Opportunistic interference management for multicarrier systems

We study opportunistic interference management when there is bursty interference in parallel 2-user linear deterministic interference channels. A degraded message set communication problem is formulated to exploit the burstiness of interference in M subcarriers allocated to each user. We focus on symmetric rate requirements based on the number of interfered subcarriers rather than the exact set of interfered subcarriers. Inner bounds are obtained using erasure coding, signal-scale alignment and Han-Kobayashi coding strategy. Tight outer bounds for a variety of regimes are obtained using the El Gamal-Costa injective interference channel bounds and a sliding window subset entropy inequality [7]. The result demonstrates an application of techniques from multilevel diversity coding to interference channels. We also conjecture outer bounds indicating the sub-optimality of erasure coding across subcarriers in certain regimes.

[1]  Tetsunao Matsuta,et al.  国際会議開催報告:2013 IEEE International Symposium on Information Theory , 2013 .

[2]  Vinod M. Prabhakaran,et al.  Opportunistic interference management , 2009, 2009 IEEE International Symposium on Information Theory.

[3]  Aydano B. Carleial,et al.  A case where interference does not reduce capacity (Corresp.) , 1975, IEEE Trans. Inf. Theory.

[4]  Vinod M. Prabhakaran,et al.  Harnessing bursty interference , 2009, 2009 IEEE Information Theory Workshop on Networking and Information Theory.

[5]  Tie Liu,et al.  Symmetrical multilevel diversity coding with an all-access encoder , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[6]  Suhas N. Diggavi,et al.  Wireless Network Information Flow , 2007, ArXiv.

[7]  Raymond W. Yeung,et al.  Symmetrical multilevel diversity coding , 1997, IEEE Trans. Inf. Theory.

[8]  Abhay Parekh,et al.  The Approximate Capacity of the Many-to-One and One-to-Many Gaussian Interference Channels , 2008, IEEE Transactions on Information Theory.

[9]  Thomas M. Cover,et al.  Network Information Theory , 2001 .