Approximately achieving the feedback interference channel capacity with point-to-point codes

Similar documents
Approximate Capacity of Fast Fading Interference Channels with no CSIT

The Capacity Region of the Gaussian Cognitive Radio Channels at High SNR

Feedback Capacity of the Gaussian Interference Channel to Within Bits: the Symmetric Case

Information Theory Meets Game Theory on The Interference Channel

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

K User Interference Channel with Backhaul

Harnessing Interaction in Bursty Interference Networks

The Generalized Degrees of Freedom of the Interference Relay Channel with Strong Interference

Capacity of a Two-way Function Multicast Channel

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

On Network Interference Management

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

On the Capacity and Degrees of Freedom Regions of MIMO Interference Channels with Limited Receiver Cooperation

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel

On the Capacity of the Interference Channel with a Relay

IN this paper, we show that the scalar Gaussian multiple-access

Wideband Fading Channel Capacity with Training and Partial Feedback

Interference Channel aided by an Infrastructure Relay

Approximate Ergodic Capacity of a Class of Fading Networks

5958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

The Nash Equilibrium Region of the Linear Deterministic Interference Channel with Feedback

Approximate capacity region of the two-pair bidirectional Gaussian relay network

Vector Channel Capacity with Quantized Feedback

Simultaneous SDR Optimality via a Joint Matrix Decomp.

Degrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling

ELEC546 Review of Information Theory

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

The Optimality of Beamforming: A Unified View

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels

Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View

2-user 2-hop Networks

Anatoly Khina. Joint work with: Uri Erez, Ayal Hitron, Idan Livni TAU Yuval Kochman HUJI Gregory W. Wornell MIT

On the Secrecy Capacity of the Z-Interference Channel

ECE Information theory Final (Fall 2008)

arxiv: v2 [cs.it] 27 Aug 2016

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Data Rate Theorem for Stabilization over Time-Varying Feedback Channels

Interactive Interference Alignment

Physical-Layer MIMO Relaying

Incremental Coding over MIMO Channels

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers

Towards control over fading channels

Appendix B Information theory from first principles

Gaussian Relay Channel Capacity to Within a Fixed Number of Bits

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

Approximate Sum-Capacity of Full- and Half-Duplex Asymmetric Interference Channels with Unilateral Source Cooperation

Clean relaying aided cognitive radio under the coexistence constraint

WIRELESS networks with multiple users are interference-limited

USING multiple antennas has been shown to increase the

Simultaneous Nonunique Decoding Is Rate-Optimal

On the Duality of Gaussian Multiple-Access and Broadcast Channels

Graph-based Codes for Quantize-Map-and-Forward Relaying

Communication Games on the Generalized Gaussian Relay Channel

On Linear Transforms in Zero-delay Gaussian Source Channel Coding

Lecture 7 MIMO Communica2ons

An Outer Bound for the Gaussian. Interference channel with a relay.

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Generalized Writing on Dirty Paper

Lecture 4 Capacity of Wireless Channels

Cognitive Multiple Access Networks

ACOMMUNICATION situation where a single transmitter

Two-Way Interference Channel Capacity: How to Have the Cake and Eat it Too

Capacity bounds for multiple access-cognitive interference channel

A Comparison of Two Achievable Rate Regions for the Interference Channel

4184 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 12, DECEMBER Pranav Dayal, Member, IEEE, and Mahesh K. Varanasi, Senior Member, IEEE

EE/Stat 376B Handout #5 Network Information Theory October, 14, Homework Set #2 Solutions

Information Theory for Wireless Communications, Part II:

Interference Channels with Source Cooperation

Random Access: An Information-Theoretic Perspective

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem

Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach

Information Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem

On successive refinement of diversity for fading ISI channels

Capacity-achieving Feedback Scheme for Flat Fading Channels with Channel State Information

Sparse Regression Codes for Multi-terminal Source and Channel Coding

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Interference, Cooperation and Connectivity A Degrees of Freedom Perspective

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Shannon meets Wiener II: On MMSE estimation in successive decoding schemes

An Achievable Rate Region for the 3-User-Pair Deterministic Interference Channel

Survey of Interference Channel

Channel Estimation with Low-Precision Analog-to-Digital Conversion

ELEC E7210: Communication Theory. Lecture 10: MIMO systems

Concatenated Coding Using Linear Schemes for Gaussian Broadcast Channels with Noisy Channel Output Feedback

The Fading Number of a Multiple-Access Rician Fading Channel

Source-Channel Coding Theorems for the Multiple-Access Relay Channel

Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT

Energy State Amplification in an Energy Harvesting Communication System

On the Secrecy Capacity of Fading Channels

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels

Computation Alignment: Capacity Approximation without Noise Accumulation

arxiv: v1 [cs.it] 4 Jun 2018

Augmented Lattice Reduction for MIMO decoding

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

A Systematic Approach for Interference Alignment in CSIT-less Relay-Aided X-Networks

Performance Analysis of MIMO-OSTBC based Selective DF Cooperative Wireless System with Node Mobility and Channel Estimation Errors

Transcription:

Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used for all approximately optimal strategies for the interference channel, with and without feedback. As rate-splitting requires fore-knowledge of channel parameters or statistics, in this paper we explore schemes for the interference channel with feedback that do not use superposition or rate-splitting. We demonstrate that pointto-point codes designed for inter-symbol-interference channels, along with time-sharing can approximately achieve the entire rate region of the interference channel with feedback. We show that such a scheme also approximately achieves the rate-region for the interference channel with fading, for a large class of fading distributions. I. INTRODUCTION Rate splitting is used for all interference channel IC strategies that achieve the approximate capacity region, including feedback and non-feedback cases 4], ], 3]. Such strategies require channel knowledge at the transmitters, as well as joint decoding at the receivers. In this paper we address the question whether we can approximately achieve the capacity region of the Gaussian IC using feedback and point-to-point codes, without using rate splitting. The approximate capacity of the Gaussian interference channel was characterized in ] to within one bit, using a ratesplitting scheme and a specific power allocation that allows part of the interference to be received at noise level. The extension of this scheme to the feedback IC was done in 4], where the capacity region was approximated to within bits. Along similar lines, the work in 5] studied the interference channel with rate-ited feedback, and using a scheme that uses superposition coding and lattice codes, the sum capacity was approximated to within a constant number of bits. Fading interference channels were considered in 3], and it was shown that rate-splitting based on the statistics of the channels, as opposed to particular realizations, is approximately optimal for a large class of fading channels. In 6], it was shown that in some regimes of channel parameters the sum capacity could be approximately achieved for the two-user Gaussian IC with successive decoding as opposed to joint decoding. However, the scheme therein still resorted to superposition coding at the transmitters. In contrast to the strategies in these works, we devise a strategy that does not make use of rate splitting, superposition coding or joint decoding for the feedback IC, and demonstrate that it achieves the entire rate region for symmetric Gaussian interference channels to within a constant gap. Our scheme only uses point-to-point codes, and a feedback scheme based on amplify-and-forward relaying, similar to the one proposed in 4]. Through amplify-and-forward relaying of the feedback signal, the scheme effectively induces a -tap inter-symbol-interference ISI channel for one of the users and a point-to-point feedback channel for the other user. The work in 4] had similarly shown that an amplify-and-forward based feedback scheme can achieve the symmetric rate point, without using rate splitting. Our work can be considered as an extension to this scheme, which enables us to approximately achieve the entire capacity region of the feedback IC. We show that our scheme can be extended to a large class of fading interference channels with symmetric channel statistics, without having the instantaneous channel knowledge at the transmitters, using techniques derived in 3]. We can also extend our scheme to rate-ited feedback IC, which approximates the sum capacity provided that the feedback link capacity is greater than log + INR, where INR is the interference-to-noise ratio. Since the schemes use point-to-point codes and do not use rate-splitting, it could have applicability in scenarios where even the channel statistics could be unknown. We believe that this is a step towards enabling implementable strategies for fading interference channels. The scheme can also potentially enable transmission in interference channel in a rateless fashion, by sending information until the decoding is successful. The paper is organized as follows. In section II we set up the system model and explain the notation used. In section III we present our scheme and state the main results and in section IV we provide the analysis for the scheme. II. SYSTEM MODEL AND NOTATION We consider the symmetric two-user static Gaussian interference channel IC, where the channel inputs X, X at the transmitters and are mapped the outputs Y, Y at receivers and by the equations Y t = g d X t + g c X t + Z t Y t = g c X t + g d X t + Z t, *The authors are with University of California, Los Angeles. Email: {joysonsebastian, karakus, suhasdiggavi}@ucla.edu

Z N 0, Tx X t g d + Y t Rx g c g c Z N 0, Tx X t g d + Y t Rx Figure. Symmetric Gaussian IC with feedback where g c, g d C are complex channel gains, and Z i t CN 0,, i =,, are circularly symmetric complex white Gaussian noise processes. We assume average power constraint n n t= X it, i =,, at the transmitters, and assume Txi has a message W i intended for Rxi for i =,, and W and W are independent. At the end of every time slot, Rxi provides channel output feedback to Txi through orthogonal links, denoted by Ŷit, and thus X i t is a function of W i, Ŷ t i. In this paper, we will focus on two different feedback models, the perfect feedback model, where Ŷi = Y i, and the rate-ited feedback model, where Ŷ i N = fyi N for some function f and a block length of N, subject to the constraint that HŶ i N NC F B. The symmetric two-user fading interference channel similarly consists of the input-output mapping Y t = g tx t + g tx t + Z t Y t = g tx t + g tx t + Z t where the channel gains g ij t, i, j {, } are i.i.d. complex random processes. The g ij t processes for any fixed i, j are i.i.d across time, and the realizations for different i, j are independent. The symmetry assumption implies that g and g have the same distribution, i.e, g g g d, and g and g have the same distribution, i.e., g g g c. We define µ d := E g d ], and µ c := E g c ]. The feedback models considered are similar to those for the static IC. For schemes involving multiple blocks phases we use the notation X in j, where j is the user index, i is the block phase index and N is the number of symbols per block. Also X i k indicates the k th symbol in the i th block phase. We use log to denote logarithm to the base, and define log + := max log, 0. A. Description of the scheme III. THE SCHEME AND MAIN RESULTS In this section, we present a scheme for the static IC that only uses point-to-point codes, and no rate splitting. The extension to the fading IC will be presented later. We consider n transmission phases, each phase having a block length of N. Generate nnr codewords X N,..., X nn, using i.i.d CN 0, distribution. User encodes its message W { },..., nnr onto the corresponding codeword X N,..., X nn. For user, generate nnr codewords X N, and let it encode its message W { },..., nnr onto X N = X N. Note that for user, the coding block length is N, whereas our definition of R assumes a transmission duration of nn. This is because, as will become clearer in what follows, Tx sends fresh information only during the first block, and uses the subsequent blocks to refine its signal through feedback and amplify-and-forward relaying. We will still denote the vector transmitted by Tx at block i > with X in. For clarity of presentation, in this section we will focus on the perfect feedback model. The scheme can be easily modified for the rate-ited feedback with sufficient rate, as will be shown in Section IV. Tx sends X in in phase i {,..., n}. Tx sends X N = X N in phase. For the remaining phases i >, Tx receives Y i N = g d X i N + g c X i N + Z i N from feedback. It can remove g d X i N from Y i N to obtain g c X i N + Z i N. In phase i, Tx sends the resulting interference-plus-noise, normalized to meet the power constraint: = g cx i N + Z i N + g c X in Without loss of generality we assume g c >, otherwise treating interference as noise provides an approximately optimal scheme.

3 In phase i >, Rx receives = g d g cx i N + Z i N + g c X in + g c + Z in Y in and feeds it back to Tx for the next phase. The transmission scheme is summarized in Table I. Note that with this scheme, for phase i >, the Tx observes a block inter-symbol interference ISI channel since its effective channel becomes Y in = g d X in + g c X i N in + g c + Z in where Z = Z in + gczi N. Note that Tx-Rx pair can employ an OFDM-based scheme to convert the resulting ISI + g c channel to a set of parallel non-interfering channels in the frequency domain see Appendix B for details. At the end of n blocks, Rx collects Y N = Table I n-phase SCHEME FOR SYMMETRIC GAUSSIAN IC WITH PERFECT FEEDBACK User Phase Phase.. Phase n X N X N.. X nn X N g cx N +Z N g.. cx n N +Z n N + gc + gc Y N,..., Y nn and decodes by finding W such that X N N W, Y is jointly typical, where X N = X N,..., X nn. At Rx, channel outputs over n phases can be combined with appropriate scaling so that the interference-plus-noise at phases {,..., n } are successively cancelled, i.e., an effective point-to-point channel can be generated through Ỹ N = n i= g d + g c n i Y in see proof for details. Note that this can be viewed as a block version of the Schalkwijk-Kailath scheme ] and the references therein. Given the effective channel Ỹ N, the receiver can simply use point-to-point typicality decoding to recover W, treating the interference in phase n as noise. B. Main results Proposition. The scheme described in Subsection III-A achieves the rate point ] R, R = log + g c + g d, log + g d + g c for the symmetric Gaussian IC with perfect feedback. Since the rate point in Proposition is within a constant number of bits of a corner point of the capacity region of the symmetric feedback IC, and the feedback IC capaciy region has only two non-trivial corner points see Figure, the following theorem follows with detailed calculations in Appendix C. Theorem. The scheme described in Subsection III-A, combined with switching the roles of users and and time-sharing achieves the capacity region of symmetric feedback IC within bits. Note that our scheme does not make use of superposition coding or joint decoding, but only uses point-to-point codes. From the perspective of Rx, the forwarding of feedback at Tx simply converts its channel into a point-to-point ISI channel, with the exception of the first block. On the other hand, from the perspective of Rx, interference is treated as noise which is refined through feedback, which simply converts its own channel into a point-to-point channel with feedback. Our scheme can be easily extended to the rate-ited setting to obtain the following theorem. Theorem 3. For the symmetric Gaussian IC with rate ited feedback, if C F B > log + g c and g c >, then the rate pair R, R = log + g c + g d 3, log + is achievable by the scheme described in Subsection III-A. g d 3 + g c For rate-ited case, one only needs to modify the scheme such that instead of Rx sending complete output and Tx subtracting its own signal, Rx performs Wyner-Ziv quantization-and-binning of the channel output, which effectively provides a quantized version of the interference to Tx. ]

4 Achievable by n phase schemes R bits Outer bound R Figure. Illustration of bounds for capacity region for symmetric Gaussian IC. The corner points of the outer bound can be approximately achieved by our n-phase schemes. The same figure applies for the fading case, but with a larger capacity gap. C. Extension to fading IC For the fading IC with perfect feedback, we consider the same n-phase scheme, with the only difference that for phases i >, Tx transmits X in = gi N c X i N + Z i N. + µc We state the following result from 3] for fading models for using in our results for the fading IC. Lemma 4 3]. For an exponential random variable W with mean µ W, and for any α, β 0, log α + βµ W E log α + βw ] log α + βµ W γ log e ] W where γ is the Euler-Mascheroni constant. For a general distribution, if there exists a constant c such that E log µ W c, then log α + βµ W E log α + βw ] log α + βµ W c. It was shown in 3] that common fading models, such as Weibull and Gamma distribution satisfies the constraint in Lemma 4. Now the following proposition shows that the simple extension of the scheme for static IC translates into a similar result for the fading IC. Proposition 5. The rate pair R, R = ]] log + µ d + µ c 3c, E log + g d + µ c is achievable by the scheme described in Subsection III-A, with the modification. The constant c is determined by the fading model according to Lemma 4. The proof for Proposition 5 relies on the idea that the penalty for treating the fading IC as a static IC with channel gains given by the mean of those in fading IC is bounded by the Jensen s gap for the logarithm of the random channel gain. In particular the Lemma 4 implies that for a class of widely used fading models, this penalty is bounded by a constant independent of the distribution of channel gains. Theorem 6. For the Rayleigh fading case, the two rate points achievable by n phase schemes, together with time sharing achieve the capacity region of symmetric feedback fading IC within + 3γ log e 4.5 bits, where γ is the Euler-Mascheroni constant. For an arbitrary fading model which satisfies the condition in Lemma 4 with a constant c, the gap is within + 3c bits.

5 Note that our computation of R provides a closed form approximate expression for the -tap fading ISI channel capacity, described by Y t = g d t X t + g c t X t + Z t, as a by-product. This gives rise to the following corollary on the capacity of fading ISI channels. Corollary 7. If there exists c that satisfies the condition in Lemma 4 for g d, g c, then the capacity C F ISI of the -tap fading ISI channel is bounded by log + µ d + µ c + C F ISI log + µ d + µ c c. IV. ANALYSIS We describe modifications for the rate ited case with C F B log + g c, g c > and provide the analysis. The analysis carries over to the perfect feedback case by letting C F B. Later we analyze the fading case. A. Static IC: rate ited case with C F B log + g c, g c > The only difference from scheme described in III, for the rate ited case is for user in phases i >. Instead of sending perfect feedback, the Rx performs Wyner-Ziv quantize-and-binning of the received symbols, considering that fact that Tx already has the side-information about its own transmitted symbols. In phase i, Rx receives Y in = g d X in + g c X in + Z in. Using the Wyner-Ziv scheme with rate log + + gc D, and distortion D, Tx can recover Ŷ N over the feedback channel, provided that C F B log + g c and g c >. After obtaining the quantized version Ŷ in = g d X in + g c X in + Z in + Q in from the feedback, Tx strips out g d X in to obtain g c X in + Z in + Q in and in the i + th phase it sends: = g cx in + Z in + Q in + D + g c X i+n Also note that Rx has knowledge of the quantization noise Q in which it can use in the noise refinement. The transmission scheme is illustrated in Table II. Note that the scheme reduces to perfect feedback case by letting D 0. Table II n PHASE SCHEME FOR RATE LIMITED FEEDBACK CASE User Phase Phase.. Phase n X N X N.. X nn X N g cx N +Z N +Q N g.. cx n N +Z n N +Q n N +D+ gc +D+ gc Decoding at Rx: At the end of n blocks Rx collects Y N = Y N,... Y nn and decodes W such that X N N W, Y is jointly typical, where X N = X N,... X nn. Using standard techniques it follows that for the n-phase scheme as N user can achieve the rate n log KY n where K K Y X n Y n denotes the determinant of covariance matrix for the n-phase scheme. Letting n, Rx can achieve the rate n n log KY n. We need K Y X n to evaluate n n log KY n where K K Y X n Y n denotes the determinant of covariance matrix for the n-phase scheme. The following lemma is helpful in evaluating this it. a b Lemma 8. If A = a ], A = b a then ], A 3 = a b 0 b a b 0 b a, A 4 = a inf n n log A n log. a b 0 0 b a b 0 0 b a b 0 0 b a etc. with a > 4 b, Proof: The proof is given in Appendix A. For the n-phase scheme, the K Y n matrix has the form A n+, as defined in Lemma 8 after identifying a = + g c + g d g and b = d g c +D+ g. Also, K c Y X n is a diagonal matrix with first diagonal element + g c and rest of the diagonal

elements + g c + D n, +D. Hence + g c KY X +D n n = + g c +D + g + g c +D c n. Since + g c +D + g c +D sup n n log KY X n log + D. Therefore the following rate is achievable for user R n n log K Y n KY X n We have using Lemma 8. Hence = n n log K Y n log + D inf n n log K + g c + g d Y n log R log + g c + g d log + D 6 is achievable. Using D if follows that R log + g c + g d 3 is achievable for the rate ited case. For perfect feedback case R log + g c + g d easily follows by setting D = 0. Decoding at Rx: For user we can use a block variant of Schalkwijk-Kailath scheme ] to achieve R = log + g d. + g c The key idea is that the interference-plus-noise sent in subsequent slots can indeed refine the symbols of the previous slot. The chain of refinement over n phases compensate for the fact that the information symbols are sent only in the first phase. Rx can remove the quantization noise Q in from its recieved symbols for i > Y in = g d g cx in + Z in + Q in + g c X in + D + g c + Z in to obtain = g d g cx in + Z in + g c X in + D + g c + Z in. Y in for i > and let Y N = Y N. Now Ỹ N = n i= g d + D + g c = g d g d + D + g c n i n Y in X + g c X nn + Z nn. Now Rx decodes for its message from Ỹ N. Hence Rx can obtain the rate R inf n n log g d n g d + + D + g c + g c g d + = log + D + g c. Since D, R = log + g d achievable for perfect feedback case. 3+ g c is achievable for rate-ited case and by setting D = 0, R = log + g d + g c is

7 B. Sketch of Analysis for fading case Similar to static case it follows that User achieves the following rate with jointly typical decoding ] R n n E K Y n log K Y X n where where K Y n is the covariance matrix for the n-phase scheme similar to the static case, but it now contains random elements. In Appendix D, we show that this it is at least log + µ d + µ c 3c. The proof relies on Lemma 8 and Lemma 4. Rx can perform noise refinement similar to the non-fading case and achieve R E log + g d +µ c ]. C. Capacity gap for fading IC We can obtain the following outer bounds for i.i.d. fading Gaussian interference channels with feedback from 3]: ] R, R E log g d + g c + ] R + R E log + g d + g c ] + E log g d + g c + g d g c +. The outer bounds again reduce to a pentagonal region with two non-trivial corner points see Figure. Our n-phase scheme can achieve the two corner points within + 3c bits for each user. The computations can be done similar to the static case as in Appendix C, and using Lemma 4. V. CONCLUSION In this paper we proposed a scheme for the interference channel with feedback which did not use rate-splitting and enabled the use of point-to-point codes. We showed the approximate optimality of this scheme for static as well as a class of fading channels. Part of the ongoing work is to achieve the approximate capacity without rate splitting, when feedback capacity is less than required by the current scheme. Another line of ongoing work is to demonstrate the approximate optimality of the scheme in a rateless setting. REFERENCES ] R. H Etkin, D. Tse, and H. Wang. Gaussian interference channel capacity to within one bit. IEEE Transactions on Information Theory, 54:5534 556, 008. ] J. Schalkwijk and T. Kailath. A coding scheme for additive noise channels with feedback i: No bandwidth constraint. IEEE Transactions on Information Theory, :7 8, 966. 3] J. Sebastian, C. Karakus, S N. Diggavi, and I-H. Wang. Rate splitting is approximately optimal for fading gaussian interference channels. Allerton Conference on Communication, Control and Computing, October 05. 4] C. Suh and D. Tse. Feedback capacity of the gaussian interference channel to within bits. IEEE Transactions on Information Theory, 575:667 685, May 0. 5] A. Vahid, C. Suh, and S. Avestimehr. Interference channels with rate-ited feedback. IEEE Transactions on Information Theory, 585:788 8, May 0. 6] Y. Zhao, C-W. Tan, S. Avestimehr, S N. Diggavi, and G J. Pottie. On the sum-capacity with successive decoding in interference channels. In Information Theory Proceedings ISIT, 0 IEEE International Symposium on, pages 494 498. IEEE, 0.

8 The following recursion easily follows: APPENDIX A MATRIX DETERMINANT: ASYMPTOTIC BEHAVIOR A n = a A n b A n with A = a, A = a b. Also A 0 can be consistently defined to be. The characteristic equation for this recursive relation is given by: λ a λ + b = 0 and the characteristic roots are given by: λ = a + a 4 b, λ = a a 4 b. Now the solution of the recursive system is given by: with the boundary conditions A n = c λ n + c λ n = c + c a = c λ + c λ. It can be easily seen that c > 0, λ > λ > 0 since a > 4 b. Now n log A n = n n log c λ n + c λ n = log λ n λ n + log c + c n n λ n n The step a follows because > λ λ > 0 and c > 0. a = log λ = log a + a 4 b. APPENDIX B IMPLEMENTATION USING OFDM TECHNIQUES With our scheme the channel for user can be to an inter-symbol interference channel since user amplifies and forwards the interference-plus-noise. We modify our scheme slightly to be able to use the OFDM techniques. We use n + phase and user repeats the symbols from phase on the phase n +. The scheme is described in Table III. A succinct notation FB: X N is used to indicate that the interference of X N and the noise is amplified and forward similar to Table I. User Phase Phase. Phase n Phase n + X N X N. X nn X N X N FB: X N. FB: X n N FB: X nn Table III MODIFIED N-PHASE SCHEME FOR OFDM IMPLEMENTATION Ignoring the first phase at Rx we get the following for the first user for the phases to n + d f 0 0.. 0 0 d f 0... 0 0 d f... Y =....... X + Z....... 0... 0 d f f 0... 0 d where Y N = transpose Y N,..., Y n+n, X N = transpose X N,..., X nn and f = g d and d = the noise power in each phase being + gc + g c the DFT matrices and the n eigenvalues are given by πij λ j = d + f exp n g c + g c and = + gc + g c. Since the transfer matrix is circulant, it can be diagonalized using, j = 0,..., n

9 where i is the imaginary unit. This yields n point to point channels with SNR j = user is given by: πij d+f exp n + gc + gc R n d + f exp πij n log + n + + g c j=0 + g c = n log + d + f + df cos φ + πj n n + j=0 + g c + g c. Hence the rate for the where φ is to account for any phase difference between the complex numbers f and d. As as n we would get a Riemann integral. We get where p = + d + f + gc and q = df + gc + gc + gc R π π Fact 9. For p q, π log p + q cos θ dθ = log 0 ˆ π 0 log p + q cos φ + θ dθ. Now we use the following fact and periodicity of cos. function. p+ p q Using the previous fact it easily follows that R log p = log + d + f + gc + gc and hence achievablity follows. d + f + + + g c + g c = + g c + g d R log + g c + g d is achievable. Now APPENDIX C APPROXIMATE CAPACITY USING N PHASE SCHEMES The following outer bounds follow from Suh-Tse. R log + g c + g d R + R log + g d + g c R log + log + g d + g c + g d g c + g c + g d. The above outer-bound region is a polytope with the following two non-trivial corner points: R = log + g c + g d R = log + g d + log + g d g c + g c + g d + g c R = log + g d + log + g d g c + g c + g d + g c R = log + g c + g d We can achieve these rate points within bits for each user using the n-phase schemes. The only important point to verify is in the following claim Claim 0. log + g d + log + g d g c log gd + + g c + g d + g c + g c

0 Now if Proof: We have g d g c due to AM-GM inequality. Hence g d + g c g d g c log + + g d + g c. log gd + + g = 0 then g d c g d > and hence again log + g c + g c + g d User can achieve the following rate. It can be easily verified that: + g c and hence log + g d log log =. If gd + + g = log + + gc <. c g d + g c APPENDIX D ANALYSIS OF N PHASE SCHEME FOR FADING IC WITH FEEDBACK n R n ] n E K Y n log KY X n. n E log KY X n ] ] = E log + g c + g c where g c and g c are independent with same fading distribution. Indeed it is also true that: n n log KY X n ] = E log + g c + g c using law of large numbers. Now E log ] + g c + g c where we used the Jensen s inequality and Lemma 4. = E log + g c + g c ] E log + g c ] log + E g c ] log + E g c ] + c + c Lemma. n n E log K Y n ] n n log ˆKY n c where ˆK Y n has all the g c i s replaced by E g c ] and similarly for g d i s. log gd + + g > 0 then c Proof: The proof involves expanding the matrix determinant and repeated application of Lemma 4. The details are given in Appendix E. Hence it follows that: n n E log K Y n ] log + E g d ] + E g c ] + c using the result for the non-fading case and hence R log + E g d ] + E g c ] + 3c is achievable. Also for the Rayleigh fading case c = γ log e and so + 3γ log e = 4.498 numerically.

APPENDIX E FADING MATRIX E log K Y n ] = E log + g c n + g d n K Y n g d n g c n g c n + E g c ] K Y n E log + E g c ] + E g d ] E g d ] E g c ] g c n K Y n + E g c ] K Y n c. The first step is by expanding the determinant. We use Lemma 4 twice in the second step. This is justified because the coefficients of g c n and g d n in the above expansion are non-negative due to the fact that all the matrices involved are covariance matrices, and the coefficients themselves are independent of g c n and g d n. This procedure can be carried out n times and it follows that: n n E log K Y n ] n n log ˆKY n c where ˆK Y n has all the g c i s replaced by E g c ] and similarly for g d i s.