Polyanskiy [1] proposed a framework for the MAC problem with a large number of users, where users employ a common codebook in the finite blocklength regime. In this work, we extend [1] to the case when the number of active users is random and there is also a delay constraint. We first define a random-access channel and derive the general converse bound. Our bound captures the basic tradeoff between the required energy and the delay constraint. Then we propose an achievable bound for block transmission. In this case, all packets are transmitted in the second half of the block to avoid interference. We then study treating interference as noise (TIN) with both single user and multiple users. Last, we derive an achievable bound for the packet splitting model, which allows users to split each packet into two parts with different blocklengths. Our numerical results indicate that, when the delay is large, TIN is effective; on the other hand, packet splitting outperforms as the delay decreases.
more »
« less
Multilevel Topological Interference Management: A TIM-TIN Perspective
The robust principles of treating interference as noise (TIN) when it is sufficiently weak, and avoiding it when it is not, form the background of this work. Combining TIN with the topological interference management (TIM) framework that identifies optimal interference avoidance schemes, we formulate a TIM-TIN problem for multilevel topological interference management, wherein only a coarse knowledge of channel strengths and no knowledge of channel phases is available to transmitters. To address the TIM-TIN problem, we first propose an analytical baseline approach, which decomposes a network into TIN and TIM components, allocates the signal power levels to each user in the TIN component, allocates signal vector space dimensions to each user in the TIM component, and guarantees that the product of the two is an achievable number of signal dimensions available to each user in the original network. Next, a distributed numerical algorithm called ZEST is developed. The convergence of the algorithm is demonstrated, leading to the duality of the TIM-TIN problem in terms of generalized degrees-of-freedom (GDoF). Numerical results are also provided to demonstrate the superior sum-rate performance and fast convergence of ZEST.
more »
« less
- Award ID(s):
- 1731384
- PAR ID:
- 10292991
- Date Published:
- Journal Name:
- IEEE Transactions on Communications
- ISSN:
- 0090-6778
- Page Range / eLocation ID:
- 1 to 1
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
null (Ed.)Considered is a multi-channel wireless network for secret communication that uses the signal-to-interference-plus-noise ratio (SINR) as the performance measure. An eavesdropper can intercept encoded messages through a degraded channel of each legitimate transmitter-receiver communication pair. A friendly interferer, on the other hand, may send cooperative jamming signals to enhance the secrecy performance of the whole network. Besides, the state information of the eavesdropping channel may not be known completely. The transmitters and the friendly interferer have to cooperatively decide on the optimal jamming power allocation strategy that balances the secrecy performance with the cost of employing intentional interference, while the eavesdropper tries to maximize her eavesdropping capacity. To solve this problem, we propose and analyze a non-zero-sum game between the network defender and the eavesdropper who can only attack a limited number of channels. We show that the Nash equilibrium strategies for the players are of threshold type. We present an algorithm to find the equilibrium strategy pair. Numerical examples demonstrate the equilibrium and contrast it to baseline strategies.more » « less
-
This paper aims to realize a new multiple access technique based on recently proposed millimeter- wave reconfigurable antenna architectures. To this end, first we show that integration of the existing reconfigurable antenna systems with the well-known non-orthogonal multiple access (NOMA) technique causes a significant degradation in sum rate due to the inevitable power division in reconfigurable antennas. To circumvent this fundamental limit, a new multiple access technique is proposed. The technique which is called reconfigurable antenna multiple access (RAMA) transmits only each user's intended signal at the same time/frequency/code, which makes RAMA an inter-user interference-free technique. Two different cases are considered, i.e., RAMA with partial and full channel state information (CSI). In the first case, CSI is not required and only the direction of arrival for a specific user is used. Our analytical results indicate that with partial CSI and for symmetric channels, RAMA outperforms NOMA in terms of sum rate. Further, the analytical result indicates that RAMA for asymmetric channels achieves better sum rate than NOMA when less power is assigned to users that experience better channel quality. In the second case, RAMA with full CSI allocates optimal power to each user which leads to higher achievable rates compared to NOMA for both symmetric and asymmetric channels. The numerical computations demonstrate the analytical findings.more » « less
-
As applications of Internet-of-things (IoT) rapidly expand, unscheduled multiple user access with low latency and low cost communication is attracting growing more interests. To recover the multiple uplink signals without strict access control under dynamic co-channel interference environment, the problem of blind demixing emerges as an important obstacle for us to overcome. Without channel state information, successful blind demixing can recover multiple user signals more effectively by leveraging prior information on signal characteristics such as constellations and distribution. This work studies how forward error correction (FEC) codes in Galois Field can generate more effective blind demixing algorithms. We propose a constrained Wirtinger flow algorithm by defining a valid signal set based on FEC codewords. Specifically, targeting the popular polar codes for FEC of short IoT packets, we introduce signal projections within iterations of Wirtinger Flow based on FEC code information. Simulation results demonstrate stronger robustness of the proposed algorithm against noise and practical obstacles and also faster convergence rate compared to regular Wirtinger flow algorithm.more » « less
-
We propose a mechanism for unlicensed LTE channel selection that not only takes into account interference to and from Wi-Fi access points but also considers other LTE operators in the unlicensed band. By collecting channel utilization statistics and sharing this information periodically with other unlicensed LTE eNBs, each eNB can improve their channel selection given their limited knowledge of the full topology. While comparing our algorithm to existing solutions, we find that the similarity between sensed Wi-Fi occupation at neighboring eNBs greatly impacts the performance of channel selection algorithms. To achieve better performance across diverse scenarios, we expand on our statistical channel selection formulation to include reinforcement learning, thereby balancing the shared contextual information with historical performance. We simulate operation in the unlicensed band using our channel selection algorithm and show how Wi-Fi load and inter-cell interference estimation can jointly be used to select transmission channels for all small cells in the network. Our approaches lead to an increase in user-perceived throughput and spectral efficiency across the entire band when compared to the greedy channel selection.more » « less
An official website of the United States government

