On exploiting the interference structure for reliable communications

O. Simeone, Elza Erkip, S. Shamai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Consider an additive Gaussian noise channel affected by an additive interference sequence, taken from a given codebook, which is known non-causally at the transmitter (e.g., via prior decoding). It is known that in this case optimal performance is attained by Dirty Paper Coding, which treats the interference signal as unstructured. In other words, for this example, the knowledge of the specific interferer's codebook at the decoder is not useful in terms of capacity. In this paper, two variations of this basic scenario are presented in which treating interference as unstructured is instead generally suboptimal. In the first case, a second encoder of the source message is present in the system that is not aware of the interferer's sequence, and source and interference messages are uncorrelated; In the second case, the sources encoded by the informed transmitter and interferer are correlated (and an uninformed encoder may or may not be present). Results are given in terms of conditions for achievability for both discrete and Gaussian models of the scenarios discussed above, and corroborated by numerical results. Optimal strategies are also identified in special cases. The conclusions herein point to the importance of exploiting the interfererence structure in multiterminal and source-channel coding scenarios.

Original languageEnglish (US)
Title of host publication2010 44th Annual Conference on Information Sciences and Systems, CISS 2010
DOIs
StatePublished - 2010
Event44th Annual Conference on Information Sciences and Systems, CISS 2010 - Princeton, NJ, United States
Duration: Mar 17 2010Mar 19 2010

Other

Other44th Annual Conference on Information Sciences and Systems, CISS 2010
CountryUnited States
CityPrinceton, NJ
Period3/17/103/19/10

Fingerprint

Transmitters
Channel coding
Communication
Signal interference
Decoding
Interference
Scenarios

ASJC Scopus subject areas

  • Information Systems
  • Information Systems and Management

Cite this

Simeone, O., Erkip, E., & Shamai, S. (2010). On exploiting the interference structure for reliable communications. In 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010 [5464932] https://doi.org/10.1109/CISS.2010.5464932

On exploiting the interference structure for reliable communications. / Simeone, O.; Erkip, Elza; Shamai, S.

2010 44th Annual Conference on Information Sciences and Systems, CISS 2010. 2010. 5464932.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simeone, O, Erkip, E & Shamai, S 2010, On exploiting the interference structure for reliable communications. in 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010., 5464932, 44th Annual Conference on Information Sciences and Systems, CISS 2010, Princeton, NJ, United States, 3/17/10. https://doi.org/10.1109/CISS.2010.5464932
Simeone O, Erkip E, Shamai S. On exploiting the interference structure for reliable communications. In 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010. 2010. 5464932 https://doi.org/10.1109/CISS.2010.5464932
Simeone, O. ; Erkip, Elza ; Shamai, S. / On exploiting the interference structure for reliable communications. 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010. 2010.
@inproceedings{5ee0a2ea15784e4fb7c15d0724ee563f,
title = "On exploiting the interference structure for reliable communications",
abstract = "Consider an additive Gaussian noise channel affected by an additive interference sequence, taken from a given codebook, which is known non-causally at the transmitter (e.g., via prior decoding). It is known that in this case optimal performance is attained by Dirty Paper Coding, which treats the interference signal as unstructured. In other words, for this example, the knowledge of the specific interferer's codebook at the decoder is not useful in terms of capacity. In this paper, two variations of this basic scenario are presented in which treating interference as unstructured is instead generally suboptimal. In the first case, a second encoder of the source message is present in the system that is not aware of the interferer's sequence, and source and interference messages are uncorrelated; In the second case, the sources encoded by the informed transmitter and interferer are correlated (and an uninformed encoder may or may not be present). Results are given in terms of conditions for achievability for both discrete and Gaussian models of the scenarios discussed above, and corroborated by numerical results. Optimal strategies are also identified in special cases. The conclusions herein point to the importance of exploiting the interfererence structure in multiterminal and source-channel coding scenarios.",
author = "O. Simeone and Elza Erkip and S. Shamai",
year = "2010",
doi = "10.1109/CISS.2010.5464932",
language = "English (US)",
isbn = "9781424474172",
booktitle = "2010 44th Annual Conference on Information Sciences and Systems, CISS 2010",

}

TY - GEN

T1 - On exploiting the interference structure for reliable communications

AU - Simeone, O.

AU - Erkip, Elza

AU - Shamai, S.

PY - 2010

Y1 - 2010

N2 - Consider an additive Gaussian noise channel affected by an additive interference sequence, taken from a given codebook, which is known non-causally at the transmitter (e.g., via prior decoding). It is known that in this case optimal performance is attained by Dirty Paper Coding, which treats the interference signal as unstructured. In other words, for this example, the knowledge of the specific interferer's codebook at the decoder is not useful in terms of capacity. In this paper, two variations of this basic scenario are presented in which treating interference as unstructured is instead generally suboptimal. In the first case, a second encoder of the source message is present in the system that is not aware of the interferer's sequence, and source and interference messages are uncorrelated; In the second case, the sources encoded by the informed transmitter and interferer are correlated (and an uninformed encoder may or may not be present). Results are given in terms of conditions for achievability for both discrete and Gaussian models of the scenarios discussed above, and corroborated by numerical results. Optimal strategies are also identified in special cases. The conclusions herein point to the importance of exploiting the interfererence structure in multiterminal and source-channel coding scenarios.

AB - Consider an additive Gaussian noise channel affected by an additive interference sequence, taken from a given codebook, which is known non-causally at the transmitter (e.g., via prior decoding). It is known that in this case optimal performance is attained by Dirty Paper Coding, which treats the interference signal as unstructured. In other words, for this example, the knowledge of the specific interferer's codebook at the decoder is not useful in terms of capacity. In this paper, two variations of this basic scenario are presented in which treating interference as unstructured is instead generally suboptimal. In the first case, a second encoder of the source message is present in the system that is not aware of the interferer's sequence, and source and interference messages are uncorrelated; In the second case, the sources encoded by the informed transmitter and interferer are correlated (and an uninformed encoder may or may not be present). Results are given in terms of conditions for achievability for both discrete and Gaussian models of the scenarios discussed above, and corroborated by numerical results. Optimal strategies are also identified in special cases. The conclusions herein point to the importance of exploiting the interfererence structure in multiterminal and source-channel coding scenarios.

UR - http://www.scopus.com/inward/record.url?scp=77953707902&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77953707902&partnerID=8YFLogxK

U2 - 10.1109/CISS.2010.5464932

DO - 10.1109/CISS.2010.5464932

M3 - Conference contribution

SN - 9781424474172

BT - 2010 44th Annual Conference on Information Sciences and Systems, CISS 2010

ER -