; Zhao, J. On the capacity region of some classes of interference channels. In Proceedings of the 2024 IEEE International Symposium on Information Theory (ISIT), Athens, Greece, 7–12 July 2024; pp. 3136–3141. [Google Scholar] [CrossRef]
  23. Polyanskiy, Y.; Wu, Y. Wasserstein continuity of entropy and outer bounds for interference channels. arXiv 2015, arXiv:1504.04419. [Google Scholar] [CrossRef]
  24. Costa, M.H.M.; Gohari, A.; Nair, C.; Ng, D. A Proof of the Noiseberg Conjecture for the Gaussian Z-Interference Channel. In Proceedings of the 2023 IEEE International Symposium on Information Theory (ISIT), Taipei, Taiwan, 25–30 June 2023; pp. 1824–1829. [Google Scholar] [CrossRef]
  25. Costa, M.H.M. A third critical point in the achievable region of the Z-Gaussian interference channel. In Proceedings of the 2014 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 9–14 February 2014. [Google Scholar]
  26. Polyanskiy, Y.; Wu, Y. Wasserstein continuity of entropy and outer bounds for interference channels. IEEE Trans. Inf. Theory 2016, 62, 3992–4002. [Google Scholar] [CrossRef]
  27. Gohari, A.; Nair, C. Outer bounds for multiuser settings: The auxiliary receiver approach. IEEE Trans. Inf. Theory 2022, 68, 701–736. [Google Scholar] [CrossRef]
  28. Costa, M.H.M.; Nair, C.; Ng, D. On the Gaussian Z-interference channel. In Proceedings of the 2017 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 12–17 February 2017; pp. 1–15. [Google Scholar] [CrossRef]
  29. Costa, M.H.M.; Nair, C. Gaussian Z-interference channel: Around the corner. In Proceedings of the 2016 Information Theory and Applications Workshop (ITA), La Jolla, CA, USA, 31 January–5 February 2016; pp. 1–6. [Google Scholar] [CrossRef]
  30. Sason, I. On the corner points of the capacity region of a two-user Gaussian interference channel. IEEE Trans. Inf. Theory 2015, 61, 3682–3697. [Google Scholar] [CrossRef]
  31. Beigi, S.; Liu, S.; Nair, C.; Yazdanpanah, M. Some results on the scalar Gaussian interference channel. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016; pp. 2199–2203. [Google Scholar] [CrossRef]
  32. Ng, W.H. On Gaussian Extremizers for the Capacity Region of the Gaussian Interference Channel. Ph.D. Thesis, The Chinese University of Hong Kong, Hong Kong, China, 2021. [Google Scholar]
Figure 1. Gaussian Z-interference channel.
Figure 1. Gaussian Z-interference channel.
Entropy 26 00898 g001
Figure 2. Degraded Gaussian interference channel.
Figure 2. Degraded Gaussian interference channel.
Entropy 26 00898 g002
Figure 3. Critical points of the capacity region.
Figure 3. Critical points of the capacity region.
Entropy 26 00898 g003
Figure 11. Contour of admissible region for a Z-interference channel with Q 1 = 1 , Q 2 = 1 , and a = 0.5 , i.e., a degraded channel with P 1 = 1 , P 2 = 4 , and N 2 = 3 .
Figure 11. Contour of admissible region for a Z-interference channel with Q 1 = 1 , Q 2 = 1 , and a = 0.5 , i.e., a degraded channel with P 1 = 1 , P 2 = 4 , and N 2 = 3 .
Entropy 26 00898 g011
Figure 12. Contourof the admissible region (blue lines) and optimized points (red lines; obtained numerically) for a Z-interference channel with Q 1 = 1 , Q 2 = 2 , a = 2 2 , i.e., a degraded channel with P 1 = 1 , P 2 = 4 , N 2 = 1 .
Figure 12. Contourof the admissible region (blue lines) and optimized points (red lines; obtained numerically) for a Z-interference channel with Q 1 = 1 , Q 2 = 2 , a = 2 2 , i.e., a degraded channel with P 1 = 1 , P 2 = 4 , N 2 = 1 .
Entropy 26 00898 g012
Figure 13. Admissible region (blue lines) and optimized points (red lines; obtained numerically) for a Z-interference channel with Q 1 = 1 , Q 2 = 1.25 , and a = 1 2 , i.e., a degraded channel with P 1 = 1 , P 2 = 2.5 , and N 2 = 1 .
Figure 13. Admissible region (blue lines) and optimized points (red lines; obtained numerically) for a Z-interference channel with Q 1 = 1 , Q 2 = 1.25 , and a = 1 2 , i.e., a degraded channel with P 1 = 1 , P 2 = 2.5 , and N 2 = 1 .
Entropy 26 00898 g013
Figure 14. Admissible region (blue lines) and optimized points (red lines; obtained numerically) for a Z-interference channel with Q 1 = 1 , Q 2 = 0.25 , and a = 1 2 , i.e., a degraded channel with P 1 = 1 , P 2 = 1 , and N 2 = 3 .
Figure 14. Admissible region (blue lines) and optimized points (red lines; obtained numerically) for a Z-interference channel with Q 1 = 1 , Q 2 = 0.25 , and a = 1 2 , i.e., a degraded channel with P 1 = 1 , P 2 = 1 , and N 2 = 3 .
Entropy 26 00898 g014
Figure 15. Boundaries between pure superposition and multiplex regions for different values of Q 1 and Q 2 .
Figure 15. Boundaries between pure superposition and multiplex regions for different values of Q 1 and Q 2 .
Entropy 26 00898 g015
Figure 16. The noiseberg achievable region for P 1 = 1 , P 2 = 2.5 , and N 2 = 1 .
Figure 16. The noiseberg achievable region for P 1 = 1 , P 2 = 2.5 , and N 2 = 1 .
Entropy 26 00898 g016
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Costa, M.H.M.; Nair, C.; Ng, D. Critical Points in the Noiseberg Achievable Region of the Gaussian Z-Interference Channel. Entropy 2024, 26, 898. https://doi.org/10.3390/e26110898

AMA Style

Costa MHM, Nair C, Ng D. Critical Points in the Noiseberg Achievable Region of the Gaussian Z-Interference Channel. Entropy. 2024; 26(11):898. https://doi.org/10.3390/e26110898

Chicago/Turabian Style

Costa, Max H. M., Chandra Nair, and David Ng. 2024. "Critical Points in the Noiseberg Achievable Region of the Gaussian Z-Interference Channel" Entropy 26, no. 11: 898. https://doi.org/10.3390/e26110898

APA Style

Costa, M. H. M., Nair, C., & Ng, D. (2024). Critical Points in the Noiseberg Achievable Region of the Gaussian Z-Interference Channel. Entropy, 26(11), 898. https://doi.org/10.3390/e26110898

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop