Computer Science > Information Theory
[Submitted on 12 Jul 2012 (v1), last revised 15 Feb 2013 (this version, v2)]
Title:Fundamental Limits of Communications in Interference Networks-Part III: Information Flow in Strong Interference Regime
View PDFAbstract:This third part of the paper is related to the study of information flow in networks with strong interference. First, the two-receiver networks are considered. A unified outer bound for the capacity region of these networks is established. It is shown that this outer bound can be systematically translated into simple capacity outer bounds for special cases such as the two-user Classical Interference Channel (CIC) and the Broadcast Channel with Cognitive Relays (BCCR) with common information. For these channels, special cases are presented where our outer bounds are tight, which yield the exact capacity. More importantly, by using the derived outer bounds, a strong interference regime is identified for the general two-receiver interference networks with any arbitrary topology. This strong interference regime, which is represented by only two conditions, includes all previously known results for simple topologies such as the two-user CIC, the cognitive radio channel, and many others. Then, networks with arbitrary number of receivers are considered. Finding non-trivial strong interference regime for such networks, specifically for the CICs with more than two users, has been one of the open problems in network information theory. In this paper, we will give a solution to this problem. Specifically, a new approach is developed based on which one can obtain strong interference regimes not only for the multi-user CICs but also for any interference network of arbitrary large sizes. For this development, some new technical lemmas are proved which have a central role in the derivations. As a result, this paper establishes the first non-trivial capacity result for the multi-user classical interference channel. A general formula is also presented to derive strong interference conditions for any given network topology.
Submission history
From: Reza Khosravi-Farsani [view email][v1] Thu, 12 Jul 2012 17:51:33 UTC (858 KB)
[v2] Fri, 15 Feb 2013 06:50:26 UTC (849 KB)
Current browse context:
cs.IT
References & Citations
Bibliographic and Citation Tools
Bibliographic Explorer (What is the Explorer?)
Connected Papers (What is Connected Papers?)
Litmaps (What is Litmaps?)
scite Smart Citations (What are Smart Citations?)
Code, Data and Media Associated with this Article
alphaXiv (What is alphaXiv?)
CatalyzeX Code Finder for Papers (What is CatalyzeX?)
DagsHub (What is DagsHub?)
Gotit.pub (What is GotitPub?)
Hugging Face (What is Huggingface?)
Papers with Code (What is Papers with Code?)
ScienceCast (What is ScienceCast?)
Demos
Recommenders and Search Tools
Influence Flower (What are Influence Flowers?)
CORE Recommender (What is CORE?)
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs.