Skip to main content

Joint coding in parallel symmetric interference channels with deterministic model

Abstract

In parallel interference channels, the sum-rate achieved by joint coding among subchannels can exceed the sum of the achievable rate of each subchannel with individual coding. In this paper, a capacity-achieving joint coding scheme is proposed for parallel symmetric interference channel. First, we provide a motivating example, from which the insights into the joint coding scheme are obtained. Second, we introduce a transmission scheme in two-user parallel symmetric interference channels, where the subchannels can cooperate to cancel interference. Then, by taking advantage of signal level alignment of the interference from different users, we generalize the scheme to multi-user cases. Finally, we prove that our scheme can achieve the sum capacity and illustrate the generalized degrees of freedom gains over individual coding in various interference scenarios.

1 Introduction

Parallel interference channel is a collection of subchannels where each subchannel is an interference channel but there is no interference between the subchannels. The typical parallel interference channels are frequency-selective orthogonal multicarrier interference channel and time-varying multi-symbol interference channel.

When considering parallel interference channel, many researchers focused their attentions on separate coding over each subchannel [13]. This might be due to the well-known fact that parallel point-to-point channel, multiple-access channel and broadcast channel are all separable. However, parallel interference channel is not separable in general. As shown by a counterexample in [4], joint coding across multiple subchannels outperforms individually optimal coding. Recently, for the two-user parallel Gaussian interference channels, Shang et al. [5] determined the conditions on the channel coefficients and power constraints under which independent coding across subchannels (i.e., treating interference as noise) is optimal. For K-user parallel deterministic interference networks, Sun and Jafar [6] derived the conditions under which treating interference as noise at each subchannel is optimal. For two-user ergodic Gaussian interference channels, Sankar et al. [7] showed that under certain conditions, joint coding across the fading states, which can be seen as subchannels, is required for optimality.

In this paper, the link between a transmitter and its desired receiver is denoted as direct-link, and the link between a transmitter and its undesired receiver is denoted as cross-link. For individual coding in each subchannel, the existence of cross-link can only deteriorate the direct-link transmission [810]. In weak interference channels, the interference will decrease the signal-to-interference-plus-noise ratio (SINR). In strong interference channels, although the interference can be decoded and then canceled, it occupies higher signal amplitude levels, leading to a reduced transmission rate of desired signals.

Recently, research results change this pessimistic point of view and reveal that the interference can actually be exploited to help decoding. In [11], the linear interference network problem is translated to the index coding problem. The authors used an example to show that the interference bit decoded in the second time slot can be used to cancel the interference encountered in the first time slot. In [12, 13], the interference signal goes through two cross-links through feedback and finally becomes desired signal.

In parallel interference channels, the strong interference subchannels can be used to help the decoding of other weak interference subchannels by retransmitting the bits that generate interference, as will be explained in the subsequent sections. However, when two users retransmit their information simultaneously in the same strong interference subchannel, they also interfere with each other. In [14], this problem was simplified by only using individual coding on strong interference subchannels. In [15], considering a specific scenario, only one user was allowed to transmit on these strong interference subchannels. In [16], a capacity-achieving joint coding scheme was proposed for two-user two-subchannel symmetric deterministic interference channel, but the proof of capacity achieving is divided into multiple subcases, and the corresponding joint coding schemes are respectively designed for each subcase. Due to the lack of systematic design principle, this scheme is hard to be generalized to parallel interference channel with multiple subchannels and multiple users. In [17], the parallel symmetric two-user interference channels were studied when the interference is bursty and feedback is available from the receivers. With the help of channel bursty and feedback, the subchannel in very strong interference regime can help to recover the signals for subchannels in strong and weak interference regime. However, the scheme does not work in constant interference channels, and there is no mechanism to let the strong interference subchannel help the weak interference subchannel.

In this paper, we study joint coding problem over parallel symmetric interference channel with multiple subchannels, where each subchannel is constant over the coding block and no feedback information from the receiver is available. First, we introduce a transmission scheme under two-user parallel symmetric deterministic interference channels. Then, we extend the scheme to multi-user cases using the principle of signal level alignment. To prove the optimality of this scheme, we derive the capacity of this class of channels by using El Gamal and Costa’s result [18] and show that the proposed scheme can achieve the sum capacity. Finally, we illustrate the generalized degrees of freedom (GDoF) gains of the proposed joint coding scheme over the individual coding scheme in various interference scenarios.

The capacity or GDoF analyses of the interference channel through the help of deterministic channel model have been got a lot of attentions in recent years, but few of them studied the parallel interference channel. For example, in [19], the sum capacity of a special case of K-user Gaussian interference network is determined within O(K) bits, where only one of the users interferes with and is also interfered by all the other users. Multi-user cognitive interference network is studied in [20], where secondary users have a priori non-causal message knowledge of primary license holders and can transmit signals to neutralize the interference appeared in primary receivers. Symmetric interference relay channel is studied in [21], where a full-duplex relay is present to coordinate the interference. Furthermore, multicoding scheme is developed in [22], by which the same rate region compared with Han-Kobayashi coding is achieved in two-user discrete memoryless interference channel. In [23], a tight converse for two-user deterministic interference channel is derived by extended network and generalized cut-set bound.

The rest of this paper is organized as follows. In Section 2, we provide the deterministic model for K-user parallel symmetric interference channels. Then, in Section 3, we introduce the individual coding scheme and its achieved GDoF for symmetric interference channels. In Section 4, the joint coding schemes are developed in two-user and multi-user cases, respectively. We prove the optimality of the proposed joint coding scheme in Section 5, where the GDoF gains over individual coding are illustrated through analysis and numerical results. Finally, Section 6 concludes this paper.

2 Channel model

It is hard to study the parallel interference network problem under Gaussian channels. In this paper, we resort to the deterministic channel model proposed in [24], which approximates the Gaussian channel as a discrete set of parallel noiseless channels [24, 25].

For the convenience of readers, we first introduce the deterministic model of point-to-point channel proposed in [24] and define several notions to be used subsequently. Then, we introduce the deterministic model of interference channel, in which each link is modeled in the same way as in point-to-point channel. Finally, we provide the deterministic model of parallel symmetric interference channel, in which each subchannel is modeled as in interference channel.

2.1 Deterministic model of point-to-point channel

In point-to-point Gaussian channel, a real-valued input x generates a real-valued output y degraded by Gaussian noise z, i.e.,

$$ y=hx + z, $$
(1)

where h is the channel coefficient, E[ |x|2]=P, and the variance of z is N 0. The signal-to-noise ratio (SNR) is defined as |h|2 P/N 0=γ. If the powers of x and z are normalized to 1, then the effective channel gain is \(\sqrt {\gamma }\).

To transform the Gaussian channel to a deterministic channel, we first represent the normalized x in a base-2 notation as

$$ \bar{x}=0.b_{1} b_{2} b_{3} b_{4} b_{5} \ldots, $$
(2)

where each bit b i {0,1}, which can be interpreted as occupying a signal level, and the most significant bit corresponds to the highest signal level.

Definition 1

In a deterministic channel, we quantize signal into multiple layers. Each layer is referred to a signal level, or simply called a level.

Definition 2

Each part of the signal in one level is called a bit. Obviously, all the bits compose the signal.

Definition 3

Different bits from a signal occupy different levels. Relative level order of two bits refers to the relative height between the two levels that they occupy. There are three kinds of relative level order between a pair of bits: higher, lower, and equal.

Given the SNR γ, the output of the deterministic channel is

$$ \bar{y}=\lfloor 2^{M} \bar{x} \rfloor = b_{1} b_{2} \ldots b_{M}, $$
(3)

where \(M=\frac {1}{2} \lfloor \log _{2} \gamma \rfloor \) is the largest integer below log2γ and b M is the lowest signal level above the noise. In other words, the input bit sequence is shifted by M positions and the remaining part after b M is truncated due to the degradation of noise.

Since there is no interference, the receiver can obtain M bits. The capacity of deterministic point-to-point channel is defined as

$$ C_{\mathrm{P2P}}(\text{SNR}) = \frac{1}{2} \lfloor \log_{2}\gamma \rfloor = M. $$
(4)

The shifting and truncation operations are illustrated in Fig. 1. In Fig. 1, b 1,b 2… are bits occupying different levels. For example, the relative order between b 2 and b 5 is that b 2 is higher than b 5. Besides, the capacity of this channel is C P2P(SNR)=4.

Fig. 1
figure 1

Deterministic model of a point-to-point channel

2.2 Deterministic model of interference channel

In K-user Gaussian interference channels, the inputs of K users form a vector x, and the output vector is

$$ \boldsymbol{y}=\boldsymbol{H}\boldsymbol{x} + \boldsymbol{z}, $$
(5)

where the entry of channel matrix H i,j stands for the channel gain from transmitter j to receiver i. The noise of different users is assumed to be independent and identically distributed (i.i.d.), and E[ z z H]=N 0 I. The SNRs depend on the channel gains of the direct-link, which are γ k,k =|H k,k |2 P k /N 0. The interference-to-noise ratios (INRs) depend on the channel gains of the cross-link, which are γ i,j =|H i,j |2 P j /N 0,ij.

For a K-user deterministic interference channel, the channel inputs can be written in a base-2 notation, i.e.,

$$ \begin{array}{ccc} \bar{x}_{1}&=&0.a_{1}a_{2}a_{3}a_{4}a_{5}\ldots,\\ \bar{x}_{2}&=&0.b_{1}b_{2}b_{3}b_{4}b_{5}\ldots,\\ &\vdots&\\ \bar{x}_{K}&=&0.k_{1}k_{2}k_{3}k_{4}k_{5}\ldots, \end{array} $$
(6)

where a i ,b i ,,k i {0,1}.

At the receiver, the outputs of the direct-link channel and cross-link channels are added together. Specially, the signal addition takes the form of XOR, i.e., modulo-2 addition. Therefore, the addition of signal and interference on one signal level does not affect that on other signal levels. The bits that are lower than noise level are lost in this model. This simplification allows us to more focus on the interactions between signal and interference.

Define \(M_{i,j}=\frac {1}{2} \lfloor \log _{2} \gamma _{i,j} \rfloor \) and apply (3) to every direct-link and cross-link of (5). Then, the output can be written as

$$ \begin{array}{ccc} \bar{y}_{1}&=&\lfloor2^{M_{1,1}}\bar{x}_{1}\rfloor \oplus \lfloor2^{M_{1,2}}\bar{x}_{2}\rfloor\oplus\cdots\oplus\lfloor2^{M_{1,K}}\bar{x}_{K}\rfloor,\\ \bar{y}_{2}&=&\lfloor2^{M_{2,1}}\bar{x}_{1}\rfloor \oplus \lfloor2^{M_{2,2}}\bar{x}_{2}\rfloor\oplus\cdots\oplus\lfloor2^{M_{2,K}}\bar{x}_{K}\rfloor,\\ &\vdots&\\ \bar{y}_{K}&=&\lfloor2^{M_{K,1}}\bar{x}_{1}\rfloor \oplus \lfloor2^{M_{K,2}}\bar{x}_{2}\rfloor \oplus\cdots\oplus\lfloor2^{M_{K,K}}\bar{x}_{K}\rfloor. \end{array} $$
(7)

An example of the two-user deterministic interference channel is shown in Fig. 2, where we denote the direct-link as solid lines and denote the cross-link as dotted lines.

Fig. 2
figure 2

A two-user deterministic interference channel

2.3 Parallel symmetric interference channel

In a two-user symmetric interference channel, the SNRs of two direct-link channels are identical and the INRs of two cross-link channels are identical, i.e., γ 1,1=γ 2,2 and γ 1,2=γ 2,1. In multi-user symmetric interference channel, all the direct-link gains are the same and all the cross-link gains are the same as well. In this kind of channel, each user generates interference to other users at the same levels.

In a symmetric interference channel, if the INR is larger than the SNR, we call it a strong interference channel. Otherwise, we call it a weak interference channel. Specifically, in deterministic channels, the strength of interference is expressed by the number of levels. Thus, if there are less cross-link levels than direct-link levels in a deterministic symmetric interference channel, it is a weak interference channel. Otherwise, it is a strong interference channel. For a network with more than one symmetric interference subchannels, we call it a parallel symmetric interference channel, where each subchannel may be a strong or weak interference channel. The difference among subchannels comes from frequency-selective or time-selective fading, i.e., each subchannel may experience different channel fading. An example of a two-user three-subchannel parallel symmetric interference channel is shown in Fig. 5.

In Fig. 5, there is only one transmitter and one receiver for each user. For example, the Tx1 blocks in different subchannels belong to the same transmitter of user 1.

3 Individual coding

Most of previous researches on interference channels focus on individual coding, which means that the coding scheme is taken in each subchannel individually, and there is no cooperation among multiple subchannels. In this section, we will first give an example of the optimal individual coding scheme in a two-user deterministic interference channel and then present the known GDoF results for K-user symmetric interference channels.

3.1 An example of individual coding

Figure 3 is an example of the individual coding in a two-user deterministic interference channel where the interference conditions are the same as in Fig. 2. It can been seen that because of the mutual interference, some signal levels must be muted; otherwise, the superposition bits are not decodable and the system throughput will be degraded. As shown in Fig. 2, if all the signal levels are occupied, only three bits can be decoded for the two users. However, if using the transmission scheme shown in Fig. 3, i.e., user 1 transmits on levels a 1, a 2, and a 4 and user 2 transmits on levels b 1 and b 4, totally five bits can be decoded. Through exhaustive searching, we can find that the sum capacity of this channel is exactly 5, and the presented scheme in Fig. 3 is thus the best individual coding scheme for this channel.

Fig. 3
figure 3

An example of individual coding

3.2 Generalized degrees of freedom

For the general K-user symmetric interference channels, an individual coding scheme is presented in [10]. Although the scheme is originally designed for Gaussian interference channels, the deterministic model is used in the derivations, and it thus can be easily applied in deterministic interference channels. In [10], the GDoF of the K-user symmetric Gaussian interference channel is also derived.

The GDoF per user is defined as

$$ d(\alpha)=\frac{1}{K}{\lim}_{\text{SNR}\to \infty}\sup {\frac{C_{\Sigma}(\text{SNR},\alpha)}{C_{\mathrm{P2P}}(\text{SNR})}}, $$
(8)

where C P2P(SNR) is the interference-free capacity for one user, C Σ (SNR,α) is the sum capacity of the K-user interference channel, and

$$ \alpha=\frac{\log{\text{INR}}}{\log{\text{SNR}}} $$
(9)

denotes the strength of interference. When α<1, it is a weak interference channel; when α>1, it is a strong interference channel.

GDoF denotes the ratio of the average sum capacity of the interference channel normalized by the capacity of the point-to-point interference-free channel when the SNR approaches infinity. For K-user symmetric Gaussian interference channels,

$$ C_{\mathrm{P2P}}(\text{SNR}) = \frac{1}{2}\log(1+\text{SNR}), $$
(10)

and the GDoF is characterized as the following piecewise function [10],

$$ d(\alpha)=\left\{ \begin{array}{l} \begin{array}{ll} {1-\alpha}, & {\alpha \in (0,\frac{1}{2})~\text{(noisy weak)}}\\ \alpha,& {\alpha \in (\frac{1}{2},\frac{2}{3})~\text{(fairly weak)}}\\ {1 - \frac{1}{2}\alpha },&{\alpha \in (\frac{2}{3},1)~\text{(moderately weak)}}\\ {\frac{1}{K}},&{\alpha=1}\\ {\frac{1}{2}\alpha },&{\alpha \in (1,2)~\text{(moderately strong)}}\\ 1,&{\alpha \in (2, + \infty)~\text{(very strong)}} \end{array} \end{array}\right.. $$
(11)

In this function, the weak interference scenario is further subdivided into three cases and the strong interference scenario is further subdivided into two cases, according to the value of α. The piecewise GDoF curve is shown in Fig. 4, where the GDoF achieves maximum in interference-free scenario or very strong interference scenario.

Fig. 4
figure 4

GDoF of K-user symmetric Gaussian interference channel

Fig. 5
figure 5

A two-user parallel interference channel with three subchannels. a Subchannel I. b Subchannel II. c Subchannel III

For K-user symmetric deterministic interference channels, the GDoF function is as same as in (11), since the difference of the sum capacity in deterministic interference channel and in Gaussian interference channel is within finite bits [10]. When the SNR approaches infinity, the ratio d(α) will go to the same.

4 Joint coding scheme

In parallel interference channel, the signals in different subchannels of one user is transmitted by the same transmitter; thus, the subchannels can be jointly encoded. Similarly, the signals received in different subchannels of the same user can be jointly decoded. The basic idea of the proposed transmission scheme is as follows. In weak interference subchannels, the bits is transmitted at the maximal possible data rate of the direct-link without considering the existence of cross-link interference. In strong interference subchannels, the bits that will generate interference in weak interference subchannels is retransmitted following a certain rule. The received signals in weak interference subchannels and strong interference subchannels are then jointly decoded.

4.1 A motivating example

To show the basic idea of our joint coding scheme, we first see a simple example. As shown in Fig. 5, the two-user parallel interference channel has three subchannels, we call them subchannels I, II, and III. The number of levels in the direct-link is three in both subchannels I and II. The number of levels in the cross-link is one and two in subchannel I and II, respectively. In subchannel III, two signal levels exist in the direct-link and three signal levels exist in the cross-link. According to the statements in Section 2.3, subchannels I and II are weak interference channels, while subchannel III is a strong interference channel.

In subchannel I, user 1 and user 2 transmit their bits on all signal levels of direct-link regardless of interference. Specifically, Tx1 transmits a 1, a 2, and a 3 and Tx2 transmits b 1, b 2, and b 3. Obviously, there are interference at the two receivers as can be seen from Fig. 5 a. In particular, since the number of direct-link signal levels M 1,1=3 and that of cross-link signal levels M 2,1=1, a bit a 1b 3 is received at Rx2, which means that b 3 is interfered by a 1. Because the channel is symmetric for two users, the interference scenario is similar at Rx1, i.e., a 3 is interfered by b 1. Provided the received bits in subchannel I, only a 1 and a 2 are decodable at Rx1 and only b 1 and b 2 are decodable at Rx2. The contaminated bits a 3 and b 3 cannot be decoded without external help.

Subchannel II is also a weak interference channel, we use similar transmission strategy as in subchannel I. The number of cross-link signal levels of this subchannel is larger, M 1,2=M 2,1=2. Therefore, although three bits are still transmitted for each user, two bits are interfered at each receiver, and only a 4 and b 4 can be decoded.

Since the bits are transmitted regardless of interference in weak interference subchannels, different bits can be transmitted in subchannel II and subchannel I, and they are independent. This property is essential in our joint coding scheme as we will see in the sequel.

Subchannel III is a strong interference channel, where three signal levels exist in the cross-link channel. The transmission scheme in this subchannel is critical. It determines whether the contaminated bits in subchannels I and II are decodable, and affects the spectrum utilization efficiency of the parallel interference channel.

The bits that will generate interference in weak interference subchannels are retransmitted in subchannel III, which is used to recover the contaminated bits in subchannel I and subchannel II. To avoid the interference between user 1 and user 2 in retransmission, a straightforward scheme at hand is orthogonal-based transmission schemes, so that there is no interference between user 1 and user 2. For example, in the first time slot, Tx1 retransmits a 1,a 4, and a 5. Through the cross-link, these bits arrive at Rx2 and can be used to cancel the interference appeared in subchannels I and II. In the second time slot, Tx2 retransmits b 1,b 4, and b 5, and Rx1 uses these bits for interference cancelation. However, this scheme is obviously inefficient.

A better choice is to let Tx1 and Tx2 retransmitting simultaneously in subchannel III. As shown in Fig. 5 c, both Rx1 and Rx2 obtain contaminated bits and cannot recover these bits individually. However, taking into account the received bits in subchannels I and II, these bits can be jointly decoded. For Rx1, in three subchannels, totally nine bits are obtained, which can be expressed as follows:

$$ \begin{array}{ll} r_{11} &= a_{1},\\ r_{12} &= a_{2},\\ r_{13} &= a_{3} \oplus b_{1},\\ r_{14} &= a_{4},\\ r_{15} &= a_{5} \oplus b_{4},\\ r_{16} &= a_{6} \oplus b_{5},\\ r_{17} &= b_{1},\\ r_{18} &= b_{4} \oplus a_{1},\\ r_{19} &= b_{5} \oplus a_{4},\\ \end{array} $$
(12)

where r 1i , i=1,,9 is the received bits at Rx1. We can see from (12) that each received bit correspond to an equation and all the received bits provide us with a set of equations.

It can be seen that a 1,a 2,a 4, and b 1 can be obtained immediately when r 11,r 12,r 14, and r 17 is received. But the other five received bits are not simply transmitted bits from user 1 or user 2, none of which can be recovered by a single equation. Fortunately, the nine equations in (12) are linear uncorrelated, and there are only nine unknown variables in (12). By solving the set of equations, all the nine bits can be recovered. In these bits, six are transmitted by user 1, which are the desired bits. The other three bits, which are transmitted by user 2 to facilitate interference cancelation, will be discarded after decoding. Since the channel is symmetric, similar characteristic holds for Rx2.

Remark 1

In subchannel III, the order of the retransmission cannot be arbitrary. For example, if we exchange the occupied levels of a 4 and a 5, as labeled in the outer column in Fig. 5 c, a 4b 5 will be received twice at Rx2. One is obtained in subchannel II, and the other is obtained in subchannel III, as indicated by the black box. In this case, part of the equations are linearly correlated, and the desired bits cannot be fully decoded.

4.2 Subchannel grouping

In the example above, the cross-link signal levels of weak interference subchannels are as many as that of strong interference subchannel. This condition is obviously not satisfied in most scenarios. Under the condition where there are more cross-link signal levels in weak interference subchannels than that of strong interference subchannels, the resource to recover the bits contaminated in weak subchannels is not enough. Under opposite condition, the resource is too much and will be wasted. Therefore, a preprocessing step called subchannel grouping is introduced.

Denote the total number of cross-link signal levels of all the weak interference subchannels as N weak and that of all the strong interference subchannels as N strong. If N weak>N strong, we can select part of the weak interference subchannels to participate joint coding. The aggregated number of cross-link signal levels of this part of subchannels is \(N^{\prime }_{\text {weak}}\), which satisfies \(N^{\prime }_{\text {weak}} \leq N_{\text {strong}}\). At the same time, other weak interference subchannels employ individual coding introduced in Section 3. If N weak<N strong, we can select part of the strong interference subchannels to participate joint coding. The aggregated number of cross-link signal levels of this part of subchannels is \(N^{\prime }_{\text {strong}}\), which still satisfies \(N^{\prime }_{\text {strong}} \geq N_{\text {weak}}\). At the same time, other strong interference subchannels employ individual coding. As will be seen in next part, subchannel grouping ensures to satisfy a necessary condition under which the bits in the subchannels participating joint coding can be jointly decoded.

4.3 Joint coding scheme for two-user case

After the subchannels for joint coding are selected, in weak interference subchannels, all the direct-link signal levels are used to transmit new bits regardless of interference. In strong interference subchannels, the bits that will generate interference in weak interference subchannels, i.e., interfering bits, are retransmitted. It is demanded that in the retransmission process, the relative level orders between any pair of bits are kept unchanged compared with the orders when they are transmitted in the weak interference subchannels.

The joint coding scheme ensures the feasibility that the transmitted bits can be jointly decoded. In the following, we will formally prove the necessary condition and the feasibility of the proposed transmission scheme. As we will see, the necessary condition guarantees that there are enough number of equations, while the feasibility comes from the requirement that these equations are linearly uncorrelated. When enough number of linearly uncorrelated equations are obtained, the bits can be decoded.

Necessary Condition

For subchannels participating joint coding, the aggregated cross-link signal levels of strong interference subchannels should be no less than the aggregated cross-link signal levels of weak interference subchannels.

Proof

To ensure the interference in weak interference subchannels which can be eliminated with the help of strong interference subchannels, at each receiver, the number of equations should be no less than the number of desired bits and interfering bits. Without loss of generality, we consider user 1. Assume that in all weak interference subchannels, there are totally X signal levels in the direct-link and Y signal levels in cross-links. Then, we have X+Y unknown bits but only have X linear equations. To decode these bits, we need at least Y more linear uncorrelated equations, which should be provided by the cross-link retransmission in strong interference subchannels. Thus, the number of the aggregated signal levels of cross-links in strong interference subchannels should be no less than Y. □

Feasibility

By the proposed joint coding scheme, the desired bits can be recovered at each receiver.

Proof

The cornerstone of this proof is the fact that the transmit levels of interfering bits are always lower than those of the desired bits in weak interference subchannels and vice versa in strong interference subchannels at receivers.

Assume that in a weak interference subchannel S 1, Tx1 transmits bit a m and Tx2 transmits bit b n , these two bits collide on the same signal level at Rx2. The bit a m will be retransmitted in strong interference subchannel S 2 and might collide with a bit b p at Rx2. The bit b p is first transmitted by Tx2 in a weak interference subchannel S 3 and is retransmitted by Tx2 in S 2. There are two possible cases when we check the linear correlation property between a m b n =r 2k and a m b p =r 2j , where m,n,p,k,j are integers.

The first case is that S 3S 1, i.e., b p and b n come from different weak interference subchannels. This suggests that they are different bits, for independent bits are transmitted in different weak interference subchannels. Hence, the two equations a m b n =r 2k and a m b p =r 2j are linearly uncorrelated.

The second case is that S 3=S 1, i.e., b p and b n come from the same weak interference subchannel. In what follows, we show that they must occupy different signal levels at Tx2.

Assume that a m is transmitted on the mth level of Tx1 in S 1 and retransmitted on the m th level of Tx1 in S 2. b n is transmitted on the nth level of Tx2 in S 1 and retransmitted on the n th level of Tx2 in S 2. b p is transmitted on the pth level of Tx2 in S 1 and retransmitted on the p th level of Tx2 in S 2. In weak interference subchannels, SNR>INR; thus, we have m<n. In strong interference subchannels, SNR<INR; thus, we have m >p . Since the relative order in the retransmission process is the same with that in the first transmission, from m >p , we can derive m>p. Finally, we have the relationship n>m>p, which means b p and b n comes from different signal level at Tx2, and they are two different independent bits. As a consequence, the two equations a m b n =r 2k and a m b p =r 2j must be linear uncorrelated, and all the bits can be recovered. □

To help understand the proof, we provide an example here. As shown in Fig. 6, S 1 and S 2 are respectively a weak interference subchannel and a strong interference subchannel, and S 3=S 1. In this example, suppose that a m =a 2, then it follows that b n =b 3 and b p =b 1. In subchannel S 1, since SNR>INR, a 2 and b 3 collide on the same signal level at Rx2. In subchannel S 2, since SNR<INR, a 2 and b 1 collide on the same signal level at Rx2. It follows that a 2b 3 and a 2b 1 are uncorrelated. The bits a k and b j in Fig. 6(b) are first transmitted in other weak interference sunchannels, which are not shown here.

Fig. 6
figure 6

An example to illustrate the feasibility. a Subchannel S 1. b Subchannel S 2

4.4 Joint coding scheme for multi-user case

In a multi-user symmetric interference channel, all the direct-link channel gains are identical and so are the cross-link gains. As shown in Fig. 7, for a K-user symmetric interference channel, each user receives interference from other K−1 users. Due to the symmetry, at each receiver, the interference signal levels are aligned. If we view the aligned interference as coming from a virtual user, the joint coding and decoding in the multi-user case can be implemented as same as in the two-user case.

Fig. 7
figure 7

A three-user parallel symmetric interference channel. a Subchannel I. b Subchannel II

The proofs of necessary condition and feasibility for multi-user joint coding are the same as in the two-user case, except that we view the aligned interference from K−1 users as coming from one virtual user. Figure 7 is an example of a three-user parallel symmetric interference channel, where only two subchannels are shown. Subchannel I is a weak interference subchannel, and subchannel II is a strong interference subchannel. In subchannel I, as can be seen in Fig. 7 a, the modulo-2 addition of a 2b 1c 1=r 12 is received on the second level of Rx1, where a 2 is the desired bit and b 1c 1 is the interference bit. We can regard b 1c 1 as one bit u 1 that is transmitted by a virtual user Tx u . Then, we obtain an equation a 2u 1=r 12. In subchannel II, as can be seen in Fig. 7 b, b 1 and c 1 are retransmitted by Tx2 and Tx3, respectively, and the virtual interference bit u 1=b 1c 1 will reappear at Rx1 with a desired bit a l , where a l is a retransmission bit that causes interference in another weak interference subchannel which is not shown here. Then, we obtain another equation a l u 1=r12′. Since the levels of interfering bits are always lower than the levels of desired bits in weak interference subchannels and vice versa for strong interference subchannels at receivers, even though a 2 is also retransmitted in this strong interference subchannel, the relative level order of a l and a 2 cannot be equal at Tx1. Thus, the two equations a 2u 1=r 12 and a l u 1=r12′ are linear uncorrelated. Then, the desired bits of user 1 can be jointly decoded at Rx1. Similar equations can be obtained at Rx2 and Rx3, and in this way, we generalize the joint coding scheme to multi-user parallel symmetric interference channels.

5 Performance analysis

In the proposed joint coding scheme, the resource of strong interference subchannels are totally sacrificed to help the weak interference subchannels to achieve interference-free transmission, since no new bits are transmitted in strong interference subchannels. Then, a natural question is that under what conditions will this scheme have performance gain over the individual coding? Is this scheme optimal? We answer these questions in this section.

5.1 Sum capacity

Theorem 1

For two-user parallel symmetric interference channel with deterministic model, when the number of cross-link levels in weak interference subchannels equals to that in strong interference subchannels, the joint coding scheme will achieve the sum capacity

$$ C_{\Sigma} = \sum_{s\in \mathbb{S}_{\text{weak}}} 2{n_{s}}, $$
(13)

where \(\mathbb {S}_{\text {weak}}\) represents the set of weak interference subchannels, s denotes a weak interference subchannel in \(\mathbb {S}_{\text {weak}}\), and n s denotes the number of direct-link signal levels in subchannel s.

Proof

We first prove the converse by deriving the sum-rate constraints and then prove the achievability by providing the achieved sum rate of the joint coding scheme.

Converse The deterministic model of two-user parallel symmetric interference channel belongs to a class of deterministic interference channel studied by El Gamal and Costa [18]. The El Gamal-Costa model is redrawn in Fig. 8, where the outputs Y 1 and Y 2 and the interferences V 1 and V 2 are deterministic functions of the inputs X 1 and X 2:

$$ \begin{array}{ll} Y_{1} &= f_{1}(X_{1}, V_{2}),\\ Y_{2} &= f_{2}(X_{2}, V_{1}),\\ V_{1} &= g_{1}(X_{1}),\\ V_{2} &= g_{2}(X_{2}), \end{array} $$
(14)
Fig. 8
figure 8

El Gamal and Costa’s deterministic interference channel model

where f 1(·,·) and f 2(·,·) satisfy the conditions

$$ \begin{array}{ll} H({Y_{1}}|{X_{1}}) &= H({V_{2}}),\\ H({Y_{2}}|{X_{2}}) &= H({V_{1}}), \end{array} $$
(15)

for all product probability distributions on X 1 X 2.

In the considered parallel symmetric interference channel, X 1 represents the transmit bits of all subchannels of user 1, g 1(X 1) represents the cross-link shifting function over X 1, and f 1(X 1,V 2) represents the function that involves direct-link shifting over X 1 and modulo-2 sum with V 2. Similar representations are applied to X 2, g 2(X 2), and f 2(X 2,V 1). In (15), the conditional entropy of Y 1 over X 1 equals to the entropy of V 2, which means that X 1 can be uniquely identified from Y 1 given a determined V 2. Similarly, X 2 can be uniquely identified from Y 2 given a determined V 1.

The capacity region of this class of deterministic interference channel is characterized as [18]

$$ \begin{aligned} {R_{1}} &\le H({Y_{1}}|{V_{2}}),\\ {R_{2}} &\le H({Y_{2}}|{V_{1}}),\\ {R_{1}} + {R_{2}} &\le H({Y_{1}}|{V_{1}}{V_{2}}) + H({Y_{2}}),\\ {R_{1}} + {R_{2}} &\le H({Y_{2}}|{V_{1}}{V_{2}}) + H({Y_{1}}),\\ {R_{1}} + {R_{2}} &\le H({Y_{1}}|{V_{1}}) + H({Y_{2}}|{V_{2}}),\\ 2{R_{1}} + {R_{2}} &\le H({Y_{1}}) + H({Y_{1}}|{V_{1}}{V_{2}}) + H({Y_{2}}|{V_{2}}),\\ 2{R_{2}} + {R_{1}} &\le H({Y_{2}}) + H({Y_{2}}|{V_{1}}{V_{2}}) + H({Y_{1}}|{V_{1}}). \end{aligned} $$
(16)

Considering that there are totally S subchannels, due to the symmetric property of each subchannel, we denote the number of direct-link signal levels of the sth subchannel as n s and the number of cross-link signal levels as m s . Following the derivation in [16], the entropies in (16) can be further simplified as

$$ H({Y_{1}}|{V_{2}}) \le \sum\limits_{s=1}^{S} H({Y_{1,s}}|{V_{2,s}}) \le \sum\limits_{s=1}^{S} {n_{s}}, $$
(17)
$$ H({Y_{1}}) \le \sum\limits_{s=1}^{S} H({Y_{1,s}}) \le \sum\limits_{s=1}^{S} \max ({m_{s}},{n_{s}}), $$
(18)
$$ H({Y_{1}}|{V_{1}}\!{V_{2}})\! \le\! \sum\limits_{s=1}^{S}\! H({Y_{1,s}}|{V_{1,s}}{V_{2,s}})\! \le\! \sum\limits_{s=1}^{S}\! \max ({n_{s}} - {m_{s}},0), $$
(19)
$$ H({Y_{1}}|{V_{1}}) \le \sum\limits_{s=1}^{S} H({Y_{1,s}}|{V_{1,s}}) \le \sum\limits_{s=1}^{S} \max ({n_{s}} - {m_{s}}, {m_{s}}). $$
(20)

Similar results hold for Y 2. Substituting these results in (16), we can obtain the sum-rate constraints as

$$ \begin{aligned} {R_{1}} + {R_{2}} &\le H({Y_{1}}|{V_{1}}{V_{2}}) + H({Y_{2}})\\ &\le \sum\limits_{s=1}^{S} \max ({n_{s}} - {m_{s}},0) + \sum\limits_{s=1}^{S} \max ({m_{s}},{n_{s}}) \\ &= \sum\limits_{s=1}^{S} \max ({m_{s}},2{n_{s}} - {m_{s}}), \end{aligned} $$
(21)

and

$$ \begin{aligned} {R_{1}} + {R_{2}} &\le H({Y_{1}}|{V_{1}}) + H({Y_{2}}|{V_{2}})\\ &\le \sum\limits_{s=1}^{S} 2\max ({n_{s}} - {m_{s}}, {m_{s}}). \end{aligned} $$
(22)

Considering that in weak interference subchannels, n s >m s and, in strong interference subchannels, n s <m s , (21) can be further expressed as

$$ {R_{1}} + {R_{2}} \le \sum\limits_{s\in \mathbb{S}_{\text{weak}}} (2{n_{s}} - {m_{s}}) + \sum\limits_{s\in \mathbb{S}_{\text{strong}}} {m_{s}}, $$
(23)

where \(\mathbb {S}_{\text {weak}}\) and \(\mathbb {S}_{\text {strong}}\) represent the set of weak and strong interference subchannels, respectively.

Similarly, (22) can be further expressed as

$$ {R_{1}} + {R_{2}} \le \sum\limits_{s\in \mathbb{S}_{\text{noisy}}} 2({n_{s}} - {m_{s}}) + \sum\limits_{s\in \mathbb{S}_{\text{medium}}} 2{m_{s}} + \sum\limits_{s\in \mathbb{S}_{\text{strong}}} 2{m_{s}}, $$
(24)

where \(\mathbb {S}_{\text {noisy}}\) represents the set of weak interference subchannels satisfying m s /n s <1/2, \(\mathbb {S}_{\text {medium}}\) represents the set of weak interference subchannels satisfying 1/2≤m s /n s <1, and \(\mathbb {S}_{\text {strong}}\) represents the set of strong interference subchannels satisfying m s /n s ≥1.

Since the number of cross-link signal levels in weak interference subchannels equals to that in strong interference subchannels, i.e.,

$$ \sum\limits_{s\in \mathbb{S}_{\text{weak}}} m_{s} = \sum\limits_{s\in \mathbb{S}_{\text{strong}}} m_{s}, $$
(25)

then (23) can be simplified as

$$ {R_{1}} + {R_{2}} \le \sum\limits_{s\in \mathbb{S}_{\text{weak}}} 2{n_{s}}, $$
(26)

and (24) can be simplified as

$$ \begin{aligned} {R_{1}} + {R_{2}} &\le \sum\limits_{s\in \mathbb{S}_{\text{noisy}}} 2({n_{s}} - {m_{s}}) + \sum\limits_{s\in \mathbb{S}_{\text{medium}}} 2({n_{s}} - {m_{s}})\\ &\quad~~ + \sum\limits_{s\in \mathbb{S}_{\text{medium}}} (4{m_{s}}-2{n_{s}}) + \sum\limits_{s\in \mathbb{S}_{\text{strong}}} 2{m_{s}}\\ & = \sum\limits_{s\in \mathbb{S}_{\text{weak}}} 2{n_{s}} + \sum\limits_{s\in \mathbb{S}_{\text{medium}}} (4{m_{s}}-2{n_{s}}). \end{aligned} $$
(27)

According to the relationship of m s and n s in medium weak interference subchannels, the second term in the last step of (27) is no less than zero, indicating that the constraint (26) is stricter than (27). Thus, the active sum-rate constraint is (26).

Achievability For the proposed joint coding scheme, in weak interference subchannels, users transmit new bits regardless of interference and, in strong interference subchannels, only interfered bits are transmitted. Since the number of cross-link signal levels in weak interference subchannels equals to that in strong interference subchannels, the received bits can be jointly decoded. The achieved sum rate of two users is

$$ R_{1} + R_{2} = \sum\limits_{s\in \mathbb{S}_{\text{weak}}} 2{n_{s}}. $$
(28)

Comparing (28) with (26), we conclude that the joint coding scheme achieves the sum capacity. □

Theorem 2

For K-user parallel symmetric interference channel with deterministic model, when the number of cross-link levels in weak interference subchannels equals to that in strong interference subchannels, the joint coding scheme achieves a sum rate

$$ R_{\Sigma} = \sum\limits_{s\in \mathbb{S}_{\text{weak}}} K{n_{s}}. $$
(29)

The proof of Theorem 2 is the same as proving the achievability part in Theorem 1.

While the achievable sum rate of K-user parallel symmetric interference channel with deterministic model has been obtained, we do not know the sum capacity of this channel yet. However, we conjecture that the proposed joint coding scheme achieves the sum capacity, since each user achieves a data rate as high as in the two-user interference channels.

5.2 Achievable GDoF

To obtain an explicit expression of the achievable GDoF and compare it with the individual coding scheme, we consider a special case of the parallel symmetric interference channel. Assume that the number of direct-link signal levels are n for all the subchannels; the number of cross-link signal levels in weak interference subchannels are m 1, and those in strong interference subchannels are m 2. The interference strength of the two kinds of subchannels can be expressed as

$$\alpha_{1} = \frac{m_{1}}{n} < 1, \quad \alpha_{2} = \frac{m_{2}}{n} > 1. $$

For the proposed joint coding scheme, α 1 strong interference subchannels can assist α 2 weak interference subchannels. For convenience of demonstration, the number of weak interference subchannels is normalized to 1. In this sense, we say one strong interference subchannel can assist to recover the contaminated bits in α 2/α 1 weak interference subchannels. For two-user case, according to Theorem 1, the sum capacity of these (α 2/α 1+1) subchannels is

$$ C_{\Sigma} = \sum\limits_{s\in \mathbb{S}_{\text{weak}}} 2{n} = 2n\frac{\alpha_{2}}{\alpha_{1}}. $$
(30)

Then, with (8), the GDoF per user is

$$ d_{\text{Joint}}({\alpha_{1}}, {\alpha_{2}}) = \frac{{{\alpha_{2}}}}{{{\alpha_{1}}}}. $$
(31)

For multi-user case, since the achieved sum rate is (29), the joint coding scheme achieves the per user GDoF as same as (31). That means, in K-user parallel symmetric interference channels, each user achieves a GDoF which is the same as that can be achieved in two-user interference channels. Thus, for multi-user case, the joint coding scheme is at least GDoF optimal.

5.3 GDoF gains

We continually consider the scenario where one strong interference subchannel is used to assist α 2/α 1 weak interference subchannels. By individual coding, the GDoF of the strong interference subchannel is d(α 2) and the GDoF of the weak interference subchannel is d(α 1). Then, the total GDoF of these (α 2/α 1+1) subchannels per user is

$$ d_{\text{Indiv}}({\alpha_{1}}, {\alpha_{2}}) = \frac{{{\alpha_{2}}}}{{{\alpha_{1}}}} d({\alpha_{1}}) + d({\alpha _{2}}), $$
(32)

where d(α 1) and d(α 2) can be obtained from (11).

Compared with the achieved GDoF by joint coding, the average GDoF gain per subchannel in each user is

$$ \begin{aligned} \Delta \overline d ({\alpha_{1}}, {\alpha_{2}}) &= \frac{d_{\text{Joint}}({\alpha_{1}}, {\alpha_{2}}) - d_{\text{Indiv}}({\alpha_{1}}, {\alpha_{2}})}{{\alpha_{2}}/{\alpha_{1}}+1} \\ &= \frac{{\frac{{{\alpha_{2}}}}{{{\alpha_{1}}}}\left[ {1 - d({\alpha_{1}})} \right] - d({\alpha_{2}})}}{{\frac{{{\alpha_{2}}}}{{{\alpha_{1}}}} + 1}}. \end{aligned} $$
(33)

In Table 1, we list the values of \(\Delta \overline d ({\alpha _{1}}, {\alpha _{2}})\) under various combinations of α 1 and α 2. From the results, we can see that we are able to provide positive GDoF gain when we use very strong interference subchannels to assist all kinds of weak interference subchannels and use moderately strong interference subchannels to assist noisy weak interference subchannels and fairly weak interference subchannels. However, when we use moderately strong interference subchannels to assist moderately weak interference subchannels, no gain can be obtained. Besides, when using very strong interference subchannels to assist moderately strong interference subchannels, we can still obtain positive gain under certain conditions, although this is not the typical scenario that we have studied.

Table 1 Average GDoF gain per subchannel

5.4 Numerical results

To demonstrate the GDoF gain, we provide some numerical results in this part. We first calculate the average achievable GDoFs when one strong interference subchannel coexists with α 2/α 1 weak interference subchannels. In this example, we fix α 2=3 and change α 1 from 0 to 1.5. Of course, when α 1>1, the channel no longer belongs to weak interference subchannel. But by setting the parameter in this range, we can obtain more useful insights. Figure 9 shows the results, where the “W” form solid line in blue represents the performance of individual coding and the red dash line represents the performance of the proposed joint coding. Note the blue solid line in Fig. 9 is not so straight as the one in Fig. 4. This comes from the fact that the result in Fig. 9 is obtained by averaging among α 2/α 1+1 subchannels. It can be seen in Fig. 9 when α 1(0,1), there are positive gains and, when α 1>1, the gain is still positive within a certain range. Only when α 1 is larger, the gains become negative. This result indicates that, even when all the subchannels experience strong interference, it still has chance to improve the average achievable GDoF if we use very strong interference subchannels to assist strong interference subchannels.

Fig. 9
figure 9

Average achievable GDoFs with different α 1 and fixed α 2, where α 2=3

Now, we provide a more comprehensive result in Fig. 10, where α 1 varies from 0 to 1 and α 2 varies from 1 to 4. In this figure, only GDoF gain is drawn, from which the dependency of the gain \(\Delta \overline d\) over different α 1 and α 2 can be seen more clearly. For a fixed α 1, \(\Delta \overline {d}\) grows monotonically with α 2. This result comes from the fact that the more cross-link signal levels can be used to employ retransmission in the strong interference subchannel, the more weak interference subchannels can be assisted. For a fixed α 2, \(\Delta \overline {d}\) varies like an N-curve, first increases when \(0<\alpha _{1}<\frac {1}{2}\), then decreases when \(\frac {1}{2}<\alpha _{1}<\frac {2}{3}\), and finally increases again when \(\frac {2}{3}<\alpha _{1}<1\). This is mainly because of the behavior of d(α 1) achieved by the individual coding, as can be seen in Fig. 4. When 0<α 1<1, d(α 1) is a reverse N-curve. In the cases when the individual coding can achieve high GDoF, the gain of joint coding is relatively low.

Fig. 10
figure 10

GDoF gains with different α 1 and α 2

In [17], only the subchannels in very strong interference can help to recover the signals for subchannels in strong and weak interference. While in this paper, from the above analysis, we know that the proposed joint coding scheme can also let the strong interference subchannel help the weak interference subchannel. Moreover, only two-user case is considered in [17], but K-user case is also considered in this paper. In [17], the interference channel is assumed to be bursty, and the helping mechanism cannot work when the channel is constant. However, the scheme proposed in this paper always works no matter the channel is constant or bursty. In particular, when the channel is bursty, different time slots can be regarded as different subchannels.

6 Conclusions

In this paper, a general joint coding scheme in parallel symmetric interference channel with deterministic model was proposed where the cross-links of the strong interference subchannels were effectively used to assist interference mitigation in weak interference subchannels. We proved that this joint coding scheme can achieve the sum capacity in two-user case and can achieve the GDoF in multi-user case. Numerical results demonstrated substantial GDoF gains over the individual coding scheme.

References

  1. ST Chung, JM Cioffi, The capacity region of frequency-selective Gaussian interference channels under strong interference. IEEE Trans. Commun. 55(9), 1812–1821 (2007).

    Article  Google Scholar 

  2. W Yu, G Ginis, JM Cioffi, Distributed multiuser power control for digital subscriber lines. IEEE J. Sel. Areas Commun. 20(5), 1105–1115 (2002).

    Article  Google Scholar 

  3. W Yu, R Lui, Dual methods for nonconvex spectrum optimization of multicarrier systems. IEEE Trans. Commun. 54(7), 1310–1322 (2006).

    Article  Google Scholar 

  4. VR Cadambe, SA Jafar, Parallel Gaussian interference channels are not always separable. IEEE Trans. Inf. Theory. 55(9), 3983–3990 (2009).

    Article  MathSciNet  Google Scholar 

  5. X Shang, B Chen, G Kramer, HV Poor, Noisy-interference sum-rate capacity of parallel Gaussian interference channels. IEEE Trans. Inf. Theory. 57(1), 210–226 (2011).

    Article  MathSciNet  Google Scholar 

  6. H Sun, SA Jafar, in ISIT. On the optimality of treating interference as noise for parallel deterministic interference networks, (2014).

  7. L Sankar, X Shang, E Erkip, HV Poor, Ergodic fading interference channels: sum-capacity and separability. IEEE Trans. Inf. Theory. 57(5), 2605–2626 (2011).

    Article  MathSciNet  Google Scholar 

  8. TS Han, K Kobayashi, A new achievable rate region for the interference channel. IEEE Trans. Inf. Theory. 27(1), 49–60 (1981).

    Article  MathSciNet  MATH  Google Scholar 

  9. RH Etkin, DNC Tse, H Wang, Gaussian interference channel capacity to within one bit. IEEE Trans. Inf. Theory. 54(12), 5534–5562 (2008).

    Article  MathSciNet  MATH  Google Scholar 

  10. SA Jafar, S Vishwanath, Generalized degrees of freedom of the symmetric Gaussian K user interference channel. IEEE Trans. Inf. Theory. 56(7), 3297–3303 (2010).

    Article  MathSciNet  Google Scholar 

  11. SA Jafar, Topological interference management through index coding. IEEE Trans. Inf. Theory. 60(1), 529–568 (2014).

    Article  MathSciNet  Google Scholar 

  12. C Suh, DNC Tse, Feedback capacity of the Gaussian interference channel to within 2 bits. IEEE Trans. Inf. Theory. 57(5), 2667–2685 (2011).

    Article  MathSciNet  Google Scholar 

  13. S Mohajer, R Tandon, HV Poor, On the feedback capacity of the fully connected K-user interference channel. IEEE Trans. Inf. Theory. 59(5), 2863–2881 (2013).

    Article  MathSciNet  Google Scholar 

  14. Y Wang, Y Tian, C Yang, C Sun, in PIMRC. Multi-carrier cooperated interference cancelation in heterogeneous cellular networks, (2013).

  15. N Hou, Y Tian, C Yang, in ICCC. Multi-carrier cooperated interference cancellation via macro-BS broadcasting in HetNet, (2014).

  16. P Mukherjee, R Tandon, S Ulukus, in Allerton Conf. Even symmetric parallel linear deterministic interference channels are inseparable, (2013).

  17. S Mishra, I Wang, S Diggavi, in ISIT. Harnessing bursty interference in multicarrier systems with feedback, (2014).

  18. AA El Gamal, MHM Costa, The capacity region of a class of deterministic interference channels. IEEE Trans. Inf. Theory. 28(2), 343–346 (1982).

    Article  MathSciNet  MATH  Google Scholar 

  19. S Saha, R Berry, in Allerton Conf. Sum-capacity of a class of K-user Gaussian interference channels within O(K) bits, (2011).

  20. D Maamari, D Tuninetti, N Devroye, Multi-user cognitive interference channels: a survey and new capacity results. IEEE Trans. Cogn. Commun. Netw. 1(1), 29–44 (2015).

    Article  Google Scholar 

  21. S Gherekhloo, A Chaaban, A Sezgin, Cooperation for interference management: a GDoF perspective. IEEE Trans. Inf. Theory. 62(12), 6986–7029 (2016).

    Article  Google Scholar 

  22. R Kolte, A Özgür, H Permuter, Multicoding schemes for interference channels. IEEE Trans. Inf. Theory. 62(9), 4936–4952 (2016).

    Article  MathSciNet  Google Scholar 

  23. M Kiamari, A Avestimehr, in Allerton Conf. Are generalized cut-set bounds tight for the deterministic interference channel? (2015).

  24. S Avestimehr, S Diggavi, DNC Tse, Wireless network information flow: a deterministic approach. IEEE Trans. Inf. Theory. 57(4), 1872–1905 (2011).

    Article  MathSciNet  Google Scholar 

  25. G Bresler, A Parekh, DNC Tse, The approximate capacity of the many-to-one and one-to-many Gaussian interference channels. IEEE Trans. Inf. Theory. 56(9), 4566–4592 (2010).

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China under Grants 61371077 and 61429101. The authors would like to thank the anonymous reviewers for their constructive comments, which helped a lot to improve the presentation of this paper.

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yafei Tian.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xue, Y., Tian, Y. & Yang, C. Joint coding in parallel symmetric interference channels with deterministic model. J Wireless Com Network 2017, 49 (2017). https://doi.org/10.1186/s13638-017-0834-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-017-0834-2

Keywords