Next Article in Journal
Kolmogorovian versus Non-Kolmogorovian Probabilities in Contextual Theories
Next Article in Special Issue
Trade-offs between Error Exponents and Excess-Rate Exponents of Typical Slepian–Wolf Codes
Previous Article in Journal
Automatic ECG Classification Using Continuous Wavelet Transform and Convolutional Neural Network
Previous Article in Special Issue
Computational Hardness of Collective Coin-Tossing Protocols
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

The Broadcast Approach in Communication Networks

1
Department of Electrical, Computer, and Systems Engineering, Rensselaer Polytechnic Institute, Troy, NY 12180, USA
2
Faculty of Electrical Engineering, Technion—Israel Institute of Technology, Haifa 3200003, Israel
*
Author to whom correspondence should be addressed.
The authors contributed equally to this work.
Submission received: 24 November 2020 / Revised: 12 January 2021 / Accepted: 13 January 2021 / Published: 18 January 2021
(This article belongs to the Special Issue Multiuser Information Theory III)

Abstract

:
In this paper we review the theoretical and practical principles of the broadcast approach to communication over state-dependent channels and networks in which the transmitters have access to only the probabilistic description of the time-varying states while remaining oblivious to their instantaneous realizations. When the temporal variations are frequent enough, an effective long-term strategy is adapting the transmission strategies to the system’s ergodic behavior. However, when the variations are infrequent, their temporal average can deviate significantly from the channel’s ergodic mode, rendering a lack of instantaneous performance guarantees. To circumvent a lack of short-term guarantees, the broadcast approach provides principles for designing transmission schemes that benefit from both short- and long-term performance guarantees. This paper provides an overview of how to apply the broadcast approach to various channels and network models under various operational constraints.

Contents
 
1      Motivation and Overview4
1.1      What is the Broadcast Approach?................................................................................................................................................. 4
1.2      Degradedness and Superposition Coding........................................................................................................................................... 5
1.3      Application to Multimedia Communication......................................................................................................................................... 6
 
2      Variable-to-Fixed Channel Coding7
2.1      Broadcast Approach in Wireless Channels......................................................................................................................................... 7
2.2      Relevance to the Broadcast Channel.............................................................................................................................................. 8
2.3      The SISO Broadcast Approach—Preliminaries..................................................................................................................................... 9
2.4      The MIMO Broadcast Approach..................................................................................................................................................... 15
            2.4.1      Weak Supermajorization............................................................................................................................................15
            2.4.2      Relation to Capacity..............................................................................................................................................16
            2.4.3      The MIMO Broadcast Approach Derivation............................................................................................................................17
            2.4.4      Degraded Message Sets.............................................................................................................................................19
2.5      On Queuing and Multilayer Coding................................................................................................................................................ 21
            2.5.1      Queue Model—Zero-Padding Queue..................................................................................................................................22
            2.5.2      Delay Bounds for a Finite Level Code Layering.....................................................................................................................23
            2.5.3      Delay Bounds for Continuum Broadcasting...........................................................................................................................24
2.6      Delay Constraints............................................................................................................................................................... 27
            2.6.1      Mixed Delay Constraints...........................................................................................................................................27
            2.6.2      Broadcasting with Mixed Delay Constraints.........................................................................................................................28
            2.6.3      Parallel MIMO Two-State Fading Channel............................................................................................................................30
            2.6.4      Capacity of Degraded Gaussian Broadcast Product Channels..........................................................................................................31
            2.6.5      Extended Degraded Gaussian Broadcast Product Channels.............................................................................................................32
            2.6.6      Broadcast Encoding Scheme.........................................................................................................................................32
2.7      Broadcast Approach via Dirty Paper Coding....................................................................................................................................... 35
 
3      The Multiple Access Channel1
3.1      Overview........................................................................................................................................................................ 35
3.2      Network Model................................................................................................................................................................... 35
            3.2.1      Discrete Channel Model............................................................................................................................................37
            3.2.2      Continuous Channel Model..........................................................................................................................................37
3.3      Degradedness and Optimal Rate Spitting.......................................................................................................................................... 38
3.4      MAC without CSIT—Continuous Channels.......................................................................................................................................... 38
3.5      MAC without CSIT—Two-State Channels: Adapting Streams to the Single-User Channels............................................................................................. 39
3.6      MAC without CSIT—Two-State Channels: State-Dependent Layering................................................................................................................. 40
3.7      MAC without CSIT—Multi-State Channels: State-Dependent Layering............................................................................................................... 45
3.8      MAC with Local CSIT—Two-State Channels: Fixed Layering........................................................................................................................ 47
3.9      MAC with Local CSIT—Two-State Channels: State-Dependent Layering.............................................................................................................. 48
3.10      MAC with Local CSIT—Multi-State Channels: State-Dependent Layering............................................................................................................ 51
 
4      The Interference Channel54
4.1      Overview........................................................................................................................................................................ 54
4.2      Broadcast Approach in the Interference Channel—Preliminaries.................................................................................................................. 55
4.3      Two-User Interference Channel without CSIT...................................................................................................................................... 57
            4.3.1      Successive Decoding: Two-State Channel............................................................................................................................58
            4.3.2      Successive Decoding: ℓ-State Channel............................................................................................................................58
            4.3.3      Average Achievable Rate Region....................................................................................................................................59
            4.3.4      Sum-Rate Gap Analysis.............................................................................................................................................61
4.4      N-User Interference Channel without CSIT........................................................................................................................................ 63
4.5      Two-User Interference Channel with Partial CSIT................................................................................................................................. 64
            4.5.1      Two-User Interference Channel with Partial CSIT—Scenario 1......................................................................................................65
            4.5.2      Two-User Interference Channel with Partial CSIT—Scenario 2......................................................................................................65
 
5      Relay Channels66
5.1      Overview........................................................................................................................................................................ 66
5.2      A Two-Hop Network............................................................................................................................................................... 67
            5.2.1      Upper Bounds......................................................................................................................................................68
            5.2.2      DF Strategies.....................................................................................................................................................70
            5.2.3      Continuous Broadcasting DF Strategies.............................................................................................................................71
            5.2.4      AF Relaying.......................................................................................................................................................75
            5.2.5      AQF Relay and Continuum Broadcasting..............................................................................................................................76
5.3      Cooperation Techniques of Two Co-Located Users.................................................................................................................................. 78
            5.3.1      Lower and Upper Bounds............................................................................................................................................80
            5.3.2      Naive AF Cooperation..............................................................................................................................................82
            5.3.3      AF with Separate Preprocessing....................................................................................................................................84
            5.3.4      Multi-Session AF with Separate Preprocessing......................................................................................................................85
            5.3.5      Multi-Session Wyner–Ziv CF......................................................................................................................................86
5.4      Transmit Cooperation Techniques................................................................................................................................................. 87
            5.4.1      Single-Layer Sequential Decode-and-Forward (SDF)..................................................................................................................88
            5.4.2      Continuous Broadcasting...........................................................................................................................................89
            5.4.3      Two Layer SDF—Successive Decoding...............................................................................................................................89
5.5      Diamond Channel................................................................................................................................................................. 92
            5.5.1      Decode-and-Forward................................................................................................................................................92
            5.5.2      Amplify-and-Forward...............................................................................................................................................94
5.6      Multi-Relay Networks............................................................................................................................................................ 94
            5.6.1      Oblivious Relays..................................................................................................................................................95
            5.6.2      Oblivious Agents..................................................................................................................................................96
5.7      Occasionally Available Relays................................................................................................................................................... 97
 
6      Communications Networks98
6.1      Overview........................................................................................................................................................................ 98
6.2      Multi-User MAC Broadcasting with Linear Detection............................................................................................................................... 98
            6.2.1      Channel Model.....................................................................................................................................................100
            6.2.2      Strongest Users Detection—Overview and Bounds...................................................................................................................100
            6.2.3      Broadcast Approach with Strongest Users Detection—(NO SIC)......................................................................................................102
            6.2.4      SIC Broadcast Approach Upper Bound................................................................................................................................103
            6.2.5      Broadcast Approach with Iterative SIC.............................................................................................................................104
6.3      The Broadcast Approach for Source-Channel Coding................................................................................................................................ 108
            6.3.1      SR with Finite Layer Coding.......................................................................................................................................109
            6.3.2      The Continuous SR-Broadcasting....................................................................................................................................109
6.4      The Information Bottleneck Channel.............................................................................................................................................. 113
            6.4.1      Uncertainty of Bottleneck Capacity................................................................................................................................115
6.5      Transmitters with Energy Harvesting............................................................................................................................................. 117
            6.5.1      Optimal Power Allocation Densities................................................................................................................................119
            6.5.2      Optimal Power Allocation over Time................................................................................................................................119
            6.5.3      Grouping the Constraints..........................................................................................................................................120
            6.5.4      Dominant Constraints..............................................................................................................................................121
            6.5.5      Optimality of Algorithm 1........................................................................................................................................121
 
7      Outlook122
 
A      Constants of Theorem 7126
 
B      Corner Points in Figure 16127
 
References128

1. Motivation and Overview

1.1. What is the Broadcast Approach?

The information- and communication-theoretic models of a communication channel are generally specified by the probabilistic description of the channel’s input and output relationship. The output, subsequently, depends on the channel input and the state process of the channel. The channel’s probabilistic description changes over time in various domains, rendering a time-varying channel state process. These, for instance, include mobile wireless communications, storage systems, and digital fingerprinting, where all have time-varying communication mediums. Reliable communication generally necessitates transmitting an encoded message over multiple channel uses. Therefore, temporal fluctuations in channel states can cause a significant impediment to sustaining reliable communications. When channel states are known to the transmitters, the encoders can be guided to adjust the transmission rates in response to the changes in the channel’s actual states. When a transmitter is informed of the channel state (e.g., via side information or feedback), it can adopt variable-length channel coding, the fundamental performance limits of which are well-investigated [1,2,3,4,5].
While desirable, informing the transmitters of the time-varying state process can be practically prohibitive in a wide range of existing or emerging communications technologies. In such circumstances, while the encoders cannot adapt their transmissions to channel states, there is still the possibility of adapting the decoders to the channel states. The information-theoretic limits of communication over such state-dependent channels when the transmitters have only access to the statistical description of the channel state process is studied broadly under the notion of variable-rate channel coding [6]. When the temporal variations are frequent enough, an effective long-term strategy is adapting the transmission strategies to the system’s ergodic behavior. However, when these variations are infrequent, their temporal average can deviate significantly from the channel’s ergodic mode, rendering the ergodic metrics (e.g., ergodic capacity) unreliable performance targets.
State-dependent channels appear in various forms in communication systems. A prevalent example is mobile wireless channels, which undergo fading processes. Fading induces time-varying states for the channel, resulting in uncertainty about the network’s state at all transmitter and receiver sites [7]. Other examples include opportunistic scheduling, in which the transmitter adjusts encoding and transmission based on a quality-of-service metric that depends on the state of the channel [8,9,10], e.g., signal-to-noise ratio, latency, and throughput; opportunistic spectrum access (across time, space, and frequency); and cognitive radio communication, in which the quality of communication relies on the access to the spectrum resources [11,12]. This survey paper focuses primarily on the fading process in different network models and the mechanisms for circumventing transmitters’ lack of information about random fading processes. Nevertheless, most techniques that we will review can be adjusted to cater to other forms of state-dependent channels as well.
When wireless channels undergo fading, a useful convention to circumvent uncertainties about the fading process is establishing training sessions to estimate channel states. Such sessions should repeat periodically commensurate to how frequently the states vary. Depending on the multiplexing mode in a communication channel, the training sessions are either bidirectional (e.g., in frequency-division multiplexing systems) or they are unidirectional and ensued by feedback sessions (e.g., in time-division multiplexing systems). While effective in delivering the channel state to the receiver sites, both mechanisms face various challenges for delivering the same information to the transmitters. For instance, establishing channels in both directions is not always feasible, and even when it is, feedback communication incurs additional costs and imposes additional latency. Such impediments are further exacerbated as the size of a network grows.
When the probabilistic model of the process is known, an alternative approach to channel training and estimation is hedging against the random fluctuations. When the fluctuations are rapid enough, an effective long-term strategy is adapting the transmission strategies to the system’s ergodic behavior. A widely-used instance of this is the ergodic capacity as a reliable transmission rate for a channel that undergoes a fast-fading process. On the other hand, when the fluctuations occur in time blocks, which is often the case, an effective strategy is the outage strategy, aiming to meet target reliability with a pre-specific probabilistic guarantee. An example of an outage strategy is adopting the notion of outage capacity, which evaluates the likelihood of reliable communication at a fixed transmission rate [13]. When the actual channel realization can sustain the rate, the transmission is carried out successfully; otherwise, it fails, and no message is decoded [7,13]. The notions of outage and delay-limited capacities are studied extensively for various networks, including the multiple access channel (c.f. [14,15,16,17,18,19] and references therein).
While the ergodic and outage approaches provide long-term probabilistic performance guarantees, they lack instantaneous guarantees. That is, each communication session faces a chance of complete failure. For instance, when the channel’s instantaneous realization does not sustain a rate equal to the ergodic or outage capacity, the entire communication session over that channel will be lost. To circumvent a lack of short-term guarantees, the broadcast approach provides principles for designing transmission schemes that benefit from both short- and long-term performance guarantees. In information-theoretic terms, the broadcast approach is called variable-to-fixed channel coding [6].

1.2. Degradedness and Superposition Coding

The broadcast approach ensures a minimum level of successful communication, even when the channels are in their weakest states. In this approach, any channel realization is viewed as a broadcast receiver, rendering an equivalent network consisting of several receivers. Each receiver is designated to a specific channel realization, and it is degraded with respect to a subset of other channels. Designing a broadcast approach for a channel model has the following two pivotal elements.
1. 
Degradedness in channel realizations: The first step in specifying a broadcast approach for a given channel pertains to designating a notion of degradedness that facilitates rank-ordering different realizations of a channel based on their relative strengths. The premise for assigning such degradedness is that if communication is successful in a specific realization, it will also be successful in all realizations considered stronger. For instance, in a single-user single-antenna wireless channel that undergoes a flat-fading process, the fading gain can be a natural degradedness metric. In this channel, as the channel gain increases, the channel becomes stronger. Adopting a proper degradedness metric hinges on the channel model. While it can emerge naturally for some channels (e.g., single-user flat-fading), in general, selecting a degradedness metric is rather heuristic, if possible at all. For instance, in the multiple access channel, the sum-rate capacity can be used as a metric to designate degradedness, while in the interference channel, comparing different network realizations, in general, is not well-defined.
2. 
Degradedness in message sets: Parallel to degradedness in channel realization, in some systems, we might have a natural notion of degradedness in the message sets as well. Specifically, in some communication scenarios (e.g., video communication), the messages can be naturally divided into multiple ordered layers that incrementally specify the entire message. In such systems, the first layer conveys the baseline information (e.g., the lowest quality version of a video); the second layer provides additional information that incrementally refines the baseline information (e.g., refining video quality), and so on. Such a message structure specifies a natural way of ordering the information layers, which should also be used by the receiver to retrieve the messages successfully. Specifically, the receiver starts by decoding the baseline (lowest-ranked) layer, followed by the second layer, and so on. While some messages have inherent degradedness structures (e.g., audio/video signals), that is not the case in general. When facing messages without an inherent degradedness structure, a transmitter can still split a message into multiple, independently generated information layers. The decoders, which are not constrained by decoding the layers in any specific order, will decode as many layers as they afford based on the actual channel realization.
In a communication system, in general, the states of degradedness in channel realizations and degradedness in message sets can vary independently. Subsequently, designing a broadcast approach for a communication system hinges on its channel and message degradedness status. By leveraging the intuitions from the known theories on the broadcast channel, we briefly comment on different combinations of the degradedness states.
  • Degraded message sets. A message set with an inherent degradedness structure enforces a prescribed decoding order for the receiver.
    -
    Degraded channels. When there is a natural notion of degradedness among channel realizations (e.g., in the single-user single-antenna flat-fading channel), we can designate one message to each channel realization such that the messages are rank-ordered in the same way that their associated channels are ordered. At the receiver side, based on the actual realization of the channel, the receiver decodes the messages designated to the weaker channels, e.g., in the weakest channel realization, the receiver decodes only the lowest-ranked message, and in the second weakest realization, it decodes the two lowest-ranked messages, and so on. Communication over a parallel Gaussian channel is an example in which one might face degradedness both in the channel and the message [20].
    -
    General channels. When lacking a natural notion of channel degradedness (e.g., in the single-user multi-antenna channel or the interference channel), we generally adopt an effective (even though imperfect) approach to rank order channel realizations. These orders will be used to prescribe an order according to which the messages will be decoded. The broadcast approach in such settings mimics the Körner–Marton coding approach for broadcast transmission with degraded message sets [21]. This approach is known to be optimal for a two-user broadcast channel with a degraded set of messages, while the optimal strategy for the general broadcast approach is an open problem despite the significant recent advances, e.g., [22].
  • General message sets. Without an inherent degradedness structure in the message, we have more freedom to generate the message set and associate the messages to different channel realizations. In general, each receiver has the freedom to decode any desired set of messages in any desired order. The single-user multi-antenna channel is an important example in which such an approach works effectively [23]. In this setting, while the channel is not degraded in general, different channel realizations are ordered based on the singular values of the channel matrix’s norm, which implies an order in channel capacities. In this setting, it is noteworthy that the specific choice of ordering the channels and assigning the set of messages decoded in each realization induces degradedness in the message set.
Built based on these two principles, and following the broadcast approach to compound channels [24], the notion of broadcast strategy for slowly fading single-user channel was initially introduced for effective single-user communication [25].

1.3. Application to Multimedia Communication

The broadcast approach has a wide range of applications that involve successive and incremental retrieval of information sources. Representative examples include image compression and video coding systems, which can be naturally integrated with the successive refinement techniques [26,27]. Specifically, the broadcast approach’s underlying premise is to allow the receivers to decode the messages only partially, as much as the channels’ actual instantaneous realizations allow. This is especially relevant in audio/video broadcast systems, in which even partially decoding the messages still renders signals that are aurally or visually interpretable or recognizable. In these systems, a transmitter is often oblivious to the instantaneous realization of the channels, and the quality of its channel shapes the quality of the audio or video signal recovered. This is also the principle widely used in communication with successive refinement, in which a message is split into multiple layers. A baseline layer carries the minimal content that allows decoding an acceptable message. The subsequent layers successively and progressively add more details to the message, refining its content and quality. This approach enables digitally achieving a key feature of analog audio and video transmission: the quality of communication is a direct function of the channel quality, while there is no channel state information at the transmitter.
In this review paper, we start by reviewing the core ideas in designing a broadcast approach in the single-user wireless channel in Section 2. In this section, we address both single-antenna and multi-antenna systems under various transmission constraints. Next, we provide an overview of the applications to the multiple access channel in Section 3. This section discusses settings in which transmitters are either entirely or partially oblivious to the channel states. Section 4 and Section 5 will be focused on the interference channel and the relay channel, respectively. A wide range of network settings will be discussed in Section 6, and finally, Section 7 provides a perspective on the possible directions for extending the theory and applications of the broadcast approach.

2. Variable-to-Fixed Channel Coding

As pointed out earlier, the broadcast approach is, in essence, a variable-to-fixed channel coding [6] for a state-dependent channel, where the state realization is known only at the receiver. While being oblivious to the channel realizations, the transmitter has access to the probabilistic description of the channel. The key idea underpinning the broadcast approach is splitting the transmitted message into multiple independent layers and providing the receiver with the flexibility to decode as many layers as it affords, depending on the channel’s actual state. While the concept is general and can be applied to a wide range of state-dependent channels, in this paper we focus on wireless channels.

2.1. Broadcast Approach in Wireless Channels

In wireless communications, the channels undergo random fading processes. In these systems, the channel state corresponds to a fading gain, and the channel state statistical description is characterized by the probability model of the fading process [7,23,25,28]. The relative duration of the channel’s coherence time to the system’s latency requirement specifies the channel’s fading condition. Specifically, slow (fast) fading arises when the channel’s coherence time is large (small) relative to the system’s latency requirement. In particular, slowly fading channels are commonly when a mobile front-end moves slowly relative to the data transmission rate. Such a model is especially apt in modern communication systems with high spectral efficiency and data rates.
In systems with slowly-fading channels, a receiver can estimate the channel fading coefficients with high accuracy. This motivates considering the instantaneous and perfect availability of the channel state information (CSI) at the receiver sites. On the other hand, acquiring such CSI at the transmitter sites (CSIT) can be either impossible, due to the lack of a backward channel from a receiver to its respective transmitter; prohibitive, due to the extensive costs associated with backward communication; or unhelpful, due to a mismatch between the stringent latency constraints and the frequency of backward communication. Hence, in these circumstances, properly circumventing the lack of perfect CSIT plays a pivotal role in designing effective communication schemes.
Capitalizing on the system’s ergodic behavior (e.g., setting the transmission rate to the ergodic capacity of a channel) effectively addresses the lack of CSIT [7]. However, this is viable only when the transmission is not facing any delay constraints, and the system is allowed to have sufficiently long transmission blocks (relative to the fading dynamics). In particular, in a highly dynamic channel environment, stringent delay constraints imply that a transmission block, in spite of still being large enough for having reliable communication [13]), is considerably shorter than the dynamics of the slow fading process. To quantify the quality of communication in such circumstances, the notion of capacity versus outage was introduced and discussed in [7,13] (and references therein). A fundamental assumption in these systems is that the fading process variations throughout the transmission block are negligible. In an outage strategy, the transmission rate is fixed, and the information is reliably retrieved by the receiver when the instantaneous channel realizations allow. Otherwise, communication fails (an outage event). In such systems, the term outage capacity refers to the maximal achievable average rate. It can also be cast as the capacity of an appropriately defined compound channel [7]. The main shortcoming of the outage approach to designing transmission is the possibility of outage events, which translates to possibly a significant loss in spectral efficiency.
The broadcast approach aims to avoid outage events while the transmitters remain oblivious to the state of their channels. In this approach, reliable transmission rates are adapted to the actual channel conditions without providing feedback from the receiver to the transmitter. This approach’s origins are discussed in Cover’s original paper [24], which suggests using a broadcast approach for the compound channel. Since the slowly-fading channel can be viewed as a compound channel with the channel realization as the parameter of the compound channel, transmission over these channels can be naturally viewed and analyzed from the perspective of the broadcast approach. This strategy is useful in various applications, and in particular, it is in line with the successive refinement source coding approach of [29] and the subsequent studies in [30,31,32,33,34]. Specifically, the underlying premise is that the more the provided information rate, the less average distortion evident in the reconstructed source.
An example of successive refinement of source coding is image compression, in which a gross description exists at first, and gradually with successive improvements of the description, the image quality is further refined. An application example is progressive JPEG encoding, where additional coded layers serve to refine the image quality. In the broadcast approach, the transmitter sends layered coded information, and in view of the receiver as a continuum of ordered users, the maximum number of layers successively decoded is dictated by the fading channel realization. Thus, the channel realization influences the received quality of the data. The broadcast approach has a practical appeal in voice communication cellular systems, where a layered voice coding is possible. Service quality, subsequently, depends on the channel realization. This facilitates using coding to achieve the basic features of analog communications, that is, the better the channel, the better the performance, e.g., the measured signal-to-noise ratio (SNR) or the received minimum mean-squared error (MMSE). All of this is viable while the transmitters are unaware of channel realizations. Other applications can be found in [35]. The problem of layered coding suggests unequal error protection on the transmitted data, which was studied in ([36], and references therein). A related subject is the priority encoding transmission (PET). The study in [37] shows that sending hierarchically-organized messages over lossy packet-based networks can be analyzed using the broadcast erasure channel with degraded message set, using the information spectrum approach [38]. Finally, we remark [39] extends the notion to settings in which the probabilistic model is unknown to the transmitter.

2.2. Relevance to the Broadcast Channel

Since the broadcast approach’s foundations hinge on those of the broadcast channel, we provide a brief overview of the pertinent literature on the broadcast channel, which was first explored by Cover [24,40]. In a broadcast channel, a single transmission is directed to a number of receivers, each enjoying possibly different channel conditions, reflected in their received SNRs. The Gaussian broadcast channel with a single transmit antenna coincides with the classical physically degraded Gaussian broadcast channel, whose capacity region is well known (see [40] for the deterministic case and [41,42,43] for the composite or ergodic cases). For multiple transmit antennas, the Gaussian broadcast channel is, in general, a non-degraded broadcast channel, for which the capacity region with a general message set is not fully known [44,45,46,47,48], and it cannot be reduced to an equivalent set of parallel degraded broadcast channels, as studied in [41,42,43,49]. In the special case of individual messages without common broadcasting, the capacity region in the multi-antenna setting was characterized in [50].
Broadcasting a single user essentially means broadcasting common information. Information-theoretic results and challenges for broadcasting a common source are discussed in [51], and in light of endless information, data transmission is termed streaming in [52]. The interpretation of single-user broadcasting is the hierarchical broadcasting using multi-level coding (MLC) [53,54,55]. The study in [54] demonstrates the spectral efficiency of MLC with hierarchical demodulation in an additive white Gaussian noise (AWGN) channel and a fading channel. Authors in [56] examine the fading interleaved channel with one bit of side information about the fading process. The broadcast approach is adapted to decode different rates for channels taking these two distinct states (determined by whether the SNR is above or below a threshold value). Since the channel is memoryless, the average rate, given by the mutual information we have I ( y , s ^ ; x ) (where x is the channel input, y is the channel output, and s ^ is the partial state information), is achievable. This is not the case with the broadcast approach, which seems to be unfit here, where channel states are assumed to be independent and identically distributed (i.i.d.).
Finally, the study in [57] considers a superposition coding scheme to achieve higher transmission rates in the slowly-fading channel. This study adopts the broadcast approach for the single-input single-output (SISO) channel with a finite number of receivers. The number of receivers is the number of coded layers. It is evident from [57] that for the SISO channel, a few levels of coded layering closely approximates the optimal strategy employing transmission of infinite code layers.

2.3. The SISO Broadcast Approach—Preliminaries

In this section, we elaborate on the original broadcast approach, first presented in [25], and we provide the derivation of the expressions related to the broadcast approach concept, an optimal power distribution, and the associated average achievable rates under different system constraints. We start by providing a canonical channel model for the single-user single-antenna system. The fading parameter realization can be interpreted as an index (possibly continuous), which designates the SNR at the receiver of interest. This model also serves as the basis for other channel models discussed in the rest of the paper. Specifically, consider the channel model:
y = h x + n ,
where x is the transmitted complex symbol, y is the received symbol, and n accounts for the AWGN with zero mean and unit variance denoted by CN ( 0 , 1 ) . Constant h represents the fading coefficient. For each realization of h, there is an achievable rate. We are interested in the average achievable rate for various independent transmission blocks. Thus, we present the results in terms of average performance, averaged over the distribution of h.
Information-theoretic considerations for this simple model were discussed in ([13], and references therein), as a special case of the multi-path setting. With the h value known to the transmitter, and with a short-term power constrain (excluding power optimization in different blocks), the reliable rate averaged over many block realizations is given by
C erg = E s [ log ( 1 + s P ) ] ,
where s | h | 2 is the random fading power. The normalized SNR, following the channel model definition (1), is denoted by P = E [ | x | 2 ] , where E stands for the expectation operator (when a subscript is added, it specifies the random variable with respect to which the expectation is taken).
The SISO channel defined in (1) is illustrated in Figure 1a, and its associated broadcast channel is depicted in Figure 1b. This figure also illustrates the broadcast approach, according to which the transmitter sends an infinite number of coded information layers. The receiver is equivalent to a continuum of ordered users, each decoding a coded layer if channel realization allows. In general, the number of coded layers (and respectively, receivers) depends on the cardinality of the fading power random variable (RV). Specifically, in a Gaussian fading channel, a continuum of coded layers is required. Predetermined ordering is achieved due to the degraded nature of the Gaussian SISO channel [40]. Each of the users has to decode a fractional rate, denoted by d R in Figure 1b. The fractional rates d R of the different users are not equal but depend on their receiver index. For some fading realization h ( j ) , only the continuum of receivers up to receiver j can decode their fractional rates d R . The first receiver decodes only its own d R , the second decode initially the interference d R (information intended to the first user) and then decodes its own d R . Finally, receiver j decodes all fractional interferences up to layer j 1 , and then decodes its information layer d R . Hence, the total achievable rate for a realization h ( j ) is the integral of d R over all receivers up to j. This model is the general case of coded layering. The broadcast approach in [25] with a finite number of code layers, also termed superposition coding, is presented in [57]. In finite level code layering, only a finite set of ordered receivers is required. This approach has a lower decoding complexity. However, it is a broadcast sub-optimal approach.
Next, assume that the fading power RV S is continuous. Then for some channel realization h ( j ) of Figure 1b, with a fading power s ( j ) , the designated reliably conveyed information rate is denoted by R ( s ( j ) ) . We now drop the superscript j, and refer to s as the realization of the fading power RV S. As illustrated, the transmitter views the fading channel as a degraded Gaussian broadcast channel [40] with a continuum of receivers, each experiencing a different effective receive SNR specified by s · P . The total transmitted power P is also the SNR as the fading and additive noise are normalized according to (1). The term s is, therefore, interpreted as a continuous index. By noting that for small enough x > 0 log ( 1 + x ) x , the incremental differential rate is given by
d R ( s ) = log 1 + s ρ ( s ) d s 1 + s I ( s ) = s ρ ( s ) d s 1 + s I ( s ) ,
where ρ ( s ) d s is the transmit power associated with a layer parameterized by s, intended for receiver s, which also designates the transmit power distribution. The right-hand-side equality is justified in [58]. Information streams intended for receivers indexed by u > s are undetectable and are treated as additional interfering noise, denoted by I ( s ) . The interference for a fading power s is
I ( s ) = s ρ ( u ) d u ,
which is also a monotonically decreasing function of s. The total transmitted power is the overall collected power assigned to all layers, i.e.,
P = 0 ρ ( u ) d u = I ( 0 ) .
As mentioned earlier, the total achievable rate for a fading realization s is an integration of the fractional rates over all receivers with successful layer decoding capability, rendering
R ( s ) = 0 s u ρ ( u ) d u 1 + u I ( u ) .
The average rate is achieved with sufficiently many transmission blocks, each viewing an independent fading realization. Therefore, the total rate averaged over all fading realizations is
R bs = 0 d u f ( u ) R ( u ) = 0 d u ( 1 F ( u ) ) u ρ ( u ) 1 + u I ( u ) ,
where f ( u ) is the probability distribution function (PDF) of the fading power, and
F ( u ) = 0 u d a f ( a ) ,
is the corresponding cumulative distribution function (CDF).
Optimizing R bs with respect to the power distribution ρ ( s ) (or equivalently with respect to I ( u ) , where u 0 ) under the power constraint P (5) is of interest and can in certain cases be found by solving the associated constrained Eüler equation [59]. We turn back to the expression in (7), corresponding to s th = 0 , and explicitly write the optimization problem posed
R bs , max = max I ( u ) 0 d u ( 1 F ( u ) ) u ρ ( u ) 1 + u I ( u ) ,
where we maximize R bs (7) over the residual interference function I ( u ) . For an extremum function I ( x ) , the variation of the functional (9) is zero [59], corresponding to a proper Eüler equation, which yields the extremal solution for I ( x ) . Let us first present the functional of (9) subject to maximization
S ( x , I ( x ) , I ( x ) ) = ( 1 F ( x ) ) x I ( x ) 1 + x I ( x ) .
The necessary condition for a maximum of the integral of S ( x , I ( x ) , I ( x ) ) over x is a zero variation of the functional ([59], Theorem 2, Section 3.2). Correspondingly, the Eüler Equation is given by
S I d d x S I = 0 ,
where
S I = ( 1 F ( x ) ) x 2 I ( x ) ( 1 + x I ( x ) ) 2 ,
S I = ( 1 F ( x ) ) x 1 + x I ( x ) ,
d d x S I = x f ( x ) 1 + x I ( x ) + ( 1 F ( x ) ) x 2 I ( x ) 1 ( 1 + x I ( x ) ) 2 .
These relationships simplify from a differential Equation (11) to a linear equation by I ( x ) , providing the following closed-form solution
I ( x ) = 1 F ( x ) x · f ( x ) x 2 f ( x ) x 0 x x 1 0 e l s e ,
where x 0 is determined by I ( x 0 ) = P , and x 1 by I ( x 1 ) = 0 . All the analyses are also valid for the single-input multiple-output (SIMO) and multiple-input single-output (MISO) channels as long as the channels are degraded regardless of the number of receive antennas in SIMO or transmit antennas in MISO. The number of transmit or receive antennas only affects the fading power distribution CDF. As an example, consider a SISO Rayleigh flat fading channel for which the fading power S has an exponential distribution with pdf
f ( u ) = e u , and F ( u ) = 1 e u , u 0 .
The optimal transmitter power distribution that maximizes R bs in (9) is specified by substituting f ( u ) and F ( u ) from (16) into (15), resulting in
ρ ( s ) = d d s I ( s ) = 2 s 3 1 s 2 , s 0 s s 1 0 , else .
Constant s 0 is determined by solving I ( s 0 ) = P , and it is given by
s 0 = 2 1 + 1 + 4 P .
Similarly, s 1 can be found by solving I ( s 1 ) = 0 , which indicates s 1 = 1 . The corresponding rate R ( s ) using (6) is
R ( s ) = 0 , 0 s s 0 2 ln ( s s 0 ) ( s s 0 ) , s 0 s 1 2 ln ( s 0 ) ( 1 s 0 ) , s 1 ,
and following (7), the associated total average rate is
R bs = 2 E i ( s 0 ) 2 E i ( 1 ) ( e s 0 e 1 ) ,
where
E i ( x ) = x e t t d t , x 0
is the exponential integral function. The limiting behavior of R bs is found to be
R bs ln P 9.256 , P 1 e P , P 0 .
The ergodic capacity in this case is given by [13],
C erg = e 1 / P · E i ( 1 P ) ln P 1.78 , P P , P 0 .
The average achievable rate of the standard outage approach, depends on the outage probability P out = P { s s th } = 1 e s th . Thus, the achievable outage rate is given by
R o ( s th ) = e s th log ( 1 + s th P ) ,
where R o ( s th ) is the average achievable rate of a single layered code for a parameter s th . That is, a rate of log ( 1 + s th P ) is achieved when the fading power realization is greater than s th , with probability e s th . The outage capacity is the product of maximizing the achievable outage average rate (24) with respect to the outage probability (or the fading power threshold s th ). This yields an outage capacity
R o , max = e s th , opt log ( 1 + s th , opt P ) ,
where s th , opt solves the equation
log ( 1 + s th , opt P ) = P 1 + s th , opt P ,
and it can be expressed in closed-form as
s th , opt = P W L ( P ) W L ( P ) · P ,
where W L ( P ) is the Lambert-W function, also known as the Omega function, which is the inverse of the function f ( W ) = W e W . Subsequently, the outage capacity is given by [60]
R o , max = e ( P W L ( P ) ) / W L ( P ) / P · log P / W L ( P ) ln P W L ( P ) , P 1 e P , P 0 .
The study in [61] provides an interesting interpretation for the basics of the broadcast approach [25] from the I-MMSE perspective.
When a transmitter has full CSI and transmits at a fixed power P, the transmission rate can be adapted to channel state, and single-layer transmission can achieve the ergodic capacity. When variability in transmission power is allowed, and we face an average power constraint, a water-filling approach can be used. This facilitates adapting the transmission power and rate to the fading state, which is advantageous in terms of the expected rate. However, when lacking the perfect CSIT, the SISO broadcast approach can be optimized as studied in [62]. In this approach, the CSI is quantized by the receiver and fed back to the transmitter. This allows for short latency, and the optimized achievable expected rate can be characterized as a function of the CSI accuracy.
The studies in [63,64] investigate various multi-layer encoding hybrid automatic repeat request (HARQ) schemes [65]. The motivation for extending the conventional HARQ schemes to multi-layer coding is to achieve high throughput efficiency with low latency. The study in [63] focuses on finite-level coding with incremental redundancy HARQ, where every coded layer supports incremental redundancy coding. The multi-layer bounds were investigated through continuous broadcasting by defining different broadcasting protocols that coherently combine HARQ and broadcasting incremental redundancy HARQ. Optimal power distribution cannot be obtained for continuous broadcasting. However, it was observed that even with a sub-optimal broadcasting power distribution, significantly high gains of ∼3 dB over an outage approach could be achieved for low and moderate SNRs in the long-term static channel model, with latency as short as two blocks. In the long-term static channel model, the channel is assumed to remain in the same fading state within the HARQ session. This is especially interesting as the conventional broadcast approach (without HARQ), has only marginal gains over the outage approach for low SNRs. The retransmission protocol of [63] is also an interesting approach, which uses retransmissions for sending new information at a rate matched to the broadcasting feedback from the first transmission. The optimal broadcasting power distribution for outage approach retransmission was fully characterized in [63], and numerical results showed that it is the most efficient scheme for high SNRs, and at the same time, it closely approximates the broadcasting incremental redundancy-HARQ for low SNRs. However, in broadcasting incremental redundancy HARQ, only sub-optimal power distributions were used and finding the broadcasting optimal power distribution is still an open problem. It may also turn out that the broadcasting incremental redundancy HARQ with an optimal power distribution has more gains over the outage approach retransmission scheme.
Next, we present the results on the achievable rates for the single-user SISO Rayleigh flat fading channel under the broadcast approach. Figure 2 demonstrates the SISO broadcast achievable average rate R bs (20), outage capacity R o (25), the ergodic capacity C erg (23) upper bound, and the Gaussian capacity C G = log ( 1 + P ) as a reference. Clearly, R bs > R o as the latter is achieved by substituting ρ ( s ) with P δ ( s s th , opt ) in lieu of the optimized ρ ( s ) in (6). Outage capacity is equivalent to optimized single-layer coding rather than the optimized continuum of code layers in the broadcast approach. This difference is more pronounced in the high SNRs. Such a comparison of the single- level code layer and two-level achievable rates is presented in [57]. This comparison shows that two-level code layering is already very close to the optimum R bs . The ergodic capacity in the general SIMO case, with N receive antennas, is given by ([66], Equation (9)):
C erg = 1 Γ ( N ) 0 d x log ( 1 + P · x ) x N 1 e x ,
where Γ denotes the Gamma function. The probability density of the total fading power for N receive antennas, is given by [66]
f ( λ ) = const ( N ) · λ N 1 e λ ,
where const ( N ) is a normalization constant.

2.4. The MIMO Broadcast Approach

Next, we review the multiple-input multiple-output (MIMO) channel. MIMO channels, in general, are non-degraded broadcast channels. The MIMO capacity region is known for multiple users with private messages  [50], and for two users with a common message [67]. A complete characterization of the broadcast approach requires the full solution of the most general MIMO broadcast channel with a general degraded message set, which is not yet available. Hence, suboptimal ranking procedures are studied. Broadcasting with degraded message sets is not only unknown in general channels, but also, it is unknown for MIMO channels [68,69]. Various approaches to transmitting degraded message set with sub-optimal ranking at the receiver are studied in [23,70,71]. The ranking of channel matrices (as opposed to a vector in a SIMO case) can be achieved via supermajorization ranking of the singular values of H H H . The variational problem for deriving the optimal power distribution for the MIMO broadcast strategy is characterized in [23], but seems not to lend itself to closed-form expressions. Thus, a sub-optimal solution using majorization is considered and demonstrated for the Rayleigh fading channel.
We adopt the broadcast approach described earlier for the SISO and SIMO channels, in which the receivers opt to detect the highest possible rate based on the actual realization of the propagation matrix H not available to the transmitter. In short, as H improves, it sustains higher reliable rates. This is because the MIMO setting is equivalent to the general broadcast channel (from the perspective of infinite layer coding), rather than a degraded broadcast channel as in the single-input case. In the sequel, we demonstrate a broadcast approach suited for this MIMO scenario. The approach suggests an ordering of the receivers based on supermajorization of singular values of the channel norm matrix. Consider the following flat fading MIMO channel with M transmit antennas and N receive antennas:
y = H x + n ,
where x is the input ( M × 1 ) vector, n is the ( N × 1 ) noise vector with complex Gaussian i.i.d. CN ( 0 , 1 ) elements. The propagation matrix ( N × M ) is designated by H and also possesses complex Gaussian i.i.d. CN ( 0 , 1 ) elements. The received ( N × 1 ) vector is denoted by y . We adhere to the non-ergodic case, where H is fixed throughout the code word transmission. We assume that the receiver is aware of H while the transmitter is not. The total transmit power constraint is P, i.e., E [ tr { x x H } ] P .

2.4.1. Weak Supermajorization

First, we introduce some partial ordering relations based on classical theory of majorization [72]. Let α = { α i } , β = { β i } be two sequences of length K. Let { α ( i ) } , { β ( i ) } be the increasing ordered permutations of the sequences, i.e.,
α ( 1 ) α ( 2 ) α ( K ) ,
β ( 1 ) β ( 2 ) β ( K ) .
Let α be weakly supermajorized by β , α w β , that is
i = 1 k α ( i ) i = 1 k β ( i ) , k = 1 , K .
Then, the relation α w β implies that [72]
i = 1 K ϕ ( α i ) i = 1 K ϕ ( β i ) ,
for all continuous decreasing convex functions ϕ ( · ) .

2.4.2. Relation to Capacity

Next, consider the received signal in (31), where the undetectable code layers are explicitly stated as
y = H ( x S + x I ) + n ,
where x S and x I are decodable information and residual interference Gaussian vectors, respectively. Their average norms are denoted by P S and P I , respectively, and the total transmit power P = P I + P S . n is an i.i.d. Gaussian complex vector with unit variance per component. The mutual information between x S and y is given by
I ( y ; x S ) = I ( y ; x S , x I ) I ( y ; x I | x S )
= log det I + P S + P I M H H H log det I + P I M H H H
= k = 1 J log 1 + P S λ k 1 + P I λ k
C ( λ ; P S , P I ) .
Parameters { λ k } for k = 1 J , where J min ( N , M ) , designate the singular values (or eigenvalues) of the matrix 1 M H H H for M N , or 1 M H H H for N M  [66]. Finally, if  λ w δ , we have
C ( λ ; P S , P I ) C ( δ ; P S , P I ) .

2.4.3. The MIMO Broadcast Approach Derivation

We discuss the MIMO channel broadcast approach via supermajorization layering for the simple case of M = N = 2 . The signal x is composed of a layered double indexed data stream with indices denoted by u and v. We refer to layer ordering by columns bottom-up, where u and v are described as a pair of indices taking integer values within the prescribed region. This is only for demonstration purposes, as indices u and v are continuous singular values of 1 2 H H H . Say u and v are associated with the minimal eigenvalue λ 2 and the sum of eigenvalues λ 2 + λ 1 , respectively. Evidently, u 0 , v 2 u . Say that λ 2 , λ 1 take on the set of integer values { 0 , 1 , 2 , 3 , 4 } , then the layered system is described by ( u , v ) in the order: ( 0 , 0 ) , ( 0 , 1 ) , ( 0 , 2 ) , ( 0 , 3 ) , ( 0 , 4 ) , ( 1 , 2 ) , ( 1 , 3 ) , ( 1 , 4 ) , ( 2 , 4 ) . The actual ordering of the layers is in fact immaterial, as will be shown, decoding is not done successively as in the SISO case [25], but rather according to what is decodable adhering to partial ordering.
We envisage all possible realizations of H and order them by u = λ 2 , v = λ 2 + λ 1 where λ 2 and λ 1 are, respectively, the minimal and maximal eigenvalues of 1 2 H H H (a 2 × 2 matrix in our case). Supermajorization ordering dictates that all streams decodable for realization H will be decodable for realization H as long as
λ 2 λ 2 , λ 2 + λ 1 > λ 2 + λ 1 .
Thus, we visualize all possible realizations of H as channels referring to different users in a broadcast setting, and we investigate the associated rates of the users, which we have ranked as in Section 2.4.1, via a degraded ordering. It is evident that the current approach specifies an achievable rate region, but by no means is it claimed to be optimal. In fact, it even has some inherent limitations.
Let u = λ 2 and v = λ 1 be the eigenvalues of 1 2 H H H for some channel realization such that v u 0 . Let ρ ( u , v ) d u d v be the power associated with the information stream indexed by ( u , v ) where v u , and featuring the incremental rate d 2 R ( u , v ) . Again, for a given u and v, all rates associated with the indices ( a , b ) , a u , b v can be decoded, as ( λ 2 , λ 1 ) is supermajorized by ( λ 2 = a , λ 1 = b ) . A natural optimization problem, in parallel to that posed and solved for the single dimensional case, is to optimize the power density ρ ( u , v ) , or the related interference pattern I ( u , v ) maximizing the average rate, under the power constraint I ( 0 , 0 ) = P . Let I ( u , v ) designate the residual interference at ( u , v ) . Hence,
I ( u , v ) = P 0 u d a a v d b ρ ( a , b ) .
The associated incremental rate d 2 R ( u , v ) , based on (3) and (37), is then given by
d 2 R ( u , v ) = log 1 + u ρ ( u , v ) d u d v 1 + u I ( u , v ) + log 1 + v ρ ( u , v ) d u d v 1 + v I ( u , v )
= u ρ ( u , v ) d u d v 1 + u I ( u , v ) + v ρ ( u , v ) d u d v 1 + v I ( u , v ) .
The power density is the second order derivative of the residual interference Function (43), i.e.,
ρ ( u , v ) = 2 u v I ( u , v ) I u v ,
and the incremental rate may be expressed as
d 2 R ( u , v , I , I u v ) = u I u v ( u , v ) d u d v 1 + u I ( u , v ) v I u v ( u , v ) d u d v 1 + v I ( u , v ) .
The accumulated reliable rate decoded at ( u , v ) is
R ( u , v ) = 0 u a v d 2 R ( a , b ) .
The expected rate, averaged over various channel realizations, is then given by
R ave = 0 0 f ( u , v ) R ( u , v ) d u d v ,
where f ( u , v ) designates the joint PDF of the ordered eigenvalues of 1 2 H H H , random variables u and v. For a Gaussian H with i.i.d. components, the joint density function of λ 2 , λ 1  is given by [66]
f λ 2 , λ 1 ( u , v ) = 16 e 2 v 2 u ( v u ) 2 , v u 0 .
The optimal expected rate is a product of an optimal selection of the power distribution ρ ( u , v ) . Specifying the power distribution uniquely specifies the residual interference function I ( u , v ) (43) and (46). Hence, optimizing R ave can instead be carried out with respect to the I ( u , v ) , i.e.,
R ave max = max I ( u , v ) 0 d a 0 d b f ( a , b ) 0 a d u u b d v R F ( u , v , I , I u v ) ,
where f ( a , b ) is defined in (50), and we have set R F ( u , v , I , I u v ) d 2 R ( u , v , I , I u v ) d u d v from (47), which depends on the interference function I ( u , v ) and the power density I u v ( u , v ) from (43) and (46), respectively. Maximizing R ave with respect to the functional I ( u , v ) is a variational problem ([23], Appendix A). Consequently, the optimization problem may be stated in the form of a partial differential equation (PDE),
S I + 2 u v S I u v = 0 ,
where
S ( a , b , I , I a b ) 1 + F ( a , b ) F ( a ) F ( b ) · R F ( a , b , I , I a b ) ,
and S I is the partial derivative with respect to the function I ( u , v ) , S I u v is the partial derivative with respect to the function I u v , and I u v is the second-order partial derivative of I ( u , v ) with respect to u and v. The necessary condition for the extremum is given in ([23], Appendix A) in terms of a non-linear second order PDE and does not appear to have a straightforward analytical solution. Therefore, we demonstrate a single-dimension approximation to the optimal solution. This approximation approach is called the 1-D approximation, and it is developed for the 2 × 2 channel, i.e., two transmit and two receive antennas. It suggests breaking the mutual dependency of the optimal power distribution ρ ( a , b ) by requiring ρ ( a , b ) = ρ ( a ) ρ ( b ) . Such a representation bears two independent solutions, obtained from solving the optimal SISO broadcast strategy. Another sub-optimal solution could be obtained based on a finite-level code layering, as suggested in [57] for the SISO scheme. Accordingly, a single layer (outage) coding with and without employing majorization ranking at the receiver is suggested by [23]. A two-layer coded scheme for the 2 × 2 channel is also studied and compared with the outage approach in [23]. Another sub-optimal approach to the MIMO channel involves modeling the MIMO channel as a multiple-access channel (MAC), where each antenna transmits an independent stream [23]. In an MAC approach for the MIMO channel, instead of performing joint encoding for all transmit antennas, each antenna has an independent encoder. Thus, the receiver views an MAC. When each encoder performs layered coding, we essentially get an MAC-broadcast strategy. This approach was first presented in [73] for the multiple-access channel, employing the broadcast approach at the receiver. The advantage of this approach is that each transmitter views an equivalent degraded broadcast channel, and the results of the SISO broadcast strategy may be directly used.

2.4.4. Degraded Message Sets

Next, we briefly outline the formulation of the general MIMO broadcasting with degraded message sets. The key step for addressing the continuous broadcast approach for MIMO channels with degraded message sets involves decoupling the layering index and the channel state. In many previous studies on the continuous broadcast approach (e.g., [23,32,74]) the layering index is associated with the channel fading gain. However, for the MIMO case with degraded message set, it is proposed that the continuous layering indices are associated with only the power allocation and layer rates.
Consider the MIMO channel model in (31). The source transmits layered messages with a power density distribution function ρ ( s ) , where s [ 0 , ) . The first transmitted message is associated with s = 0 , and can be considered as a common message for all receivers. The next layer indexed by d s , cannot be decoded by the first user, but it is a common message for all other users. The capacity of the channel in (31) for a given channel state is the mutual information given by
I ( y ; x ) = log det I + P M H H H ,
which can also be expressed using the eigenvalues of 1 M H H H  [66],
I ( y ; x ) = k = 1 K log 1 + P λ k ,
where K = min ( M , N ) is the degree of freedom of the MIMO channel, and { λ k } k = 1 K are the eigenvalues of 1 M H H H . The singular value decomposition (SVD) of 1 M H H H = U Λ V H where U and V are unitary matrices and Λ is a [ K x K ] diagonal matrix of singular values of 1 M H H H . The equivalent receive signal of (31) multiplied by H is y = U Λ V H x + n , and multiplying the received signal by U H creates a parallel channel U H y = Λ x + n , where x = V x . This makes the channel of (31) an effective parallel channel when x is transmitted. However V is known at the receiver, and therefore the transmitter does not have to perform any precoding, and layering can be performed with respect to singular values distribution of 1 M H H H . The fractional achievable rate for a power allocation ρ ( s ) d s , and under successive decoding, is given by
k = 1 K log 1 + λ k ρ ( s ) d s 1 + λ k I ( s ) = k = 1 K λ k ρ ( s ) d s 1 + λ k I ( s ) ,
where I ( s ) is the residual layering power. I ( s ) serves as interference for decoding layer s. The relationship between power density distribution and the residual interference is ρ ( s ) = d I ( s ) d s . It is achievable for the set of eigenvalues { λ k } k = 1 K such that
d R ( s ) k = 1 K λ k ρ ( s ) d s 1 + λ k I ( s ) d I K ( λ 1 , . . . , λ K , s ) .
Feasibility of successive decoding here results from the fact that the function d I K ( λ 1 , , λ K , s ) is an increasing function of λ k , k { 1 , , K } . Define a fractional rate allocation function r ( s ) , such that r ( s ) ρ ( s ) = d R ( s ) . The cumulative rate achievable for a layer index s is simply
R ( s ) = 0 s r ( u ) ρ ( u ) d u .
The probability of achieving R ( s ) is given by
F c ( s ) = P r ( s ) k = 1 K λ k 1 + λ k I ( s ) ,
where F c ( s ) is the complementary CDF of the layering index s, i.e., F c ( s ) = 1 F ( s ) . The expected broadcasting rate is then
R bs = 0 d s ( 1 F ( s ) ) r ( s ) ρ ( s ) = 0 d s P r ( s ) k = 1 K λ k 1 + λ k I ( s ) r ( s ) ρ ( s ) .
We focus now on the case of K = 2 , i.e., min ( M , N ) = 2 . In this case, the fractional rate r ( s ) is decipherable if
r ( s ) λ 1 1 + λ 1 I ( s ) + λ 2 1 + λ 2 I ( s ) .
An alternative formulation is for a given λ 1 , the eigenvalues λ 2 for which r ( s ) can be reliably decoded are given by
λ 2 r ( s ) + r ( s ) λ 1 I ( s ) λ 1 1 + ( 2 λ 1 r ( s ) ) I ( s ) r ( s ) λ 1 I 2 ( s ) G ( λ 1 , s , I , r ) ,
where the inequality holds only for G ( λ 1 , s , I , r ) 0 . An alternative representation of the decoding probability of layer s is thus
F c ( s ) = P λ 2 G ( λ 1 , s , I , r )
= 0 d u G ( u , s , I , r ) d v f λ 1 , λ 2 ( u , v ) · 1 G ( u , s , I , r ) 0
= 0 d u f λ 1 ( u ) Q λ 1 , λ 2 ( u , G ( u , s , I , r ) ) · 1 G ( u , s , I , r ) 0 ,
where 1 ( x ) is the indicator function, and
f λ 1 , λ 2 ( u , v ) = 2 F λ 1 , λ 2 ( u , v ) u v ,
is the joint PDF of ( λ 1 , λ 2 ) , and
Q λ 1 , λ 2 ( u , v ) F λ 1 , λ 2 ( u , v ) u .
The expected rate for a general layering function r ( s ) and a layering power allocation function I ( s ) is given by
R bs = 0 d s r ( s ) ρ ( s ) · 0 d u f λ 1 ( u ) Q λ 1 , λ 2 ( u , G ( u , s , I , r ) ) · 1 G ( u , s , I , r ) 0 .
Clearly, the optimization problem for expected broadcasting rate maximization is given by
R bs , opt = max r ( s ) 0 , I ( s ) , s . t . I ( 0 ) = P , ρ ( s ) 0 0 d s J ( s , I , I , r ) ,
where the integrand functional J ( s , I , I , r ) is given by
J ( s , I , I , r ) = r ( s ) ρ ( s ) 0 d u f λ 1 ( u ) Q λ 1 , λ 2 ( u , G ( u , s , I , r ) ) · 1 G ( u , s , I , r ) 0 .
The necessary conditions for extremum are given by the Euler equations [59]
J r = 0 ,
J I s J I = 0 ,
where J r is the partial derivative of J with respect to r ( s ) . The extremum condition for r ( s ) in (71) can be expressed as follows:
0 d u f λ 1 ( u ) Q λ 1 , λ 2 ( u , G ) · 1 r ( s ) 1 G 0 + δ ( G ) f λ 1 , λ 2 ( u , G ) s G · 1 G 0 = 0 ,
where for brevity, G ( u , s , I , r ) is replaced by G, and δ ( x ) is the Dirac delta function. The extremum conditions, as stated in (71) and (72), do not lend themselves into closed-form analytical solutions even though K = 2 , and characterizing them remains an open problem for future research.

2.5. On Queuing and Multilayer Coding

Classical information theory generally assumes an infinitely long queue of data ready for transmission, which is motivated by maximizing communication throughput (Shannon capacity). In network theory, on the other hand, the input data is usually a random process that controls writing to a buffer (serving as a queue), and the readout from this buffer is another random process. In these settings, the design goal of transmission concentrates on minimizing the queue delay for the input data. However, designing the data queue and transmission algorithm cannot be decoupled in the presence of stringent delay constraints on input data transmission. This is because the objective is no longer only maximizing the throughput. This conceptual difference between network theory and information theory can be overcome by posing a common optimization problem and jointly minimizing the delay of a random input process under a power (rate) control constraint. This becomes a cross-layer optimization problem involving the joint optimization of two layers of the seven-layer open systems interconnection (OSI) model. Other fundamental gaps between network theory and information theory are covered in detail in [75,76,77,78].
Queuing and channel coding for a block fading channel with transmit CSI only, for a single user, is discussed in [79]. In this section, we first consider optimizing rate and power allocation for a single layer code transmission. For this scheme, the outage capacity [13] maximizes the achievable throughput. Rate and power are optimized jointly to minimize the overall delay. The delay is measured from the arrival of a packet at the queue until successfully decoded, including, if needed, retransmission due to outage events.
The study in [80] considers a cross-layer system optimization approach for a single-server queue followed by a multi-layer wireless channel encoder, as depicted in Figure 3. The main focus is on minimizing the average delay of a packet measured from entering the queue until successful service completion.

2.5.1. Queue Model—Zero-Padding Queue

Next, we consider the zero-padding queue model described in [80]. It is assumed that the transmission is performed every time the queue is not empty. If the available queue data are less than a packet size, a frame can be generated with zero-padding to have a valid frame for the channel encoder. We define the queuing time as the time from arrival to completion of service, and the waiting time as the time measured from arrival until initially being served. The queue’s waiting time analysis can be done at embedded points: the beginning of every time slot. The random process of packet arrival random at each slot is a deterministic process denoted by λ (bits/channel use).
The queue waiting time can be measured directly based on the queue size, as stated on Little’s theorem [81], by normalizing the queue size by the inverse of the input rate λ . Notice that Little’s theorem does not consider the instantaneous quantities to the average waiting time and average queue size. The following equation defines the queue size:
Q n + 1 = N λ n + 1 + Q n N R n N λ n + 1 + Q n N R n 0 0 otherwise ,
where N is the number of channel uses between slots, which is also the block length, and λ n + 1 is a deterministic queue input rate λ . It is noteworthy that in a single-layer coding, R n is a fixed R with probability p, and it is 0 with probability 1 p . This waiting time equation is also analyzed in ([82], Chapter 5) for a single-layer coding approach and a deterministic arrival process, where tight bounds on the expected waiting time are obtained. For simplicity, by normalization of the queue size by the block-length N, the Lindley equation is obtained [83]:
q ˜ n + 1 = q ˜ n + λ n + 1 R n q ˜ n + λ n + 1 R n 0 0 q ˜ n + λ n + 1 R n < 0 ,
where q ˜ n is now the queue size in units of blocks of data corresponding to N arrivals to the queue. In an outage approach, we have R n = R with probability p, and R n = 0 with a complementary probability 1 p , which is also the outage probability. For the rest of the analysis, the queue equations will be normalized following (75). We specify the queuing time equation for completeness of the definitions, which is the overall system delay for the zero-padding queue. The overall delay must always take into account the additional delay of service time beyond the queue’s waiting time. The normalized queue size is the waiting time equivalent, i.e.,
q n + 1 = q n + λ n + 1 λ R n λ , q n R n λ 0 λ n + 1 λ , o t h e r w i s e ,
where q n is a normalized queue size at a renewal slot n. In a single-layer coding approach, it is possible to analyze the queue delay by adopting the standard M/G/1 queue model. The input random process of an M/G/1 model follows a Poisson process, and its service distribution is another general random process. In an outage approach, a geometrically distributed random variable characterizes the time between services. For using the M/G/1 model, an important assumption on the system model is made: input arrives in blocks that have the same length as the coded transmission blocks. That is, the queue equation is normalized to the data block size of its corresponding transmission. The number of arrivals is measured in block units, and the input process has a rate of λ norm .
Having the arrival blocks are equal in size to transmitted blocks is a limiting constraint since a change of transmission rate means a change in input block size. Therefore, the M/G/1 queue model is not adopted in [80], and in the following, we use the zero-padding queue model as described earlier.

2.5.2. Delay Bounds for a Finite Level Code Layering

We consider here K multi-layer coding, and describe the Lindley equation [81]. The queue update equation is given by
w n + 1 = w n + x n w n + x n 0 0 w n + x n < 0 ,
where x n is the update random variable, which depends on the number of code layers. Its value represents the difference between the queue input λ and the number of layers successfully decoded, i.e.,
x n λ i = 1 K ν i , n R i .
Random variables { ν i , n } i = 1 K are associated with the outage probability as function of layer index. The corresponding fading power thresholds are denoted by { s th , i } i = 1 K . Random variables { ν i , n } i = 1 K are related to the fading thresholds as follows
ν i , n = 1 s th , i s n s th , i + 1 0 otherwise ,
where s n is the fading power realization at the nth time-slot, and s th , K + 1 = . Every random variable ν i , n has a probability of being 1, denoted by p K i + 1 . Note that outage probability is
p ¯ = 1 i = 1 K p i ,
in which p ¯ represents the probability that all layers cannot be decoded. The CDF of the queue size at these embedding points requires computing the CDF at every time instant. In this setting, the probability density d F X ( τ ) of X (78) is given by
d F X ( x ) = i = 1 K p i δ x ( λ j = 1 K i + 1 R j ) + p ¯ δ ( x λ ) ,
where p i = P { s th , i s n s th , i + 1 } for i { 1 , , K } and s th , K + 1 = . The next theorem, discussed in detail in ([80], Appendix B), establishes upper and lower bounds on E [ W K ] .
Theorem 1
([80]). For a K-layer coding, the expected queue size is upper and lower bounded by
E [ w K ] ( K λ ) ( i = 1 K p i K i + 1 λ ) ( K λ ) 2 + i = 1 K p i ( K K i + 1 ) 2 + p ¯ K 2 2 ( i = 1 K p i K i + 1 λ ) ,
and
E [ w K ] 2 ( K λ ) ( i = 1 K p i K i + 1 λ ) ( K λ ) 2 + i = 1 K p i ( K K i + 1 ) 2 + p ¯ K 2 2 ( i = 1 K p i K i + 1 λ ) ,
where V j = 1 V R j .
The variance of the achievable rate random variable σ R KL 2 is given by
σ R KL 2 i = 1 K p i K i + 1 2 ( R KL , av ) 2 ,
where
R KL , av i = 1 K p i K i + 1 .
Corollary 1.
Queue expected size and expected delay for K-layer coding are upper bounded by
E [ w KL ] σ R K L 2 2 ( R KL , av λ ) ( 1 λ R KL , av ) σ R K L 2 2 R KL , av ,
and the expected delay is upper bounded by
E [ w λ , KL ] σ R K L 2 2 λ ( R KL , av λ ) ( 1 λ R KL , av ) σ R K L 2 2 R KL , av λ ,
where σ R KL 2 and R KL , av are given by (84) and (85) respectively.

2.5.3. Delay Bounds for Continuum Broadcasting

A continuous broadcasting approach is considered in this section. In this approach, the transmitter also sends multi-layer coded data. Unlike K-layer coding, the layering is a continuous function of the channel fading gain parameter. The number of layers is not limited, and an incremental rate with a differential power allocation is associated with every layer. The differential per layer rate is d R ( s ) = s ρ ( s ) d s 1 + s I ( s ) and ρ ( s ) d s is the transmit power of a layer s. This also determines the transmission power distribution per layer [58]. The residual interference for a fading power s is I ( s ) = s ρ ( u ) d u (4). The total achievable rate for a fading gain realization s is R ( s ) = 0 s u ρ ( u ) d u 1 + u I ( u ) (6). It is possible to extend the K-layer coding bounds shown above to this continuous broadcast setting. The bounds in (82) and (83) could be used for broadcasting after performing the following modifications:
  • The number of layers is unlimited, that is K .
  • Since the layering is continuous, every layer i is associated with a fading gain parameter s. Every rate R i is associated with a differential rate d R ( s ) specified in (3).
  • The cumulative rate K should be replaced by
    R T = 0 d R ( s ) .
  • The sum i = 1 K p i K i + 1 is actually the average rate and it turns to be R bs (7) for the continuum case.
  • Finally, in finite-level coding the expression i = 1 K p i ( K K i + 1 ) 2 + p ¯ K 2 turns out to be
    R d , bs 2 0 d u f ( u ) R T 0 u d R ( s ) 2
    = 0 d u f ( u ) u d R ( s ) 2
    = 2 0 d u F ( u ) d R ( u ) u d R ( s ) ,
    in the continuous case, where d R ( u ) and R ( u ) are specified in (3) and (6), respectively.
Corollary 2.
The queue average size for a continuous code layering is upper and lower bounded by
E [ w bs ] R T λ 2 + R d , bs 2 ( R T λ ) 2 2 ( R bs λ ) ,
E [ w bs ] ( R T λ ) + R d , bs 2 ( R T λ ) 2 2 ( R bs λ ) ,
and the average delay is lower and upper bounded by
E [ w λ , bs ] R T λ 2 λ + R d , bs 2 ( R T λ ) 2 2 λ ( R bs λ ) ,
E [ w λ , bs ] R T λ λ + R d , bs 2 ( R T λ ) 2 2 λ ( R bs λ ) ,
where R bs , R T , and R d , bs 2 are specified in (7), (88), and (89) respectively.
The variance of the achievable rate random variable σ R bs 2 is given by
σ R bs 2 0 d u f ( u ) R ( u ) 2 R bs 2
= 0 d u f ( u ) 0 u d R ( s ) 2 R bs 2
= 2 0 d u ( 1 F ( u ) ) d R ( u ) 0 u d R ( s ) R bs 2
= 2 0 d u ( 1 F ( u ) ) d R ( u ) R ( u ) R bs 2 .
Corollary 3.
The queue average size for a continuous code layering is upper bounded by
E [ w bs ] σ R bs 2 2 ( R bs λ ) ( 1 λ R bs ) σ R bs 2 2 R bs ,
and the average delay is upper bounded by
E [ w λ , bs ] σ R bs 2 2 λ ( R bs λ ) ( 1 λ R bs ) σ R bs 2 2 R bs λ ,
where R bs and σ R bs 2 are given by (7) and (96), respectively.
For minimizing the expected delay in the continuous layering case, it is required to obtain the optimal ρ ( s ) (4) which minimizes the average queue size upper bound. As in multi-layer coding, an analytic solution is not available and remains an open problem for further research. However, numerical optimization is impossible here. The constraint of optimization is a continuous function. The target functional in the optimization problem for continuous layering does not have a localization property [59]. A functional with localization property can be written as an integral of some target function. Our functional contains a ratio of integrals and further multiplication of integrals, which cannot be converted to an integral over a single target function. Such functional is also denoted as a nonlocal functional in [59]. In such cases, it is preferable to look for an approximate representation of the nonlocal functional, which has the localization property. Alternatively, approximate target functions with reduced degrees of freedom may be optimized.
An interesting observation from the numerical results of [80] is that when considering delay as a performance measure, code layering could give noticeable performance gains in terms of delay, which are more impressive than those associated with throughput. This makes layering more attractive when communicating under stringent delay constraints.
Analytic resource allocation optimization for delay minimization, under the simple queue model in [80], remains an open problem for further research. In general, when layering is adopted at the transmitter, in conjunction with successive decoding at the receiver, the first layer is decoded earlier than other layers, and it has the shortest service time. Accounting for a different service delay per layer, the basic queue size update equation (the Lindley equation) should be modified accordingly. The analysis of the broadcast approach with a per layer queue is a subject for further research. The queue model which was used in [80] is a zero-padding queue. In this model, the frame size is kept fixed every transmission, and if the queue is nearly empty, the transmission includes zero-padded bits on top of queue data. Optimizing the transmission strategy as a function of the queue size, such that no zero-padding is required, can further increase layering efficiency and minimize the expected delay. This is a possible direction for further research.

2.6. Delay Constraints

There are various aspects in which delay constraints in communications may impact the system design. Stringent delay constraints might not allow to capture the channel ergodic distribution, and may benefit from a broadcast approach. This is while relaxed delay constraints may allow transmission of long codewords that capture the channel ergodicity. When there is a mixture of delay requirements on data using the same physical transmission resources, interesting coded transmission schemes can be considered. This is studied in [84] as discussed in next subsections and also widely covered in [85,86]. Another aspect is decoding multiple independent blocks, as considered in [87], and studied by its equivalent channel setting, which is the MIMO parallel channel [20] and discussed in detail in the next subsections.

2.6.1. Mixed Delay Constraints

The work in [84] considers the problem of transmission with delay-constrained (DC) and non-delay-constrained (NDC) streams are transmitted over an SISO channel, with no CSIT adhering to the broadcast approach for the DC stream. The DC stream comprises layers that have to be decoded within a short period of a single transmission block. The NDC stream comprises layers that may be encoded over multiple blocks and decoded after the complete codeword is received, potentially observing the channel ergodicity. Three overall approaches are suggested in [84], trying to maximize the expected sum rate. Their achievable rate regions over DC and NDC are examined. A DC stream is always decoded in the presence of an NDC stream, which is treated as interference. However, before decoding an NDC stream, the decodable DC layers can be removed, allowing NDC decoding at the highest signal-to-interference-plus-noise ratio (SINR). A closed-form solution of the sum-rate maximization problem can be derived for the outage and broadcast DC stream in parallel to a single NDC layer. When NDC transmission is also composed of multi-layers, the optimization problem of the expected sum-rate becomes much more complicated.
The joint strategy of accessing both DC and NDC parts on a single channel uses a two-level block nesting. Every L samples define a block for the DC stream, while the NDC stream is encoded over K such blocks, consisting of L · K samples. The NDC block is called a super block. L is large enough for reliable communication for the DC part, but it is much shorter than the dynamics of the slow fading process. K is large enough to enable the empirical distribution of the fading coefficient to be similar to the real one. Two independent streams of information are encoded. The DC stream is decoded at the completion of each block at the decoder, at a rate dependent upon the realization of the channel fading coefficient for that block. The NDC stream is decoded only at the completion of the super block. All of the following proposed schemes assume superposition coding, equivalent to symbol-wise additivity of the DC and NDC code letters. Denote by w L the L-length codeword for the DC code for each block, and z K L the K L -length codeword for the NDC code for each super block. Define one super block as
y k , i = s k · ( w k , i + z k , i ) + n k , i , for i = 1 , 2 , , L , k = 1 , 2 , , K ,
where the double sub-index { k , i } is equivalent to the time index ( k 1 ) · L + i . Note that slow fading channel nature was used by defining s k , i = s k . This scheme reflects a power constraint of the form E [ | w k , i + z k , i | 2 ] P . Define R DC ( s ) as the achievable rate for a fading power realization s per block. The total expected DC rate over all fading power realizations is given by
R DC = 0 f S ( u ) R DC ( u ) d u .
Let R NDC designate the rate of the NDC part, which experiences enough such realizations throughout communication. When relaxing the stringent delay constraint, coding over sufficient large blocks achieves ergodic capacity, denoted by C erg = E S [ log 1 + S P ] . Clearly, for any coding scheme R DC + R NDC C erg .

2.6.2. Broadcasting with Mixed Delay Constraints

The superposition of DC and NDC is employed by allocating a fixed amount of power per stream. Define the DC relative power portion as β [ 0 , 1 ] , that is β · P is the power allocated for the DC stream and the rest ( 1 β ) · P for the NDC stream. The DC part uses the broadcast approach. During decoding of the DC part, the NDC is treated as additional interference since during the decoding of each DC block the NDC codeword cannot be completely received, and thus cannot be decoded nor reconstructed to assist the DC decoding. The NDC decoder is informed of all DC decoded layers per DC codeword, and it cancels out the decoded part from the corresponding NDC block, maximizing its SINR for NDC decoding. By designing the two encoders like described earlier, we can justify that both DC and NDC parts communicate over a flat fading channel with additive Gaussian noise. The imposed noise for each part consists of the white channel noise along with undecodable codewords of those that are undecoded yet from both parts.
The DC encoder uses superposition of an infinite number of layers, ordered using channel fading realization s in a manner that forms a degraded broadcast channel. Per DC message, the transmitted codeword of length L is given by
w L ( m 1 , m 2 , , m ) = j = 1 w j L ( m j ) .
Designate ρ ( s ) to be the DC layering power distribution, which will be optimized later on, and each layer communication scheme will try to overcome a Gaussian channel where the fading is known to both sides. The NDC encoder sends a single message through a block of length L · K . By random coding over a Gaussian channel, the codewords can be generated. A total of e L · K · R NDC codewords can be used, where the channel rate R NDC relies on the optimized channel power ρ ( s ) as well.
The decoders are activated by order. First, the DC decoder works on every L-block and by successive decoding can reveal as many layers as the channel permits. It is similar to the classic broadcast approach, except all layers suffer from an undecodable (at this stage) interference. All DC decoders’ outputs are fed to the NDC decoder, which works after K such blocks. After removal of the decodable DC codewords of all blocks, the NDC part is decoded with a minimal residual interference, where the interference includes only the undecoded DC layers. Calculating the DC rate in the presence of NDC is a direct extension of [23], which is a special case for β = 1 . Define the DC interference for a fading power s as I ( s ) , implying
I ( s ) = s ρ ( u ) d u , and ρ ( s ) = d d s I ( s ) .
It associates the undecodable layers upon a channel fading realization s as noise to the transmission. It is restricted to the total DC allocated power
I ( 0 ) = 0 ρ ( u ) d u = β P ,
with 0 β 1 .
Lemma 1
(Achievable Expected DC Rate [84]). Any total expected DC rate R DC , which is averaged over all fading realizations, that satisfies
R DC u = 0 ( 1 F S ( u ) ) u ρ ( u ) 1 + u I ( u ) + ( 1 β ) P u d u ,
is achievable.
Lemma 2
(Achievable Expected NDC Rate [84]). Any total expected NDC rate R NDC , which is averaged over all fading realizations, that satisfies
R NDC 0 f S ( u ) log 1 + ( 1 β ) P u 1 + u I ( u ) d u ,
is achievable.
It is possible to derive the optimal power allocation for DC layering that maximizes the sum rate ( R DC + R NDC as stated in (106) and (107), respectively. It is a function that depends on I ( s ) according to (105). Specifically, the optimization problem is
I * ( s ) = argmax I ( s ) R DC + R NDC s . t . I ( 0 ) = β P , and I ( ) = 0 .
The outage approach is a simple special case of layering, where a single DC coded layer is used. In this case, the power distribution I ( s ) is explicitly given by
I ( s ) = β P if 0 s s th 0 if s > s th ,
ρ ( s ) = β P · δ ( s s th ) ,
where δ is the Dirac function and s th is a parameter set prior to the communication. Constant  s th may be interpreted as the fading gain threshold for single layer coding. The advantages of this approach are low implementation complexity and ease of analysis. The disadvantage is its sub-optimality. The outage approach is designed for a channel with fixed fading of s th . On the one hand, if s s th , the message can be transmitted error-free at a rate adjusted for s th . On the other hand, if s < s th , the specific transmission is useless.
Proposition 1
(Joint Optimality by Outage DC [84]). The maximizer I o ( s ) of (108) subject that satisfies the form in (109) is specified by s th * , which can be found as the solution to
f S ( s th * ) log 1 + β P s th * = ( 1 F S ( s th * ) ) β P ( 1 + P s th * ) ( 1 + ( 1 β ) P s th * ) .
The optimal expected DC outage rate and the optimal expected NDC outage rate, which together maximize the sum rate are
R DC , o = 1 F S ( s th * ) log 1 + β P s th * 1 + ( 1 β ) P s th * ,
R NDC , o = 0 s th * f S ( u ) log 1 + ( 1 β ) P u 1 + β P u d u + s th * f S ( u ) log 1 + ( 1 β ) P u d u .
Maximizing (108) can be derived analytically by developing an Eüler Equation in a similar way to [23]. This is done by enlarging the class of admissible functions I ( s ) (as opposed to the outage approach) to be continuously differentiable and to satisfy the boundary conditions I ( 0 ) = β P and I ( ) = 0 .
Proposition 2
(Joint Optimality by Broadcast DC ). The maximizer I b s ( s ) of (108) when considering all continuously differentiable boundary conditioned functions is I bs ( s ) = [ I ˜ ( s ) ] 0 β P , where
I ˜ ( x ) = 1 x b ( x ) + b 2 ( x ) 4 a ( x ) c ( x ) 2 a ( x ) 1 ,
a ( x ) = x f S ( x ) ,
b ( x ) = 2 ( 1 β ) P f S ( x ) x 2 ( 1 F S ( x ) ) ,
c ( x ) = ( 1 β ) 2 P 2 f S ( x ) x 3 .
The associated rates R DC , bs and R NDC , bs can be achieved by substituting it in (106) and (107).
The square root in (114) can impose a finite-length domain for I ˜ ( s ) , that can result in discontinuity at I ( s ) . This situation is addressed by assigning a Dirac function at ρ ( s ) , which can be interpreted as a superposition of single-layer coding and continuous layering. Figure 4 shows the relation of R DC + R NDC for the joint outage approach and the joint broadcast approach, for selected values of β . The total expected sum-rate is the sum of the DC rate and the NDC rate. As may be observed, if β 0.9 , then the ergodic capacity can be nearly achieved in high SNRs.

2.6.3. Parallel MIMO Two-State Fading Channel

Broadcasting over MIMO channels is still an open problem, and only sub-optimal achievable schemes are known [23]. The work in [20] considers a two-state parallel MIMO channel, which is equivalent to a SISO two-state channel, where decoding can be done over multiple consecutive blocks, as studied in [87]. The work in [20] considers the slow (block) fading parallel MIMO channel [66], where channel state is known at the receiver only. Under this channel model, the transmitter may adopt a broadcast approach [23], which can optimize the expected transmission rate under no transmission CSI, which is essentially characterized by the variable-to-fixed coding [6].
The study in [49] composes two degraded broadcast channels [24,88] into a three-user setup: an encoder with two outputs, each driving a dual-output broadcast channel; two decoders, where each is fed by one less-noisy broadcast channel output and one more-noisy output of the other channel (called unmatched). This channel is referred to as degraded broadcast product channel. For the AWGN case, the capacity region (private and common rates) of this channel was derived [49]. In [20], the MIMO setting for the broadcast approach is revisited, with new tools that differ from those in [23,74]. This is by analyzing the finite-state parallel MIMO channel, where the capacity region in [49] is used to address the multi-layering optimization problem for maximizing the expected rate of a two-state fading [87,89,90] parallel MIMO channel.

2.6.4. Capacity of Degraded Gaussian Broadcast Product Channels

Consider the model introduced in [49], which is a two-receiver discrete memoryless degraded product broadcast channel. The Gaussian case was addressed as a special case. A single transmitter encodes two n-length codewords consisting of a common message w 0 { 1 , , 2 n R 0 } to be decoded by both users, and two private messages w BA { 1 , , 2 n R BA } and w AB { 1 , , 2 n R AB } , one for each of the two decoding users. A single function encodes these three messages into two codewords, where each undergoes parallel degraded broadcast sub-channels
y 1 = x 1 + n 11 z 1 = y 1 + n 12 , and z 2 = x 2 + n 21 y 2 = z 2 + n 22 ,
where n 11 , n 21 CN ( 0 , ν b 1 ) , n 21 , n 22 CN ( 0 , ν a 1 ν b 1 ) . As depicted in the bold and red parts of Figure 5, two users (namely A B and B A ) receive both common and private messages from the transmitter and independently decode the messages. This is an unmatched setting, as y 1 is less noisy than z 1 , and z 2 is less noisy than y 2 . Hence, each of the users has one less-noisy channel output alongside another, which is the noisier output of the other sub-channel. Following ([49], Theorem 2), which shows this case, and exploiting symmetry for equal power allocation to both sub-channels, optimal allocation is expected to be achieved by equal common rate allocation to every user (state). Denoting α ¯ = 1 α , the capacity region ( R 0 , R BA , R AB ) is
R 0 log 1 + ν a α P 1 + ν a α ¯ P + log 1 + ν b α P 1 + ν b α ¯ P ,
R 0 + R BA = R 0 + R AB log 1 + ν a α P 1 + ν a α ¯ P + log ( 1 + ν b P ) ,
R 0 + R BA + R AB log 1 + ν b P + log 1 + ν a α P 1 + ν a α ¯ P + log 1 + ν b α ¯ P .

2.6.5. Extended Degraded Gaussian Broadcast Product Channels

The classical product channel is extended by introducing two dual-input receivers in addition to the original two. The first gets the two more noisy channel outputs ( z 1 , y 2 ) , whereas the second receives the two less noisy outputs ( z 2 , y 1 ) . To support this, two messages w AA and w BB are added. The total two n-length codewords are the superposition of three codewords by independent encoders as follows ( X 1 , X 2 ) = f AA ( w AA ) + f cr ( w 0 , w BA , w AB ) + f BB ( w BB ) , where subscript cr stands for crossed states ( ( A , B ) or ( B , A ) ). See Figure 5 for an illustration.
Stream AA is decoded first, regardless of whether the others can be decoded (this is done by treating all the other streams as interference). Then, both streams AB and BA, including their common stream subscripted 0 can be decoded after removing the AA impact from their decoder inputs (treating the BB stream as interference). Finally, removing all the above decoded streams allows decoding stream BB. From (121), we have
R AA 2 log 1 + α AA P ν a 1 + α ¯ AA P ,
R AA + R 0 2 log 1 + α AA P ν a 1 + α ¯ AA P + log 1 + α α cr P ν b 1 + ( α ¯ α cr + α BB ) P + log 1 + α α cr P ν a 1 + ( α ¯ α cr + α BB ) P ,
R AA + R 0 + R BA = R AA + R 0 + R AB 2 log 1 + α AA P ν a 1 + α ¯ AA P + log 1 + α α cr P ν a 1 + ( α ¯ α cr + α BB ) P + log 1 + α cr P ν b 1 + α BB P ,
R AA + R 0 + R BA + R AB 2 log 1 + α AA P ν a 1 + α ¯ AA P + log 1 + α cr P ν b 1 + α BB P + log 1 + α α cr P ν a 1 + ( α ¯ α cr + α BB ) P + log 1 + α ¯ α cr P ν b 1 + α BB P ,
R AA + R 0 + R BA + R AB + R BB 2 log 1 + α AA P ν a 1 + α ¯ AA P + log 1 + α cr P ν b 1 + α BB P + log 1 + α α cr P ν a 1 + ( α ¯ α cr + α BB ) P + log 1 + α ¯ α cr P ν b 1 + α BB P + 2 log 1 + α BB P ν b 1 ,
where α AA , α cr , α BB [ 0 , 1 ] are the relative power allocations for the subscripted letters α AA + α cr + α BB = 1 , and α [ 0 , 1 ] is the single user private power allocation within the unmatched channel.

2.6.6. Broadcast Encoding Scheme

Adding a message splitter at the transmitter and channel state-dependent message multiplexer at the receiver enriches the domain. Figure 6 illustrates the encoding and decoding schemes. During decoding, the four possible channel states S = ( S 1 , S 2 ) impose different decoding capabilities. If S = ( A , A ) , then g AA ( · ) can reconstruct w AA to achieve a total rate of R AA . For S = ( B , A ) , g BA ( · ) is capable of reconstructing three messages ( w AA , w 0 , w BA ) with sum rate of R AA + R 0 + R BA . Similarly for S = ( A , B ) , g AB ( · ) reconstructs ( w AA , w 0 , w AB ) with sum rate R AA + R 0 + R AB . When both channels are permissive S = ( B , B ) , all five messages ( w AA , w 0 , w BA , w AB , w BB ) are reconstructed at g BB ( · ) under the rate R AA + R 0 + R BA + R AB + R BB . Recall that a single user transmission is of interest here, thus the expected rate of the parallel channel underhand can be expressed by
R ave = P A 2 R AA + P A P B ( R AA + R 0 + R AB ) + P B P A ( R AA + R 0 + R BA ) + P B 2 ( R AA + R 0 + R BA + R AB + R BB ) .
Using (126), and since both channels have identical statistics leading to R AB = R BA , the achievable average rate is
R ave = 2 ( P A + P B ) 2 log 1 + ν a P + R 0 ( 1 α AA ) + R 1 ( 1 α AA α α cr ) + R 2 ( 1 α AA α cr ) ,
where the new notations are
R 0 ( α 0 ) = [ ( P A + P B ) 2 P A 2 ] log ( 1 + ν b α 0 P ) [ ( P A + P B ) 2 + P A 2 ] log ( 1 + ν a α 0 P ) ,
R 1 ( α 1 ) = P B 2 log ( 1 + ν b α 1 P ) [ ( P A + P B ) 2 P A 2 ] log ( 1 + ν a α 1 P ) ,
R 2 ( α 2 ) = 2 P A P B log ( 1 + ν b α 2 P ) .
and the arguments satisfy α 0 = 1 α AA , α 1 = 1 α AA α α cr , and α 2 = 1 α AA α cr = α BB . Note that R 0 ( α 0 ) and R 1 ( α 1 ) are not obliged to be positive, as they can be negative for some scenarios, and R 2 ( α 2 ) is non-positive by definition. Denoting the domain D of valid power allocations vector α = [ α , α AA , α cr , α BB ] T [ 0 , 1 ] 4 and the operator [ x ] + = max { 0 , x } yield the following proposition.
Proposition 3.
The maximal sum rate of the symmetric two parallel two state channel over all power allocations is
max α D R ave ( α ) = 2 ( P A + P B ) 2 log ( 1 + ν a P ) + max 0 α AA 1 R 0 ( 1 α AA ) + R 1 ( α 1 opt ( α AA ) ) ,
where
α 1 opt ( α AA ) = max { 0 , min { 1 α AA , α 1 * } } ,
α 1 * = P B 2 ν b [ ( P A + P B ) 2 P A 2 ] ν a [ ( P A + P B ) 2 P A 2 P B 2 ] ν a ν b P ,
and the latter solves α 1 R 1 ( α 1 * ) = 0 .
Corollary 4.
The optimal power allocation for the state ( B , B ) is α BB opt = 0 .
This is true for any set of parameters ν a , ν b , P A , P B , even if P B 1 and ν b ν a . Inherently, a penalty occurs when trying to exploit the double permissive state.
Corollary 5.
Under the optimal power allocation, α opt ( α AA ) = 1 α 1 opt ( α AA ) / ( 1 α AA ) .
This removes a degree of freedom in the optimization problem.
Using these corollaries, and the notation α = [ α , α AA , α cr , α BB ] T instead of α = [ α 0 , α 1 , α 2 ] T , we have the following theorem.
Theorem 2.
The maximal sum rate of the symmetric two-parallel two-state channel over all allocations α D is
R ave opt = 2 ( P A + P B ) 2 log ( 1 + ν a P ) + [ l ] max 0 α AA 1 R 0 ( 1 α AA ) + R 1 ( ( 1 α AA ) · ( 1 α opt ( α AA ) ) ) ,
where
r C l α opt ( α AA ) = min 1 , 1 P B 2 ν b [ ( P A + P B ) 2 P A 2 ] ν a 2 P A · P B · ν a ν b P ( 1 α AA ) + .
Denoting the argument of the maximization as α AA opt , the optimal power allocation vector is
α opt = [ α opt ( α AA ) , α AA opt , 1 α AA opt , 0 ] .
From Proposition 3 and by setting α 1 = 1 α AA α α cr = ( 1 α AA ) ( 1 α ) , it can be observed that the optimal allocation for state BB is α BB = 0 . For evaluation of the advantage of the joint α AA and α , the following sub-optimal schemes are compared: (a) independent broadcasting; (b) privately broadcasting; and (c) only common broadcasting. A scheme for which the encoder disjointly encodes different messages into each single channel of the parallel channel using the broadcast approach over the fading channel is denoted by independent broadcasting. The broadcast approach for fading SISO channel relies on two main operations: superposition coding by layering at the transmitter; and successive interference cancellation at the receiver. The maximal expected sum rate of the symmetric two parallel two state channel under independent broadcasting is
R ave ind - bc , opt = 2 ( P A + P B ) log 1 + ν a P 1 + ν a ( 1 α ind - bc , opt ) P + 2 P B log 1 + ν b ( 1 α ind - bc , opt ) P ,
α bc , opt = min 1 , 1 P B ν b ( P A + P B ) ν a P A ν a ν b P + .
A scheme for which no power is allocated for the common stream in the ( B , A ) and ( A , B ) states (message w 0 ) is called privately broadcasting. This scheme is equivalent to setting α = 0 in Theorem 2, thus allocating encoding power from the common stream ( R 0 = 0 ) to the other streams R AA , R AB , R BA and R BB , which achieves optimality for
α AA prv - bc , opt = min 1 , 1 [ P B P A ] ν b [ P B + P A ] ν a 2 P A ν a ν b P + .
A scheme for which all of the crossed state power is allocated only to the common stream (message w 0 ) and no power is allocated to the private messages (no allocation for messages w AB and w BA ) is called only common broadcasting. This scheme is equivalent to setting α = 1 in Theorem 2, thus allocating encoding power from the private streams ( R AB = R BA = 0 ) to the other streams R AA , R 0 and R BB , which achieves optimality for
α AA cmn - bc , opt = min 1 , 1 [ ( P A + P B ) 2 P A 2 ] ν b [ ( P A + P B ) 2 + P A 2 ] ν a 2 P A 2 ν a ν b P + .
The result in Theorem 2 differs from the one presented in [87] for the two-parallel two state channel. In [87] it is chosen to transmit only common information to the pairs ( A , B ) and ( B , A ) . (Ref. [87], Equation (39)) clearly states that for the crossed states (A, B) and (B, A) only common rate is used without justification. It is further claimed that this is an expected rate upper bound for some power allocation. The result in (137) proves that broadcasting common information only, i.e., α = 1 is sub-optimal, and does not yield the maximal average rate.

2.7. Broadcast Approach via Dirty Paper Coding

We conclude this section by noting the relevance of dirty paper coding (DPC) to the broadcast approaches discussed. Even though the central focus of the broadcast approaches discussed is superposition coding, all these approaches can be revisited by instead adopting dirty paper coding. Information layers generated by a broadcast approach interfere with one another with the key property that the interference is known to the transmitter. DPC enables effective transmission when the transmitted signal is corrupted by interference (and noise in general) terms that are known to the transmitter. This is facilitated via precoding the transmitted signal by accounting for and canceling the interference.
DPC plays a pivotal role in the broadcast channel. It is an optimal (capacity-achieving) scheme for the multi-antenna Gaussian broadcast channel [47,50] with general message sets and effective, in the form of binning, for the general broadcast channel with degraded message sets [22]. To discuss the application of the DPC in the broadcast approach, consider the single-user channel with a two-state fading process, that is for the model in (1) we have h { h w , h s } where | h w | < | h s | , rendering the following two models in these two states:
y w = h w x + n w ,
y s = h s x + n s ,
which can be also considered a broadcast channel with two receivers with channels h w and h s . The broadcast region for this channel can be achieved by both superposition coding and DPC. When the noise terms have standard Gaussian distribution, the capacity region is characterized by all pairs
R w 1 2 log 1 + α P | h w | 2 1 + ( 1 α ) P | h w | 2 ,
R s l e q 1 2 log 1 + ( 1 α ) P | h s | 2 .
over all α [ 0 , 1 ] . This capacity region is achievable by superposition coding of two information layers x w and x s with rates R w and R s to transmit x = x w + x s . The same region can be achieved by DPC, where x w is generated and decoded as done in superposition coding, and x s is designed by treating x w as the interference known to the transmitter non-causally. It is noteworthy that the original design of DPC in [91] the non-causally known interference term is modeled as additive Gaussian noise. However, as shown in [92], the interference term can be any sequence, like a Gaussian codeword, and still achieve the same capacity region.
The operational difference of superposition coding and DPC at the receiver side is that when using superposition coding, at the stronger receiver, the layers x w and x s have to be decoded sequentially, while when using DPC, the two layers can be decoded in parallel. This observation alludes to an operational advantage of DPC over superposition coding: while both achieving the capacity region, DPC imposes shorter decoding latency.

3. The Multiple Access Channel

3.1. Overview

As discussed in detail in Section 2, CSI uncertainties result in degradation in communication reliability. Such degradations can be further exacerbated as we transition to multiuser networks consisting of a larger number of simultaneously communicating users. Irrespective of multiuser channel models, a common realistic assumption is that slowly varying channels can be estimated by the receivers with high fidelity, providing the receivers with the CSI. Acquiring the CSI by the transmitters can be further facilitated via feedback from the receivers. However, feedback communication is often infeasible or incurs additional communication and delay costs, which increase significantly as the number of transmitters and receivers grows in the network.
This section focuses on the multi-access channel, consisting of multiple users with independent messages communicating with a common receiver. The channels undergo slow fading processes. Similar to the setting considered in Section 2, it is assumed that the receivers can acquire the CSI with high fidelity (e.g., through training sessions). While the receiver has perfect and instantaneous access to the states of all channels, the transmitters are either entirely or partially oblivious to the CSI, rendering settings in which the transmitters face CSI uncertainty. The information-theoretic limits of the MAC when all the transmitters and receivers have complete CSI are well-investigated [7,93,94]. Furthermore, there is a rich literature on the MAC’s information-theoretic limits under varying degrees of availability of instantaneous CSIT. Representative studies on the capacity region include the impact of degraded CSIT [95], quantized and asymmetric CSIT [96], asymmetric delayed CSIT [97], non-causal asymmetric partial CSIT [98], and symmetric noisy CSIT [99]. Bounds on the capacity region of the memoryless MAC in which the CSIT is made available to a different encoder in a causal manner are characterized in [100]. Counterpart results are characterized for the case of common CSI at all transmitters in [101], which are also extended in [102] to address the case in which the encoder compresses previously transmitted symbols and the previous states. The study in [103] provides an inner bound on the capacity region of the discrete and Gaussian memoryless two-user MAC in which the CSI is made available to one of the encoders non-causally. An inner bound on the capacity of the Gaussian MAC is derived in [104] when both encoders are aware of the CSI in a strictly causal manner. The capacity region of a cooperative MAC with partial CSIT is characterized in [105]. The capacity region of the multiuser Gaussian MAC in which each interference state is known to only one transmitter is characterized within a constant gap in [106]. A two-user generalized MAC with correlated states and non-causally known CSIT is studied in [107]. In [108], a two-user Gaussian double-dirty compound MAC with partial CSIT is studied. The capacity regions of a MAC with full and distributed CSIT are analyzed in [109]. A two-user cooperative MAC with correlated states and partial CSIT is analyzed in [110]. The study in [111] characterizes inner and upper bounds on the capacity region of a finite-state MAC with feedback.
Despite the rich literature on the MAC with full CSIT, when the transmitters can acquire only the probability distribution of the fading channel state, without any instantaneous CSIT, the performance limits are not fully known. The broadcast approach is investigated for the two-user MAC with no CSIT in [73,89,90,112,113,114]. The multiple access channel is primarily studied in [73,89,90,112,113,114]. Specifically, the effectiveness of a broadcast strategy for multiuser channels is investigated in [73,90,112] for the settings in which the transmitters are oblivious to all channels, and in [89,114] for the settings in which each transmitter is oblivious to only channels linking other users to the receiver. Specifically, when the transmitters are oblivious to all channels, the approaches in [73] and [112] adopt the broadcast strategy designed for single-user channels and directly apply it to the MAC. As a result, each transmitter generates a number of information streams, each adapted to a specific realization of the direct channel linking the transmitter to the receiver. The study in [90] takes a different approach based on the premise that the contribution of each user to the overall performance of the multiple access channel not only depends on the direct channel linking this user to the receiver, but it is also influenced by the relative qualities of the other users’ channels. Hence, it proposes a strategy in which the information streams are generated and adapted to the channel’s combined state resulting from incorporating all individual channel states. The setting in which the transmitters have only local CSIT, that is, each transmitter has the CSI of its direct channel to the receiver while being unaware of the states of other users’ channels, is studied in [89,114]. Medium access without transmitter coordination is studied in [115].
The remainder of this section is organized as follows. This section focuses primarily on the two-user MAC, for which we provide a model in Section 3.2. We start by discussing the settings in which the transmitters have access to only the statistical model of the channel, and they are oblivious to the channel model in Section 3.4 with an emphasis on continuous channel models. Next, we focus on the setting in which the receiver has full CSI, and the transmitters have only the statistical model of the CSI and review two broadcast approaches in Section 3.5 and Section 3.6. The focus of these two subsections is two-state discrete channel models. Their generalization to multi-state channels will be discussed in Section 3.7. Finally, we will review two broadcast approach solutions for settings with local (partial) CSIT in Section 3.8 and Section 3.9. The focus of these two subsections are on the two-state discrete channel models, and their generalization to the multi-state models is discussed in Section 3.10.

3.2. Network Model

Consider a two-user multiple access channel, in which two independent users transmit independent messages to a common receiver via a discrete-time Gaussian multiple-access fading channel. All the users are equipped with one antenna, and the random channel coefficients are statistically independent. The fading process is assumed to remain unchanged during each transmission cycle and can change to independent states afterward. The users are subject to an average transmission power constraint P. By defining x i as the signal of transmitter i { 1 , 2 } and h i as the coefficient of the channel linking transmitter i { 1 , 2 } to the receiver, the received signal is
y = h 1 x 1 + h 2 x 2 + n ,
where n accounts for the AWGN with mean 0 and variance 1. We consider both continuous and discrete models for the channel. 

3.2.1. Discrete Channel Model

Each of the channels, independently of the other one, can be in one of the finite distinct states. We denote the number of states by N and denote the distinct values that h 1 and h 2 can take by { s m : m { 1 , , } } . Hence the multiple access channel can be in one of the combined 2 states. By leveraging the broadcast approach (c.f. [23,25,112]), the communication model in (144) can be equivalently presented by a broadcast network that has two inputs x 1 and x 2 and 2 outputs, each corresponding to one channel state combination. Each output corresponds to one possible combinations of channels h 1 and h 2 . We denote the output corresponding to the combination h 1 = s m and h 2 = s n by
y m n = s m x 1 + s n x 2 + n m n ,
where n m n is a standard Gaussian random variable for all m , n { 1 , , } . Figure 7 depicts this network for the case of the two-state channels ( = 2 ). Without loss of generality and for the convenience in notations, we assume that channel gains { s m : m { 1 , , } } take real positive values and are ordered in the ascending order, i.e., 0 < s 1 < s 2 < < s . We define p m n as the probability of the state ( h 1 , h 2 ) = ( s m , s n ) . Accordingly, we also define q m = n = 1 p m n and p n = m = 1 p m n . We will focus throughout the section on the case of symmetric average transmission power constraints, i.e., P 1 = P 2 = P , whereas the generalization to the case of asymmetric power constraints is straightforward.

3.2.2. Continuous Channel Model

In the continuous channel model, the fading coefficients h 1 and h 2 take a continuous of values that follow known statistical models. These statistical models are known to the transmitter and receiver. We denote the fading powers by s 1 = | h 1 | 2 and s 2 = | h 2 | 2 . Depending on channel realizations, denote the channel output when the channel gains are s 1 and s 2 by
y s 1 s 2 = s 1 x 1 + s 2 x 2 + n s 1 s 2 .
Throughout this section, we use the notation C ( x , y ) = 1 2 log 2 1 + x y + 1 P
We review settings in which the transmitters are either fully oblivious to all channels or have local CSIT. That is, each transmitter 1 (2) knows channel h 1 ( h 2 ) while being unaware of channel h 2 ( h 1 ). We refer to this model by L-CSIT, and similarly to the N-CSIT setting, we characterize an achievable rate region for it.

3.3. Degradedness and Optimal Rate Spitting

The broadcast approach’s hallmark is a designating an order of degradedness among different network realizations based on their qualities. Designating degradedness in the single-user single-antenna channel arises naturally, as discussed in Section 2. However, for the multiuser networks, there is no natural notion of degradedness, and any ordering approach will at least bear some level of heuristics. In the broadcast approaches that we discuss in this section for the MAC, we use the capacity region of the multiple access channels under different network states. Based on this notion of degradedness, once one of the channels improves, the associated capacity region expands, alluding the to the possibility of sustaining higher reliable rates.

3.4. MAC without CSIT—Continuous Channels

We start by discussing the canonical Gaussian multiple-access channel in which the channels undergo a continuous fading model in (146). This is the setting that is primarily investigated in [73]. To formalize this approach, we define R i ( s ) as the reliability communicated information rate of transmitter i at fading level s. Similarly to the single-user channel, we define ρ i ( s ) as the power assigned to the infinitesimal information layer of transmitter i corresponding to fading power s. Accordingly, we define the interference terms
I i ( s ) = s ρ i ( u ) d u .
when the channels fading powers are s 1 and s 2 , we define SNR i ( s 1 , s 2 ) as the effective SNR of transmitter i. These SNR terms satisfy
SNR 1 ( s 1 , s 2 ) = s 1 1 + s 2 I 2 ( SNR 2 ( s 1 , s 2 ) ) , SNR 2 ( s 1 , s 2 ) = s 1 1 + s 2 I 1 ( SNR 1 ( s 1 , s 2 ) ) .
Hence, corresponding to this channel combination, the rate that transmitter i can sustain reliability is
R i ( s 1 , s 2 ) = 0 SNR i ( s 1 , s 2 ) u d I i ( u ) 1 + u I i ( u ) ,
and subsequently, the expected rate of transmitter i is
R ¯ i = E [ R i ( s 1 , s 2 ) ] = 0 1 F i ( u ) u d I i ( u ) 1 + u I i ( u ) ,
where F i denotes the CDF of SNR i ( s 1 , s 2 ) . Any resource allocation or optimization problem over the average rates R ¯ 1 and R ¯ 2 consists in determining the power allocation functions ρ i ( s ) . For instance, finding the transmission policy that yields the maximum average rate R ¯ 1 + R ¯ 2 boils down to designing functions ρ 1 and ρ 2 . The same formulation can be readily generalized to the K-user MAC, in which we designate a power allocation function to each transmitter, accordingly define the interference functions, the achievable rates for each specific channel realization, and the average rate of each user.

3.5. MAC without CSIT—Two-State Channels: Adapting Streams to the Single-User Channels

We continue by reviewing finite-state multi-access channels. This setting is first investigated in [112] for the two-state discrete channel model. As suggested in [112], one can readily adopt the single-user strategy of [25] and split the information stream of a transmitter into two streams, each corresponding to one fading state, and encodes them independently. Recalling the canonical model in (146), let us refer to the channel with the fading gains s 1 and s 2 as weak and strong channels, respectively (We will use this strong versus weak dichotomous model throughout Section 3).The two encoded information streams are subsequently superimposed and transmitted over the channel. One of the streams, denoted by W 1 , is always decoded by the receiver, while the second stream, denoted by W 2 , is decoded only when the channel is strong.
This strategy is adopted and directly applied to the multiple access channel in [112]. Specifically, it generates two coded information streams per transmitter, where the streams of user i { 1 , 2 } are denoted by { W 1 i , W 2 i } . Based on the channels’ actual realizations, a combination of these streams is successively decoded by the receiver. In the first stage, the baseline streams W 1 1 and W 1 2 , which constitute the minimum amount of guaranteed information, are decoded. Additionally, when the channel between transmitter i and the receiver, i.e., h i is strong, in the second stage information stream W 2 i is also decoded. Table 1 depicts the decoding sequence corresponding to each of the four possible channel combinations.
Based on the codebook assignment and decoding specified in Table 1, the equivalent multiuser network is depicted in Figure 8. The performance limits on the rates are characterized by delineating the interplay among the rates of the four codebooks { W 1 1 , W 1 2 , W 2 1 , W 2 2 } . We denote the rate of codebook W i j by R ( W i j ) . There are two ways of grouping these rates and assessing the interplay among different groups. One approach would be analyzing the interplay between the rate of the codebooks adapted to the weak channels and the codebooks’ rate adapted to the strong channels. The second approach would be analyzing the interplay between the rates of the two users. In a symmetric case and in the face of CSIT uncertainty, a natural choice will be the former approach. For this purpose, define R w = R 1 1 + R 1 2 and R s = R 2 1 + R 2 2 as the rate of the codebooks adapted to the weak and strong channels, respectively. The study in [112] characterizes the capacity region of the pair ( R w , R s ) achievable in the Gaussian channel, where it is shown that superposition coding is the optimal coding strategy. The capacity region of this channel is specified in the following theorem.
Theorem 3
([112]). The ( R w , R s ) capacity region for the channel depicted in Figure 8 is given by the set of all rates satisfying
R w C ( 2 s 1 ( 1 β ) , 2 s 1 β ) ,
R s C ( 2 s 2 , 0 ) ,
for all β [ 0 , 1 ] .

3.6. MAC without CSIT—Two-State Channels: State-Dependent Layering

In the approach of Section 3.5, each transmitter adapts its transmission to its direct link to the receiver without regards for the channel linking the other transmission to the receiver. However, the contribution of user i { 1 , 2 } to a network-wide performance metric (e.g., sum-rate capacity) depends not only on the quality of the channel h i , but also on the quality of the channel of the other user. This motivates adapting the transmission scheme of each transmitter to the MAC’s combined state instead of the individual channels. As investigated in [90,113] adapting to the network state can be facilitated by assigning more information streams to each transmitter and adapting them to the combined effect of both channels. Designing and assigning more than two information streams to each transmitter allows for a finer resolution in successive decoding, which in turn expands the capacity region characterized in [112].
To review the encoding and decoding scheme as well as the attendant rate regions, we start by focusing on the two-state discrete channel model. This setting furnishes the context to highlight the differences between streaming and successive decoding strategy in this section and those investigated in Section 3.5. By leveraging the intuition gained, the general multi-state discrete channel model will be discussed in Section 3.6.
In the approach that adapts the transmissions to the combined network states, each transmitter splits its message into four streams corresponding to the four possible combinations of the two channels. These codebooks for transmitter i { 1 , 2 } are denoted by { W 11 i , W 12 i , W 21 i , W 22 i } , where the information stream W u v i is associated with the channel realization in which the channel gain of user i is s v , and the channel gain of the other user is s u . These stream assignments are demonstrated in Figure 9. The initial streams { W 11 1 , W 11 2 } account for the minimum amount of guaranteed information, which are adapted to the channel combination ( h 1 2 , h 2 2 ) = ( s 1 , s 1 ) and they should be decoded by all four possible channel combinations. When at least one of the channels is strong, the remaining codebooks are grouped and adapted to different channel realizations according to the assignments described in Figure 9. Specifically:
  • The second group of streams { W 12 1 , W 21 2 } are reserved to be decoded in addition to { W 11 1 , W 11 2 } when h 1 is strong, while h 2 is still weak.
  • Alternatively, when h 1 is weak and h 2 is strong, instead the third group of streams, i.e., { W 21 1 , W 12 2 } , are decoded.
  • Finally, when both channels are strong, in addition to all the previous streams, the fourth group { W 22 1 , W 22 2 } is also decoded.
The order in which the codebooks are successively decoded in different network states is presented in Table 2. Based on this successive decoding order, channel gain state ( s 1 , s 1 ) is degraded with respect to all other states (i.e., the capacity region of the MAC corresponding to receiver y 11 is strictly smaller than those of the other three receivers), while  ( s 1 , s 2 ) and ( s 2 , s 1 ) are degraded with respect to ( s 2 , s 2 ) . Clearly, the codebook assignment and successive decoding approach presented in Table 2 subsumes the one proposed in [112] presented in Table 1. In particular, Table 1 can be recovered as a special case of Table 2 by setting the rates of the streams { W 21 1 , W 21 2 , W 22 1 , W 22 2 } to zero. The codebook assignment and decoding order discussed leads to the equivalent multiuser network with two inputs { x 1 , x 2 } and four outputs { y 11 , y 12 , y 21 , y 22 } , as depicted in Figure 10. Each receiver is designated to decode a pre-specified set of codebooks.
Next, we delineate the region of all achievable rates R u v i for i , u , v { 1 , 2 } , where  R u v i accounts for the rate of codebook W u v i . Define β u v i [ 0 , 1 ] as the fraction of the power that transmitter i allocates to stream W u v i for u { 1 , 2 } and v { 1 , 2 } , where we clearly have u = 1 2 v = 1 2 β u v i = 1 . For the simplicity in notations, and in order to place the emphasis on the interplay among the rates of different information streams, we focus on a symmetric setting in which relevant streams in different users have identical rates, i.e., rates of information streams W u v 1 and W u v 2 , denoted by R u v 1 and  R u v 2 respectively, are the same, and it is denoted by R u v , i.e., R u v = R u v 1 = R u v 2 .
Theorem 4
([90]). The achievable rate region of the rates ( R 11 , R 12 , R 21 , R 22 ) for the channel depicted in Figure 10 is the set of all rates satisfying:
R 11 r 11
R 12 r 12
R 21 r 21
R 12 + R 21 r 1
2 R 12 + R 21 r 12
R 12 + 2 R 21 r 21
R 22 r 22 ,
over all possible power allocation factors β u v i [ 0 , 1 ] such that Σ u = 1 2 Σ v = 1 2 β u v i = 1 , where by setting β ¯ u v = 1 β u v we have defined
r 11 = min 1 2 C 2 s 1 β 11 , 2 s 1 β ¯ 11 , C s 1 β 11 , ( s 1 + s 2 ) β ¯ 11 , C s 2 β 12 , s 1 ( β 12 + β 22 ) + s 2 ( β 21 + β 22 ) ) } ,
r 12 = min 1 2 C 2 α 2 β 12 , 2 α 2 β 22 , C α 2 β 12 , α 1 ( β 12 + β 22 ) + α 2 ( β 21 + β 22 ) ) ,
r 21 = min 1 2 C 2 s 2 β 21 , 2 s 2 β 22 , C s 1 β 21 , s 1 ( β 12 + β 22 ) + s 2 ( β 21 + β 22 ) , r 1 = min 1 2 C 2 s 2 ( β 12 + β 21 ) , 2 s 2 β 22 , C s 1 β 21 + s 2 β 12 , s 1 ( β 12 + β 22 ) + s 2 ( β 21 + β 22 ) ,
r 12 = C s 2 ( 2 β 12 + β 21 ) , 2 s 2 β 22 ,
r 21 = C s 2 ( β 12 + 2 β 21 ) , 2 s 2 β 22 ,
r 22 = 1 2 C 2 s 2 β 22 , 0 .
Proof. 
The proof follows from the structure of the rate-splitting approach presented in Figure 9 and the decoding strategy presented in Table 2. The detailed proof is provided in ([90], Appendix B).    □
In order to compare the achievable rate region in Theorem 4 and the capacity region presented in Theorem 3, we group the information streams in the way that they are ordered and decoded in [112]. Specifically, the streams { W 21 1 , W 21 2 , W 22 1 , W 22 2 } are allocated zero power. Information streams W 11 1 and W 11 2 are adapted to the weak channels, and the information streams W 12 2 and W 12 2 are reserved to be decoded when one or both channels are strong. Information streams adapted to the strong channels are grouped, and their rates are aggregated, and those adapted to the weak channels are also groups, and their rates are aggregated. Based on this, the region presented in Theorem 4 can be used to form the sum-rates R w = ( R 11 1 + R 11 2 ) and R s = ( R 12 1 + R 12 2 ) .
Theorem 5
([90]). By setting the power allocated to streams { W 21 1 , W 21 2 , W 22 1 , W 22 2 } to zero, the achievable rate region characterized by Theorem 4 reduces to the following region, which coincides with the capacity region characterized in [112].
R w min { a 3 , a 6 , a 9 , a 4 + a 8 } ,
a n d R s C s 2 β 12 1 + s 2 β 12 2 , 0 ,
where we have defined
a 3 = C s 1 ( β 11 1 + β 11 2 ) , s 1 ( β ¯ 11 1 + β ¯ 11 2 ) ,
a 4 = C s 1 β 11 1 , s 1 β ¯ 11 1 + s 2 β ¯ 11 2 ,
a 6 = C s 1 β 11 1 + s 2 β 11 2 , s 1 β ¯ 11 1 + s 2 β ¯ 11 2 ,
a 8 = C s 1 β 11 2 , s 2 β ¯ 11 1 + s 1 β ¯ 11 2 ,
a 9 = C s 2 β 11 1 + s 1 β 11 2 , s 2 β ¯ 11 1 + s 1 β ¯ 11 2 .
Proof. 
See ([90], Appendix D).    □
Figure 11 quantifies and compares the achievable rate region characterized in Theorems 4 and 5 with the capacity region characterized in Theorem 3. The regions presented in Theorems 4 and 5 capture the interplay among the rates of the individual codebooks and the capacity region of Theorem 3 characterize the trade-off between the sum-rates of the information streams adapted to the weak and strong channels. To have a common ground for comparisons, the result of Theorems 4 and 5 can be presented to signify the codebooks of the weak and strong channel states. Recall that earlier we defined the sum-rates
R w = R 11 1 + R 11 2 , and R s = R 12 1 + R 12 2 .
Accordingly, for the coding scheme (Table 2) we define
R ¯ w = R 11 1 + R 11 2 + R 21 1 + R 21 2 + R 12 1 + R 12 2 ,
and R ¯ s = R 22 1 + R 22 2 .
Based on these definitions, Figure 11 demonstrates the regions described by ( R w , R s ) and ( R ¯ w , R ¯ s ) , in which the transmission SNR is 10, the channel coefficients are ( s 1 , s 2 ) = ( 0.5 , 1 ) , and the regions are optimized over all possible power allocation ratios. The numerical evaluation in Figure 11 depict that the achievable rate region in Theorem 4 subsumes that of Theorem 5 (and subsequently, that of 3), and the gap between the two regions diminishes as the rates of the information layers adapted to the strong channels increases, i.e., R s and R ¯ s increase. Next, in order to assess the tightness of the achievable rate regions, we present an outer bound on the capacity region of the network in Figure 10.
Theorem 6
([90]). An outer bound for the capacity region of the rates ( R 11 , R 12 , R 21 , R 22 ) for the channel depicted in Figure 10 is the set of all rates satisfying:
R 11 1 2 a 3 , R 12 1 2 a 24 , R 21 1 2 a 27 , R 22 r 22 ,
where we have defined
a 24 = C s 2 β 12 1 + s 2 β 12 2 , s 2 β 22 1 + s 2 β 22 2 ,
a 27 = C s 2 β 21 1 + s 2 β 21 2 , s 2 β 22 1 + s 2 β 22 2 ,
r 22 = 1 2 C 2 s 2 β 22 , 0 .
Figure 12 compares the outer bound specified in Theorem 6 and the achievable rate region presented in Theorem 4 for SNR values 1 and 5, and the choice of ( s 1 , s 2 ) = ( 0.5 , 1 ) . Corresponding to each SNR, this figure illustrates the capacity region obtained in Theorem 3, as well as the achievable rate region and the outer bound reviewed in this section.
To evaluate the average rate as a long-term relevant proper measure capturing the expected rate over a large number of transmission cycles, where each cycle undergoes an independent fading realization. Consider a symmetric channel, in which the corresponding information streams are allocated identical power and have the same rate, and set R u v = R u v 1 = R u v 2 for u , v { 1 , 2 } . In addition, consider a symmetric distribution for h 1 and h 2 such that P ( h 1 2 = s i ) = P ( h 2 2 = s i ) for i { 1 , 2 } , and define p = P ( h 1 2 = s 1 ) = P ( h 2 2 = s 1 ) . By leveraging the stochastic model of the fading process, the average rate is
R ave = 2 [ R 11 + ( 1 p ) ( R 12 + R 21 ) + ( 1 p ) 2 R 22 ] .
Figure 13 depicts the variations of the average sum-rate versus p for different values of s 1 . The observations from this figure also confirm that higher gain levels are exhibited as p decreases. It is noteworthy that the results from Figure 11 validates the observations from Figure 13 that improvement in average rate is significant when the probability of encountering a weak channel state is low since the rate distribution considered in the achievable rate region comparison will correspond to average rate if the probability of observing s 1 is zero.

3.7. MAC without CSIT—Multi-State Channels: State-Dependent Layering

The idea of adapting the transmission to the combined network states can be extended to devise codebook assignment and decoding strategy schemes for the general multiple-state channel. Similarly to the two-state channel, in the -state channel model, 2 codebooks are assigned to each transmitter. Hence, corresponding to the combined channel state ( h 1 2 , h 2 2 ) = ( s q , s p ) codebook W p q 1 is assigned to transmitter 1 and codebook W q p 2 is assigned to transmitter 2. By following the same line of analysis as in the two-state channel, the network state ( h 1 2 , h 2 2 ) = ( s 1 , s 1 ) can be readily verified to be degraded with respect to states ( s 1 , s 2 ) , ( s 2 , s 1 ) , and ( s 2 , s 2 ) when s 2 > s 1 . Additionally, channel combinations ( s 1 , s 2 ) and ( s 2 , s 1 ) are also degraded with respect to state ( s 2 , s 2 ) . When a particular transmitter’s channel becomes stronger while the interfering channel remains constant, the transmitter affords to decode additional codebooks. Similarly, when a transmitter’s own channel remains constant while the interfering channel becomes stronger, the transmitter can decode additional layers. This can be facilitated by decoding and removing the interfering transmitter’s message, based on which the transmitter experiences reduced interference. Based on these observations, by ordering the different realizations of h 1 and h 2 in the ascending order and determining their relative degradedness, a successive decoding strategy is illustrated in Table 3. In this table, A p , q denotes the cell in the pth row and the qth column, and it specifies the set of codebooks U p q to be decoded when the combined channel state is ( h 1 2 , h 2 2 ) = ( s q , s p ) . In this table, the codebooks set to be decoded in each possible combined state is recursively related to the codebooks decoded in the weaker channels. Specifically, the state corresponding to A p 1 , q 1 is degraded with respect to states A p , q 1 and A p 1 , q . Therefore, in the state A p , q , the receiver decodes all streams from states A p 1 , q 1 (included in U p 1 , q 1 ), A p , q 1 (included in U p , q 1 ), and A p 1 , q (included in U p 1 , q ). Subsequently, these are followed by decoding one additional stream from each user denoted by W p q 1 and W q p 2 . When both channel coefficients have the strongest possible realizations, all the streams from both users will be decoded at the receiver.
Next, the rate region achieved is presented in Theorem 7 for the general multi-state channel. It can be verified that the region characterized by Theorem 4 is subsumed by this general rate region. Similarly to the two-state channel settings, define R u v i as the rate of codebook W u v i for i { 1 , 2 } and u , v { 1 , , } . Furthermore, define β u v [ 0 , 1 ] as the fraction of the power allocated to the codebook W u v i , where u = 1 v = 1 β u v = 1 . For the simplicity in notations and for emphasizing the interplay among the rates, we focus on the symmetric case in which R u v = R u v 1 = R u v 2 .
Theorem 7
([90]). A region of simultaneously achievable rates
{ R u v : u < v a n d u , v { 1 , , } }
for an ℓ-state two-user multiple access channel is characterized as the set of all rates satisfying:
R u v min b 1 ( u , v ) , b 2 ( u , v ) , b 3 ( u , v ) 2
R v u min b 4 ( u , v ) , b 5 ( u , v ) 2
R u v + R v u min b 6 ( u , v ) , b 7 ( u , v ) , b 8 ( u , v ) 2
2 R u v + R v u b 9 ( u , v )
R u v + 2 R v u b 10 ( u , v )
R u u min b 11 ( u ) , b 12 ( u ) 2 ,
where constants { b i : i { 1 , , 12 } } are specified in Appendix A.

3.8. MAC with Local CSIT—Two-State Channels: Fixed Layering

Next, we turn to the setting in which the transmitters have local CSI. Specifically, each channel randomly takes one of a finite number of states, and each transmitter only knows the state of its direct channel to the receiver perfectly, along with the probability distribution of the state of the other transmitter’s channel. This model was first studied in [114], in which a single-user broadcast approach is directly applied to the MAC. In this approach, each transmitter generates two coded layers, where each layer is adapted to one of the states of the channel linking the other transmitter to its receiver. This transmission approach is followed by successive decoding at the receiver in which there exists a pre-specified order of decoding of the information layers.
This scheme assigns codebooks based on channels’ strengths such that it reserves one additional information layer as the channel state gets stronger. In this scheme, the number of transmitted layers and the decoding order are fixed and independent of the actual channel state. In the two-state channel model, when a transmitter i experiences the channel state s m , it splits its message to two information layers via two independent codebooks denoted by T m 1 i and T m 2 i . The rate of layer T m 1 i is adapted to the weak channel state of the other user while the rate of layer T m 2 i is adapted to the strong channel state. Thus, each transmitter encodes its information stream by two layers and adapts the power distribution between them according to its channel state. Subsequently, the receiver implements a successive decoding scheme according to which it decodes one layer from transmitter 1 followed by one layer from transmitter 2, and then the remaining layer of transmitter 1, and finally the remaining layer of transmitter 2. This order is pre-fixed and is used in all channel states. This scheme is summarized in Table 4.
The following theorem characterizes an outer bound on the average rate region. For this purpose, define R i ( h 1 , h 2 ) as the rate of transmitter i for the state pair ( h 1 , h 2 ) . Accordingly, define R ¯ i = E h 1 , h 2 [ R i ( h 1 , h 2 ) ] as the average rate of transmitter i, where the expected value is with respect to the distributions of h 1 and h 2 .
Theorem 8
([114]). When the transmitters have local CSIT, an outer bound on the expected capacity region contains rates ( R ¯ 1 , R ¯ 2 ) satisfying
R ¯ 1 q 1 C ( s 1 , 0 ) + ( 1 q 1 ) C ( s 2 , 0 )
R ¯ 1 q 2 C ( s 1 , 0 ) + ( 1 q 2 ) C ( s 2 , 0 )
R ¯ 1 + R ¯ 2 q 1 q 2 C ( 2 s 1 , 0 ) + ( q 1 + q 2 2 q 1 q 2 ) C ( s 1 + s 2 , 0 ) + ( 1 q 1 ) ( 1 q 2 ) C ( 2 s 2 , 0 ) .

3.9. MAC with Local CSIT—Two-State Channels: State-Dependent Layering

Next, we present another scheme for the MAC with local CSIT that generalizes the scheme of Section 3.8 via adapting information layering to the combined states of the channel. The underlying motivation guiding this generalization is that we need to account for both the direct and interfering roles that each transmitter plays. Hence, the transmission rates of different layers should be adapted to the combined state of the entire network. The major difference between this approach and that in Section 3.8 is that this scheme relies on the available local CSIT available to the individual transmitters such that each transmitter adapts its layers and their associated raters to the instantaneous state of the channel. This facilitates opportunistically sustaining higher rates.
  • State-dependent Layering. In this approach, each transmitter, depending on the instantaneous state of the local CSI available to it, splits its message into independent information layers. Formally, when transmitter i { 1 , 2 } is in the weak state, it encodes its message by only one layer, which we denote by U 11 i . On the other contrary, when transmitter i { 1 , 2 } is in the strong state, it divides its message into two information layers, which we denote by U 12 i , and U 22 i . Hence, transmitter i adapts the codebook U 12 i (or U 22 i ) to the state in which the other transmitter experiences a weak (or strong) channel. A summary of the layering scheme and the assignment of the codebooks to different network states is provided in Figure 14. In this table, the cell associated with the state ( s m , s n ) for m , n { 1 , 2 } specifies the codebook adapted to this state.
  • Decoding Scheme. A successive decoding scheme is designed based on the premise that as the combined channel state becomes stronger, more layers are decoded. Based on this, the total number of codebooks decoded increases as one of the two channels becomes stronger. In this decoding scheme, the combination of codebooks decoded in different states is as follows (and it is summarizes in Table 5):
  • State ( s 1 , s 1 ) : In this state, both transmitters experience weak states, and they generate codebooks { U 11 1 , U 11 2 } according to Figure 14. In this state, the receiver jointly decodes the baseline layers U 11 1 and U 11 2 .
  • State ( s 2 , s 1 ) : When the channel of transmitter 1 is strong and the channel of transmitter 2 is weak, three codebooks { U 12 1 , U 22 1 , U 11 2 } are generated and transmitted. As specified by Table 5, the receiver jointly decodes { U 12 1 , U 11 2 } . This is followed by decoding the remaining codebook, i.e., U 22 1 .
  • State ( s 1 , s 2 ) : In this state, codebook generation and decoding are similar to those in the state ( s 2 , s 1 ) , except that the roles of transmitters 1 and 2 are interchanged.
  • State ( s 2 , s 2 ) : Finally, when both transmitters experience strong channels, the receiver decodes four codebooks in the order specified by the last row of Table 5. Specifically, the receiver first jointly decodes the baseline layers { U 12 1 , U 12 2 } , followed by jointly decoding the remaining codebooks { U 22 1 , U 22 2 } .
Compared to the setting without any CSIT at the transmitter (i.e., the setting discussed in Section 3.6), the key difference is that the transmitters have distinct transmission strategies when they are experiencing different channel states. Specifically, each transmitter dynamically chooses its layering scheme based on the instantaneous channel state known to it. Furthermore, the major difference with the scheme of Section 3.8 is that this scheme adapts the number of encoded layers proportionately to the strength of the combined channel state. Such adaptation of the number of encoded layers results in two advantages. The first one is that adapting the number of layers leads to overall fewer information layers to be generated and transmitted. This, in turn, results in decoding overall fewer codebooks and reduced decoding complexity. The second advantage pertains to providing the receiver with the flexibility to vary the decoding order according to the combined channel state. This allows for a higher degree of freedom in optimizing power allocation, and subsequently, larger achievable rate regions. In support of these observations, the numerical evaluations in Figure 15, the achievable rate region subsumes that of Section 3.8. Furthermore, as the number of channel states increases, the sum-rate gap between these two schemes becomes more significant. Finally, depending on the actual channel state, the scheme in this section decodes between 2 and ( + 1 ) 2 codebooks, whereas the scheme of Section 3.8 always decodes 2 codebooks.
It is noteworthy that when in the two-state channel model of Figure 16 the channel states are s 1 = 0 and s 2 = 1 , this model simplifies to the two-user random access channel investigated in Section 3.5. In this special case, reserving one codebook to be decoded exclusively in each of the interference-free states, i.e., ( s 1 , s 2 ) and ( s 2 , s 1 ) , enlarges the achievable rate region. Hence, it is beneficial in this special case to treat codebooks ( U 22 1 , U 22 2 ) as interference whenever both users are active, i.e., when the channel state is ( s 2 , s 2 ) . In general, however, when the channel gain s 1 is non-zero, i.e., s 1 > 0 , reserving two codebooks to be decoded exclusively in these two channel states limits the average achievable rate region.
  • Achievable Rate Region. Next, we provide an inner bound on the average capacity region. Recall that the average rate of transmitter i is denoted by R ¯ i = E h 1 , h 2 [ R i ( h 1 , h 2 ) ] , where the expectation is with respect to the random variables h 1 and h 2 . Hence, the average capacity region is the convex hull of all simultaneously achievable average rates ( R ¯ 1 , R ¯ 2 ) . Furthermore, we define β i j k [ 0 , 1 ] as the ratio of the total power P assigned to information layer U i j k , where we have
    i = 1 j β i j k = 1
    for all j , k { 1 , 2 } . The next theorem characterizes an average achievable rate region.
Theorem 9
([89]). For the codebook assignment in Figure 14, and the decoding scheme in Table 5, for any given set of power allocation factors { β i j k } , the average achievable rate region { R ¯ 1 , R ¯ 2 } is the set of all rates that satisfy
R ¯ 1 q 1 C s 1 , s 2 β 22 2 + q 2 C s 2 β 12 1 , s 2 β 22 1 + s 2 β 22 2 + C s 2 β 22 1 , 0 ,
R ¯ 2 p 1 C ( s 1 , s 2 β 22 1 ) + p 2 C s 2 β 12 2 , s 2 β 22 1 + s 2 β 22 2 + C s 2 β 22 2 , 0 ,
R ¯ 1 + R ¯ 2 q 1 p 1 C 2 s 1 , 0 + q 1 p 2 C s 1 + s 2 β 12 2 + s 2 β 22 2 , 0 + q 2 p 1 C s 1 + s 2 β 12 1 + s 2 β 22 1 , 0 + q 2 p 2 C s 2 β 12 1 + s 2 β 12 2 + s 2 β 22 1 + s 2 β 22 2 , 0 .
Achieving the average rate region specified in this theorem requires decoding the codebooks in the order specified by Table 5. Specifically, the receiver adopts a multi-state decoding scheme where in each state it decodes at most two codebooks. This decoding scheme continues until all the codebooks from both transmitters are decoded. Even though limiting the number of codebooks to be decoded at each stage is expected to result in a reduced rate region, it can be readily verified that the rate region that is achieved by employing a fully joint decoding scheme can be recovered via time-sharing among the average achievable rates corresponding to all possible decoding orders in each channel state.
  • Outer Bound. Next, we provide outer bounds on the average capacity region, and we compare them with the achievable rate region specified by Theorem 9.
  • Outer bound 1: The first outer bound is the average capacity region corresponding to the two-user MAC in which the transmitters have complete access to the CSI [116]. This region is specified by OTVYZO in Figure 17.
  • Outer bound 2: The second outer bound is the average capacity region of the two-user MAC with local CSI at transmitter 1 and full CSI at transmitter 2. Outer bound 2 is formally characterized in the following theorem.
Theorem 10
([89]). For the two-user MAC with local CSI at transmitter 1 and full CSI at transmitter 2, the average capacity region is the set of all average rates enclosed by the region OTUWYZO shown in Figure 17, where the corner points are specified in Appendix B.
For the case of available local CSI at transmitter 1 and full CSI at transmitter 2, it can be shown that deploying the discussed layering scheme at transmitter 1 (with local CSIT) achieves the average sum-rate capacity of Outer bound 1. This is formalized in the following theorem.
Theorem 11
([89]). With local CSI at transmitter 1 and full CSI at transmitter 2, an average achievable rate region is the region OTUXYZO shown in Figure 17. The average capacity region is achieved along TU and YZ , and the sum-rate capacity is achieved on XY. The corner points are specified in Appendix B.
Figure 17 illustrates the relative representations of the inner and outer bounds on the average capacity region. Specifically, the region specified by OTVYZO is the average capacity region of a two-user MAC with full CSI at each transmitter, which serves as Outer Bound 1 specified earlier. This region encompasses Outer Bound 2 denoted by OTUWYZ. Segments TU and XYZ of the boundary of Outer Bound 1 coincide with the average capacity region of the case of the two-user MAC with full CSIT.
Figure 15 demonstrates the average rate region for the two-state channel. For this region we have P = P 1 = P 2 = 10 dB, and select the channel gains as s 1 = 0.25 and s 2 = 1 . Accordingly, the channel probability parameters are set to q 1 = p 1 = 0.5 . The main observation is that the average achievable rate region coincides with average rate region achieved when the receiver adopts joint decoding. It can be shown that when the transmitters have local CSIT, it is possible to achieve an average sum-rate that is close to outer bound 1, and that the average the sum-rate capacity can be achieved asymptotically in the low and high power regimes. This observation is formalized in the next theorem.
Theorem 12
([89]). By adopting the codebook assignment presented and setting β 22 1 = β 22 2 = s 1 s 2 , the sum-rate capacity of a two-user MAC with full CSIT is achievable asymptotically as P 0 or P .

3.10. MAC with Local CSIT—Multi-State Channels: State-Dependent Layering

In this section, we generalize the encoding and decoding strategy of Section 3.9 to the general -state channel. When the channels have possible states, each transmitter is allocated different sets of codebooks, one corresponding to each channel state. Specifically, corresponding to channel state s m for m { 1 , , } , transmitter i encodes its message via m information layers generated according to independent codebooks. This set of codebooks is denoted by W m i = { U 1 m i , , U m m i } .
Table 6 specifies the designation of the codebooks to different combined channel states. In this table, the channels are ordered in the ascending order. In particular, varying channels for transmitter 1, the combined channel state ( s q , s p ) precedes all channel states ( s k , s p ) for all k > q . Similarly, for transmitter 2 channel state ( s q , s p ) precedes the channel state ( s q , s k ) , for every k > p . Furthermore, according to this approach, when user i’s channel becomes stronger, it decodes additional codebooks. The sequence of decoding the codebooks, as shown in Table 6, is specified in three steps:
  • State ( s 1 , s 1 ) : Start with the weakest channel combination ( s 1 , s 1 ) , and reserve the baseline codebooks U 11 1 , U 11 2 to be the only codebooks to be decoded in this state. Define V 11 i = { U 11 i } as the set of codebooks that the receiver decodes from transmitter i when the channel state is ( s 1 , s 1 ) .
  • States ( s 1 , s q ) and ( s q , s 1 ) : Next, construct the first row of the table. For this purpose, define V 1 q 2 as the set of the codebooks that the receiver decodes from transmitter 2, when the channel state is ( s 1 , s q ) . Based on this, the set of codebooks in each state can be specified recursively. Specifically, in the state ( s 1 , s q ) , decode what has been decoded in the preceding state ( s 1 , s q 1 ) , i.e., the set of codebooks V 1 ( q 1 ) 2 , plus new codebooks { U 1 q 1 , , U q q 1 } . Then, construct the first column of the table in a similar fashion, except that the roles of transmitter 1 and 2 are swapped.
  • States ( s q , s p ) for p , q > 1 : By defining the set of codebooks that the receiver decodes from transmitter i in the state ( s q , s p ) by V q p i , the codebooks decoded in this state are related to the ones decoded in two preceding states. Specifically, in state ( s q , s p ) decode codebooks V ( p 1 ) q 1 and V p ( q 1 ) 1 . For example, for = 3 , the codebooks decoded in ( s 2 , s 3 ) include those decoded for transmitter 1 in state ( s 2 , s 2 ) along with those decoded for transmitter 2 in channel state ( s 1 , s 3 ) .
The decoding order in the general case is similar the one used for = 2 in Table 5. In particular, in channel state ( s q , s p ) the receiver successively decodes q codebooks from transmitter 1 along with p codebooks from transmitter 2. The set of decodable codebooks in channel state ( s q , s p ) is related to set of codebooks decoded for transmitter 2 in state ( s q 1 , s p ) and those decoded for transmitter 1 ( s q , s p 1 ) . The average achievable rate region for the codebook assignment and decoding strategy presented in this section is summarized in Theorem 13. Similar to the two-state channel case, define β m n i [ 0 , 1 ] as the fraction of power allocated to the codebook U m n i such that m = 1 n β m n i = 1 , n { 1 , . } .
Theorem 13
([89]). For the codebook assignment in this section and the decoding scheme in Table 6, for any given set of power allocation factors { β m n i } , the average achievable rate region { R ¯ 1 , R ¯ 2 } for the ℓ-state channel is the set of all rates that satisfy
R ¯ 2 E [ r 1 ( n , m ) ] ,
R ¯ 2 E [ r 2 ( n , m ) ] ,
R ¯ 1 + R ¯ 2 E [ min { r 3 ( n , m ) , r 4 ( n , m ) } ] ,
where the functions { r 1 ( n , m ) , , r 4 ( n , m ) } , for all m , n { 1 , , } are defined as follows.
r 1 ( n , m ) = min m j = 1 c 1 ( j , m ) + c 3 ( j , n , m ) ,
r 2 ( n , m ) = min m j = 1 c 2 ( j , m ) + c 4 ( j , n , m ) ,
r 3 ( n , m ) = k < m c 5 ( m ) + c 7 ( m , n ) + c 9 ( k , m , n ) ,
r 4 ( n , m ) = k < m c 5 ( m ) + c 6 ( m , n ) + c 8 ( k , m , n ) ,
where
c 1 ( j , m ) = C ( s j β j j 1 , s m C 2 ( j , m ) ) , j { 1 , , } , m { j , , } ,
c 2 ( j , i ) = C ( s j β j j 2 , s m C 1 ( j , m ) ) , j { 1 , , } ,
c 3 ( j , n , m ) = C ( s n β j n 1 , s n C 1 ( j , n ) + s j C 2 ( j , j ) ) , n { j + 1 , , } , m { j , , } ,
c 4 ( j , n , m ) = C ( s n β j n 2 , s j C 1 ( j , m ) + s n C 2 ( j , n ) ) , n { j + 1 , , } ,
c 5 ( m ) = C ( s m β m m 1 + s n β m m 2 ) , m { 1 , , } ,
c 6 ( m , n ) = C ( s m β m m 1 + s n β m n 2 , s n C 2 ( m , n ) ) , m < n , n { m + 1 , , } ,
c 7 ( m , n ) = C ( s n β m n 1 + s m β m m 2 , s n C 1 ( m , n ) ) , m < n , n { m + 1 , , } ,
c 8 ( k , m , n ) = C s m β k m 1 + s n β k n 2 , s m C 1 ( k , m ) + s n C 2 ( k , n ) , k < m , n { m , , } ,
c 9 ( k , m , n ) = C s n β k n 1 + s m β k m 2 , a n C 1 ( k , n ) + s m C 2 ( k , m ) , k < m , n { m , , } ,
and we have defined C 1 ( m , n ) = 1 i = 1 m β i n 1 and C 2 ( m , n ) = 1 i = 1 m β i n 2 , for all m < n and n { m + 1 , , } .
Figure 18 demonstrates the average rate region for the three-state channel, in which the channel gains are s 1 = 0.04 , s 2 = 0.25 , s 3 = 1 , and channel probability parameters q 1 = 0.3 , q 2 = 0.4 for transmitter 1, and p 1 = 0.6 , p 2 = 0.1 for transmitter 2. Furthermore, the region in Theorem 11 is evaluated in Figure 19. Specifically, the average achievable rate region OTUXYZ specified in Figure 17 is evaluated for three scenarios S 1 , S 2 , S 3 . In all three scenarios, the average power constraint is set to 10 dB, i.e., P 1 = P 2 = P = 10 dB, and the channel states are ( s 1 , s 2 ) = ( 0.3 , 1 ) . Evaluations are carried out for the symmetric setting S ^ 1 with the probability distribution q 1 = p 1 = 0.5 , and the asymmetric cases S ^ 1 , S ^ 2 with probability distributions q 1 = 0.2 , p 1 = 0.8 and q 1 = 0.4 , p 1 = 0.5 . This figures illustrate that the average capacity region of the two-user MAC with full CSIT can be partially achieved when only one user has full CSIT.

4. The Interference Channel

4.1. Overview

In this section, we turn the focus to the interference channel as a key building block in interference-limited wireless networks. In this channel, multiple transmitters communicate with their designated receivers, imposing interference on one another. Designing and analyzing interference management schemes has a rich literature. Irrespective of their discrepancies, the existing approaches often rely on the accurate availability of the CSIT and CSIR. We discuss how the broadcast approach can be viewed as a distributed interference management scheme, rendering a practical approach to have effective communication in the interference channel in the face of unknown CSIT.
While the literature on assessing the communication reliability limits of the interference channel and the attendant interference management schemes is rich, a significant focus is on the channels with perfect availability of the CSIT at all transmitters. Representative known results in the asymptote of high SNR regime include the degrees-of-freedom (DoF) region achievable by interference alignment [117,118]. In the non-asymptotic SNR regime of particular note is the achievable rate region due to Han–Kobayashi (HK) [119,120], which is shown to achieve rates within one bit of the capacity region for the Gaussian interference channel [121]. While unknown in its general form, the capacity region is known in special cases, including the strong interference channel [122,123], the discrete additive degraded interference channel [124], certain classes of the deterministic interference channel [125,126,127,128], and opportunistic communication under bursty interference, which is a form of the broadcast approach and is studied under different assumptions on the non-causal availability of the CSI at the transmitters and receivers [129]. some other examples of interference channel and broadcast approach are found in [130,131]. There are extensive studies on circumventing the challenges associated with analyzing and optimal resource allocation over the HK region [130,132,133,134,135,136,137,138]. A more detailed and thorough overview of these can be found in [94].
Interference management without CSIT has also been the subject of intense studies more recently, with more focus on the high SNR regime. Representative studies in the high SNR regime include characterizing the DoF region for the two-user multi-antenna interference channel in [139,140,141,142,143,144,145]; blind interference alignment in [146,147,148,149,150,151,152,153,154,155]; interference management via leveraging network topologies in [156,157]; and ergodic interference channels in [158,159,160]. In the non-asymptotic SNR regime, the studies are more limited, and they include analysis on the capacity region of the erasure interference channel in [161,162]; the compound interference channel in [163]; ergodic capacity for the Z-interference channel in [164]; ergodic capacity of the strong and very strong interference channels in [165,166]; and approximate capacity region for the fast-fading channels [167,168].
In this section, conductive to relieving dependency on full CSIT, we discuss how the broadcast approach can be viewed as a distributed interference management solution for circumventing the lack of CSIT in the multiuser interference channel. One significant intuition provided by the HK scheme is that even with full CSIT, layering and superposition coding is necessary. Built upon this intuition, the broadcast approach is a natural evolution of the HK scheme. We focus on the two-user and finite-state Gaussian interference channel to convey the key ideas in rate-splitting, codebook assignments, and decoding schemes. The remainder of this section is organized as follows. This section focuses primarily on the two-user Gaussian interference channel, for which we provide a model in Section 4.2. We start by discussing the setting in which the receiver has full CSI, and the transmitters have only the statistical model of the CSI and review the application of the broadcast approach in this setting in Section 4.3 for the two-user channel and in Section 4.4 for the multiuser channel. Finally, we will review the interference channel with local CSIT in Section 4.5. Under the setting with local CSIT, we consider two scenarios in which each transmitter either knows the level of the interference that their respective receiver experiences, or the level of interference they impose on the unintended receiver. We discuss how the broadcast approach can be designed for each of these two scenarios.

4.2. Broadcast Approach in the Interference Channel—Preliminaries

Consider the two-user slowly-fading Gaussian interference channel, in which the coefficient of the channel connecting transmitter i to receiver j is denoted by h i j * for i , j { 1 , 2 } . We refer to h i i * and h i j * as the direct and cross channel coefficients, respectively, i j . The signal received by receiver i is denoted by
y i * = h i i * x i * + h i j * x j * + n i * ,
where x i * denotes the signal transmitted by transmitter i, and n i * accounts for the AWGN distributed according to N 0 , N i . The transmitted symbol x i * is subject to the average power constraint P i * , i.e., E [ | x i * | 2 ] P i * . Each channel is assumed to follow a block fading model in which the channel coefficients remain constant for the duration of a transmission block of length n, and randomly change to another state afterward. We consider an -state channel model in which each channel coefficient h i j * randomly and independently of the rest of the channels takes one of the possible states { s i : i { 1 , , } } . Without loss of generality, we assume that 0 < s 1 < < s < + . The -state interference channel in (208) gives rise to an interference channel with 2 different states. The entire channel states are assumed to be fully known to the receivers while being unknown to the transmitters. A statistically equivalent form of the -state interference channel in (208) is the standard interference channel model given by [169,170]
y 1 = x 1 + a 1 x 2 + n 1 , and y 2 = a 2 x 1 + x 2 + n 2 ,
and the inputs satisfy E [ | x i * | 2 ] P i * , where we have defined
a 1 = h 12 * h 22 * 2 · N 2 N 1 , a 2 = h 21 * h 11 * 2 · N 1 N 2 , and P i = ( h i i * ) 2 N i · P i * .
and the terms n 1 and n 2 are the additive noise terms distributed according to N ( 0 , 1 ) . The equivalence between (208) and (209) can be established by setting
y i = y i * N i , x i = h i i * N i x i * , n i = n i * N i .
Channel gains a 1 and a 2 are statistically independent, inheriting their independence from that of the channel coefficients. By invoking the normalization in (210), it can be readily verified that the cross channel gains a i take one of K = ( 1 ) + 1 possible states, which we denote by { β 1 , , β K } . Without loss of generality we assume they are in the ascending order. For the two-state channel, the cross channel gain takes one of the three states β 1 = s 1 s 2 , β 2 = 1 , and β 3 = 1 β 1 . Hence, the state of the network is specified by two cross links, rendering K 2 states for the network. We say that the network is in the state ( β s , β t ) when ( a 1 , a 2 ) = ( β s , β t ) . To distinguish different states, in the network state ( β s , β t ) , we denote the outputs by
y 1 s = x 1 + β s x 2 + n 1 , and y 2 t = β t x 1 + x 2 + n 2 .
Hence, this interference channel can be equivalently presented as a network with two transmitters and K 2 receiver pairs, where each receiver pair corresponds to one possible channel state. In the case of the symmetric interference channel, we have a 1 = a 2 , and the number of possible channel combinations reduces to K, rending an equivalent network with two transmitters and 2 K receivers. Figure 20 depicts such a symmetric network for the two-state channel. Finally, we define
q 1 s = P ( a 1 = β s ) and q 2 s = P ( a 2 = β s ) .

4.3. Two-User Interference Channel without CSIT

Effective interference management in the interference channel hinges on how a transmitter can balance the two opposing roles that it has as both an information source and an interferer. Striking such a balance requires designating a proper notion of degradedness according to which different realizations of the network can be distinguished and ordered. Hence, specifying an order of degradedness plays a central role in assigning codebooks and designing the decoding schemes. We adopt the same notion of degradedness that was used for the MAC with proper modifications.
When each channel has possible states, the cross channels take one of the K = ( 1 ) + 1 . Hence, by adopting the broadcast approach, this two-user interference channel becomes equivalent to a multiuser network consisting of two transmitters and K 2 receivers. The transmitters and each of these receivers form a MAC, in which the receiver is interested in decoding as many information layers as possible. To this end and by following the same line of arguments we had for the MAC, we use the capacity region of the individual MACs to designate degradedness among distinct network states.
The network model in (212) is equivalent to a collection of MACs. The MAC associated with receiver y i s , for s < k , is degraded with respect to the MAC associated with the receiver y i k . Hence, receiver y i k can successfully decode all the information layers that are decoded by the receivers { y i 1 , , y i s } . Driven by this approach to designating degradedness, each transmitter splits its message into multiple independent codebooks, where each is adapted to one combined state of the network and intended to be decoded by specific receivers.
At receiver y i k , decoding every additional layer form transmitter i directly increases the achievable rate. In parallel, decoding each additional layer from the interfering other transmitter indirectly increases the achievable rate by canceling a part of the interfering signal. Driven by these two observations, transmitter i breaks its message into 2 K layers denoted by { V i k , U i k } k = 1 K , each serving a specific purpose. Recall that in the canonical model in (212), the direct channels remain unchanged and only the cross channels have varying states. Hence, each of the 2 K layers of each transmitter is designated to a specific cross channel state and receiver.
  • Transmitter 1 (or 2) reserves the information layer V 1 k (or V 2 k ) for adapting it to the channel from transmitter 1 (or 2) to the unintended receiver y 2 k (or y 1 k ). Based on this designation, the intended receivers { y 1 k } k = 1 K (or { y 2 k } k = 1 K ) will decode all codebooks { V 1 k } k = 1 K (or { V 2 k } k = 1 K ), and the non-intended receivers { y 2 k } k = 1 K (or { y 1 k } k = 1 K ) will be decoding a subset of these codebooks. The selection of the subsets depends on on channel strengths of the receivers, such that the non-intended receiver y 2 k (or y 1 k ) decodes only codebooks { V 1 s } s = 1 k (or { V 2 s } s = 1 k ).
  • Transmitter 1 (or 2) reserves the layer U 1 k (or U 2 k ) for adapting it to the channel from transmitter 2 (or 1) to the intended receiver y 1 k (or y 2 k ). Based on this designation, the unintended receivers { y 2 k } k = 1 K (or { y 1 k } k = 1 K ) will not decode any of the codebooks { U 1 k } k = 1 K (or { U 2 k } k = 1 K ), and the intended receivers { y 1 k } k = 1 K (or { y 2 k } k = 1 K ) will be decoding a subset of these codebooks. The selection of these subsets depends on channel strengths of the receives such that the intended receiver y 1 k (or y 2 k ) decodes only the codebooks { U 1 s } s = 1 k (or { U 2 s } s = 1 k ).
Figure 21 specifies how the codebooks are assigned to transmitter 1 as we as the set of codebooks decoded by each of the three receivers { y 1 k } k = 1 3 associated with transmitter 1.

4.3.1. Successive Decoding: Two-State Channel

We review a successive decoding scheme for the two-state channel. This scheme will be then generalized in Section 4.3.2. In this decoding scheme, each codebook will be decoded by a number of receivers. Therefore, the rate of each codebook will be limited by the its most degraded channel state. The codebooks that are not decoded by a receiver will be treated as Gaussian noise. These codebooks impose interference on the receiver, which compromises the achievable rate at the receiver. This observation guides designing a successive decoding scheme that dynamically identifies (i) the set of the receivers that decode a given codebook, and (ii) the order by which the codebooks are successively decoded by each receiver.
For formalizing this decoding strategy, denote the set of receivers that decode codebook V i k by V i k , and denote the set of the receivers that decode U i k by U i k . Therefore, we have
V 1 k = { y 1 s } s = 1 3 { y 2 s } s = k 3 , V 2 k = { y 2 s } s = 1 3 { y 1 s } s = k 3 , and U i k = { y i s } s = k 3 .
The order of successively decoding the codebooks at receiver y i k is specified in Table 7.

4.3.2. Successive Decoding: -State Channel

In this section, we generalize the successive decoding scheme to the general multi-state channels. Similarly to (214), we define
V 1 k = { y 1 s } s = 1 K { y 2 s } s = k K , V 2 k = { y 2 s } s = 1 K { y 1 s } s = k K , and U i k = { y i s } s = k K .
Each of the two receivers decodes a set of the codebooks. The choice of the set depends on the channel states. Specifically, when the network state is ( β q , β p ) , receiver 1 decodes K + q codebooks from transmitter 1 and q codebooks from transmitters 2. These codebooks are decoded successively in two stages in the following order:
  • Receiver 1—stage 1 (Codebooks { V i s } s = 1 q ): Receiver 1 decodes one information layer from each transmitter in an alternating manner until all codebooks { V 1 s } s = 1 q and { V 2 s } s = 1 q are decoded. The first layer to be decoded in this stage depends on the state β q . If β q < 1 , the receiver starts by decoding codebook V 1 1 from transmitter 1, then it decodes the respective layer V 2 1 from transmitter 2, and continues alternating between the two transmitters. Otherwise, if β q > 1 , receiver 1 first decodes V 2 1 from the interfering transmitter 2, followed by V 1 1 from transmitter 1, and continues alternating. By the end of stage 1, receiver 1 has decoded q codebooks from each transmitter.
  • Receiver 1—stage 2 (Codebooks { V 1 s } s = q + 1 K and { U 1 s } s = 1 q ): In stage 2, receiver 1 carries on decoding layers { V 1 s } s = q + 1 K from transmitter 1, in an ascending order of the index s. Finally, receiver 1 decodes layers { U 1 s } s = 1 q specially adapted to receivers { y 1 s } s = 1 q , in an ascending order of index s. Throughout stage 2, receiver 1 has additionally decoded K codebooks from its intended transmitter 1.
The decoding scheme at receiver 2 follows the same structure by swapping the roles of the two transmitters. The set of codebooks decoded by receiver i in channel state ( β q , β p ) is partly defined by the set of codebooks decoded by receiver i and the set decoded by receiver j in state ( β q 1 , β p 1 ) . The decoding scheme is summarized in Table 8. In this table, the channels are ordered in the ascending order such that at receiver 1, state ( β q , β p ) precedes all channel states ( β k , β p ) for all k > q . Similarly, at receiver 2, state ( β q , β p ) precedes network state ( β q , β k ) , for every k > p . Furthermore, according to this approach, when the cross channel of receiver i becomes stronger, receiver i decodes additional codebooks from both transmitters. In particular, in Table 8, every cell contains the codebooks decoded in the combined channel state ( β q , β p ) where we mark the codebooks decoded by receiver 1 in blue color, while those decoded by receiver 2 in red color. To further highlight the relationship between the decodable codebooks in different states, we denote by C i k the set of codebooks decoded by the receiver i when a i = β k .

4.3.3. Average Achievable Rate Region

In this section, we provide an overview on the average achievable rate region. The average rates of the users are specified by the rates of codebooks { V i k , U i k } k = 1 K , for i { 1 , 2 } . These rates should satisfy all the constraints imposes by different receivers in order for them to successfully decode all their designated codebooks. Hence, the rates are bounded by the smallest achievable rates by the receivers V i k and U i k . To formalize the rate regions, define R ( A ) as the rate of codebook A { V i k , U i k : i , k } , and define γ ( A ) as the fraction of the power P i allocated to the codebook A { V i k , U i k : i , k } . Accordingly, define R i ( s , t ) as the total achievable rate of user i, when the network is in the state ( β s , β t ) . Finally, denote the average achievable rate at receiver i by R ¯ i = E [ R i ( β s , β t ) ] , where the expectation is taken with respect to the probabilistic model of the channel. Note that the transmitters collectively have 4 K codebooks. Corresponding to the set S R + 4 K , define the rate region R in ( S ) as the set of all average rate combinations ( R ¯ 1 , R ¯ 2 ) such that R ( A ) S for all A { V i k , U i k : i , k } , i.e.,
R in ( S ) = ( R ¯ 1 , R ¯ 2 ) : R ( A ) S , A { V i k , U i k : i , k .
Furthermore, corresponding to each receiver y i k and codebook A { U i k , V i k : i , k } that should be decoded by y i k , define R i k ( A ) as the maximum rate that we can sustain for codebook A, while being decodable by y i k . Accordingly, for user i, and corresponding to s , t { 1 , , K } define the rates
r i ( s , t ) = k = t + 1 K R i s ( V i t ) + k = 1 s R i k ( U i k ) + min { 1 , 2 } k = 1 t R k ( V i k ) ,
where the rates R i s ( A ) are defined as follows. First, define γ ( A ) as the fraction of P i allocated to A { U i k , V i k : k } , and set
Γ v ( i , k ) = j = 1 k γ ( V i j ) , and Γ u ( i , k ) = j = 1 k γ ( U i j ) .
Based on these definitions, if the codebook V i k is decoded by the receiver y i s , then we have
If β s 1 , R i s ( V i k ) = C γ ( V i k ) P i , ( 1 Γ v ( i , k ) ) P i + β k ( 1 Γ v ( j , s 1 ) ) P j ,
If β s > 1 , R i s ( V i k ) = C γ ( V i k ) P i , ( 1 Γ v ( i , k ) ) P i + β k ( 1 Γ v ( j , s ) ) P j .
Similarly, if the codebook V i k is decoded by the receiver y j s , then we have
If β s 1 , R j s ( V i k ) = C β s γ ( V i k ) P i , β k ( 1 Γ v ( i , k ) ) P i + ( 1 Γ v ( j , s ) ) P j ,
If β s > 1 , R j s ( V i k ) = C β s γ ( V i k ) P i , β k ( 1 Γ v ( i , k ) ) P i + ( 1 Γ v ( j , s 1 ) ) P j .
Finally, when codebook U i k is decoded by the receiver y i s , then we have
R i s ( U i k ) = C γ ( U i k ) P i , β k ( 1 Γ v ( 1 , s ) ) P j + ( 1 Γ v ( 1 , K ) Γ u ( 1 , s ) ) P i .
Theorem 14
([171]). The average achievable rate region via sequential decoding is specified by
R in seq = ( R ¯ 1 , R ¯ 2 ) : R i ( s , t ) r i ( s , t ) , i 1 , 2 , s , t { 1 , , K } .
The average achievable rate region characterized in Theorem 14 is illustrated in Figure 22 and Figure 23. Figure 22 shows a general asymmetric setting for the following set of parameters P 1 = P 2 = 10 dB, ( q 1 1 , q 1 2 , q 1 3 ) = ( 0.5 , 0.3 , 0.2 ) , ( q 2 1 , q 2 2 , q 2 3 ) = ( 0.3 , 0.3 , 0.4 ) , and the weak channel state at each receiver is given by β 1 = 0.5 . Similarly, for = 3 , Figure 23 evaluates the average rate region for an asymmetric channel with ( q i 1 , q i 2 , q i 3 , q i 4 , q i 5 , q i 6 , q i 7 ) = ( 0.1 , 0.1 , 0.1 , 0.2 , 0.1 , 0.1 , 0.3 ) , where the weak channel states at receivers 1 and 2 are set as ( β 1 , β 2 , β 3 ) = ( 0.1 , 0.2 , 0.9 ) and ( β 1 , β 2 , β 3 ) = ( 0.1 , 0.4 , 0.7 ) , respectively. Comparing these figures indicates that increasing the number of states reduces the gap between the two regions (broadcast approach and HK).

4.3.4. Sum-Rate Gap Analysis

Next, we provide an upper bound on the gap of the average achievable sum-rate to the average sum-rate capacity of the interference channel in which the transmitters have full CSI. To this end, we use the existing results on the gap between the sum-rate achievable by the HK scheme and the sum-rate capacity. to present the main ideas and for simplicity in notations, we present the results for the symmetric setting, i.e., when  a 1 = a 2 = a , symmetric average power constraints, i.e., when P 1 = P 2 = P , and symmetric probabilistic models for the channels, i.e., when q 1 s = q 2 s = q s = 1 3 . Generalization of the results to the non-symmetric settings is straightforward.
In the symmetric settings, the channel in (212) simplifies to either a weak interference channel (when a = β 1 ) , or to a strong interference channel (when a { β 2 , β 3 } ). To assess the average sum-rate gap, we start by analyzing the gap in the weak and strong interference regimes separately. The average of these gaps provides the average sum-rate gap. Throughout this discussions we set β = β 3 = 1 β 1 .
  • Weak interference: In the weak interference regime, the capacity with full CSIT is in unknown. In this regime, in order to quantify the gap of interest, we first evaluate the gap of the sum-rate achieved by the scheme of Section 4.3.2 to the sum-rate achieved by the HK scheme. By using this gap in conjunction with the known results on the gap between the sum-rate of HK and the sum-rate capacity, we provide an upper bound on the average sum-rate gap of interest.
  • Strong interference: In the strong interference regime, the sum-rate capacity with full CSIT is known. It can be characterized by evaluating the sum-rate of the intersection of two capacity regions corresponding to two multiple access channels formed by the transmitters and each of the receivers [123].
By quantifying the two gaps above, and then aggregating them based on the probabilistic model of the channel, the following theorem establishes upper bounds on the gap between the average sum-rate achieved by the approach in Section 4.3.1 and the sum-rate capacity. The gap is characterized in two distinct regimes of transmission power, denoted by G 1 and G 2 . Define R ¯ sum ( G i ) as the minimum average sum-rate achievable under region G i , and denote the average sum-rate capacity with full CSIT by C sum ( G i ) . Finally, define the gap Δ ( G i ) = C sum ( G i ) R ¯ sum ( G i ) .
Theorem 15
([171]). The average sum-rate achievable by the broadcast approach in Figure 21 and Table 7 has the following gap with the sum-rate capacity of the symmetric Gaussian interference channel with full CSIT:
(i) 
For P G 1 = 0 , β β ( β 2 + β 1 ) , + we have
Δ ( G 1 ) 1 3 1 + log 1 + P ( 1 + β ) 1 + P ( 1 + 1 β ) + 1 2 log ( 2 + β ) .
(ii) 
For P G 2 = β , β ( β 2 + β 1 ) we have
Δ ( G 2 ) 1 3 log 4 3 + log 1 + P ( 1 + β ) 1 + P / β + β + 3 log ( 2 + β ) 2 1 + 2 β .
Further analyzing the result in this theorem shows that the gap in the high SNR regime is upper bounded by a constant (for fixed channel gains).
Theorem 16
([171]). For any fixed network model (i.e., fixed β), when P is sufficiently large, the gap between the sum-rate capacity of the symmetric Gaussian interference channel with full CSIT and the average sum-rate achievable by the broadcast approach in Figure 21 and Table 7 is upper bounded by
Δ 1 6 log 8 β 2 · β + 2 β + 1 .
Figure 24 and Figure 25 compare the maximum average sum-rate with that of the sum-rate of the HK scheme. In both schemes, the average sum-rate is maximized over all possible power allocation schemes over different codebooks. Figure 24 depicts the gap between the two methods normalized by the sum-rate of HK. This signifies the relative sum-rate loss that can be attributed, for the most part, to the lack of the CSI at the transmitters. It is observed that the relative loss with respect to the HK peaks for moderate power regimes, while in the small and large power regimes, it is diminishing. For the evaluations in Figure 24, a two-state channel with a symmetric channel probability model ( q 1 s = q 1 s = q s ) is considered, in which ( q 1 , q 2 , q 3 ) = ( 0.3 , 0.6 , 0.1 ) . The results follow the same trend for different values of β 1 . Figure 25 evaluates the bounds on the sum-rate gaps presented in Theorem 15. The three plots in this figure correspond to those in Figure 24. Specifically, the plots in Figure 25 depict the Δ ( G i ) normalized by the HK sum-rate. This figure shows that the bound on the gap becomes tighter as the power increases.

4.4. N-User Interference Channel without CSIT

Finally, we provide a brief overview of a representative approach to generalizing the approaches discussed thus far to the general N user channel. To this end, consider a generalization of (209) to the N-user channel, in which for user m { 1 , , N } we have
y m = x m + i m a m i x i + n m .
Each of the channel coefficients a i m takes one of the L possible states { β 1 , , β L } , order in the ascending order. The state of the network will be specified by the cross-links states, rendering a network with N transmitters and N L N 1 receivers. In the case of the symmetric interference channel, i.e., a m i = a , the number of network states reduces to N transmitters and N L receivers.
Each transmitter, to balance its impacts on the intended and unintended receivers, performs rate-splitting and adapts each information layer to one combined state of the network designated to be decoded by a specific group of receivers. In the equivalent network, each transmitter and its associated S = L N 1 receivers form a MAC. The critical stage in specifying the broadcast approach is adopting a notion of degradedness among different such MAC. Facing a lack of a natural choice, we define an aggregate strength for receiver y m as
θ m = i m a m i .
This metric is used to sort the S receivers associated with y m in the equivalent network. Denote these receivers by { y m 1 , , y m S } , which are sorted in the ascending order such that for s < k receivers the θ m value associated with the states in the channel receiver y i s is smaller than that of receiver y i k . Hence, for s < k , the multiple access channel at receiver y i s is degraded with respect to the channel at y i k . Therefore, receiver y i k can successfully decode all the layers adapted to the channels with the designated receivers { y i 1 , , y i s } . At receiver y i k , every layer decoded form transmitter i directly increases the achievable rate, whereas every layer decoded from the other transmitter indirectly increases the achievable rate by canceling a part of the interfering signal. Hence, similarly to the two-user channel, transmitter i splits its message into 2 S layers denoted by { V i k , U i k } k = 1 S with the following designations and objectives:
  • Transmitter m adapts layer V m k to the state of the channels linking all other transmitters to the unintended receivers { y 1 k , , y N L 1 k } { y m k } : while the intended receivers { y m k } k = 1 S will be decoding all codebooks { V m k } k = 1 S , the non-intended receivers { y 1 k , , y S k } { y m k } decode a subset of these codebooks depending on their channel strengths. More specifically, a non-intended receiver y i k decodes only the codebooks { V m s } s = 1 k .
  • Transmitter m adapts the layer U m k to the state of the channels linking all other transmitters to the intended receiver y m k : while the unintended receivers { y 1 k , , y S k } { y m k } will not be decoding any of the codebooks { U m k } k = 1 S , the intended receivers { y m k } k = 1 S decode a subset of these codebooks depending on their channel strengths. More specifically, the intended receiver y m k decodes only the codebooks { U m s } s = 1 k .
As the number of users N increases, the total number of codebooks per transmitter 2 S = 2 L N 1 grows exponentially with the number of users. This renders joint decoding to have a prohibitive decoding complexity. A viable remedy is adopting the opportunistic successive decoding schemes (e.g., [138,172]), which are low-complexity schemes in which each receiver can dynamically identify an optimal set of codebooks to decode.

4.5. Two-User Interference Channel with Partial CSIT

We now turn the attention to how the transmitters have partial information about the overall network state. Specifically, based on the model in (209), we consider two separate scenarios in which each transmitter either knows the interference that it causes to the unintended receiver, or the interference that its intended receiver experiences. More specifically, in Scenario 1, transmitter i knows the channel state a j for j i , while being unaware of a i . In contrast, in Scenario 2, transmitter i knows the channel state a i while being unaware of a j for j i . These two scenarios and their associated broadcast approaches are discussed next.

4.5.1. Two-User Interference Channel with Partial CSIT—Scenario 1

  • State-dependent adaptive layering. In this setting, each transmitter controls the interference that it imposes by leveraging the partially known CSI. Concurrently, each transmitter adapts one layer to every possible channel state at its intended receiver, overcoming the partial uncertainty about the other transmitter’s interfering link. Based on these observations, transmitter i splits its information stream into a certain set of codebooks depending on the state of its outgoing cross channel. We denote the set of codebooks transmitted by user i when a j = β k by C i k . Each set C i k consists of K + 1 codebooks given by
C i k = { V i k , U i k ( 1 ) , , U i k ( K ) } .
The layers denoted by V i k are adapted to be successfully decoded by both receivers in all network states. Additionally, layers U i k ( s ) , s { 1 , , K } are specifically adapted to be opportunistically decoded by the intended receiver y i s only. In particular, when transmitter i knows the state of its outgoing channel to be β k , it splits its information stream into K + 1 layers specified in (230) where
  • layer V 1 k ( V 2 k ) is adapted to the cross channel state at the unintended receiver y 1 k ( y 2 k ); and
  • layer U 1 k ( s ) ( U 2 k ( s ) ) is adapted to the cross channel state at the intended receiver y 2 s ( y 1 s ), for s { 1 , , K } .
Note that the sets { C i k } i , k contain the same number of codebooks corresponding to each user i and outgoing channel state β k . However, the motivation behind using K different sets is that the power allocation among the layers in each set is distinct. Given that transmitter i adapts the layers V i k to each cross channel state at the unintended receiver, it directly imposes a constraint on the fraction of power allocated to the remaining layers  { U i k ( s ) } .
  • Successive decoding. Each codebook will be decoded by multiple receivers in the equivalent network formed by different receivers associated with different network states. Hence, each codebook rate will be constrained by its associated most degraded channel state. Furthermore, any undecoded layer at a particular receiver imposes interference, which degrades the achievable rate at that receiver. Motivated by these premises, a simple successive decoding scheme can be designed that specifies (i) the set of receivers at which each layer is decoded, and (ii) the order of successive decoding order at each receiver.
In network state ( β s , β t ) , user 1 transmits the superposition of all the layers in the set C 1 s = { V 1 s , U 1 s ( 1 ) , , U 1 s ( K ) } , while user 2 transmits the layers in the set C 2 t = { V 2 t , U 2 t ( 1 ) , , U 2 t ( K ) } . Accordingly, layers V 1 s and V 2 t are decoded by both receivers y 1 s and y 2 t . Further, a subset of the layers { U i s ( t ) } from user i are opportunistically decoded by the intended receiver only depending of the interfering channel state β t from transmitter j i . For state ( β s , β t ) , we summarize the decoding order at each receiver y i s as follows:
  • Receiver y 1 s : First, it decodes one layer from the unintended transmitter V 2 t and remove it from the received signal. Secondly, it decodes the baseline layer from its intended transmitter V 1 s . Finally, depending on the network state ( β s , β t ) , it successively decodes all the layers { U 1 s ( 1 ) , , U 1 s ( t ) } .
  • Receiver y 2 t : First, it decodes one layer from the unintended transmitter V 1 s and remove it from the received signal. Secondly, it decodes the baseline layer from its intended transmitter V 2 t . Finally, depending on the network state ( β s , β t ) , it successively decodes all the layers { U 1 t ( 1 ) , , U 1 t ( s ) } .

4.5.2. Two-User Interference Channel with Partial CSIT—Scenario 2

  • State-dependent adaptive layering. In contrast to Scenario 1, in this scenario, transmitter i knows a i , and it is oblivious to the other channel. Lacking the extent of interference that each transmitter causes, transmitter i adapts multiple layers with different rates such that the unintended receiver opportunistically decodes and removes a part of the interfering according to the actual state of the channel. Simultaneously, transmitter i adapts the encoding rate of a single layer to be decoded only by its intended receiver based on the actual state of channel a 2 . Based on this vision, transmitter i splits its information stream into a distinct set of codebooks corresponding to each state of the cross channel at its intended receiver. We denote the set of codebooks transmitted by user i when a i = β k by D i k . Each set D i k consists of K + 1 codebooks given by
D i k = { V i k ( 1 ) , , V i k ( K ) , U i k } .
The layers denoted by { V i k ( s ) } s = 1 K are adapted to be fully decoded by transmitter i and partially decoded by receiver j, depending on the actual network state. Contrarily, layers U i k are specifically adapted to be decoded by the intended receiver y i s only. In particular, when transmitter i knows the state of the interfering link to its intended receiver to be β k , it splits its information stream into K + 1 encoded layers specified in (231) where
  • layer V 1 k ( s ) ( V 2 k ( s ) ) is adapted to the cross channel state at the unintended receiver y 2 s ( y 1 s ), for s { 1 , , K } ; and
  • layer U 1 k ( U 2 k ) is adapted to the cross channel state at the intended receiver y 1 k ( y 2 k ).
Similarly to the layering approach in Scenario 11, sets D i k contain an equal number of codebooks for each i { 1 , 2 } and k { 1 , , K } . Nevertheless, power allocation schemes among the layers in each set are distinct.
  • Successive decoding. Given that each codebook will opportunistically be decoded by multiple receivers, its maximum achievable rate is constrained by the most degraded network state in which it is decoded. Similarly to that of Scenario 1, a successive decoding scheme is devised that specifies (i) the set of receivers at which each layer is decoded, and (ii) the order of successive decoding order at each receiver.
In network state ( β s , β t ) , user 1 transmits the superposition of all the layers in the set D 1 s = { V 1 s ( 1 ) , , V 1 s ( K ) , U 1 s } , while user 2 transmits the layers in the set D 2 t = { V 2 t ( 1 ) , , V 2 t ( K ) , U 2 t } . Layers U 1 s and U 2 t are decoded by both receivers y 1 t and y 2 s . On the other hand, a subset of the layers { V i s ( k ) } from user i are opportunistically decoded by the unintended receiver j depending on the interfering channel state. In network state ( β s , β t ) , we summarize the decoding order at each receiver y i s as follows:
  • Receiver y 1 s : First, it decodes one layer from the interfering signal V 2 t ( 1 ) . Afterwards, it decodes one layer from the intended signal V 1 s ( 1 ) . This receiver continues the decoding process in an alternating manner until codebooks { V 2 t ( j ) } j = 1 s from transmitter 2 and codebooks { V 1 s ( j ) } j = 1 K } are decoded from the intended receiver 1 are successfully decoded. Finally, the last remaining layer from the intended message U 1 s is decoded.
  • Receiver y 2 t : First, it decodes one layer from the interfering signal V 1 s ( 1 ) . Afterwards, it decodes one layer from the intended signal V 2 t ( 1 ) . This receiver continues the decoding process in an alternating manner until codebooks { V 1 s ( j ) } j = 1 s from transmitter 1 and codebooks { V 2 t ( j ) } j = 1 K } are decoded from the intended receiver 2 are successfully decoded. Lastly, the last remaining layer from the intended message U 2 t is decoded.

5. Relay Channels

5.1. Overview

In this section, we extend the discussions to two-hop networks, in which a source and a destination communicate while being assisted by relay nodes. In line with the key assumption throughout this paper (i.e., no CSIT), we assume that the transmitter and the relay(s) are oblivious to instantaneous realizations of their outgoing channels. Such settings are especially relevant when a source communicates with a remote destination, and a relay terminal is occasionally present near the source but without the source’s knowledge [173,174,175,176].
We start the discussion with a two-hop network model in Section 5.2, where the source and destination communicated through a relay node (no direct source-destination communication). In this section, we review various decode-and-forward (DF), amplify-and-forward (AF), quantize-and-forward (QF), and amplify-and-quantize-and-forward (AQF) relaying schemes and characterize their attendant average communication rates, based on the results in [177]. The work in [178] considers the problem of communication between a single remote transmitter and a destined user while being helped by co-located users. This problem is discussed in more detail in Section 5.3. In a dynamic wireless network where a source terminal communicates with a destination, it is worth considering oblivious relaying strategies of a relay near the source transmitter in the presence of other users in the network [179], as discussed in Section 5.4. In Section 5.5, we review the broadcast transmission schemes of the diamond channel investigated in [180]. Motivated by addressing the distributed nature and delay sensitivity of modern communication systems, the study in [181] investigates a network consisting of a source-destination pair, the communication between which is assisted by multiple relays. This setting is reviewed in Section 5.6. Finally, motivated by the fact that in practical wireless networks, it is often difficult for each user to keep track of the relay nodes, in Section 5.7, we review the settings in which the relays are available only occasionally.

5.2. A Two-Hop Network

Let us consider a two-hop relay fading channel [177], where the transmitter and receiver communicate through an intermediate network node that serves as a relay. Various relaying protocols and broadcasting strategies are considered. For example, DF relaying, a simple relay with a single packet buffer, which cannot reschedule retransmissions, is first studied. DF relaying limitations in various cases give rise to consideration of other relaying techniques, such as AF, where a maximal broadcasting achievable rate is analytically derived. A QF relay, coupled with a single-level code at the source, uses codebooks matched to the received signal power and performs optimal quantization. This is simplified by an AQF relay, which performs scaling, and single codebook quantization on the input. As discussed later in this section, it is observed that the latter may be throughput-optimal on the relay-destination link while maintaining a lower coding complexity compared with the QF setting.
The work in [182] concerns two-hop transmissions over relay-assisted block fading channels, assuming there is no direct link between the transmission ends and the communication is carried out by a relay. Various relaying strategies are considered in combination with the multi-layer coded transmission. The study in [183] optimizes the power allocation for relaying strategies in a similar two-way relay setting. The work in [184] considers a two-layer transmission and optimizes the power allocation for a DF relay.
In a DF [185] scheme, the relay decodes the received source message, re-encodes it, and forwards the resulting signal to the destination. Note that, since the relay must perfectly decode the source message, the achievable rates are bounded by the capacity of the channel between the source and the relay. A non-regenerative relay has a different coding scheme than the source, and it can improve, for example, the reliability of the relay-destination transmission. The work in [186] compares two DF protocols assuming knowledge of channel gains at the transmitter and adhering to delay-limited capacity. Further work on user cooperation to increase diversity gains, using DF cooperation techniques over a Rayleigh fading channel is found in [187].
In [188], different types of AF relay settings are studied and general expressions for the aggregate SNR at the destination are derived for a varying number of relaying nodes. This study is motivated by previous observations that AF relays can sometimes approach or exceed the performance of their DF counterparts [185].
A QF relay implementation is considered in [174] and it is shown to be superior to the DF and AF, in terms of average throughput in the presence of a direct link and a known channel gain on the relay-destination link, which models a two co-located user cooperation. Practical compress-and-forward (CF) code design was presented in [189] for the half-duplex relay channel. The quantization in [174,189] is of Wyner–Ziv (WZ) quantization type [190], which refers to the relay quantizing its received observation of the source symbol while relying on the side information that is available at the destination receiver, from the direct link. In a two-hop relay setting, the receiver has no additional side information, and thus the quantization applied at the relay is a standard quantization of a noisy Gaussian source [191]. Consider the following SISO channel:
y r = h s x s + n s ,
where y r is a received vector of length N at the relay, which is also the transmission block length, x s is the transmitted vector, and n s is the additive noise vector, with elements that are complex Gaussian i.i.d. with zero mean and unit variance denoted CN ( 0 , 1 ) . h s is the (scalar) fading coefficient, assumed to be perfectly known at the relay and the destination receivers only. The source transmitter has no CSI. The power constraint at the source is given by P s = E [ | x s | 2 ] . The channel between the relay and the destination is described by
y d = h r x r + n r ,
where y d is a received vector of length N at the destination receiver, and x r is the relay transmitted vector. n r is the additive noise vector, with elements that are complex Gaussian i.i.d. with zero mean and unit variance denoted by CN ( 0 , 1 ) , and h r is the (scalar) fading coefficient. The fading coefficients h s and h r are assumed to be perfectly known at the destination receivers only. The relay transmitter does not possess h r . The power constraint at the relay is given by P r = E [ | x r | 2 ] .
It is assumed that the relay operates in a full-duplex mode by receiving and transmitting on different frequency bands, realizing a two-hop network. Furthermore, the relay is not capable of buffering data. In the DF protocols, the relay has to forward all the data successfully decoded immediately. Layers that were not decoded on the path from source to destination must be rescheduled for retransmission at the source. If the relay had packet scheduling capabilities, the DF protocols could be improved by letting the relay perform retransmission of layers that are not decoded at the destination. However, this calls for distributed scheduling control, which highly complicates the system and is beyond the scope of this subsection.

5.2.1. Upper Bounds

A full CSI (FCSI) upper bound is derived for a hypothetical case that both source and relay have perfect CSI of all links, and the source always transmits in the maximal achievable rate over this relay channel. This achievable rate is the minimal rate determined by the fading gain realizations on both links. It is generally expressed by
C FCSI = E s s , s r [ log ( 1 + min ( P s s s , P r s r ) ) ] ,
where s s = | h s | 2 , and s r = | h r | 2 . By explicitly extracting the expectation in (234) we get
C FCSI = 0 d ν 0 d μ f ( ν ) f ( μ ) log ( 1 + min ( P s ν , P r μ ) ) = 0 d ν P s P r ν d μ f ( ν ) f ( μ ) log ( 1 + P s ν ) + 0 d ν f ( ν ) 0 P s P r ν d μ f ( μ ) log ( 1 + P r μ ) = 0 d ν f ( ν ) ( 1 F ( P s P r ν ) ) log ( 1 + P s ν ) + P s P r 0 d ν ( 1 F ( ν ) ) f ( P s P r ν ) log ( 1 + P s ν ) ,
where f ( x ) and F ( x ) are the PDF and CDF of the fading gain, respectively. For a Rayleigh fading channel, the FCSI upper bound is given by
C FCSI = ( 1 + P s P r ) 0 d ν e ( 1 + P s P r ) ν log ( 1 + P s ν )
= e P s + P r P r P s E 1 P s + P r P r P s ,
where E 1 ( x ) is the exponential integral function E 1 ( x ) x d t e t t for x 0 [192]. The ergodic cut-set upper bound is the minimum of the average achievable rates on the two links (source-relay and relay-destination). This is specified by
C erg = min { E s s [ log ( 1 + P s s s ) ] , E s r [ log ( 1 + P r s r ) ] } .
For Rayleigh fading channels, and similar fading gain distribution functions f ( x ) for the two links, the ergodic upper bound simplifies to
C erg = 0 d ν e ν log ( 1 + P ν ) , s . t . P = min ( P s , P r ) ,
which is justified by the monotonicity of the ergodic capacity as function of P. A tighter upper bound on the broadcast strategy is the broadcasting cut-set bound. This is the minimum average broadcasting rate achievable on each of the links separately. It is specified by
R bs cutset = min 0 d u f μ ( u ) R μ ( u ) , 0 d u f ν ( u ) R ν ( u ) ,
where f ν ( u ) and f μ ( u ) are the PDFs of the source-relay and relay destination fading gains, respectively, and R ( u ) is the broadcasting achievable rate for a fading gain u. For a Rayleigh fading channel with similar distribution on both links, the cut-set bound is given by ([23], Equation (18))
R bs cutset = 2 E 1 ( s 0 ) 2 E 1 ( 1 ) ( e s 0 e 1 ) ,
where
s 0 = 2 1 + 1 + 4 min ( P s , P r ) .
The broadcasting cut-set bound (241) may be achieved if the relay is allowed to delay its data and reschedule retransmissions independently. Furthermore, the relay has to inform the source how many layers were decoded for every block. We do not assume such feedback is available. The only feedback, in our channel model, is from destination to source indicating the number of successfully decoded layers.

5.2.2. DF Strategies

Consider first the simple DF relaying for an outage approach with single-level coding at source and relay. In single-level coding, the code rate from the source transmitter to the relay is determined by the fading gain threshold selected. For a power threshold s s , the code rate is R = log 1 + P s s s , and this same rate is transmitted from the relay to the destination with power P r , thus R = log 1 + P r s r , and s r = P s P r s s . Hence, the average achievable rate from the source to the destination is
R 1 , ave = P ( ν > s s ) P ( μ > s r ) log ( 1 + P s s s )
= ( 1 F ν ( s s ) ) ( 1 F μ ( s r ) ) log ( 1 + P s s s ) ,
where ν , μ are the fading gain random variables, F ν ( x ) , F μ ( x ) are the corresponding CDFs, and P s is the source transmission power. For a Rayleigh fading channel, with  F μ ( x ) = F ν ( x ) = 1 e x , the average rate is given by
R 1 , ave = e s s e P s P r s s log ( 1 + P s s s ) ,
and the maximal achievable rate is thus
R 1 L = max s s e s s e P s P r s s log ( 1 + P s s s ) .
Let the source perform two-level coding, and the relay has to decode as many layers as possible, depending on the fading realization. If successful in decoding both layers, it transmits a single-level code at a rate that is the sum of source rates. If only one layer was decoded successfully at the relay, it encodes it into a different single-level code, which is equal in rate to the first level of the source channel code. This gives higher flexibility in decoding of a single layer at the destination receiver when the channel conditions on the source-relay link allow only one layer detection at the relay. The channel code rate at the source is given by
R 1 s = log ( 1 + P s s s , 1 ) log ( 1 + ( 1 α s ) P s s s , 1 ) ,
R 2 s = log ( 1 + ( 1 α s ) P s s s , 2 ) ,
where 0 α s 1 , s s , 1 and s s , 2 are the fading gain thresholds implicitly specifying the layering rates. The rates of the single-level code at the relay are then given by
R 1 r = log ( 1 + P r s r , 1 ) , s . t . R 1 r = R 1 s ,
R 2 r = log ( 1 + P r s r , 2 ) , s . t . R 2 r = R 1 s + R 2 s ,
where s r , 1 and s r , 2 are determined from the rate equalities on the right hand side of (249). The overall average rate is then
R 2 1 , ave = max s s , 1 , s s , 2 , α s P ( s s , 1 ν < s s , 2 ) P ( μ > s r , 1 ) R 1 s + P ( ν > s s , 2 ) P ( μ > s r , 2 ) ( R 1 s + R 2 s )
= max s s , 1 , s s , 2 , α s F ν ( s s , 2 ) F ν ( s s , 1 ) ( 1 F μ ( s r , 1 ) ) R 1 s + 1 F ν ( s s , 2 ) ( 1 F μ ( s r , 2 ) ) ( R 1 s + R 2 s ) ,
where ν is the fading gain RV on the source-relay link, and μ is the RV on the relay destination link. This approach outperforms single-level coding at the source and two-level coding at the relay, described in the previous subsection. The main reason for this difference is that the outage approach described here adapts to the source-relay channel conditions. That is, the outage rate from the relay to the destination is equal to the decoded rate and depends on the number of successfully decoded layers (249). However, when considering the opposite approach (source: outage, relay: two-level), the outage rate is fixed for all channel conditions, and if the relay fails in its decoding, nothing is transmitted to the destination.

5.2.3. Continuous Broadcasting DF Strategies

  • Coding Scheme I—Source: Outage and Relay: Continuum Broadcasting. In this coding scheme, the source transmitter performs single-level coding. Whenever channel conditions allow decoding at the relay, it performs continuum broadcasting, as described in the previous subsection. Thus, the received rate at the destination depends on the instantaneous channel fading gain realization on the relay-destination link. Clearly, a necessary condition for receiving something at the destination is that channel conditions on the source-relay link will allow decoding. The source transmission rate is given by
R 1 s = log ( 1 + P s s s ) ,
and the corresponding achievable rate at the destination is given by
R r ( ν ) = 0 ν u ρ r ( u ) d u 1 + u I r ( u ) ,
where I r ( ν ) is the residual interference distribution function and its boundary conditions are stated in (4) and (5). The total rate transmitted in the broadcasting link is equal to the single-level code rate of the source-relay link, that is
R 1 s = 0 u ρ r ( u ) d u 1 + u I r ( u ) .
The above condition in (255) states a constraint on the optimization of the average rate. The average rate expression, considering the transmission scheme on the two links is
R ave = P ( ν > s s ) 0 d x f μ ( x ) 0 x u ρ r ( u ) d u 1 + u I r ( u )
= ( 1 F ν ( s s ) ) 0 d x ( 1 F μ ( x ) ) x ρ r ( x ) 1 + x I r ( x ) ,
where we have used partial integration rule. The average rate maximization problem can now be posed as
R 1 bs , ave = max s s , I r ( ν ) ( 1 F ν ( s s ) ) 0 d x ( 1 F μ ( x ) ) x ρ r ( x ) 1 + x I r ( x ) s . t . 0 u ρ r ( u ) d u 1 + u I r ( u ) = log ( 1 + P s s s ) .
As a first step in solving the maximal average rate, the residual interference distribution I r ( ν ) is found for every s s . That is
R 1 bs ( s r ) = max I r ( ν ) 0 d x ( 1 F μ ( x ) ) x ρ r ( x ) 1 + x I r ( x ) s . t . R 1 s = 0 u ρ r ( u ) d u 1 + u I r ( u )
= max I r ( ν ) 0 d x G 1 ( x , I r ( x ) , I r ( x ) ) s . t . R 1 s = 0 d x G 2 ( x , I r ( x ) , I r ( x ) ) ,
where I r ( x ) = d I r ( x ) d x . The necessary condition for extremum in (259) subject to the subsidiary condition, is in generally stated [59]
G 1 , I r + λ G 2 , I r d d x G 1 , I r + λ G 2 , I r = 0 ,
where G 1 , I r is the derivative of G 1 with respect to I r , and G 1 , I r is the derivative of G 1 with respect to I r . The scalar λ is also known as a Lagrange multiplier, and it is determined from the subsidiary condition in (259). The substitution of S I r G 1 , I r + λ G 2 , I r , and S I r G 1 , I r + λ G 2 , I r by using (259) results in
S I r = x 2 I r 1 F μ + λ ( 1 + x I r ) 2 ,
S I r = x 1 F μ + λ 1 + x I r ,
d S I r d x = ( x 2 I r 1 ) 1 F μ + λ ( 1 + x I r ) 2 .
Substituting the expressions in (262) into the extremum condition in (261) yields a general solution for the residual interference, as function of the Lagrange multiplier λ . This is summarized in the following proposition.
Proposition 4.
The relay broadcasting residual power distribution function I r ( x ) that maximizes the expected rate over the two-hop wireless fading channel (232) and (233) is given by
I r ( x ) = P 0 x x 0 1 F μ ( x ) + λ x f μ ( x ) f μ ( x ) x 2 x 0 x x 1 0 x x 1 ,
where x 0 and x 1 are determined from the boundary conditions I r ( x 0 ) = P and I r ( x 1 ) = 0 , respectively. The scalar λ is determined from the subsidiary condition in (259).
When considering a Rayleigh flat fading channel for the relay destination link, i.e., F μ ( x ) = 1 exp ( x ) , the residual interference distribution gets the following form
I r ( x ) = λ e x x 2 + 1 x 2 1 x , for x 0 x x 1 ,
and the condition I r ( x 1 ) = 0 provides
x 1 = 1 W L ( λ e ) ,
where W L ( x ) is the Lambert W-function, also called the omega function, and it is the inverse of the function f ( W ) = W e W . Interestingly, the subsidiary condition with (266) as the solution for I r ( x ) yields a simplified expression
R T = x 0 x 1 u ρ r ( u ) d u 1 + u I r ( u )
= 2 log ( x 1 ) x 1 ( 2 log ( x 0 ) x 0 )
= 2 log ( 1 W L ( λ e ) ) 1 + W L ( λ e )
2 log ( x 0 ) + x 0 ,
where (267) is used for substitution of x 1 . Using the subsidiary condition (259), i.e., R T = R 1 s , the solution of x 0 as function of λ is
x 0 = 2 W L 0.5 e log ( 1 W L ( λ e ) ) 0.5 + 0.5 W L ( λ e ) 0.5 R 1 s .
Finally, λ can be found by solving I r ( x 0 ) = P . Thus, all initial conditions are satisfied, the solution for λ is obtained by numerically solving the nonlinear equation specified by I r ( x 0 ) = P . The maximal rate R 1 bs , ave is then obtained by searching numerically over s s and evaluating R 1 bs , ave for all s s in the search.
  • Coding Scheme II—Source: Continuum Broadcasting and Relay: Outage. In this coding scheme, the source transmitter performs continuum broadcasting, as described in the previous subsection. The relay encodes the successfully decoded layers into a single-level block code. Thus, the rate of each transmission from the relay depends on the number of layers decoded. For a fading gain realization ν on the source-relay link, the decodable rate at the relay is
R s ( ν ) = 0 ν u ρ s ( u ) d u 1 + u I s ( u ) .
This is also the rate to be transmitted in a single-level coding approach, yielding
R 1 r ( ν ) = log ( 1 + P r s r ( ν ) ) ,
where s r ( ν ) is the fading gain threshold for decoding at the destination. In order to ensure equal source and relay transmission rates, it is required that R 1 r ( ν ) = R s ( ν ) . The average rate is then given by
R bs 1 , ave = max I s ( x ) 0 d x P ( μ s r ( x ) ) f ν ( x ) R s ( x )
= max I s ( x ) 0 d x ( 1 F μ ( s r ( x ) ) ) f ν ( x ) 0 x u ρ s ( u ) d u 1 + u I s ( u )
= max I s ( x ) 0 d x e x e s r ( x ) 0 x u ρ s ( u ) d u 1 + u I s ( u ) ,
where a Rayleigh fading distribution is assumed on the last equality, and
s r ( ν ) = 1 P r exp 0 ν d x x ρ s ( x ) 1 + x I s ( x ) 1 .
As may be noticed from (278), the functional subject to optimization in (275) does not have a localization property [59], and thus, it does not have a standard Euler-Lagrange equation for an extremum condition.
  • Coding Scheme III—Source and Relay: Continuous Broadcasting. In this scheme, both source and relay perform the optimal continuum broadcasting. The source transmitter encodes a continuum of layered codes. The relay decodes up to the maximal decodable layer. Then it retransmits the data in a continuum multi-layer code matched to the rate that has been decoded last. In this scheme, the source encoder has a single power distribution function, which depends only on a single fading gain parameter. The relay uses a power distribution that depends on the two fading gains on the source-relay and the relay-destination links.
In general, the source channel code rate as a function of the fading gain is the same one specified in (273). The rate achievable at the destination is then given by
R s ( ν , μ ) = 0 μ u ρ r ( ν , u ) d u 1 + u I r ( ν , u ) .
The maximal average rate is then specified by
R bs bs , ave = max I s ( ν ) , I r ( ν , μ ) 0 d x 0 d y f ν ( x ) f μ ( y ) 0 y u ρ r ( x , u ) d u 1 + u I r ( x , u ) s . t . 0 u ρ r ( x , u ) d u 1 + u I r ( x , u ) R s ( v ) ,
which may be simplified into
R bs bs , ave = max I s ( ν ) , I r ( ν , μ ) 0 d x 0 d y f ν ( x ) ( 1 F μ ( y ) ) y ρ r ( x , y ) 1 + y I r ( x , y ) s . t . 0 u ρ r ( x , u ) d u 1 + u I r ( x , u ) R s ( v ) .
In order to present an Euler–Lagrange equation here, the subsidiary condition in (281) still has to be brought to a functional form, and then it could be solved with the aid of the Lagrange multipliers.

5.2.4. AF Relaying

Consider a relay that cannot decode and encode the data, but rather it can only amplify the input signal. The channel model to consider here is the same one specified in (232) and (233). However, it may be assumed that the relay can estimate the input signal power and amplify the signal (without distortion) by a factor that ensures maximal transmission P r from the relay. In such a case, the amplification coefficient is given by
γ = P r P s | h s | 2 + 1 .
The equivalent received signal at the destination can be specified by
y d = γ h r h s γ 2 | h r | 2 + 1 x s + n r ,
where n r CN ( 0 , 1 ) and the original source signal is multiplied by a factor, which represents an equivalent fading coefficient with power
s b = γ 2 s r s s γ 2 s r + 1 = P r s r s s P r s r + P s s s + 1 ,
where s r = | h r | 2 and s s = | h s | 2 , and we have used the amplification factor definition from (282) for explicitly stating the equivalent fading gain. The CDF of the equivalent fading gain s b is then given by
F s b ( x ) = P ( s b < x ) = R d x s d x r f s s ( x s ) f s r ( x r ) ,
where
R = x r , x s [ 0 , ) | P r x r x s P r x r + P s x s + 1 x .
when assuming a Rayleigh fading channel, i.e., f s r ( x r ) = e x r and f s s ( x s ) = e x s , we have
F s b ( x ) = 1 P s P r x d x r x ( 1 + P r x r ) x r P r x P s d x s e x s e x r
= 1 P s P r x d x r e x r x ( 1 + P r x r ) x r P r x P s ,
which does not lend itself to a closed-form expression. In a broadcast approach, the transmitter performs continuous code layering, matched to the equivalent single fading gain RV. Using the equivalent channel model (283) and using the results of [23], the average received rate is given by
R bs , AF , ave = max I ( x ) 0 1 F s b ( x ) x I ( x ) 1 + x I ( x ) ,
where the optimal residual interference distribution I opt ( x ) is given by [23]
I opt ( x ) = P 0 x x 0 1 F s b ( x ) x f s b ( x ) f s b ( x ) x 2 x 0 x x 1 0 x x 1 ,
where x 0 and x 1 are determined from the boundary conditions I r ( x 0 ) = P s and I r ( x 1 ) = 0 , respectively. The maximal achievable rate is provided by the following proposition.
Proposition 5.
The maximal achievable expected rate of a two-hop AF-relay network is explicitly given by
R bs , AF , ave = x 0 x 1 d x 2 ( 1 F s b ( x ) ) x + ( 1 F s b ( x ) ) f s b ( x ) f s b ( x ) ,
where the CDF F s b ( x ) is specified in (286), and thus the corresponding PDF is given by
f s b ( x ) = d d x F s b ( x ) = P s P r x d x r P r x r ( 1 + P r x r ) ( P s x P r x r ) 2 e x r x ( 1 + P r x r ) x r P r x P s .
Finally, R bs , AF , ave (290) can be obtained via a numerical integration.

5.2.5. AQF Relay and Continuum Broadcasting

Now, let the source encoder perform continuum layering, and the relay, as before, amplifies its input signal, quantizes it with average distortion D, optimally in an MSE sense. The destination tries to first decode the quantized signal u q . Upon successful decoding, it decodes the multi-level code up to the highest layer possible, depending on the fading gain on the source relay link. In this setting, we consider single-level quantization. In broadcasting, it may be assumed that part of the original signal cannot be decoded. Therefore, it is modeled as additive Gaussian noise. The quantized signal, after suitable amplification and forward channel conversion, as a function of the source data, is given by
u q = β γ h s x s , s + β γ h s x s , I + β γ n s + n q ,
where n q is the equivalent quantization noise distributed according to CN ( 0 , β D ) , β = 1 D P r , γ = P r P s ν s + 1 with ν s = | h s | 2 , and x s , I represents the residual interference in the decoded signal. Consider a power distribution ρ ( ν s ) which is the source power distribution as function of the fading gain. Then the incremental rate associated with a fading ν s is
d R ( ν s ) = γ 2 ν s ρ ( ν s ) β 2 d ν s γ 2 + β D + γ 2 ν s I ( ν s ) β 2 ,
which simplifies after substituting γ and some algebra
d R ( ν s ) = ν s ρ ( ν s ) d ν s 1 + D β + ν s ( I ( ν s ) + P s D β ) ,
where the D β D / P r 1 D / P r . Thus, the average rate attainable, when u q is successfully decoded, is
R ave = 0 d ν s f ( ν s ) 0 ν s d R ( u )
= 0 ( 1 F ( ν s ) ) ν s ρ ( ν s ) d ν s 1 + D β + ν s ( I ( ν s ) + P s D β )
= 0 ( 1 F ( ν s ) ) ν s ρ N ( ν s ) d ν s 1 + ν s I N ( ν s ) ,
where the first equality is obtained by solving the integral in parts. The following relationships follow from the definitions of the normalized power distribution and residual interference:
ρ N ( ν s ) ρ ( ν s ) 1 + D β ,
I N ( ν s ) I ( ν s ) + D β P s 1 + D β ,
that satisfy ρ N ( ν s ) = I N ( ν s ) . For a given average distortion D, D β is also explicitly determined, and the maximal average rate R ave is achieved for
ρ N ( ν s ) = 2 ν s 3 1 ν s 2 ,
I N ( ν s ) = 1 ν s 2 1 ν s ,
on the range of ν s [ ν 0 , ν 1 ] , where the boundary conditions are I N ( ν 0 ) = P s and I N ( ν 1 ) = 0 . Thus, the range of the optimal solution is
ν 0 = 2 1 + 1 + 4 P s ,
ν 1 = 2 1 + 1 + 4 P s D β 1 + D β .
This rate is attainable only when the compressed signal may be decoded at the destination. Otherwise, an outage event occurs, and nothing can be restored from the original signal. Evidently, the event of outage depends only on the relay-destination link. Hence, the average achievable rate for the broadcast-amplify-quantize (BAQ) approach is formalized in the next proposition.
Proposition 6.
In the system model described by (232) and (233), with ν s known to relay and destination, and ν r known to destination only, the maximal average attainable rate in a BAQ scheme is specified by
R BAQ , ave = max D P ¯ out · 0 ( 1 F ( ν s ) ) ν s ρ N ( ν s ) d ν s 1 + ν s I N ( ν s ) ,
where the complementary outage probability is
P ¯ out = P log P r D log ( 1 + ν r P r ) .
The complementary outage probability for a Rayleigh fading channel reduces (305) into P ¯ out = e 1 D + 1 P r . Computing R BAQ , ave can be directly pursued, while optimizing the selection of the average distortion D, and directly computing the average rate for every D.
Figure 26 demonstrates the maximal attainable expected rates for the various relaying protocols. The numerical results correspond to Rayleigh fading channels on both source-relay and relay-destination links. A comparison of all relaying protocols (DF, AF, QF, AQF) is provided for equal SNR on both links, i.e., P r = P s . As may be noticed, the broadcasting for AF relay has the highest throughput gains for high SNRs. The AQF scheme with two levels of refinement at the relay, shows only a small gain in the overall expected throughput. This questions the possible benefits of higher levels of successive refinement at the relay, when the source performs only single-level coding.

5.3. Cooperation Techniques of Two Co-Located Users

The work in [178] considers the problem of communication between a single remote transmitter and a destination while being helped by co-located users, over an independent block Rayleigh-fading channel, as depicted in Figure 27. The users’ co-location nature allows cooperation, enabling a higher communication rate from the transmitter to the destination. The transmitter has no CSI, while receivers have access to perfect CSI. Under this channel model, cooperation between co-located users for a transmitter using a broadcast approach achieves higher expected rates. This is directly explained by the fundamentals of the broadcast approach, where the better the channel quality, the more layers that can be successfully decoded. The cooperation between the users is performed over AWGN channels, under a relay power constraint with unlimited bandwidth. Three cooperation techniques are considered: AF, CF, and DF. For the case of a relaxed decoding delay constraint, these techniques are extended by the broadcast approach. The high efficiency is obtained from multi-session cooperation as each session allows decoding more layers. Interestingly, closed-form expressions for infinitely many AF sessions and recursive expressions for the more complex CF can be derived.
The first cooperation strategy is based on the AF relaying by a network user to the destination user over the cooperation with the following variations.
  • Naive AF—A helping node scales its input and relays it to the destined user, who jointly decodes the relay signal and the direct link signal.
  • Separate preprocessing AF—A more efficient form of single-session AF is a separate preprocessing approach in which the co-located users exchange the values of the estimated fading gains, and each individually decodes the layers up to the smallest fading gain. The helping user removes the decoded common information from its received signal and performs AF on the residual signal to the destined user.
  • Multi-session AF—Repeatedly separate preprocessing is followed by a transmitting cooperation information at both helper and destination nodes (on orthogonal channels). The preprocessing stage includes individual decoding of the received information from the direct link and previous cooperation sessions. Along the cooperation sessions, transmission of the next block already takes place. It means that multi-session cooperation introduces additional decoding delays without any impact on the throughput. For this purpose, multiple parallel cooperation channels are assumed. For incorporating practical constraints on the multi-session approach, the total power of multi-session cooperation is restricted to P r . This is identical to the power constraint in single-session cooperation.
In the limit of infinitely many sessions, the multi-session cooperation channel capacity is C coop = P r . The other cooperation schemes (naive AF, and separate preprocessing AF) cannot efficiently use unlimited bandwidth. Single-session wide-band AF means duplicating the AF signal while proportionally reducing its power. This has no gain over narrow-band cooperation. Therefore a narrow-band cooperation channel is used for these two schemes, with C coop = log ( 1 + P r ) . Another set of cooperative strategies based on the WZ [190] CF relaying are:
  • Naive CF—A helping node performs WZ-CF over the cooperation link. The destination informs the relay of its fading gain realization prior to the WZ compression. The destination performs optimal joint decoding of the WZ compressed signal forwarded over the cooperation link, and its own copy of the signal from the direct link.
  • Separate preprocessing CF—Each user decodes independently up to the highest common decodable layer. Then WZ–CF cooperation takes place on the residual signal by WZ coding.
  • Multi-session CF— Multi-session cooperation, as described for AF, is carried out in conjunction with successive refinement WZ [193] CF relaying.
To analyze these models, consider the following SIMO channel
y i = h i x s + n i , i { 1 , 2 } ,
where y i is a received vector by user i, with length L, which is the transmission block length. The length L is assumed to be sufficiently large that transmission rates close to the mutual information are reliably decoded. x s is the original source transmitted vector, and n i is the additive noise vector, with complex Gaussian i.i.d. zero-mean and unit variance CN ( 0 , 1 ) , and h i is the (scalar) fading coefficient, which is perfectly known at the ith receiver. The fading h i is distributed according to the Rayleigh distribution h i CN ( 0 , 1 ) , and it remains constant for the duration of every transmission block (adhering to a block fading channel). It means that the two users have equal average SNR, which is realistic due to their co-location. Nevertheless, the results may be extended to the case of unequal average SNRs in a straightforward way. Receivers being co-located may also suggest channel realization correlation ( h 1 and h 2 ). In the case of such correlation, the cooperation gains are expected to be smaller since even the joint decoding channel capacity decreases. We assume, for simplicity of analysis, fully independent fading channel realizations. The cooperation link between the users are modeled by AWGN channels as follows:
y 2 , 1 ( k ) = x 1 ( k ) + w 1 ( k ) ,
y 1 , 2 ( k ) = x 2 ( k ) + w 2 ( k ) ,
where y 2 , 1 ( k ) is the length L helper’s received cooperation vector from the destination ( i = 1 ), on the kth cooperation link, and vise-versa for y 1 , 2 ( k ) . x i ( k ) is the cooperation signal from user i, on the kth cooperation link, and w i is the noise vector with i.i.d. elements distributed according to CN ( 0 , 1 ) . On a single-session cooperation k = 1 , and the power of x i ( 1 ) is limited by E [ | x i ( 1 ) | 2 ] P r (for i = 1 , 2 ). On a K-session cooperation there are K orthogonal cooperation channels available for each user with a total power constraint P r . The power constraint here is specified by
E k = 1 K | x i ( k ) | 2 P r .
Hence, K is also the bandwidth expansion that results from the multi-session cooperation. It is assumed that the next block’s receive can be performed while transmitting a cooperation message of previous blocks, that is, a full-duplex receiver. Cooperation is without interference, as orthogonal channels are assumed for this purpose. Naturally, the link capacity of a single-session narrow-band cooperation over the AWGN channel defined in (307) is given by C coop , NB = log ( 1 + P r ) .
In the limit of K with a power constraint for multi-session cooperation, the cooperation link capacity is given by
C coop , WB = 0 d R ( s ) = 0 log ( 1 + ρ ( s ) d s ) = 0 ρ ( s ) d s = P r ,
where the fractional rate of a session s is d R ( s ) and d R ( s ) = log ( 1 + ρ ( s ) d s ) . The fractional power at the sth session is ρ ( s ) . The multi-session power constraint implies
0 ρ ( s ) d s = P r ,
which justifies the last equality in (310).

5.3.1. Lower and Upper Bounds

To evaluate the benefit of cooperation among receivers in a fading channel following the model described in (306) and (307), we provide upper and lower bounds on relevant figures of merit. There are three types of bounds relevant to our channel model. The first is the outage capacity, which is the ultimate average rate achievable using a single-level code (without multi-layer coding). The second one is the achievable broadcasting rate, which refers to a scheme using a continuous broadcast approach. The last one is the ergodic capacity, which gives the ultimate upper bound on average rates by averaging maximal rates obtained with full transmitter CSI.
The lower bounds are obtained by considering no-cooperation. That is a single transmitter-receiver pair with no cooperating user. Therefore, all lower bounds are simple SISO fading channel capacities. Upper bounds refer to the case where a co-located helping node is available, and the two users can perform optimal joint decoding of their received signals. In all cases, the bounds relate to a Gaussian block fading channel, adhering to (306) and (307).
  • Outage lower bound. The single-layer coding expected rate is
R outage , LB = max u th > 0 ( 1 F ( u th ) ) log ( 1 + u th P s ) ,
where the optimal threshold u th that maximizes (311) is given by u th , opt = P s W ( P s ) W ( P s ) P s . The function W ( x ) is the Lambert-W function.
  • Broadcasting lower bound. This bound is based on an SISO block fading channel, with receive CSI. The maximal expected broadcasting rate [23], for a Rayleigh fading channel is
R bs , LB = e 1 e s 0 + 2 E 1 ( s 0 ) 2 E 1 ( 1 ) ,
where s 0 = 2 / ( 1 + 1 + 4 P s ) , and E 1 ( x ) is the exponential integral function.
  • Ergodic lower bound. Ergodic capacity of a general SIMO channel with m receiver antennas is [66]
C erg ( m ) = 0 u m 1 e u log ( 1 + P s u ) d u , m N ,
which simplifies for an SISO channel into
C erg , LB = C erg ( 1 ) = e 1 / P s E 1 ( 1 / P s ) .
  • Outage upper bound. Fully cooperating user bound is derived similarly to (311), with  F UB ( u ) as the fading gain distribution function.
  • Broadcasting upper bound. The broadcasting upper bound is a two receive antenna block fading channel. The expected broadcasting rate for a Rayleigh fading channel [23] is
R bs , UB = s 1 e s 1 e s 1 3 E 1 ( s 1 ) ( s 0 e s 0 e s 0 3 E 1 ( s 0 ) ) ,
where s 0 and s 1 are determined by the boundary conditions I UB ( s 0 ) = P s and I UB ( s 1 ) = 0 , respectively. The residual interference I UB ( x ) is given by I UB ( x ) = ( 1 + x x 2 ) / x 3 .
  • Ergodic upper bound. Ergodic bound for two receive antennas SIMO fading channel is C erg ( 2 ) in (313),
C erg , UB = C erg ( 2 ) = 1 + e 1 / P s E 1 ( 1 / P s ) 1 / P s e 1 / P s E 1 ( 1 / P s ) .
Figure 28 exemplifies the upper and lower bounds for two cooperating users.
  • Single-session cut-set upper bound. Another upper bound considered is the classical cut-set bound of the relay channel [40]. This bound may be useful for single-session cooperation, where the capacity of the cooperation link is rather small. Using the relay channel definitions in (306) and (307), and assuming a single cooperation session K = 1 , the cut-set bound for a Rayleigh fading channel is given by
C cut set = sup p ( x s ) , p ( x 2 ) min I ( x s ; y 1 | h 1 ) + I ( x 2 ; y 1 , 2 ) , I ( x s ; y 1 , y 2 | h 1 , h 2 )
= min C erg ( 1 ) + C coop , C erg ( 2 ) ,
where the ergodic capacity C erg ( m ) is given by (313), and the terms C erg ( 1 ) and C erg ( 2 ) are specified in (314) and (316), respectively. The cut-set bound is tight only when C erg ( 1 ) + C coop C erg ( 2 ) , since otherwise the cut-set bound coincides with the ergodic upper bound C erg , UB in (316).

5.3.2. Naive AF Cooperation

In this AF strategy, the helping node scales its input signal to the relaying power P r , and relays the signal to the destination user. The destination received signal at the destination, after AF relaying is
y b = y 1 , 2 ( 1 ) y 1 = α h 2 x s + α n 2 + w 2 h 1 x s + n 1 = ( β x s + w ˜ 2 ) · 1 + α 2 h 1 x s + n 1 ,
where y b is the signal to be decoded at the destination, and α scales the relay output to P r . Hence, α = P r 1 + P s s 2 , and s i = | h i | 2 . The normalized noise vector w ˜ 2 has i.i.d. elements distributed CN ( 0 , 1 ) . Hence, the normalized signal gain after the scaling of user i = 2 is
β = P r s 2 1 + P s s 2 + P r .
The achievable rate as a function of the channel fading gains is given by the following mutual information
I ( x s ; y b | h 1 , h 2 ) = log ( 1 + P s s b ) = log 1 + P s s 1 + P r s 2 1 + P s s 2 + P r ,
where s b = s 1 + β , and therefore, the equivalent fading s b is the broadcasting variable. The CDF of s b  [23] is
F s b ( x ) = P ( s b x ) = 0 d u f s 1 ( u ) 0 max 0 , x P r u 1 + P s u + P r d v f s 2 ( v ) ,
where f s i ( u ) is the PDF of s i . The CDF of s b , for a Rayleigh fading channel, is
F s b ( x ) = 0 x 0 1 e ( 1 + P r ) x P r P s x 0 ( 1 + P r ) x P r P s x d u · e u x + P r u 1 + P s u + P r 0 x < P r P s 1 0 d u · e u x + P r u 1 + P s u + P r x P r P s .
The corresponding PDF f s b ( x ) is given by
f s b ( x ) = 0 x 0 0 ( 1 + P r ) x P r P s x d u · e u x + P r u 1 + P s u + P r 0 x < P r P s 0 d u · e u x + P r u 1 + P s u + P r x P r P s
This provides the single-layer and broadcasting expected rates for the naive AF. The transmitter performs broadcasting optimized on fading gain random variable s b from (322). The maximal expected rate is expressed as follows
R bs , ave = max I ( u ) 0 d u ( 1 F s b ( u ) ) ρ ( u ) u 1 + I ( u ) u ,
where F ν ( u ) is the fading gain CDF.
Proposition 7.
The optimal power distribution, which maximizes the broadcasting achievable expected rate for naive AF cooperation is given by
I NAF ( u ) = P s u < u 0 1 F s b ( u ) u · f s b ( u ) u 2 f s b ( u ) u 0 u u 1 0 u > u 1 ,
where u 0 and u 1 are obtained from the boundary conditions I opt ( u 0 ) = P s and I opt ( u 1 ) = 0 , respectively. The equivalent fading gain distribution F s b ( x ) and f s b ( x ) are specified in (323) and (324), respectively.
The broadcasting gain is compared to the single-layer coding under the same fading gain distribution. Using the equivalent SISO channel model, which is governed by s b with CDF F s b ( u ) in (323), the optimal power allocation for naive-AF can be specified following (326). Note that I NAF ( u ) is non-increasing, starting from P s at u = 0 . The average rate is explicitly given by
R NAF = 0 d x 2 ( 1 F s b ( x ) ) x + ( 1 F s b ( x ) ) f s b ( x ) f s b ( x ) .
The first derivative of the PDF of s b is denoted by f s b ( x ) .

5.3.3. AF with Separate Preprocessing

In this section, every node tries to decode independently as many layers as possible. Then both users exchange the index of the highest layer successfully decoded. Every node re-encodes the decoded data of each layer up to the lowest common index and removes it from the original received signal. The helping node scales the result to power P r and relays it over the cooperation link to the destination. This improves on the naive AF, as the cooperation is more efficient, though it requires the helping node to be aware of the source codebook and be able to decode its transmission. Like the naive AF, this is a single-session K = 1 cooperation. The received signal at the helping node can be expressed as
y 2 = h 2 ( x s , D + x s , I ) + n 2 ,
where x s , D is the part of the source data successfully independently decoded by helping node i = 2 . The coded layers not decoded independently x s , I are actually the residual interference signal.
When s 1 s 2 , the decoded data in x s , D include layers up to s 2 . This reflects in the residual interference power I ( s ) , where s is the fading gain equivalent. The residual signals at both sides (before a cooperation session) are
y 1 , I = h 1 x s , I ( s 2 ) + n 1 ,
y 2 , I = h 2 x s , I ( s 2 ) + n 2 .
It may be shown, similarly to AF derivation, that the equivalent fading gain, after AF relaying y 2 , I , is (331). Generally speaking, the helping node removes only common information from its input signal and relays the scaled residual signal to the destination. The destination user receives a relayed residual signal, containing only its undecoded layers when s 2 s 1 . Otherwise, the helping node transmits its scaled residual interference, including some layers that could be independently decoded by the destination. The equivalent fading gain observed by the destination and its distribution are stated in the following proposition.
Proposition 8.
In an AF with separate preprocessing cooperation strategy, with a single cooperation session K = 1 with a limited power P r , the highest decodable layer is associated with an equivalent fading gain determined by
s a = s 1 + P r s 2 1 + s 2 · max ( I ( s 1 ) , I ( s 2 ) ) + P r ,
with the following CDF for a Rayleigh fading channel
F s a ( x ) = 0 ϕ 1 1 ( x ) [ exp ( 2 u ) exp u ϕ 2 ( u ) exp u ϕ 3 ( u ) ] d u ,
where
ϕ 1 ( u ) = u + u P r 1 + u I ( u ) + P r ,
ϕ 2 ( u ) = max u , x u P r 1 + u I ( u ) + P r ,
ϕ 3 ( u ) = max u , ϕ 4 ( x u ) ,
ϕ 4 ( x u ) = ( 1 + P r ) ( x u ) P r I ( u ) ( x u ) P r I ( u ) ( x u ) > 0 P r I ( u ) ( x u ) 0 .
Additional details are available in [178].

5.3.4. Multi-Session AF with Separate Preprocessing

Next, we discuss K multi-session AF with separate preprocessing per session. The total power allocation per transmitted codeword for all sessions corresponding to its decoding is P r , in the limit of K = . In this approach, common layers are subtracted before every AF session by both users. After every AF relaying, each node attempts to decode more layers using all received AF signals so far and its own received signal. It should be emphasized that the multi-session is performed over parallel orthogonal channels in such a way that the source transmission is block-wise continuous. For example, during the kth cooperation session of the 1st transmitted block (from the source), the first cooperation session for the k 1 transmitted block takes place. As the overall multi-session power is limited to P r , at every block epoch, the total power of P r is used.
As parallel channels are used for cooperation, with infinitesimal power ρ ( s ) allocated per channel, this wide-band cooperation link’s capacity is the capacity of the corresponding parallel channel. The power allocation is 0 ρ ( s ) d s = P r under the constraint of P r . The fractional rate per sub-band is then d R ( s ) = log ( 1 + ρ ( s ) d s ) = ρ ( s ) d s , [58]. Therefore, the average capacity of this wide-band cooperation link, regardless of the actual power allocation density, is C coop = P r  (310). Notice that we use AF, which cannot effectively use such capacity increase in single-session cooperation ( P r > log ( 1 + P r ) ). This capacity is available in two directions: relay-destination and destination-relay. It is required that information is exchanged in both directions. Otherwise, multi-session cooperation becomes inefficient, and unidirectional transmission, of only the relay to the destination, will not gain from multi-session relaying. In the case of unlimited sessions, the scalar equivalent fading gain can be derived for a given broadcasting power allocation I ( s ) .
Proposition 9.
In a multi-session AF ( K , cooperation power constraint P r ) with separate preprocessing cooperation strategy, the highest decodable layer is associated with an equivalent fading gain determined by
s ms = s a * s 1 s 2 s b * s 1 < s 2 ,
where s b * is the solution of
s 2 s b * s 1 ( s 1 + s 2 σ ) 2 [ 1 + s 1 I ( σ ) ] d σ = P r ,
and by using s b * ,
s a * = s 1 + s 2 · Z ( s b * ) 1 + Z ( s b * ) ,
where
Z ( s ) = s 2 s 1 + s 1 I ( σ ) ( 1 + s 2 I ( σ ) ) s 1 ( s 1 + s 2 σ ) d σ .
Similarly, achievable rates are obtained for naive CF and CF with separate preprocessing [178].

5.3.5. Multi-Session Wyner–Ziv CF

In this cooperation scheme, both nodes can quantize and compress their received signals and exchange the result via a cooperation session. The compression is performed by the WZ [190] algorithm using side information at the decoder. For this to be performed, several definitions are required. Notice that each WZ compression step can use all information collected in the previous sessions in the form of side information. Define
y ^ 1 ( k ) = y 1 + n c , 1 ( k ) ,
where n c , 1 ( k ) is independent of y 1 , as the compressed signal that is transmitted from i = 1 to the co-located user i = 2 . We refer the reader to [193], for successive Wyner–Ziv overview. Here, we deal with the case where the message that is transmitted in each session has better side information than the previous session since more layers are decoded. Furthermore, the second session can use the information sent by all the previous sessions in order to improve performance. Since the power that is used by each session is a control parameter, rather than a fixed parameter, the use of an auxiliary variable that is transmitted during a session, but decoded only at the next session is superfluous (due to the better side information, declared as V in [193]). Next, using [193], the following Markov chain is defined, where unlike [193], we are interested in independent averaged distortion, rather than plain averaged distortion. The main feature here is that the compression noise n c , i ( k ) should decrease from iteration to iteration, ending up with a sequence of degraded channels y ^ i ( k ) , following the Markov chain:
y 2 x s y 1 y ^ 1 ( k ) y ^ 1 ( k 1 ) y ^ 1 ( 1 ) ,
y 1 x s y 2 y ^ 2 ( k ) y ^ 2 ( k 1 ) y ^ 2 ( 1 ) .
The equivalent fading gains after every iteration of the multi-session cooperation are stated in the following proposition.
Proposition 10.
The achievable rate in the multi-session with separate preprocessing and successive refinement WZ is given in a recursive form for the kth session,
R W Z ( k ) = E s ms ( k ) log ( 1 + s ms ( k ) P s ) ,
where
s ms ( k ) = s a ( k ) s 1 s 2 s b ( k ) s 1 < s 2 ,
and
s a ( k ) = s 1 + s 2 1 + ( σ 2 ( k ) ) 2 ,
s b ( k ) = s 2 + s 1 1 + ( σ 1 ( k ) ) 2 ,
and
σ j ( k ) 2 = σ j ( k 1 ) 2 1 + s j I ( s ( k 1 ) ) + s 3 j I ( s ( k 1 ) ) ( 1 + s 3 j I ( s ( k 1 ) ) ) 1 + δ j ( k ) 1 + σ j ( k 1 ) 2 + s j I ( s ( k 1 ) ) ( 1 + δ j ( k ) ) ,
where σ j ( k ) is specified in (347) for j = 1 , 2 , and δ j ( k ) is the fractional power assigned to user j for the kth cooperation session.
Figure 29 compares the variation of the average rates versus the cooperation link quality ( P r / P s ) achieved by the naive AF, separate preprocessing AF, multi-session AF, and narrow-band naive CF. It is observed that the gains of separate preprocessing AF over the naive approach increase with decreasing P r / P s . For P s = 20 dB, both approaches achieve gains over the outage upper bound for P r / P s 0 dB. For moderate to high P s and P r , the multi-session AF approximates the broadcasting upper bound. Again, the naive CF outperforms all other approaches and approximates the broadcasting upper bound even on a wider range of P r values.

5.4. Transmit Cooperation Techniques

Relaying strategies of a relay close to the source transmitter are considered in [179]. The source-relay channel is assumed to be a fixed gain AWGN due to their colocation, while the source-destination and the relay-destination channels are subject to a block flat Rayleigh fading. A perfect CSI is assumed only at the respective receivers. With the expected throughput as a performance measure, [179] incorporates a two-layer broadcast approach into a cooperative strategy based on the DF scheme, referred to as SDF. The SDF strategy’s achievable rate expressions are derived under the broadcast approach for multiple settings, including single-user MISO and the general relay setting using successive decoding technique, both numerically and analytically.
The system consists of a source terminal s communicating with a destination receiver, denoted by d. The multi-terminal network may consist of a helping terminal r. The helping terminal is occasionally present, and when available, it is near the source. However, the source is not aware of the relay’s existence or availability. This model is motivated by the nature of wireless sensor networks. In such networks, numerous sensors intended to gather some information from the environment are deployed over a limited area. The sensors usually transmit information to a control point, which may have high processing capabilities. The dense deployment, along with autonomous functionality required from each sensor, leads to the concepts of collocation and obliviousness of cooperation among sensors.
The information is transmitted over a shared wireless medium where transmission received by the destination is subject to block flat Rayleigh fading. The fading coefficients between the source and the destination denoted by h s , and between the relay and the destination denoted by h r , are modeled by two independent zero-mean unit variance complex Gaussian RVs and are assumed to remain constant over a transmission block of N symbols, with N large enough to allow Shannon theoretic arguments to hold. Since the source and the relay are physically collocated, the channel gain between the two is assumed to be Q e j θ , where Q is a fixed power gain (known to all), and θ is a random phase uniformly distributed RV over π , π , which is assumed fixed during a transmission block of N symbols and independent from one block to the next.
During the transmission period of one fading block, the relay (if one exists) can assist the source in relaying the message to the destination. Unaware of the relay’s presence, the source assumes that in the worst case, it is the only active transmitter, optimizing its transmission for the SISO channel. When the relay exists, the received signals at the relay and the destination at time n, n = 1 , , N , are modeled by
y r n = Q x s n + n r n ,
y d n = h s x s n + h r x r n + n d n ,
where y r ( n ) and y d ( n ) are the received signals at the relay and destination, respectively. The signals x s ( n ) and x r ( n ) designate the source and relay transmitted signals, respectively. The AWGN samples are denoted by n r ( n ) , n d ( n ) and they are distributed as CN ( 0 , 1 ) . Without a helping relay, the received signal at the destination is given by
y d n = h s x s n + n d n .
For brevity, the fading gains are denoted by ν s = h s 2 and ν r = h r 2 each of which is exponentially distributed with unit mean.

5.4.1. Single-Layer Sequential Decode-and-Forward (SDF)

In the SDF strategy [173,176], the source transmits a single layer coded signal at the rate R. The relay (if present) remains silent while trying to decode the single-layer message. Once it can decode the message (after accumulating enough mutual information), it starts transmitting the message, acting as a second transmit antenna. If it is unable to decode the message before the block ends, it remains silent throughout the block, and no further cooperation occurs. The term sequential decode-and-forward emphasizes that the relay first decodes the entire message and only then starts sending its codeword. The mutual information at the relay is log 1 + P s Q , which means that a relay will decode a rate R message for R log 1 + P s Q . Define ε as the fractional time within the transmission block which the relay uses to decode the message, i.e., ε = Δ min 1 , R log 1 + P s Q , ε ¯ = 1 ε . The expected throughput for a Rayleigh fading channel is expressed by
R ave SDF = R · e e R 1 P s + 0 e R 1 P s exp e R ε log 1 + ν P s ε ¯ 1 ν P s P r exp ( ν ) d ν R log 1 + P s Q e e R 1 P s R > log 1 + P s Q .
The expected throughput R ave SDF for R > log 1 + P s Q is also equal to the achievable rate without a relay, which serves as the oblivious cooperation lower bound.

5.4.2. Continuous Broadcasting

Consider the problem of oblivious relaying where the transmitter performs continuous layering. It is assumed that when the relay exists, it first decodes the entire message from the source and then starts its transmission. Under a collocation assumption, the relay decoding time may be negligible compared to the transmission block duration. This setting of negligible relay decoding delay is called informed SDF. The informed SDF protocol assumes that the helping relay, when available, is informed of the transmitted packets in advance. Thus, when a relay is available, it helps throughout the transmission block.
Denote the power density at the transmitter by ρ s s and its corresponding residual interference function by I s s , where I s s 0 = P s and I s s 1 = 0 . The layering power density at the relay is denoted by ρ r s . The relay residual interference function I r s maximizing the expected throughput in presence of a helping relay is the subject for optimization. The relay power constraint is I r s 0 = P r . As the optimization problem does not lend itself to a closed-form solution for a general power distribution I r ( s ) , a suboptimal I r s is proposed. Consider a relay power distribution of the form
I r s = P r P s I s s .
The selection of such a power distribution (352) may be analytically analyzed using a single-variable function as a subject for optimization via the calculus of variations. Any general selection of I s ( s ) and I r ( s ) requires optimizing two functionals, and does not seem to have a closed-form analytical solution. This general problem remains a subject for further research. Under the power allocation in (352) the equivalent fading gain of the combined source and relay signals takes the form of s eq ν s + P r P s ν r . The CDF of s eq is thus
F s eq s = F s = 1 e s s e s a = 1 1 + e s a 1 + a e s a 1 a otherwise ,
where a P r P s . It is clear that the expected throughput may be directly computed, as I s ( s ) is the source optimal power allocation [23], and the relay uses the mentioned I r s = P r P s I s s . We call this setting relay broadcasting. In order to evaluate the oblivious cooperation gain, the achievable expected throughput can be compared to the 2 × 1 MISO setting, where a single source with two antennas transmits using a continuous layering coded signal. This serves as a tight upper bound and is termed MISO broadcasting.

5.4.3. Two Layer SDF—Successive Decoding

Previous subsections presented achievable rates for the single-layer and for the continuous broadcasting approaches. This subsection focuses on a practical layering approach, involving only two coded layers. Two coded layers are incorporated within the SDF schemes, and achievable rates are studied. Lower and upper bounds are derived first, and then achievable rates are formulated. More details are available in [179]. The general problem can be formulated by considering a transmitter using a two-layer coding approach with a power per layer defined by α P s and α ¯ P s , where α ¯ 1 α . Accordingly, the rate per layer is defined by
R 1 = log 1 + η 1 α P s 1 + η 1 α ¯ P s ,
R 2 = log 1 + η 2 α ¯ P s ,
where η 1 < η 2 can be interpreted as equivalent fading gains for reliable decoding of the ith layer. In oblivious relaying, the source power allocation per layer, defined by α , is set such that the expected throughput is maximized without a relay. When a helping relay is available, the source keeps using the power allocation α , while the relay allocates β P r and β ¯ P r for the first and second layer, respectively. Under SDF relaying, the relay has to decode the message before transmitting it. The relay fractional decoding time, ε r i of the ith layer, is
ε r 1 min 1 , R 1 log 1 + Q α P s 1 + Q α ¯ P s ,
ε r 2 min 1 , max ε r 1 , R 2 log 1 + Q α ¯ P s ,
where ε r i specifies the fractional time for the relay to gain sufficient mutual information to decode the ith layer. Note that due to successive decoding, the second layer decoding cannot be shorter than its preceding layer. Using the fractional decoding times, it is required to derive the mutual information at the destination for each of the layers. When the relay requires more time to decode the second layer, it may begin allocating all its power P r for the first layer. Only once the second layer decoding is complete does the relay begin transmitting using β P r and β ¯ P r allocated power per layer. The mutual information for decoding the first layer is given by
I SDF , 1 = ε r 1 log 1 + ν s α P s 1 + ν s α ¯ P s + ε r 2 ε r 1 log 1 + ν s α P s + ν r P r 1 + ν s α ¯ P s
+ 1 ε r 2 log 1 + ν s α P s + ν r β P r 1 + ν s α ¯ P s + ν r β ¯ P r ,
where ν s and ν r are the fading gain realizations of the source-destination and the relay-destination links, respectively. The coefficients ε r 1 , ε r 2 are the relative time for the relay to gain sufficient mutual information to decode the first layer and second layer, respectively. The mutual information associated with the second layer is
I SDF , 2 = ε r 2 log 1 + ν s α ¯ P s + 1 ε r 2 log 1 + ν s α ¯ P s + ν r β ¯ P r .
The expected throughput achievable at the destination, with a helping relay, can be computed by using (354) and (360), to obtain
R ave BSDF = R 1 · P I S D F , 1 > R 1 I S D F , 2 < R 2 + R 1 + R 2 · P I S D F , 1 > R 1 I S D F , 2 > R 2 ,
which can be maximized over α , β , η 1 , η 2 . We assume that ε r 1 = ε r 2 , implying simplex relay. This means the relay transmits only after completing the decoding of both layers.
A lower bound for the achievable rate of oblivious relaying is considered here. In an oblivious setting, the maximal expected throughput without a helping relay is called a direct transmission rate. This rate serves as the lower bound to achievable rates for the relay channel.
Proposition 11.
The oblivious relaying lower bound, i.e., single user direct transmission expected throughput is
R ave BSU = R 1 P η 1 < ν s < η 2 + R 1 + R 2 P ν s > η 1 ν s > η 2 ,
where R 1 , R 2 are the two-layers’ rate allocation, and η 1 , η 2 are the fading gain threshold for decoding the first layer and second layer, respectively.
The expected rate R ave BSU can be optimized over α , η 1 , η 2 to maximize (362), and provide a tight lower bound. In an oblivious setting, it remains to optimize the relay layering power allocation, i.e., β , to maximize R ave BSDF in (361).
The MISO achievable rates serve as upper bounds, reflecting full cooperation among transmitters. As the relay and source might have different power allocations, it is required to study the problem of MISO layering with individual power constraints per antenna. Consider first a sub-optimal approach where the same fractional power allocation per layer is used per antenna. In our setting this means α = β in (358) and (360), i.e., the first layer power allocation of the source and the relay is α P s and α P r , respectively. The expected rate then, similarly to (361), becomes
R ave BMISO = R 1 P log 1 + Y 1 + α ¯ Y > R 1 log 1 + α ¯ Y < R 2 + R 1 + R 2 P log 1 + Y 1 + α ¯ Y > R 1 log 1 + α ¯ Y > R 2 ,
where Y P s ν s + P r ν r . For a Rayleigh fading channel the CDF of Y is given by
F Y u = 1 P r P s P r e u P r P s e u P s P s P r 1 + u P s e u P s P s = P r .
Now, consider the more general setting for the MISO layering problem, where source and relay layering power distribution are not necessarily equal, i.e., α β . The following result derived via explicit evaluation of the decoding probabilities quantifies the average throughput achievable by letting the relay use an independent power allocation.
Proposition 12
([179]). For a 2 × 1 MISO, a channel model described by (348) and independent predetermined power allocation coefficients α , β , the average throughput is given by
R ave BVMISO = R 1 k e η 1 k 1 + R 2 e ν s 2 k η 1 ν s 2 k 1 + n e η 2 e ν s 2 n η 2 ν s 2 n 1 1 e R 1 β ¯ 0 R 1 k e η 1 e k η 1 k 1 + R 2 e ν s 1 k η 1 ν s 1 e k η 1 k 1 + n e η 2 e ν s 1 n η 2 ν s 1 n 1 1 e R 1 β ¯ > 0 ,
where n = Δ α ¯ P s β ¯ P r , k = Δ α P s β + η 1 P s β α P r , and where
ν s 1 0 α ¯ η 2 β ¯ > α η 1 β + η 1 P s β α α η 1 β ¯ + α ¯ η 2 β + η 1 P s β α α ¯ β + η 1 P s β α α β ¯ otherwise ,
ν s 2 α η 1 β ¯ + α ¯ η 2 β + η 1 P s β α α ¯ β + η 1 P s β α α β ¯ .
It is evident from the above proposition that the relay’s power allocation has a crucial effect on the achievable rate, and a powerful relay does not guarantee a high achievable rate unless equipped with appropriate power allocation. For an equal layering power allocation, i.e., α = β , (365) reduces to (363) as ν s 1 = 0 . A step in determining an optimal power allocation for the MISO is taken in the following proposition, which establishes the optimal power allocation for an asymptotic source power and a constant ratio of source to relay powers.
Proposition 13
([179]). For a 2 × 1 MISO setting satisfying P s , P r , and P s P r = c under the channel model described by (348), the equal power allocation is optimal.

5.5. Diamond Channel

Next, we review the two-hop transmission from a source to destination via two parallel full-duplex relay channel, which is investigated in [180]. Similarly to the general theme of this paper, the transmitter and the relays are oblivious to their forward links to their next hops, while being aware of their backward channel from the previous one.
As shown in Figure 30, the transmitter sends a signal x, and it is received by both relay nodes. The signal received by relay i { 1 , 2 } is given by
y r i = h r i x + n i ,
where h r i follows a Rayleigh fading process and n i accounts for the AWGN. The signal received by the receiver from the concurrent transmissions by the relays is
y = h 1 x r 1 + h 2 x r 2 + n ,
where h i follows a Rayleigh fading process and n is the AWGN. The relays can be in the half- or full-duplex modes. Accordingly, the channel gains are defined as s i = | h i | 2 and s r i = | h r i | 2 .
A relevant metric to assess the broadcast approach’s performance is the average rate that can be sustained reliably between the source and the destination, maximized over all possible allocations of power across different information layers at the transmitter and the relays. Each overall channel realization is the combination of the realizations of four distinct and independently varying channels. A relevant notion of degradedness in the channel can be specified based on the source-destination rate that the channel can support. Based on this, channel realizations are rank-ordered based on the aggregate rate they support. The transmitter designates one layer per realization, and the receiver at each channel realization decodes all the layers designated to that realization and those designated to the weaker ones. This strategy is next reviewed under different relaying strategies.

5.5.1. Decode-and-Forward

In this scheme, a transmitter generates K information layers denoted by { x 1 , , x K } , which are adapted to K discrete channel gains. The first baseline layer is designed to be decoded by the relays when the gain of the channels linking the source to the relays is at least s 1 , i.e., relay i decodes x 1 when s r i a 1 . Similarly, in general, layer k is designed to be decoded by the relays when s r i a k . Hence, the fraction of the power allocation to layer k { 1 , , K } is denoted by γ k . The incremental rate allocated to layer k is
R k = log 1 + γ k a k 1 + j = k + 1 K γ i a k .
Each relay starts decoding the information layers from the baseline layer 1 up to the layer that its actual channel realization affords. This results in the two relay nodes decoding a different number of information layers. Denote the number of layers decoded by relay 1 and relay 2 by M 1 and M 2 , respectively. Relay i then superimposes all the M i information layers and allocates α i j fraction of its power to layer j { 1 , , M i } , with the rest being allocated power 0, i.e., α i j = 0 for j { M i + 1 , , K } . Hence, the message transmitted by relay i is
x r i = j = 1 K α i j x j .
Since each relay is oblivious to the channel and power distribution of the other relay, due to the symmetry involved, it is assumed that power distributions are the same in both schemes. It is shown in ([180], Theorem 2) that if power distribution across the layers is identical in both relays, then the relay signals must be uncorrelated in order to achieve the maximum expected rate. Hence, each relay’s code construction is based on assuming a similar power distribution for the other relay. The two relays adopt a transmission scheme that mimics the space-time block codes, implemented in a distributed way. Specifically, consider the time-slotted transmission in which the signal transmitted by relay i { 1 , 2 } at time t is denoted by X i ( t ) . At time t, transmitter 1 transmits j = 1 K α 1 j x j ( t ) and transmitter 2 transmits j = 1 K α 2 j x j ( t + 1 ) . Subsequently, at time t + 1 , transmitter 1 transmits j = 1 K α 1 j x j * ( t + 1 ) and transmitter 2 transmits j = 1 K α 2 j x j * ( t ) . Hence, the received signal at the destination is
y ( t ) y * ( t + 1 ) = i = 1 K h 1 α 1 i h 2 α 2 i h 2 * α 2 i h 1 * α 1 i x i ( t ) x i ( t + 1 ) + n ( t ) n * ( t + 1 ) .
By capitalizing on the structure, the destination decouples the received signal into two parallel streams of signals by post-multiplying the received vector on the left side of (372) by
h 1 * α 1 i h 2 α 2 i h 2 * α 2 i h 1 α 1 i .
Based on this approach, the interference power imposed when decoding layer i by the destination is
I i = ( s 1 α 1 i + s 2 α 2 i ) j = i + 1 K ( s 1 α 1 j + s 2 α 2 j ) .
Therefore, the probability of successfully decoding layer k at the destination is
P k = P s 1 α 1 k i + s 2 α 2 k 1 + j = k + 1 K ( s 1 α 1 j + s 2 α 2 j ) γ k a k 1 + i = k + 1 K γ i a k .
Hence, the expected achievable rate is
R ave = k = 1 K P k R k = k = 1 K P k log 1 + γ k a k 1 + j = k + 1 K γ i a k .
An optimal allocation of power across different layers can be found by maximizing the average sum-rate. A toy example showing the details and some steps involved is available in [180].

5.5.2. Amplify-and-Forward

In this relaying mode, only the destination node decodes the information layers and the relay nodes only amplify what they receive. To coherently decode the signals, the destination deploys a distributed space-time code permutation along with the threshold-based ON/OFF power scheme, which is known to improve the performance of AF relaying. In this scheme, relay i will remain silent if the channel gain s r i is smaller than a pre-specified threshold a th . Otherwise, each relay completes its transmission in two consecutive time slots. In time t, relay 1 transmits c 1 y r 1 ( t ) and relay 2 transmits c 2 y r 2 ( t + 1 ) . In time slot t + 1 , relay 1 transmits c 1 y r 1 * ( t + 1 ) and relay 2 transmits c 2 y r 2 * ( t ) , where coefficients c 1 and c 2 are selected properly to satisfy the power constraints. At the destination, the received vector
y ( t ) y * ( t + 1 )
is multiplied by
h r 1 h 1 c 1 h r 2 h 2 c 2 h r 2 * h 2 * c 2 h r 1 * h 1 * c 1 H ,
transforming the channel into two parallel channel, yielding the following mutual information between the transmitter and the receiver
I ( x ; y ) = log 1 + s r 1 s 1 c 1 2 + s r 2 s 2 c 2 2 1 + s 1 c 1 2 + s 2 c 2 2 · P .
Hence, the average rate of this channel can be found by averaging I ( x ; y ) over the distributions of all the channel gains involved. Subsequently, the maximum average rate can be found by averaging the mutual information across different realizations of the channels.

5.6. Multi-Relay Networks

Motivated by addressing the distributed nature and delay sensitivity of modern communication systems, the study in [181] investigates a network consisting of a source-destination pair, the communication between which is assisted by M T relays. The source is connected to the relays via a broadcast channel, and the relays have orthogonal channels to the destination. There is no direct link between the transmitter and the receiver. The signal received by relay i { 1 , , M T } during time slot t { 1 , , n } is given by
y r i ( t ) = x ( t ) + n i ( t ) ,
where x ( t ) and n i ( t ) represent the transmitted signal by the source and the AWGN. The channel between each relay and the destination has a finite capacity denoted by C. Furthermore, the relays will have a non-ergodic failure profile, and it is assumed that at any given time, a random number of relays denoted by M { M 0 , , M T } are functioning, while communication by the rest is erased for the entire duration of a transmission. M 0  denotes the minimum number of relays that are functioning at any given time, and define p = [ p M 0 , , p M T ] as the probability mass function of M.
The success/erasure model of the relay-destination links provides a context for defining degradedness among different realizations. Specifically, a realization that has m functioning relay-destination links will be considered degraded with respect to the one with n > m functioning links. Based on this, the transmitter splits its messages into M T M 0 + 1 independently generated information layers { W M 0 , , W M T } with rates { R M 0 , , R M T } . When there are M = m active relay-destination links, the destination decodes information layers { W M 0 , , W M T } , rendering a total rate of R m T = i = 1 m R i . Subsequently, the average rate in the channel is
R ave = m = M 0 M T p m R m T .
Two distinct settings will be discussed next: the oblivious relays setting, in which which the relays are oblivious to the codebooks used by the source, and the non-oblivious relays settings in which the relays are informed about the codebooks used by the source.

5.6.1. Oblivious Relays

In this setting, a relay performs a stochastic mapping from the message set to a codeword. This stochastic mapping depends on a random key F F that is revealed to the destination, but it is unknown to the relays. By appropriately choosing a probabilistic model for F, it is possible to model a scenario in which the signal transmitted by the source is i.i.d. over the codeword elements. At each relay, being oblivious to the codebook F, the relay maps its received sequence to an index in the set { 1 , , 2 n C } . Finally, the destination uses the relays’ indexes, the knowledge of the codebook F, and the actual number of active relay-destination links, decode the layers associated with the number of active relay-destination links. By restricting the input to be Gaussian, it is shown in [181] that the average capacity of the channel is upper bounded by
C ave max m = M 0 M T p m i = 1 m R i ,
where
R m = 1 2 log 1 + m β m P 1 + m σ m 2 + m P k = m + 1 M T β k .
The maximization in (382) is taken with respect to parameters β m 0 , which satisfy
m = M 0 M T = 1 ,
and σ m 2 is defined as
σ m 2 = 1 m + P 2 2 m C 1 1 .
Motivated by the structure of this upper bound, [181] proposes a broadcast approach and single-description compression at the relays. In this approach, each relay sends over the relay-destination link a single index (description), which is a function of its received signal. The compression/decompression scheme is inspired by the technique used in [194] for robust distributed source coding in a CEO problem. The technique works by performing random binning at the agents, as is standard in distributed compression. Moreover, the test channel (i.e., equivalent compression noise) and binning rate are selected so that the receiver can recover with high probability the compressed signals on the M active links irrespective of the realized value of M as long as it is M M 0 (as guaranteed by assumption). In other words, the design of the compression scheme targets the worst-case scenario of M = M 0 . Notice that, should more than M 0 links be active M > M 0 , the corresponding compressed signals would also be recoverable at the receiver, since, by the design of the binning rate, any subset of M 0 descriptions can be decompressed [194]. After decompression is performed, the receiver uses all the M signals obtained from the relays to decode the codewords up to the Mth layer (that is, the layers with rates R m with M 0 m M ). Under this transmission scheme, the achievable average rate is
R m 1 2 log 1 + m β m P 1 + σ 2 + m P k = m + 1 M T β k ,
where σ 2 satisfies
1 2 log 1 + M 0 P 1 + σ 2 1 M 0 1 + 1 σ 2 C .
This broadcast approach can be further developed to couple the broadcast coding approach with multi-description, rather than single-description, compression at the relays. The idea follows the work in [195], which focused on the CEO problem. Accordingly, each relay shares the n C bits it can convey to the destination between multiple descriptions of the received signal to the decoder. The basic idea is that different descriptions are designed to be recoverable only if certain connectivity conditions are met (that is, if the number of functioning links M is sufficiently large). This adds flexibility and robustness to the compression strategy. To simplify the presentation, the analysis is focused on the two-agent case ( M T = 2 ). In this approach, the two relays send two descriptions: a basic one to be used at the destination in case the number of active links turns out to be M = 1 and a refined one that will be used only if M = 2 . In this setting, the achievable average rate is
R 1 1 2 log 1 + β P 1 + ( 1 β ) P + σ 1 2 + σ 2 2 ,
R 2 1 2 log 1 + 2 ( 1 β ) P 1 + σ 2 2 ,
with any power allocation factor β and σ 1 2 and σ 2 2 that satisfy
1 2 log 1 + P + 1 σ 1 2 + σ 2 2 + 1 4 log ( σ 1 2 + σ 2 2 ) 2 ( 2 P + σ 2 2 + 1 ) ( σ 2 2 + 1 ) ( 2 P + σ 1 2 + σ 2 2 + 1 ) ( σ 1 2 + σ 2 2 + 1 ) σ 2 4 ) C .

5.6.2. Oblivious Agents

Next, we briefly review the model in which the agents are informed about the codebook used at the source. As shown in [181], the average capacity for this setting is upper bounded by
C ave m = M 0 M T p m min 1 2 log ( 1 + m P ) , m C .
This result follows directly from cut-set arguments, where the first term in the min follows by considering the cut between source and relays, and the second depends on the cut from relays to the destination.
As for an achievable strategy, a generalization of the single-description approach for the setting of the oblivious relay can be constructed in a straightforward way. In this scheme, the source uses broadcast coding with Gaussian codebooks. However, on top of the M T M 0 + 1 layers considered earlier, the source superimposes a further layer carrying a common message, denoted by W 0 , with rate R 0 , to be decoded by all relays and then forwarded to the destination. The destination is considered to recover such a message at all times, that is, as long as the number of active links M satisfies M M 0 . For this purpose, each agent reserves a rate of R / M 0 on its outgoing links to send an index computed as a random function of the decoded W 0 . It can be easily seen that, even though the agents are unaware of which links are currently active, the receiver will be able to recover W 0 with vanishing probability of error as n . The extra layer carrying W 0 is decoded first by the agents and canceled, and the rest of coding/decoding takes place as for the broadcast approach with a single-description scheme with the caveat that now the remaining link capacity to forward compression indices is C R / M 0 . Under this scheme, the average rate that can be achieved is given by
R M 0 R ˜ M 0 + R 0 ,
R m 1 2 log 1 + m β m P 1 + σ 2 + m P k = m + 1 M T β k for M 0 + 1 , , M T .
where
R 0 = 1 2 log 1 + β 0 P 1 + ( 1 β 0 ) P ,
and σ 2 satisfies
1 2 log 1 + M 0 P ( 1 β 0 ) 1 + σ 2 1 M 0 1 + 1 σ 2 C R 0 M 0 .

5.7. Occasionally Available Relays

Finally, we consider the impact of uncertainty in the network topology on transmission. This is motivated by the fact that in practical wireless networks, it is often difficult for each user to keep track of neighboring terminals, potentially assisting in the transmission of its information. This is especially pronounced in high-mobility networks. One immediate implication of this setting is in the IEEE 802.11 WLAN protocol using occasional relay terminals is explored. Mobile users that are far away from an access point can suffer from low uplink rates. Occasional relaying terminals between the mobile users and the access point receive the transmitted packets and relay them to the access point. When relays do not exist, then the direct links are used, albeit at a lower rate.
This setting is studied in [176], which considers communication between a source and a destination where occasionally there might be a relay node in close proximity of the source, and assisting it without its knowledge (i.e., the source is oblivious to the existence of the relay node). The destination, on the other hand, is aware of the existence of the relay node. When the relay exists, the source-relay channel is considered to be of a constant quality (due to the proximity), and the source-destination and relay-destination channels undergo block fading. All channels are known only to their associated receivers, and they are otherwise unknown to other nodes.
Hence, in this setting, the transmitter’s uncertainty is due to a combination of channel uncertainty and relay existence uncertainty. Furthermore, the combination of these factors can be used for adopting a natural notion of channel degradedness. Specifically, we can use the throughput of the channel as a metric based on which different channel realizations and relay existence scenarios can be rank-ordered. By leveraging this notion of degradedness, the transmitter generates the codebooks, one corresponding to each possible realization, ensued by superposition coding for transmission. At the destination node, the receiver uses the information about the actual realization of the channel and the relay’s existence and decodes all the codebooks assigned to this realization and all the weaker ones, treating the rest as noise.

6. Communications Networks

6.1. Overview

Previous sections discussed point-to-point communication, the MAC, the interference channel, and the relay channel. This section considers a broader span of communication networks with multiple communicating nodes and different cooperation levels. Only a limited number of examples are covered in detail, and an outlook of additional relevant problems is provided in Section 7.
We review the application of the broadcast approach to four different aspects of modern communication networks. First, we focus on cellular communication. Specifically, the case of uplink communications is studied in [196] where the broadcast approach is studied in conjunction with multiuser detection for randomly spread direct sequence (DS) code-division multiple access (CDMA). This is discussed in more detail on Section 6.2. In networks, it may be commonly required to minimize the distortion of the source information rather than maximize the expected rate. For fading channels combining the broadcast approach with successive refinement source coding allows minimization of expected distortion. This aspect is discussed in Section 6.3. Successive refinement as combined with the broadcast approach gives idea beyond the basic setting, and was recently used for a multiuser downlink with layered cooperation among users [197]. The broadcast approach for the information bottleneck channel is studied in [198,199,200], and it is discussed on Section 6.4. Finally, the design of the broadcast approach for transmitters with harvested energy is discussed in Section 6.5. There are indeed many additional network related works which are worth noting but cannot be reviewed in details in this section, such as those in [201,202,203,204,205,206,207,208,209,210,211,212,213].

6.2. Multi-User MAC Broadcasting with Linear Detection

A cellular system where macrocells are overlaid with femtocells is studied in [214]. Each femtocell is served by a home base station that is connected to the macrocell base station via an unreliable network access link, such as a digital subscriber line (DSL) followed by the Internet. A scenario with a single macrocell and a single femtocell is considered first, and it is then extended to include multiple macrocells and femtocells, both with standard single-cell processing and multicell processing (or network MIMO). Two main issues are addressed for the uplink channel: (i) interference management between femto and macrocells; and (ii) robustness to uncertainties on the quality of the femtocell access link. The problem is formulated in information-theoretic terms, and inner and outer bounds are derived to achievable per-cell sum-rates for outdoor and home users. Overall, the analysis lends evidence to the performance advantages of sophisticated interference management techniques, based on joint decoding and relaying, and of robust coding strategies via the broadcast approach.
The work in [196] considers the problem of multiuser detection for randomly spread DS-CDMA over flat fading channels. The analysis focuses on the case of many users and large spreading sequences such that their ratio, which is the system load, is kept fixed. Spectral efficiency of practical linear detectors such as match-filter and decorrelator employing successive interference cancellation (SIC) at the receiver is derived. This is used to extend the notion of the strongest users detectors for SIC receivers. The strongest users detectors system design relies on an outage approach where each user transmits in a single layer (fixed rate), and only users experiencing good channel conditions may be reliably decoded, while the other users are not decoded. In [196], iterative SIC decoding is studied, and it is shown that for equal power users, the optimal rate allocation, for maximizing the expected spectral efficiency, is equal rates for all users. This outage approach analysis is extended for a multi-layer coding broadcast approach per user. The expected sum-rate, under iterative decoding with linear multiuser detectors, is optimized, and the optimal layering power distribution is obtained. For small system loads, the achievable spectral efficiency with the continuous broadcast approach and a linear matched filter detector exhibits significant gains over the single-layer coding approach.
Multiuser wireless communication systems using CDMA have been studied and implemented in recent years. The results on the asymptotic distribution of singular values of certain random matrices allowed the analysis of randomly spread direct sequence CDMA [215,216,217]. In those multiple access channels, random and independent signature waveforms are assigned to the network subscribers.
In [216], the sum-rate capacity per chip was analyzed for a non-fading channel, the number of users K is taken to the limit ( K ), and the spreading sequence length N is also large ( N ). The system load, which is also the number of users per chip is kept fixed, i.e.,
β = K N .
The main conclusions from the results in [216] are that for low β , the linear multiuser detectors (e.g., decorrelator and linear MMSE detectors) have near-optimal spectral efficiency. For any β and E b / N 0 , the match-filter multiuser detector is far from optimal. The spectral efficiency of the linear detectors, except for the matched filter, grows unbounded with E b / N 0 , for a given β . The work in [217] extended these results to the case where every user experiences a flat fading channel. The sum-rate capacity is an ergodic capacity, which is achievable for fast fading channels, where every transmitted block experiences sufficiently many fading realizations to approximate ergodicity. Otherwise, a framework of outage capacity may better characterize the expected performance. The channel model with slow fading, where a fading remains fixed throughout a transmission block, is considered in [218], where an outage probability is equivalent to the fraction of undecoded users, providing a framework for strongest users detection. In this work, it is assumed that all users transmit at equal rates and equal power, regardless of their individual fading realizations. In such a case, the receiver can no longer guarantee reliable decoding for all active users. In this case, the receiver ranks all active users by their received powers and decodes the transmissions of the largest number of users, for which decoding is successful. The system design can be done such that a fraction of undecodable users (FUU) is defined, and this dictates the fixed rate to be used by all active users. The total achievable sum-rate is referred to as the outage capacity. The FUU can be optimized such that the average sum rate is maximized.
In [196], the sum-rate capacity of linear detectors with SIC receivers is studied for different types of detectors. Different approaches to rate allocation and multi-stage decoders with SIC are considered. Interestingly, it turns out that with iterative SIC decoding, equal rate allocation achieves the highest average spectral efficiency. In iterative decoding, the receiver decodes as many users as possible and performs SIC every iteration. The effective system load is reduced after every SIC iteration, increasing the multiuser detector efficiency. Thus, more users with worse channel conditions can be decoded. Moreover, by letting every user employ multi-layer coding, the expected spectral efficiency may increase further.
The multi-access channel combined with the broadcast approach [23] in its continuous layering form was first analyzed in [73]. Some MAC outage approaches and MIMO multi-layering schemes were studied in [74]. In [112], a simple two state multi-access channel with two users is studied, where it is shown that superposition coding is optimal, and the sum-rate capacity per layer is derived. A random-access (non-fading) channel is also a special case of the MAC. Achievable rates over this channel are studied with superposition coding in [112,219]. An alternative practical approach is to use variable-rate coding over the MAC [220].
The main results of [196] may be summarized as follows:
  • formulation of ergodic bounds for systems with random spreading DS-CDMA over fading channels, employing SIC receivers;
  • derivation of the expected spectral efficiency achievable with equal rate allocation per user, and iterative SIC decoding. It is also shown that equal rate allocation maximizes the expected spectral efficiency;
  • derivation of the expected spectral efficiency for the case of multi-layer coding taken to the limit of many layers (continuous broadcast approach);
  • analysis of a multi-layer coding where parallel decoders are used, without employing SIC;
  • analysis of a more complicated setting, including a multi-layer coded transmission with iterative SIC decoding. It is shown that, like in the single-layer case, the expected spectral efficiency is maximized for equal rate allocation per user. Furthermore, the optimal layering power allocation function, which maximizes the expected spectral efficiency, is obtained for the matched-filter and decorrelator detectors. The case of broadcasting with MMSE and optimal detectors under iterative SIC decoding remains an open problem.

6.2.1. Channel Model

We describe the channel model and the basic assumptions. Consider the following system model
y = V H x + n ,
where x = [ x 1 , . . . , x K ] is a vector of length K. An individual term x k is a sample of a layered coded signal of the kth user, and { x k } are i.i.d. and distributed according to CN ( 0 , P ) , where P sets the power constraint per user. V is an [ N × K ] signature matrix with elements i.i.d. distributed according to v i , j CN ( 0 , 1 N ) , and n is, without loss of generality, a normalized AWGN vector n CN ( 0 , I N ) . The channel matrix H is a diagonal matrix H = diag ( h 1 , h 2 , . . . , h K ) of fading gains. The empirical distribution of { s k } { | h k | 2 } converges almost surely to a distribution Q ( s ) such that E Q [ s ] = 1 . The channel matrix H remains fixed throughout a transmission block, which corresponds to a slowly fading channel model. Note that, since the additive noise is normalized we have SNR = P .
The energy per bit to noise spectral density ratio is used for evaluating the spectral efficiency and for comparing different strategies, and it is defined as
E b N 0 = β R sum SNR ,
where R sum is the total spectral efficiency, i.e., the sum-rate in bits per second per Hertz. The system load β is defined in (396).

6.2.2. Strongest Users Detection—Overview and Bounds

Motivated by practical considerations, the decoding of strongest users on block fading channels is studied in [218]. This study assumes that all users transmit at equal rates and equal powers, regardless of their individual fading realizations. In such a case, the receiver can no longer guarantee the reliable decoding of all active users. Thus, the receiver ranks all active users by their received powers and decodes the transmissions of the largest number of users, for which decoding is successful. The system design can be optimized to a fixed FUU, which dictates the rate to be used by all active users. The maximal achievable sum-rate is referred to as the outage capacity. It is obtained by optimizing the FUU such that the average sum rate is maximized.
The ergodic spectral efficiency for the fading CDMA channel model in (397) is given by [217]
C erg ( β , SNR ) = β E s log ( 1 + s η ( β ) SNR ) ,
where η ( β ) is the multiuser detector efficiency, which depends on the detector type (e.g, matched filer, decorrelator, MMSE), and is a function of the system load β , and the SNR. The expectation is taken with respect to the fading gain distribution Q ( s ) . For the completeness of this presentation, the multiuser detector efficiency is specified for each relevant detector. The detector efficiency of a matched filter is [217]
η mf ( β ) = 1 1 + β SNR .
The detector efficiency of a decorrelator receiver is
η dec ( β ) = max { 0 , 1 β } ,
and for an MMSE detector, η mmse ( β ) satisfies the following equation
η mmse ( β ) + β E s s η mmse ( β ) SNR 1 + s η mmse ( β ) SNR = 1 .
The expectation here is taken with respect to the fading gain distribution Q ( s ) . For a Rayleigh fading channel, the expectation is explicitly expressed as
E s s η mmse SNR 1 + s η mmse SNR = 1 E 1 1 η mmse SNR η mmse SNR exp 1 η mmse SNR ,
where E 1 ( x ) is the exponent integral function.
  • Upper bound. It is well-known that the optimum multiuser detector capacity is also equal to the ergodic successive decoding sum-rate capacity with an MMSE detector, according to the mutual information chain rule [40]. Thus the ergodic capacity, obtained with an optimum detector, can be expressed by the ergodic SIC MMSE detection capacity [217]
C opt ( β , SNR ) = E s 0 β log 1 + s · η mmse ( z ) · SNR d z .
  • Strongest users detection. It refers to the practical case where all users transmit at a fixed rate, via single-layer coding. The adequate channel model here is the block fading channel, where a fixed fading realization throughout the block for each user is observed. Thus, all users experiencing fading gains smaller than a threshold s th will not be reliably decoded. This is demonstrated in Figure 31, where a fraction of users, corresponding to Q ( s th ) , is in an outage, and all other users are reliably decoded. The average achievable sum-rate for outage decoding is given by [218]
C out ( β , SNR ) = β ( 1 Q s th ) log ( 1 + s th η ( β ) SNR ) ,
where Q ( s th ) is the probability of outage corresponding to the fraction of users that cannot be reliably decoded. The multiuser detector efficiency η ( β ) is specified in equations (400) and (402) for the underlying linear detectors.
In parallel decoding schemes, the decoding latency may be small. However, there is an inherent spectral efficiency loss due to decoding every user in the presence of interference from all other users. An SIC decoder attempts decoding the users one by one, where after every successful decoding, a reconstructed signal associated with the decoded user is subtracted from the input signal. The procedure continues until the last user is decoded. Consider the case that each user transmits over a fading channel. Such a channel model was studied in [217], where the detectors considered were an optimal detector, MMSE, decorrelator, and MF. The derivations in [196] extend the results for the SIC receiver strategy.
For a given system load β , the ergodic sum-rate is specified in (399). This sum-rate is an upper bound since its achievability requires fast feedback from the receiver to all users. With SIC decoding, the ergodic sum-rate is given by
C SIC , erg ( β , SNR ) = E s 0 β d z log 1 + s · η z SNR .
The ergodic sum-rate for an MF-SIC detector is derived in the same lines as for the non-fading case, yielding
C SIC , MF ( β , SNR ) = E s s + β + 1 SNR log ( 1 + SNR ( s + β ) ) ( 1 SNR + s ) log ( 1 + s SNR ) β + 1 SNR log ( 1 + β SNR ) .
The sum-rate capacity, for an SIC decorrelator detector, is also available as a function of the fading gain distribution
C SIC , Dec ( β , SNR ) = E s 1 + 1 s SNR log ( 1 + s SNR ) β 1 β + 1 s SNR log ( 1 + s SNR ( 1 β ) ) .
For an MMSE detector, the sum-capacity cannot be given in a closed-form, and it is computed using η ( z ) given in (403), plugged into the ergodic capacity expression in (406).

6.2.3. Broadcast Approach with Strongest Users Detection—(NO SIC)

If we let every user transmit a continuously layered coded signal, then the number of decodable layers per user directly depends on the experienced fading level. Consider here parallel decoding, where the receiver decodes all users in parallel up to the highest reliably decoded layer. Thus, the achievable rate, averaged over all possible fading realizations, is given by
R bs ( β , SNR ) = lim K , N , J , K N β , J ( s ) / K q ( s ) 0 d s J ( s ) N 0 s d u u η ρ ( u ) 1 + u η I ( u ) ,
where J ( s ) is the number of decoded users at fading level s, and where the broadcasting rate, derived in (6), is modified here by the detector efficiency η . The expected sum rate is simplified into
R bs ( β , SNR ) = 0 d s q ( s ) 0 s d u u η ρ ( u ) 1 + u η I ( u ) = 0 d s ( 1 Q ( s ) ) s η ρ ( s ) 1 + s η I ( s ) .
It can be shown that the optimal power distribution, which maximizes R bs ( β , SNR ) , is like in (15), where the detector efficiency η scales the power distribution
I ( x ) = SNR x < x 0 1 Q ( x ) x · q ( x ) x 2 q ( x ) η x 0 x x 1 0 else ,
where x 0 is determined by I ( x 0 ) = SNR , and x 1 by I ( x 1 ) = 0 .

6.2.4. SIC Broadcast Approach Upper Bound

In order to characterize an achievable rate via layering, the power distribution for layering should be optimized for every subset of users, and their corresponding residual interference must be accounted for in the stages of the SIC, as described above for the outage case. Such an analytical analysis for the broadcast approach seems to be intractable. Therefore, an upper bound significantly tighter than the ergodic upper bound is provided.
The upper bound of the broadcast approach is simply the broadcast approach combined with SIC, where optimal layering is performed for every subset of users. It is assumed that at any decoding stage, there is no residual interference from previous SIC stages. Although interference from undecoded layers of early stages does exist, this assumption allows full derivation and optimization of a continuous broadcast approach. Under this simplified setting, the layering sum-rate with SIC is given by
C SIC , BS ( β , SNR ) = 0 β d z 0 d s ( 1 Q ( s ) ) s η ( z ) ρ ( s ) 1 + s η ( z ) I ( s ) ,
where the inner integral is the average achievable rate for a given system load z. The maximization of this average rate is given in (410), with an optimal power distribution specified in (411). For a Rayleigh fading channel, this maximal average rate can be expressed more explicitly as
C SIC , BS ( β , SNR ) = β ( e 1 2 E 1 ( 1 ) ) + 0 β d z 2 E 1 ( S 0 ( z ) ) e S 0 ( z ) ,
where S 0 ( z ) = 2 / 1 + 1 + 4 SNR η ( z ) . Since this broadcasting upper bound does not provide an achievable expected rate, the analysis of continuous broadcasting, which follows assumes equal rates with iterative decoding.

6.2.5. Broadcast Approach with Iterative SIC

A broadcast approach is employed by all transmitting users, where all users transmit with the same rate and layering power distribution. The decoder applies iterative SIC decoding. The main idea in the decoding scheme is to apply an iterative SIC per layer. The decoding process is illustrated in Figure 32. Every iteration includes M stages of iterative SIC decoding, where M is the number of coded layers. The first stage attempts iterative SIC decoding of the first layer of all users. Then the next stage performs iterative SIC decoding for the group of users for which decoding of the first layer was successful. This continues until the last layer decoding is done. Then the second iteration continues similarly.
The continuous layering characterizes the highest achievable sum-rate for the broadcast approach, i.e., the number of layers is unlimited. Every layer is associated with a fractional rate and power allocation, as described in the broadcast approach overview. The achievable rates and overall performance strongly depend on the transmission scheme and the decoding strategy. The decoding strategy which is adopted here is the multi-round iterative decoding. The maximal achievable average rate can be expressed by the following optimization problem
R sum , bs = max I R sum , bs ( I ) ,
where the achievable continuous layering rate R sum , bs ( I ) is given by
R sum , bs ( I ) = β 0 d s ( 1 Q ( s ) ) s η ( G ) ρ ( s ) 1 + s η ( G ) I ( s ) 0 d s J ( s , I , I ) ,
where G corresponds to the remaining layers per user, which induce the mutual interference
G β SNR 0 Q ( s ) ρ ( s ) d s 0 d s Z ( s , I , I ) ,
where I ( s ) = s d u ρ ( u ) .
The optimization of (415) with respect to the residual interference constraint in (416) can be solved by fixing the interference parameter G to an arbitrary value such that 0 < G β . For such G, the optimization in (415) is a standard variational problem with a residual interference constraint on top of the power constraint I ( 0 ) = SNR . The optimization problem is, therefore
max I 0 d s J ( s , I , I ) s . t . G 0 d s Z ( s , I , I ) .
We can write the Lagrangian form
L = 0 d s J ( s , I , I ) + λ G 0 d s Z ( s , I , I ) .
The Euler–Lagrange condition for extremum can be derived, and the optimal layering power distribution can be expressed in a closed-form, as summarized in the next proposition.
Proposition 14
([196]). The optimal power distribution, which maximizes the expected sum-rate of a continuous broadcast approach (417), with matched-filter multiuser detection and iterative SIC decoding, is achieved from
I ( s ) = SNR s < s 0 SNR + SNR 2 + 4 λ β ( 1 Q ( s ) ) SNR η ( G ) s 2 Q ( s ) 2 λ β 1 s η ( G ) s 0 s s 1 0 s > s 1 ,
where s 1 is the smallest fading gain for which I ( s 1 ) = 0 , and the left boundary condition on s 0 satisfies I ( s 0 ) = SNR. The Lagrangian multiplier λ is obtained by an equality for the residual interference constraint (416), as specified by
s 0 s 1 Q ( s ) I ( s ) d s = G SNR β .
The decoding algorithm for a decorrelator multiuser detector is similar. In the continuous setting, the detector efficiency is updated according to the number of users for which all layers are decoded. This is the reason the upper boundary of the power distribution is a subject for optimization. The solution is obtained by solving the corresponding variable endpoint variational optimization problem.
It is assumed here that the optimal solution for the power distribution lies on a single continuous interval [ s 0 , s 1 ] . The extension to multiple continuous intervals may be done as in [32]. The average achievable rate with a decorrelator detector, in its general form, is
R bs , decorr = β s a + s b d s ( 1 Q ( s ) ) s ρ ( s ) η β Q ( s b ) 1 + s I ( s ) η β Q ( s b ) + ( 1 Q ( s a ) ) R 0 ( s a ) + ( 1 Q ( s b ) ) R 1 ( s b ) ,
where η ( x ) = 1 x , I ( s 0 ) = SNR , I ( s 1 ) = 0 , and the rate of the first layer is
R 0 ( s a ) = β log 1 + s a η β Q ( s b ) ( SNR I ( s a + ) ) 1 + s a η β Q ( s b ) I ( s a + ) ,
where I ( s a ) = SNR , and I ( s a + ) is the remaining power allocation for the continuous and last layers. The last layer is allocated
R 1 ( s b ) = β log 1 + s b η β Q ( s b ) I ( s b ) I ( s b + ) ,
where I ( s b + ) = 0 . Thus, the discontinuity in I ( s ) can be in s a and s b . Define the functional subject for optimization, from (421), by
G ( s b , s , I , I ) = β ( 1 Q ( s ) ) s I ( s ) η β Q ( s b ) 1 + s I ( s ) η β Q ( s b ) .
The following variable end point variational optimization problem is solved following
R bs , decorr = max s a , s b , I s a + s b d s G ( s b , s , I , I ) + ( 1 Q ( s a ) ) R 0 ( s a ) + ( 1 Q ( s b ) ) R 1 ( s b ) s . t . I ( s a ) = SNR I ( s b + ) = 0 .
The optimal power distribution is formulated in the next proposition.
Proposition 15.
The expected sum-rate for continuous layering per user, with a decorrelator multiuser detector and iterative SIC decoding, is given by
R bs , decorr = β s a + s b d s ( 1 Q ( s ) ) s I opt ( s ) η β Q ( s b ) 1 + s I opt ( s ) η β Q ( s b ) + ( 1 Q ( s a ) ) R 0 ( s a ) + ( 1 Q ( s b ) ) R 1 ( s b ) ,
where η ( x ) = 1 x , and the optimal layering power distribution is given by
I opt ( s ) = SNR s s a 1 Q ( s ) s · Q ( s ) s 2 Q ( s ) η ( β Q ( s b ) ) s a + s s b 0 e l s e ,
and the interval for continuous layering satisfies
s a + s b d s G ( s b , s , I opt , I opt ) s b + G ( s b , s b , I opt , I opt ) + s b ( 1 Q ( s b ) ) R 1 ( s b ) + ( 1 Q ( s a ) ) R 0 ( s a ) = 0 ,
and
G ( s b , s = s a , I opt , I opt ) + s a ( 1 Q ( s a ) ) R 0 ( s a ) = 0 .
From the numerical results in [196], and Figure 33, the broadcast approach with multi-round iterative SIC decoding offers a significant spectral efficiency gain over the single-layer coding strategies. The gain is especially noticeable for the lower system loads. Interestingly, for β 0.2 , it can be noticed that the spectral efficiency of the broadcast approach exceeds the MF single-layer ergodic bound at high E b / N 0 (Figure 33). For a single user setting, the ergodic bound is always an upper bound which cannot be exceeded. However, in our multiuser setting, an MF detector is used for the ergodic bound, and the MF detection is information lossy. In the broadcast approach, the MF detection is performed over and over for every layer according to the iterative decoding scheme. Hence, the broadcast approach with iterative decoding may outperform the optimum single-layer coding with transmitter channel side information (ergodic bound). Generally speaking, this result should not be limited to small system loads. Any non-zero slope of the broadcast approach is sufficient for exceeding the MF single-layer ergodic bound. However, the crossing level will be at very high E b / N 0 values. Figure 34 demonstrates the achievable rates for a Rayleigh fading channel with a decorrelator based multiuser detection, with different transmission and decoding strategies.
It can be concluded that unequal transmission rate assignment is a practical strategy, as the base-station, aware of all its users, can take care of rate allocation. This is in contrast to ergodic bounds, where the users must transmit at rates matching their experienced fading realizations (which is an impractical assumption). In SIC with the strongest users and single-iteration detection, the subsets are ordered regardless of the instantaneous channel realizations. Therefore, such an assignment can be done once for every new subscriber. It was shown in this work that for single-iteration decoding, unequal rate allocation maximizes the spectral efficiency since the decoding order is fixed. However, for iterative SIC decoding, the decoding order is no longer fixed, and it is shown that equal rate allocation maximizes the expected sum-rate.
It is worth noting that systems employing decorrelator detection can significantly gain from using SIC at system loads close to β = 1 . For such system loads, single-user detection is interference-limited, and therefore, the achievable rate can be infinitesimally small. While with SIC, only the users decoded first transmit at low rates. Gradually, the effective system load for decoding is reduced, and higher spectral efficiency can be achieved for other users, resulting in higher sum-rates.
The single-layer analysis was extended to a multi-layer coding broadcast approach per user. The expected sum-rate, under iterative decoding with linear multiuser detectors, is optimized, and the optimal power distribution is obtained (for a decorrelator and an MF detector). The achievable spectral efficiency for a linear matched filter detector shows significant gains over the single-layer coding approach. The interesting observation here is that the expected spectral efficiency exceeds the single-layer ergodic sum-capacity. The ergodic bound assumes that every user transmits at a rate matched to its decoding stage and channel realization. For a single-user setting, the ergodic bound is always an upper bound for the broadcast approach. However, in our multiuser setting, an MF detector is used for the ergodic bound, and the MF detection is information lossy. In the broadcast approach, the MF detection is performed over and over for every layer according to the iterative decoding scheme. Therefore, the broadcast approach can provide spectral efficiencies exceeding those of a single layer coding with channel side information, when an MF detector is used.

6.3. The Broadcast Approach for Source-Channel Coding

In networks, it may be commonly required to minimize the distortion of the source information rather than maximize the expected rate. This broadcast approach is useful in a variety of applications, and it matches the successive refinement (SR) source coding approach [29,30,221] and later works [30,31,32,33,34]. That is, the more information rate is provided, the less average distortion is evident in the reconstructed source. On a wireless fading channel, in order to minimize the expected distortion at the receiver, it is essential to find the optimal power allocation in the broadcast strategy and this is indeed our focus in this section. This cross-layer design approach was, in fact, already suggested in [23].
The broadcast-SR approach facilitates to achieve via coding the basic features of analog communications, that is the better the channel, the better the performance (say measured by received SNR (MMSE)). Furthermore, that is without the transmitter knowing the state channel realization, see applications as referenced in the book [35].
The initial effort on this problem was made in [222], where the broadcast strategy coupled with SR source coding was compared with several other schemes. The optimization problem was formulated by discretizing the continuous fading states, and an algorithm was devised when the source coding layers are assumed to have the same rate. This algorithm, however, does not directly yield the optimal power allocation when the fading states are discrete and pre-specified, nor does it give a closed-form solution for the continuous case. This problem is also considered in [223], which provides an iterative algorithm by separating the optimization problem into two sub-problems. The study in [33] provides a recursive algorithm to compute the optimal power allocation for M fading states, with worst-case complexity of O ( 2 M ) . Furthermore, by directly taking the limit of the optimal solution for the discrete case, a solution was given for the continuous case optimal power allocation, under the assumption that the optimal power allocation is concentrated in a single interval. Similar problems were considered in [224,225] in the high SNR regime from the perspective of distortion exponent. Successive refinement, as combined with the broadcast approach, gives idea beyond the basic setting and was used in [197].
The work in [32] proposes a new algorithm that can compute in linear time, i.e., of  O ( M ) complexity, the optimal power allocation for the case with M discrete fading states. Furthermore, it provides a derivation of the continuous case optimal power allocation solution by the classical variational method [59]. Both the algorithm and the derivation rely on an alternative representation of the Gaussian broadcast channel capacity, which appeared in [41]. The dual problem of minimizing power consumption subject to a given expected distortion constraint is also discussed.

6.3.1. SR with Finite Layer Coding

Finite-layer coding can be matched to a finite number of fading states, the M possible power gains in an increasing order s 1 < s 2 < . . . < s M are distributed according to a probability mass function p i such that i = 1 M p i = 1 . The transmitter has an average power constraint P, and if power P i is allocated to the ith layer in the broadcast strategy, the ith layer channel rate R i is given by
R i = 1 2 log 1 + s i P i 1 + s i j = i + 1 M P j = 1 2 log 1 + P i 1 / s i + j = i + 1 M P j .
From the second expression in (430), the equivalence to broadcast on a set of channels with different noise variances is clear. Let n i 1 / s i , which implies n 1 > n 2 > . . . > n M are the equivalent noise power on the channels. The layers corresponding to smaller values of s i (and larger values of n i ) will be referred to as the lower layers, which is consistent with the intuition that they are used to transmit the more protected base layers of the SR source coding. Since the Gaussian source is successively refinable [29], the receiver with power gain s i can thus reconstruct the source within distortion
D i = exp 2 b j = 1 i R j ,
where b is the bandwidth expansion coefficient. Combining (430) and (431), the problem we wish to solve is essentially the following minimization over the power allocation ( P 1 , P 2 , . . . , P M ) :
min i = 1 M p i j = 1 i 1 + P j 1 / s j + k = j + 1 M P k b s . t . P i 0 , i = 1 , , M i = 1 M P i P .
when the fading state is continuous, the density of the power gain distribution is then given by f ( s ) , which is assumed to be continuous and differentiable almost everywhere. In this case, the goal is then to find a power allocation density function P ( s ) , or its cumulative function, which minimizes the expected distortion, see more details in [32].

6.3.2. The Continuous SR-Broadcasting

We next turn our attention to the case of a continuum of layers, which is, in fact, the case considered in [23]. To facilitate understanding, we first provide a less technical derivation under the assumption that the optimal power allocation concentrates on a single interval of the power gain range, and show that this is indeed true for some probability density function f ( s ) . This simple derivation provides important intuitions for the general case, based on which a more general derivation is then given and some properties of the solution are subsequently discussed. For simplicity, we first assume f ( s ) has support on the entire non-negative real line [ 0 , ) . Later it is shown that this assumption can be relaxed. The optimization problem can be reformulated as follows. Define
I ( i ) = exp j = 1 i 2 R j .
We take the number of layers to infinity and the constraint becomes an integral equation, where we convert back to the power gain s instead of noise power n, and it is clear we can replace the inequality by equality without loss of optimality
0 I ( s ) 1 s 2 d s = 0 exp 2 R ( s ) s 2 d s = P ,
where R ( s ) is the cumulative rate associated with a fading gain s. The term to be optimized is given by
D ¯ ( I ) = 0 f ( s ) exp ( 2 b R ( s ) ) d s = 0 f ( s ) I ( s ) b d s .
Note the additional condition that I ( s ) has to be monotonically non-decreasing, and it should satisfy the boundary conditions I ( 0 ) = 1 . Ignoring the positivity constraint I ( s ) 0 for now, take
J ( s , I , I ) = f ( s ) I b ( s ) , G ( s , I , I ) = I ( s ) s 2 .
Hence the optimization problem can be written as
min 0 J ( s , I , I ) d s s . t . 0 G ( s , I , I ) d s = P .
Next, we assume there is a unique interval [ s 1 , s 2 ] for which power allocation is non-zero. Under this assumption, the objective function reduces to
D ¯ ( I ) = 0 J ( s , I , I ) d s = s 1 s 2 f ( s ) I ( s ) b d s + F ( s 1 ) + 1 F ( s 2 ) I ( s 2 ) b ,
where F ( s ) is the CDF of the fading gain random variable, i.e., F ( s ) = 0 s f ( r ) d r , and the constraint becomes
P ( I ) = 0 G ( s , I , I ) d s = s 1 s 2 I ( s ) 1 s 2 d s + I ( s 2 ) s 2 1 s 1 = P .
Then we can write the Lagrangian form L ( I ) = D ¯ ( I ) + λ ( P ( I ) P ) . To find the extremal solution, we consider an increment q ( s ) , and the increment of the Lagrangian functional is given by Δ ( q ) = L ( I + q ) L ( I ) . By taking an increment q ( s ) with q ( s 1 ) = q ( s 2 ) = 0 as well as q ( s ) = 0 for s [ s 1 , s 2 ] , then the Euler-Lagrange equation ([59], pp. 42–50) requires
J I + λ G I d d s [ J I + λ G I ] = 0 ,
with
J I = b f ( s ) I b + 1 ( s ) , G I = 1 s 2 , J I = G I = 0 ,
which further simplifies to
I ( s ) = b f ( s ) s 2 λ 1 / ( b + 1 ) .
At this point, it is clear that for I ( s ) 0 to be true, which is necessary for I ( s ) to be a valid solution, f ( s ) s 2 should have non-negative derivative in any interval such that (442) holds. In fact, for any interval that a positive rate is allocated to, f ( s ) s 2 should have strictly positive derivative such that I ( s ) is strictly increasing. If there is only one interval over the support of f ( s ) where f ( s ) s 2 has strictly positive derivative, then the single interval solution assumption is indeed true. Now, since q ( s 2 ) can be arbitrary, at this variable end ([59], pp. 25–29) a necessary condition for an extremum is
b ( 1 F ( s 2 ) ) I ( s 2 ) b + 1 + λ 1 s 2 = 0 ,
which gives
λ = b s 2 ( 1 F ( s 2 ) ) I ( s 2 ) b + 1 .
Since I ( s 1 ) = 1 , λ = b f ( s 1 ) s 1 2 , with the expression of I ( s ) gives one boundary condition
1 F ( s 2 ) = f ( s 2 ) s 2 .
The lower bound s 1 is determined by the power constraint, from which we have
s 1 I ( s ) s 2 d s = s 1 s 2 f ( s ) f ( s 1 ) s 1 2 1 / ( b + 1 ) s 2 b / ( b + 1 ) d s + 1 s 2 f ( s 2 ) s 2 2 f ( s 1 ) s 1 2 1 / ( b + 1 ) = P + 1 s 1 ,
where in the second equation we split the integral into two parts partitioned by s = s 2 . Hence, the unique extremal solution is
I ( s ) = f ( s ) s 2 f ( s 1 ) s 1 2 1 / ( b + 1 ) ,
with the boundary conditions specified by (445) and (446). To find the corresponding power allocation, define T ( s ) = s P ( r ) d r . We derive from (447) that
T ( s ) = s I ( r ) I ( s ) d r 1 s = f ( s 2 ) s 2 2 f ( s ) s 2 1 / ( b + 1 ) 1 s 2 + s s 2 f ( r ) r 2 f ( s ) s 2 1 / ( b + 1 ) 1 r 2 d r 1 s .
Through some basic calculation, it can be shown that this is the same solution as that in [33]. Thus, the limit of the optimal solution of the discrete case in [33] indeed converges to the extremal solution derived through the classical variational method. Furthermore, the variational method derivation directly asserts that f ( s ) s 2 has a non-negative derivative for any positive power allocation interval. This condition was, however, lacking in the derivation in [33].
We consider the average achievable distortion for a SISO Rayleigh fading channel, with CDF F ( s ) = 1 exp s s ¯ , where s ¯ is the expected fading gain power. For this distribution, the optimal power allocation is single interval continuous, and zero outside the interval [ s 1 , s 2 ] . That can be immediately observed from f ( s ) s 2 by taking its first derivative
d d s f ( s ) s 2 = 2 s s ¯ s 2 s ¯ 2 exp s s ¯ ,
where d d s f ( s ) s 2 0 on a single interval s [ 0 , 2 s ¯ ] . Then the upper bound s 2 [ 0 , 2 s ¯ ] is determined by (445), which reduces to
exp s 2 s ¯ = s 2 s ¯ exp s 2 s ¯ ,
yielding s 2 = s ¯ . Solving (446) gives the other boundary value s 1 , denoted by s 1 , opt ; the condition (446) does not lead to an analytical expression, but can be solved numerically. Then, the general expression for I ( s ) for the Rayleigh fading channel is given by
I ( s ) = 1 s s 1 , opt s 2 s 1 , opt 2 exp s s 1 , opt s ¯ 1 / ( b + 1 ) s 1 , opt < s s ¯ s ¯ 2 s 1 , opt 2 exp s ¯ s 1 , opt s ¯ 1 / ( b + 1 ) s > s ¯ .
In Figure 35, the average distortion bounds for Rayleigh fading channels are demonstrated for three different values of bandwidth expansion values ( b = 0.5 , 1 , 2 ). For every bandwidth expansion, the minimal average distortion of the outage approach and broadcast approach are compared. It can be noticed that the smaller b is, the larger is the broadcast gain, which can be defined as the SNR gain of the broadcast approach over the outage approach for the same average distortion value. Thus, the benefit of the broadcast approach compared to the outage directly depends on the system design parameter b.

6.4. The Information Bottleneck Channel

An interesting setting is the information bottleneck channel, the objective of which is the efficient transmission of data over a wireless block fading channel that is connected to a limited capacity reliable link. This setting is known as the bottleneck channel [198]. Two main broadcast approaches are considered for the bottleneck channel in [198]. The first is an oblivious approach, where the sampled noisy observations are compressed and transmitted over the bottleneck channel without having any knowledge of the original information codebook. This is compared to a decode-forward (non-oblivious) approach, where the sampled noisy data is decoded, and whatever is successfully decoded is reliably transmitted over the bottleneck channel. This work is extended for an uncertain bottleneck channel capacity setting in [199], where the transmitter is not aware of the available backhaul capacity per transmission and knows only its distribution. In both settings, it is possible to analytically describe the optimal continuous layering power distribution that maximizes the average achievable rate in closed-form expressions. The topic is covered in more details [200].
The Gaussian bottleneck problem is depicted in Figure 36. Consider a Markov chain of a random variable triplet x y z , related according to
y = h · x + n ,
where x and n are i.i.d, with n N ( 0 , 1 ) . The fading gain is s = | h | 2 fixed per transmission block. The SNR is P · s , where P is the transmission power E [ X 2 ] = P . The fading gain s distribution is known to transmitter and receiver as the broadcast approach [23] discussed earlier. The output z of the bottleneck channel is a compressed version of the received signal y under the bottleneck channel capacity C constraint. The optimization problem can be formalized as
max P ( z | y ) , P ( x ) s . t . I ( y ; z ) C I ( x ; z ) .
If x is Gaussian, then it is clear [226,227] that y z is also a Gaussian channel. Therefore, the maximization result of (453) is
C Obliv = I ( x ; z ) = 1 2 log 1 + P | h | 2 1 + P | h | 2 · exp ( 2 C ) ,
which is a direct result of the rate-distortion approach. The output of the relay y may be represented by quantizing its input
z = y + m ,
where P | h | 2 + 1 is the variance of y of the channel model (452). The quantization noise variance, denoted by m, is obtained by I ( z ; y ) = C , i.e.,
E [ m 2 ] = P | h | 2 + 1 exp ( 2 C ) 1 .
The problem underhand is the reliable transmission rate from x to destination with an oblivious relay that uses the bottleneck channel to send compressed versions of its input, without knowledge of the transmitter codebook.
For a DF non-oblivious relay, the relay can decode its input and then send the decoded data under bandwidth limitation C over the bottleneck channel y z . Hence, the minimum of two capacities provides the achievable transmission rate
C DF = min 1 2 log ( 1 + P | h | 2 ) , C .
An alternative setting that generalizes the current model is a variable availability of the bottleneck capacity, which is common in cellular uplink transmission. This can be due to changing traffic loads over time on the network [212]. This means that the relay-destination bottleneck channel capacity C is a random variable. The source transmitter knows its distribution; however, like in the wireless fading channel, feedback to the transmitter is not available due to the capacity variability dynamics. If the relay perfectly knows, per received codeword, the bottleneck currently available capacity, it can adapt its data rate. However, if the relay has no access to the capacity per codeword, it may use successive refinement source coding [32] matched to the capacity distribution.
Consider a fading wireless link to y, where s = | h | 2 is a unit variance block fading gain. It is assumed to change independently between codewords and remains fixed over a single codeword. The channel model of z is expressed by its block fading gain as
z = FPR eq x + n ,
where n is a unit variance Gaussian noise. The equivalent fading gain FPR eq is given by
FPR eq = s ( 1 exp ( 2 C ) ) 1 + s · P · exp ( 2 C ) ,
which is directly obtained from (456). It may be observed that FPR eq is finite for s 0 , and at the limit of s becomes
lim s FPR eq = ( exp ( 2 C ) 1 ) / P ,
and the ergodic capacity of the bottleneck fading channel is
C Obliv , Erg = E s 1 2 log ( 1 + P · FPR eq )
= E s 1 2 log 1 + s · P · ( 1 exp ( 2 C ) ) 1 + s · P · exp ( 2 C ) .
The continuous broadcasting approach solution is rather straightforward here. The channel model here can be expressed by equivalent fading gain ν = FPR eq from (459), which depends on the bottleneck channel capacity C and the distribution of the channel fading gain s. In this bottleneck channel with oblivious relaying, the broadcast approach is optimized for a fading distribution F ν ( u ) of (459). Obtaining optimal power distribution can be derived directly. Clearly for high bottleneck channel capacity C , then FPR eq s .
A DF relay (non-oblivious approach) can decode the received signal y, and reliably convey to the destination the decoded data under capacity limit C. An ergodic upper bound of the bottleneck fading channel C DF , Erg , is not achievable for a block fading channel, as the transmitter has no CSI. It is beneficial to transmit a multi-layer coded signal for this channel model. The DF non-oblivious ergodic capacity is expressed as
C DF , Erg = E s min C , 1 2 log ( 1 + s P ) ,
where a single fading realization is assumed per transmission and decoding of a single codeword, for the slowly fading channel.
The continuous broadcasting approach for the non-oblivious DF approach can be optimized in the following way. A transmitted signal x is multi-layer coded in a continuum of layers. The received signal y is decoded layer-by-layer in a successive decoding manner. All the successfully decoded layers with a total rate up to C, the bottleneck channel capacity, can be reliably conveyed over the bottleneck channel. The optimization goal is to maximize the average transmitted rate over the bottleneck channel in this block fading channel model. We formulate here the optimization of power density distribution function ρ opt ( u ) so that the average transmission rate is maximized under the bottleneck channel capacity constraint.
Proposition 16.
For the non-oblivious block fading bottleneck channel, the total expected average achievable rate of the broadcast approach is obtained by the following residual power distribution function
I opt ( u ) = arg max I ( u ) 1 2 0 d u ( 1 F s ( u ) ) ρ ( u ) u 1 + I ( u ) u s . t . 0 d u ρ ( u ) u 1 + I ( u ) u C . ,
where F s ( u ) is the CDF of the fading gain random variable, and C is the bottleneck channel capacity. The optimal power allocation I opt ( u ) is given by
I opt ( u ) = P u < u 0 1 F s ( u ) + λ opt u · f s ( u ) u 2 f s ( u ) u 0 u u 1 0 u > u 1 ,
where λ opt 0 is a Lagrange multiplier specified by
λ opt = u 1 · f s ( u 1 ) 1 + F s ( u 1 ) ,
and for any λ opt > 0 ,
u 1 2 · f s ( u 1 ) = exp ( 2 C ) · u 0 2 · f s ( u 0 ) .
Figure 37 demonstrates the achievable rates with a non-oblivious approach as compared to an oblivious approach for a bottleneck channel capacity C = 4 (Nats/Channel use). It can be observed here that in the high SNR region, the gain of the broadcast approach compared to single-layer coding is higher with a non-oblivious approach.

6.4.1. Uncertainty of Bottleneck Capacity

A common case in cellular uplink is a variable availability of backhaul capacity. This may be the result of variable loads on the network over time. Traffic congestion of internet data may lead to changing the availability levels of the backhaul [212]. On the bottleneck channel, this means that the relay-destination link capacity C is a random variable. It may be assumed that the transmitter is aware of the average capacity and its distribution. However, like the wireless fading channel, the capacity variability dynamics may not allow time for feedback to the transmitter. The following subsection considers the case that the relay is fully aware of the current bottleneck available capacity for each received codeword.
Consider a bottleneck channel with discrete capacity levels represented by N random capacity values { C i } i = 1 N , such that C 1 C 2 C N with corresponding probabilities { p b , i } i = 1 N , such that p b , i 0 and i = 1 N p b , i = 1 . The average capacity of the bottleneck channel is
C ave = i = 1 N p b , i C i .
The broadcast approach can be derived here for an oblivious relay setting and under an equivalent fading gain distribution. Since the transmitter is not aware of the bottleneck capacity per codeword, and only knows its distribution, the following optimization flow is used for the continuous broadcast approach optimization. The combined equivalent channel viewed by the transmitter is
FPR eq ( s , C b ) = s ( 1 exp ( 2 C b ) ) 1 + s · P · exp ( 2 C b ) , and s = | h | 2 .
The continuous broadcast approach is optimized for a fading distribution F μ ( u ) , where  μ = FPR eq ( s , C b ) is the equivalent channel gain depending on the fading gain realization s, and bottleneck channel capacity C b available per codeword. The CDF of this fading gain is
F μ ( u ) = i = 1 N p b , i F s u 1 ( 1 + P u ) exp ( 2 C i ) .
The main result here is expressed in the following proposition:
Proposition 17.
The power distribution, which maximizes the expected rate over the oblivious bottleneck channel, is
I ( x ) = 1 F μ ( x ) x · f μ ( x ) x 2 f μ ( x ) , x 0 x x 1 0 , else ,
where x 0 is determined by I ( x 0 ) = P , and x 1 by I ( x 1 ) = 0 . Furthermore, the broadcasting rate is expressed as function of the FPR eq distribution F μ ( u )
R opt ( s ) = 0 s < x 0 log ( s / x 0 ) + 1 2 log f μ ( s ) f μ ( x 0 ) x 0 s x 1 log ( x 1 / x 0 ) + 1 2 log f μ ( x 1 ) f μ ( x 0 ) s > x 1 .
The derivation of this optimization is based on the analysis in [23] for characterizing the power distribution under an equivalent channel model that includes the relayed signal after compression to a rate which matches the bottleneck channel capacity. The channel model for the relayed signal z can be expressed by its block fading gain, under an oblivious approach. Specifically,
z = FPR eq · x + n ,
where n is a unit variance Gaussian noise, and FPR eq ( s , C b ) is specified in (469). More details can be found in [200]. It is interesting to note here that although the relay can perform successive refinement source coding matched to backhaul capacity distribution, it does not help and cannot increase the expected achievable rate if the relay is informed with the available capacity per codeword.
An interesting problem arises when the wireless channel is fast fading, and bottleneck channel capacity is random. That is, the fading h (452) changes independently (i.i.d.) for every channel use. For long codewords, the ergodic nature of the channel can be utilized per transmitted codeword. Evidently, under a non-oblivious DF relay, the relay decodes the transmission, and then whatever possible is conveyed through the backhaul. The interesting part is the oblivious processing. Here, the relay should also convey the fading realizations h and received signal y to the destination, the best possible way. Hence, h plays the role of the source to be conveyed with successive refinement. Furthermore, note that even if all y is provided to the destination, unavailable fading realization vector h makes the capacity behave as log log ( SNR ) , as in the i.i.d. channel with unavailable fading at the transmitter and receiver. This problem is analyzed for a known bottleneck capacity in [228].

6.5. Transmitters with Energy Harvesting

As the last model in this section, we review the channel model of [229] in which the transmitter relies on an exogenous energy harvesting unit as its only source of energy. Energy harvesting has been evolving rapidly as a promising alternative to systems with lifetime-limited batteries. Communication systems empowered by energy harvesting units rely on ambient sources, which facilitate potentially perpetual sources of power [230,231,232,233]. Specifically, the recent advances in both the theory and implementation of energy harvesting circuitry has facilitated the growth in various wireless domains, e.g., ad-hoc networks [234], wireless body networks [235], wireless sensor networks [236], and radio frequency identification systems [237], which constitute the main technologies that IoT relies on.
By relying on harvested energy, the transmitter faces two sources of randomness due to the fading and energy arrival processes. The transmitter knows only the statistical descriptions of these processes while remaining oblivious to the actual realizations of both. We review the optimal distribution of power across information layers and over time in order to maximize the average rate that can be reliably sustained. An interesting observation is that allocation of power across layers and over time can be decoupled into two independent power allocation tasks, one specifying the allocation over time, and the second one optimizing the available power at any given time across different layers. Furthermore, both sub-problems can be solved optimally (under proper assumptions on the fading process).
To lay the context, consider transmission over a slowly-fading Gaussian channel. The channel undergoes block fading, where the fading gain is constant over a block of n channel uses and changes independently across blocks. The block length n is assumed to be sufficiently long such that under the given delay constraints (finite transmission duration), one codeword can be reliably transmitted to the receiver. The input-output relationship across B fading blocks is given by
y b i = h b · x b i + n b i , i { 1 , , n } , b { 1 , , B } ,
where x b i and y b i are the transmitted and received symbols at time i in block b, h b is the fading coefficient in block b, and n b i accounts for the AWGN distributed according to N C ( 0 , 1 ) . Denote the channel gains by s b = | h b | 2 , for b { 1 , , B } , and denote the CDF of s b , known to the transmitter, by F b : R + [ 0 , 1 ] . Accordingly, denote the associated PDF by f b : R + R + . Finally, set p b i = E [ | x b i | 2 ] as the transmission power at time i in block b, and define p b as the aggregate power used in block b, i.e.,
p b = i = 1 n E [ | x b i | 2 ] = i = 1 n p b i .
Let g b i denote the amount of energy harvested during time slot i of block b. Accordingly, corresponding to each block b define the vectors p b = [ p b 1 , , p b n ] T and g b = [ g b 1 , , g b n ] T . The transmitter is equipped with a battery whose capacity order dominates that of the amount of harvested energy. This induces a set of power consumption constraints according to which the amount of energy consumption up to each time instant cannot exceed the harvested energy up to that point. Specifically, by defining
𝟙 i = [ 1 , , 1 i , 0 , , 0 n i ] T , i { 1 , , n } ,
corresponding to each pair b { 1 , , B } and i { 1 , , n }
j = 1 b 1 𝟙 n T · p j + 𝟙 i T · p b j = 1 b 1 𝟙 n T · g j + 𝟙 i T · g b .
Based on this approach, when the aggregate transmission power over any transmission block is p and the actual channel gain during that block is s = | h | 2 , define ρ ( p , s ) as the density of the power allocated to the information layer indexed by s. Hence, the amount of power allocated to realization s is ρ ( p , s ) d s , and the amount of interference power imposed on the receiver designated to the channel realization with gain s is
I p , s = s ρ p , u d u .
To satisfy the power constraint for the aggregate power split across different layers, the following condition must be satisfied.
I ( p , 0 ) = p .
Based on such power allocation and interference terms, the average rate over all possible fading realizations within one transmission block is
R b ( p b ) = 0 [ 1 F b ( s ) ] s · ρ b p b , s 1 + s · I b p b , s d s ,
Sum-rate optimization is constrained with the energy availability constraints in (477) and the aggregate power allocation constraint I b ( p b , 0 ) = p b . Hence, the optimal allocation of power across information layers and over time is the solution to the following problem, which involves a stochastic guarantee on meeting the power constraints.
R = max { p b } , { ρ b ( p b , s ) } b = 1 B R b ( p b ) s . t . P j = 1 b 1 𝟙 n T · p j + 𝟙 i T · p b j = 1 b 1 𝟙 n T · g j + 𝟙 i T · g b η , b , i I b ( p b , 0 ) = p b , b p b 0 , b .

6.5.1. Optimal Power Allocation Densities

Based on (481), for any given set of power allocation terms { p b : b { 1 , , B } } , the set of optimal densities can be found as the solution to
P ( p 1 , , p B ) = max { ρ b ( p b , s ) } b = 1 B R b ( p b ) s . t . I b ( p b , 0 ) = p b , b .
By noting the expansions of I b ( p , s ) and R b ( p ) in (478) and (480), respectively, we have
R b ( p ) = 0 [ 1 F b ( s ) ] · s · I b ( p , s ) s 1 + s · I b p , s d s .
Based on this characterization, for a given power allocation over time { p b : b { 1 , , B } } , we have
I b ( p , s ) = 1 F b ( s ) s 2 f b ( s ) 1 s , b s u b 0 , otherwise ,
where b and u b can be determined uniquely by solving
I b ( p b , b ) = p b a n d I b ( p b , u b ) = 0 .
The analysis directly follows the same line of arguments as in the setting without an energy harvesting transmitter. Based on the characterization of interference residual functions { I b : b { 1 , , B } } , the optimal rate over the fading block b { 1 , , B } at the fading state s is
R b ( p b , s ) = 0 for s < b ln s 2 f b ( s ) b 2 f b ( b ) for b s u b ln u b 2 f b ( u b ) b 2 f b ( b ) for u b s ,
Subsequently, the average transmission rate over the fading block b with aggregate power p b is
R b ( p b ) = ln u b 2 f b ( u b ) b 2 f b ( b ) b u b 2 s + f b ( s ) f b ( s ) · F b ( s ) d s .
which can be used to show the interesting property that for any continuous CDF, R b ( p b ) , it is non-decreasing and strictly concave in p b  [229].

6.5.2. Optimal Power Allocation over Time

Next, based on the given allocation of power across information layers and leveraging the key properties of R b ( p b ) , i.e., concavity and being non-decreasing, optimal power distribution over time can be delineated. For this purpose, we present the solution to the following problem studied in [238], which is a more general problem that subsumes both problems R its special case.
Q ( γ ) = max { p b } b = 1 B w b ( p b ) s . t . i = 1 b p i γ b b p b 0 b ,
where γ = [ γ 1 , , γ B ] and w b : R + R + is strictly concave and non-decreasing in p b . Based on the expressions for R b ( p ) , the sum-rate over block b depends on the power vector p b only through its sum p b , defined in (475). This implies that instead of enforcing the energy availability constraints in (477), we can equivalently enforce a constraint only on the aggregate power in each block. Hence, by defining
γ b = i = 1 b 𝟙 n T · g i ,
the linear constraints in R can be equivalently stated as the linear constraint in Q . The detailed steps of solving the problem (488) analytically and the attendant performance guarantees are discussed in details in [238], a summary of which is provided next.
In order to facilitate different steps in the analysis, define the following auxiliary problem, solving which is instrumental to characterizing the properties of interest. Corresponding to each pair i and j such that 1 i < j B define
Q i j ( γ ) = max { p b } b = i j w b ( p b ) s . t . b = i j p b = γ j γ i p b 0 , b { i , , j } ,
which has a unique globally optimal solution since the utility function is strictly concave.

6.5.3. Grouping the Constraints

The auxiliary term p ˜ has a pivotal role in establishing the properties of p . Corresponding to p we define the auxiliary vector p ˜ by slightly modifying Algorithm 1. Specifically, by modifying line 1 to initiate the values of γ b according to γ b = = 1 b p . This modified version of Algorithm 1 successively partitions the set of constraints { = 1 b p γ b } into d disjoint subsets of constraints. Specifically, it returns time indices u 0 < u 1 < < u d < B , and partitions the set { 1 , , B } into d disjoint sets
D i = { u i 1 + 1 , , u i } , f o r i { 1 , , d } .
Furthermore, this algorithm computes the metrics { v i : i { 1 , , d } } and assigns v i to the set D i . Once these sets are known, solving Q reduces to solving a collection of smaller problems in the form of Q u i 1 u i ( γ ) defined in (490). The properties of p ˜ are formalized next.
Theorem 17.
Given p as the optimal solution to Q , vector p ˜ satisfies all the constraints of Q . Furthermore, the vector p ˜ satisfies b = 1 B w b ( p ˜ b ) b = 1 B w b ( p b ) and the equality holds if and only if p = p ˜ .
This establishes the optimality of p ˜ generated by modifying Algorithm 1.
Theorem 18.
If p is the optimal solution to the problem Q , then p ˜ generated by modifying Algorithm 1 is also optimal. Uniqueness of p indicates p ˜ = p .
Algorithm 1. Computing p .
1: set γ b according to (489) b { 1 , , B } .
2: initialize d = 0 and u 0 = 0 ,
3: while u d B 1
4:     d d + 1
5:    set A d = { u d 1 + 1 , , B }
6:    for b A d
7:       set y d , b as the solution to Q u d 1 b ( γ )
8:       set q d , b = min d w i d y ( y i d , b ) : i { u d 1 + 1 , , b }
9:    end for
10:     u d = arg max b A d q d , b (if not unique select the smallest)
11:     v d = max b A d q d , b
12:     z d = y d , u d
13: end while
14: for i { 1 , , d }
15:    for b D i = { u i 1 + 1 , , u i }
16:        p b = z b i
17:    end for
18: end for

6.5.4. Dominant Constraints

By leveraging the results in the previous subsection, which partition the set of constraints into a collection of d disjoint constraint sets, additional properties for these sets of constraints can be concluded. Specifically, in each of the given d sets, it can be shown that one constraint holds with equality, which we refer to as the dominant constraint. These d dominant constraints are the only constraints needed to characterize the optimal solution p . This property is formalized in the following theorem.
Theorem 19.
Under the optimal solution p , all the inequality constraints with indices included in { u m : m { 1 , , d } } hold with equality. Furthermore, the sequence { v 1 , v 2 , , v d } is strictly decreasing.
We remark that the set of indices { u i : i { 1 , , d } } and measures { v i : i { 1 , , d } } have significant physical meanings in power allocation. The elements of { u i : i { 1 , , d } } specify the time instances at which all the resources arrived by that time instance are entirely consumed. Furthermore, the second part of Lemma 19 establishes a connection among the derivative measures q d , b and v d defined in Algorithm 1. In particular, the measures { v i : i { 1 , , d } } are the derivatives of the utility functions at the optimal solution p over time.

6.5.5. Optimality of Algorithm 1

So far we have shown that if we modify Algorithm 1 such that instead of initializing the terms γ b as defined in (489) we initialize them based on p , then the output will be in fact the optimal solution p . Next we show that initiating Algorithm 1 with either γ b = = 1 b p or according to (489) yields the same output. The underlying insight is that closer scrutiny of Algorithm 1 shows that this algorithm depends on p primarily for determining the metrics { v i : i { 1 , , d } } and their associated constraint indices { u i : i { 1 , , d } } . By invoking the result of Lemma 19, we next show that for determining the sets { v i : i { 1 , , d } } and { u i : i { 1 , , d } } , alternatively, we can also initialize γ b according to (489), based on which we can show that the outcome of Algorithm 1 will be, in fact, the optimal solution p . This observation is formalized in the following theorem.
Theorem 20.
By setting γ b according to (489), Algorithm 1 generates the optimal solution of Q .

7. Outlook

We conclude this survey by providing an outlook for some of the key open or uninvestigated research directions.
  • Single-user MIMO channel. Designing an optimal broadcast approach for the general MIMO channel is still an open problem since the MIMO channel is a non-degraded broadcast channel [68,69]. Its capacity region is known for multiple users with private messages [50], and for two users with a common message [67]. However, a complete characterization of the broadcast approach requires the full solution of the most general MIMO broadcast channel with a degraded message set [21], which is not yet available (infinite number of realizations, for H with Gaussian components), and hence suboptimal ranking procedures were considered. Various degraded message sets and transmission schemes with sub-optimal ranking at the receiver are studied in [23,70,71]. Formulation of the general MIMO broadcasting with degraded message sets and the optimization of the layering power distribution, which maximizes the expected rate, is stated in (71) and (73). This optimization problem does not lend itself to a closed-form solution and remains an open problem for future research. The framework analyzed in [239], which uses rate-splitting and binning, may be useful for the general broadcast problem with degraded message sets. It is shown in [240] that a tight upper bound might be obtained for the two users broadcast channel by adding an auxiliary receiver. Generalizing this work for multiple users may provide an efficient tool for obtaining outer bounds in general and on the MIMO broadcast approach.
The capacity region of a compound multiple-antenna broadcast channel is characterized under a particular degradedness order of users in [241]. The channel considered there has two users, where each user has a finite set of possible realizations. This again suggests that there is much room for further research to fully characterize the broadcast approach for the general MIMO channel. The majority of contributions discussed so far have considered Gaussian distribution for transmitted signals. It may be of interest to apply the broadcast approach to finite-input signals [242], or even binary-input channels [243]. This facilitates analyzing more practical settings and, in turn, obtaining tighter achievable bounds with the broadcast approach.
  • Binary-dirty paper coding. DPC has a pivotal role in Gaussian broadcast transmissions. Owing to its optimality for some settings (e.g., MIMO broadcast channel [50]), an interesting research direction is investigating the performance or operation gains (e.g., rate and latency) of using DPC instead of superposition coding in the settings discussed in Section 2 and Section 6. From a broader perspective, binning techniques facilitate DPC to be effective beyond Gaussian channels. In particular, Marton’s general capacity region relies on the basic elements of binning [244], in the context of which the classical Gelfand–Pinsker [245] strategy can be interpreted as a vertex point [245]. The Gelfand–Pinsker strategy in the Gaussian domain becomes DPC [91,245]. The study in [246] addresses both binning and superposition coding aspects in a unified framework. Furthermore, this study also investigates mismatched decoding, which can account for the imperfect availability of the CSI at the receivers. It is also noteworthy that throughout the paper, we primarily focused on the notion of physically degraded channels and rank-ordering them based on their degradedness. Nevertheless, it is important to investigate less restrictive settings, such as less-noisy channels [94,247,248].
  • Secrecy. When considering the broadcast approach, it is natural to look also at secrecy in communications. Such an approach not only involves determining which decoded messages depend on the channel state, but it also involves determining those that are required to be kept secret [201,202,209,249]. This can be designed as part of the multi-layer broadcast approach.
  • Latency. There are various aspects in which delay constraints in communications may impact the system design, some of which were discussed in Section 2. There exists significant room for incorporating fixed-to-variable channel coding and variable-to-variable channel coding in the broadcast approach. In a way, this is a combination of variable-to-fixed coding (broadcast approach) and fixed-to-variable coding (that is, Fountain-like schemes). For example, some applications allow decoding following multiple independent transmission blocks, as considered in [87], and studied by its equivalent channel setting, which is the MIMO parallel channel [20]. Queuing theory can be used to analyze the expected achievable latency, as in [80]. An interesting observation is that layering often offers higher latency gains than throughput gains. The problem of resource allocation for delay minimization, even under a simple queue model as in [80], remains an open problem for further research. Similarly, a generalization of the queue model with parallel queues associated with multiple streams, each with a different arrival random process and a different delay constraint, is an important direction to investigate.
  • Connection to I-MMSE. It is well-known that the scalar additive Gaussian noise channel has the single crossing point property between the MMSE in the estimate of the input given the channel output. This property also provides an alternative proof to the capacity region of the scalar two-user Gaussian broadcast channel [250]. This observation is extended to the vector Gaussian channel [71] via information-theoretic properties on the mutual information, using the I-MMSE relationship, a fundamental connection between estimation theory and information theory shown in [250]. An interesting future direction is investigating the impact of I-MMSE relation on the broadcast approach.
  • Information bottleneck. Another interesting setting is the information bottleneck channel. In this channel model, a wireless block fading channel is connected to a reliable channel with limited capacity, referred to as the bottleneck channel [198,199]. In these studies, it is assumed that the transmitted signal is Gaussian, which made it possible to describe the optimal continuous layering power distribution in closed-form expressions. Extensions beyond Gaussian have both practical and theoretical significance.
One may consider the bottleneck channel setting, as depicted in Figure 36, where the transmitted signal is not necessarily Gaussian. Define the random variable triplet x t z that form a Markov chain, and are related according to (452), i.e., y = x + n , where x and n are independent random variables, with n N ( 0 , 1 ) being real Gaussian with a unit variance. The transmitted signal x distribution is subject to optimization, and SNR = P · s , and P are the transmission power E [ x 2 ] = P . The bottleneck channel output z is a compressed version of y adhering to a limited capacity of the bottleneck channel C, i.e., I ( y ; z ) C . It is of interest to maximize I ( x ; z ) , with a maximizing probability that is not necessarily Gaussian, see for example [251]. It is conjectured in [252] that the optimal distribution maximizing I ( x ; z ) is discrete. The bottleneck channel may also consist of multiple independent relays connected through digital links to the destination, creating a distributed bottleneck. This setting is the CEO problem with logarithmic loss [253,254], and under this setting, the broadcast approach for multi-access channels [90] becomes very beneficial. With other loss functions, e.g., MMSE, the problem falls within source quality via broadcasting. Hence, the distributed bottleneck can also be viewed as source-channel coding problems with a distortion performance measure, as discussed in Section 6.3. A model with two relays, known as the diamond channel, is also interesting and relevant. In the oblivious non-fading case, the optimal transmission and relay compression, together with joint decompression at the receiver, are known and characterized in [255]. For the non-oblivious diamond channel, only upper bounds [256], and achievable rates of the type discussed in [257] are available. It may also be interesting to consider the setting of recent work [258] and extend it to the case that no CSIT is available and consider a broadcast approach strategy for each user. Another possible direction is extending [211] to scenarios in which the variable backhaul links capacities { C i } are available only at the destination. Adapting the broadcast MIMO approach for the vector bottleneck channel [23,259] is another important direction.
  • Implementation. The actual implementation of the broadcast approach, in general, is a rich topic for further research. Evidently, as it is mainly associated with layered decoding, this can be done by a variety of advanced coding and modulation techniques such as the low-density parity-check (LDPC) codes and turbo codes. The work in [260] considers LDPC implementation in conjunction with rate-splitting (no CSIT) in the interference channel, and [261] provides bounds on LDPC codes over an erasure channel with variable erasures. Polar codes can be directly adopted for implementing the broadcast approach as their decoding is based on successive cancellations, and hence they naturally fit in the broadcast approach. Its efficiency has been demonstrated in the general broadcast channel [262,263], and further its ability to work on general channels without adapting the transmitter to the actual channel [264] demonstrates the special features that are central to the broadcast approach. Furthermore, its applicability to multiple description [265] make it a natural candidate that can be used for implementing joint source-channel coding via a broadcast approach. Polar codes may also be used to practically address the variable-to-variable rate channel coding, as it is suitable for variable-to-fixed channel coding as well as fixed-to-variable channel coding, as demonstrated in [266] for rateless codes. Power allocation across different information layers in special cases is investigated in [267], and there is room for further generalizing the results.
  • Finite blocklength. This paper focuses primarily on the asymptotically long transmission blocks. It is also essential to analyze the broadcast approach in the non-asymptotic block length regime. In such regimes, one could compromise the distribution of rates (asymptotic regime) with second-order descriptions, or even random coding error exponents, as there is a tradeoff between the error exponent rate of a finite block and the maximum rate. The practical aspects of communication under stringent finite blocklength constraints are discussed in [268].
  • Identification via channels. The identification problem introduced in [269] is another case of a state-dependent channel. Its objective is communicating messages over a channel to select a group of messages at the receiver. This is in contrast to Shannon’s formulation in which the objective is selecting one message. Many of the challenges pertinent to state-dependent channels and the lack of CSIT that appear in Shannon’s formulation are relevant for the identification problem as well. Recent studies on the identification via channels without the CSIT include [270].
  • Mixed-delay constraints. One major challenge in modern communication systems is heterogeneity in data type and their different attendant constraints. One such constraint pertains to latency, where different data types and streams can face various delay constraints. The broadcast approach investigated for addressing mixed-delay constraints in the single-user channel [84], can be further extended to address this problem in more complex settings (e.g., soft handoff in cellular systems [86] and C-RAN uplink [85]) while facing the lack of CSIT and in the context of fixed-to-variable channel coding [6] and fountain codes [271].
  • Source coding. Another application is source coding with successive refinement where side information at the receiver (Wyner–Ziv) can be different, e.g., another communications link that might provide information and its quality is not known at the transmitter [272]. Another possible extension is the combination of successive refinements and broadcast approach [32].
  • Caching. In cooperative communication, it is common that relay stations perform data caching [273,274], and the transmitter has no information about what is being cached. This random aspect of the amount and location (for multi-users) of cashing might play an interesting role in a broadcast approach for such a system.
  • Algebraic structured codes. The information-theoretic analyses of the networks reviewed in this paper generally are based on unstructured code design. In parallel to unstructured codes, there is rich literature on the structured design of codes with a wide range of applications to multi-terminal communication (e.g., multiple access and interference channels) and distributed source coding. A thorough recent overview of algebraic codes is available in [275].
  • Networking. All different settings and scenarios discussed in this article play important roles in communication networks. As a network’s size and complexity grow, the users cannot be all provided with the complete and instantaneous state of the networks. Specifically, in the future wireless systems (e.g., 6G), cell-based hierarchical network architectures will be dispensed with [276]. In such networks, acquiring the CSI at the transmitters will be impossible, in which case the broadcast approach will be effective in circumventing the lack of CSIT. Furthermore, network coding can be incorporated in the broadcast approach, as it can account for latency, general wireless impediments (e.g., fading), and various network models, e.g., the relay, broadcast, interference, and multiple-access channels [277].
    Finally, we highlight that the broadcast approach’s hallmark is that it enables communication systems to adapt their key communication performance metrics (e.g., data rate, service latency, and message distortion) to the actual realizations of the communication channels. Such a feature is especially important as the size, scale, and complexity of the communication systems grow, rendering the instantaneous acquisition of channel realizations at the transmitters costly, if not prohibitive altogether. Adapting communication to unknown channels is an inherent property of communication systems in the pre-digital (analog) era, facilitating the mainstream adoption of broadcasting technologies for distributing audio and video contents. The broadcast technology instates this property in digital communication systems as well.

Author Contributions

All authors have contributed equally to the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

The work of A. Tajer has been supported in part by the U.S. National Science Foundation under the grant ECCS-1933107. The work of S. Shamai has been supported by the European Union’s Horizon 2020 Research And Innovation Program, grant agreement no. 694630, and the WIN consortium via the Israel minister of economy and science.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AFamplify-and-forward
AQFhybrid amplify-quantize-and-forward
AWGNadditive white Gaussian noise
BCCbroadcasting coherent combining
BIRbroadcasting incremental redundancy
CCcoherent combining
CDFcumulative distribution function
CDMAcode-division multiple access
CFcompress-and-forward
CSIchannel state information
CSITchannels state information at the transmitter sites
DCdelay constrained
DFdecode-and-forward
DoFDegrees-of-freedom
DSdirect-sequence
DSLdigital subscriber line
FCSIfull CSI
FUUfraction of undecodable users
HARQhybrid automatic retransmission request
HKHan–Kobayashi
IRincremental redundancy
LTSCLong-term static channel
MACmulti-access channel
MFmatched filter
MIMOmultiple input multiple output
MISOmultiple input single output
MLCmulti-level coding
MMSEminimum mean squared-error
NDCnon-delay constrained
OARoutage approach retransmission
PDFprobability distribution function
PETpriority encoding transmission
QFquantize-and-forward
RVrandom variable
SDFsequential decode and forward
SICsuccessive interference cancellation
SINRsignal to interference and noise ratio
SISOsingle input single output
SIMOsingle input multiple output
SNRsignal-to-noise ratio
SRsuccessive refinement

Appendix A. Constants of Theorem 7

b 1 ( u , v ) = min j J 1 C s v β u v , s j B 1 ( j , u , v ) + s v B 2 ( j , u , v ) ,
b 2 ( u , v ) = C s v β u v , ( s v + s ) B 3 ( u , v ) ,
b 3 ( u , v ) = C 2 s v β u v , 2 s v B 3 ( u , v ) ,
b 4 ( u , v ) = C s u β v u , s B 4 ( u , v ) + s u B 5 ( u , v ) ,
b 5 ( u , v ) = C 2 s v β v u , 2 s v B 3 ( u , v ) ,
b 6 ( u , v ) = min ( j , k ) J 2 { C s j β v u + s k β u v , s j B 6 ( k , u , v ) + s k B 7 ( k , u , v ) } ,
b 7 ( u , v ) = C s v ( β u v + β v u ) , ( s v + s ) B 3 ( u , v ) ,
b 8 ( u , v ) = C 2 s v ( β u v + β v u ) , 2 s v B 3 ( u , v ) ,
b 9 ( u , v ) = min ( j , k ) J 3 { C s j ( β u v + β v u ) + s k β u v , ( s j + s k ) B 3 ( u , v ) } ,
b 10 ( u , v ) = min j , k J 3 { C s j ( β u v + β v u ) + s k β v u , ( s j + s k ) B 3 ( u , v ) ) } ,
b 11 ( u ) = C s u β u u , ( s u + s ) B 8 ( u , u ) ,
b 12 ( u ) = C 2 s u β u u , 2 s u B 8 ( u , u ) ,
and
B 1 ( j , u , v ) = 1 n = 1 j m = 1 v 1 β m n n = 1 u β v n ,
B 2 ( j , u , v ) = 1 n = 1 v 1 m = 1 j β m n n = 1 u β n v ,
B 3 ( u , v ) = 1 n = 1 v 1 m = 1 v 1 β m n n = 1 u β v n n = 1 u β n v ,
B 4 ( u , v ) = 1 n = 1 v 1 m = 1 u β m n n = 1 u β n v ,
B 5 ( u , v ) = 1 n = 1 u m = 1 v 1 β m n n = 1 u β v n ,
B 6 ( j , u , v ) = 1 n = 1 j m = 1 v 1 β m n n = 1 u β v n ,
B 7 ( j , u , v ) = 1 n = 1 j m = 1 v 1 β n m n = 1 u β n v
B 8 ( u , v ) = 1 n = 1 u m = 1 v β m n .

Appendix B. Corner Points in Figure 16

The coordinates of the corner points of Figure 17 are specified as follows
T : ( 0 , b 1 ) , U : ( b 2 , b 1 ) , V : ( b 7 , b 1 ) , W : ( b 3 , b 4 ) , X : ( f 1 , f 2 ) , Y : ( b 5 , b 6 ) , Z : ( b 5 , 0 ) ,
where we have defined
b 1 = p 1 C ( s 1 , 0 ) + p 2 C ( s 2 , 0 ) ,
b 2 = q 1 C s 1 , s 2 + q 2 C s 2 , s 2 ,
b 3 = q 1 ρ i * + q 2 ρ ^ j * ,
b 4 = p 1 μ i * + p 2 μ ^ j * ,
b 5 = q 1 C ( s 1 , 0 ) + q 2 C ( s 2 , 0 ) ,
b 6 = p 11 C s 1 , s 1 + p 12 C s 2 , s 1 + p 21 C s 1 , s 2 + p 22 C s 2 , s 2 ,
b 7 = p 11 C s 1 , s 1 + p 21 C s 2 , s 1 + p 12 C s 1 , s 2 + p 22 C s 2 , s 2 ,
f 1 = q 1 C s 1 , 0 + q 2 C s 2 β 12 1 , s 1 + s 2 β 22 1 + C ( s 2 β 22 1 , 0 ) ,
f 2 = p 11 C ( 2 s 1 , 0 ) + ( p 12 + p 21 ) C ( s 1 + s 2 , 0 ) + p 22 C ( 2 s 2 , 0 ) f 1 ,
and we have defined i * = arg max i μ i and j * = arg max j μ ^ j for
μ 1 = p 1 C ( s 1 , 0 ) + p 2 [ C ( s 1 + s 2 , 2 s 1 ) + C ( s 1 , 0 ) ] ,
μ 2 = p 1 [ C ( 2 s 1 , s 1 + s 2 ) + C ( s 2 , 0 ) ] + p 2 C ( s 2 , 0 ) ,
μ ^ 1 = p 1 C ( s 1 , 0 ) + p 2 [ C ( 2 s 2 , s 1 + s 2 ) + C ( s 1 , 0 ) ] ,
μ ^ 2 = p 1 [ C ( s 1 + s 2 , 2 s 2 ) + C ( s 2 , 0 ) ] + p 2 C ( s 2 , 0 ) ,
ρ 1 = C ( s 1 , s 1 ) , ρ 2 = C ( s 1 , s 2 ) ,
ρ ^ 1 = C ( s 2 , s 1 ) ,
ρ ^ 2 = C ( s 2 , s 2 ) .

References

  1. Burnashev, M.V. Data transmission over discrete channel with feedback: Random transmission time. Probl. Peredachi Inf. 1976, 12, 10–30. [Google Scholar]
  2. Tchamkerten, A.; Telatar, E. Variable length coding over an unknown channel. IEEE Trans. Inf. Theory 2006, 52, 2126–2145. [Google Scholar] [CrossRef] [Green Version]
  3. Shayevitz, O.; Feder, M. Achieving the empirical capacity using feedback: Memoryless additive models. IEEE Trans. Inf. Theory 2009, 55, 1269–1295. [Google Scholar] [CrossRef]
  4. Polyanskiy, Y.; Poor, H.V.; Verdú, S. Variable-length coding with feedback in the non-asymptotic regime. In Proceedings of the IEEE International Symposium on Information Theory, Austin, TX, USA, 13–18 June 2010. [Google Scholar]
  5. Tyagi, H.; Narayan, P. State-dependent channels: Strong converse and bounds on reliability function. In Excursions in Harmonic Analysis; Springer: Cambridge, MA, USA, 2013. [Google Scholar]
  6. Verdú, S.; Shamai (Shitz), S. Variable-rate channel capacity. IEEE Trans. Inf. Theory 2010, 56, 2651–2667. [Google Scholar] [CrossRef]
  7. Biglieri, E.; Proakis, J.; Shamai (Shitz), S. Fading channels: Information-theoretic and communication aspects. IEEE Trans. Inf. Theory 1998, 44, 2619–2692. [Google Scholar] [CrossRef]
  8. Shamai (Shitz), S.; Telatar, E. Some information-theoretic aspects of decentralized power control in multiple access fading channels. In Proceedings of the Information Theory and Networking Workshop, Metsovo, Greece, 27 June–1 July 1999. [Google Scholar]
  9. Sharif, M.; Hassibi, B. Delay considerations for opportunistic scheduling in broadcast fading channels. IEEE Trans. Wirel. Commun. 2007, 6, 3353–3363. [Google Scholar] [CrossRef] [Green Version]
  10. Asadi, A.; Mancuso, V. A survey on opportunistic scheduling in wireless communications. IEEE Commun. Surv. Tutor. 2013, 15, 1671–1688. [Google Scholar] [CrossRef]
  11. Zhao, Q.; Sadler, B.M. A survey of dynamic spectrum access. IEEE Signal Process. Mag. 2007, 24, 79–89. [Google Scholar] [CrossRef]
  12. Tanab, M.E.; Hamouda, W. Resource allocation for underlay cognitive radio networks: A survey. IEEE Commun. Surv. Tutor. 2016, 19, 1249–1276. [Google Scholar] [CrossRef]
  13. Ozarow, L.; Shamai (Shitz), S.; Wyner, A. Information-theoretic considerations for cellular mobile radio. IEEE Trans. Veh. Technol. 1994, 43, 359–378. [Google Scholar] [CrossRef]
  14. Hanly, S.V.; Tse, D.N.C. Multiaccess fading channels—Part II: Delay-limited capacities. IEEE Trans. Inf. Theory 1998, 44, 2816–2831. [Google Scholar] [CrossRef]
  15. Li, L.; Jindal, N.; Goldsmith, A. Outage capacities and optimal power allocation for fading multiple-access channels. IEEE Trans. Inf. Theory 2005, 51, 1326–1347. [Google Scholar] [CrossRef]
  16. Narasimhan, R. Individual outage rate regions for fading multiple access channels. In Proceedings of the IEEE International Symposium on Information Theory, Nice, France, 24–29 June 2007; pp. 1571–1575. [Google Scholar]
  17. Haghi, A.; Khosravi-Farsani, R.; Aref, M.; Marvasti, F. The capacity region of fading multiple access channels with cooperative encoders and partial CSIT. In Proceedings of the IEEE International Symposium on Information Theory, Austin, TX, USA, 13–18 June 2010; pp. 485–489. [Google Scholar]
  18. Das, A.; Narayan, P. Capacities of time-varying multiple-access channels with side information. IEEE Trans. Inf. Theory 2001, 48, 4–25. [Google Scholar] [CrossRef]
  19. Jafar, S. Capacity with causal and noncausal side information: A unified view. IEEE Trans. Inf. Theory 2006, 52, 5468–5474. [Google Scholar] [CrossRef]
  20. Cohen, K.M.; Steiner, A.; Shamai (Shitz), S. On the broadcast approach over parallel MIMO two-state fading channel. In Proceedings of the IEEE International Zurich Seminar on Information and Communication, Zurich, Switzerland, 26–28 February 2020. [Google Scholar]
  21. Körner, J.; Marton, K. General broadcast channels with degraded message sets. IEEE Trans. Inf. Theory 1977, 23, 60–64. [Google Scholar] [CrossRef]
  22. Nair, C.; El Gamal, A. The capacity region of a class of three-receiver broadcast channels with degraded message sets. IEEE Trans. Inf. Theory 2009, 55, 4479–4493. [Google Scholar] [CrossRef]
  23. Shamai (Shitz), S.; Steiner, A. A broadcast approach for a single-user slowly fading MIMO channel. IEEE Trans. Inf. Theory 2003, 49, 2617–2635. [Google Scholar] [CrossRef]
  24. Cover, T.M. Broadcast channels. IEEE Trans. Inf. Theory 1972, 18, 2–14. [Google Scholar] [CrossRef] [Green Version]
  25. Shamai (Shitz), S. A broadcast strategy for the Gaussian slowly fading channel. In Proceedings of the IEEE International Symposium on Information Theory, Ulm, Germany, 29 June–4 July 1997; p. 150. [Google Scholar]
  26. Berger, T.; Gibson, J.D. Lossy source coding. IEEE Trans. Inf. Theory 1998, 44, 2693–2723. [Google Scholar] [CrossRef] [Green Version]
  27. Wolf, J.K.; Wyner, A.D.; Ziv, J. Source coding for multiple descriptions. Bell Syst. Tech. J. 1980, 59, 1417–1426. [Google Scholar] [CrossRef]
  28. Steiner, A.; Shamai (Shitz), S. The broadcast approach in communications systems. In Proceedings of the IEEE Convention of Electrical and Electronics Engineers in Israel, Eilat, Israel, 3–5 December 2008. [Google Scholar]
  29. Equitz, W.H.R.; Cover, T.M. Successive refinement of information. IEEE Trans. Inf. Theory 1991, 37, 269–275. [Google Scholar] [CrossRef] [Green Version]
  30. Rimoldi, B. Successive refinement of information: Characterization of the achievable rates. IEEE Trans. Inf. Theory 1994, 40, 253–259. [Google Scholar] [CrossRef]
  31. Ng, C.T.K.; Tian, C.; Goldsmith, A.J.; Shamai (Shitz), S. Minimum expected distortion in Gaussian source coding with uncertain side information. In Proceedings of the IEEE Information Theory Workshop, Solstrand, Norway, 1–6 July 2007; pp. 454–459. [Google Scholar]
  32. Tian, C.; Steiner, A.; Shamai (Shitz), S.; Diggavi, S.N. Successive Refinement Via Broadcast: Optimizing Expected Distortion of a Gaussian Source Over a Gaussian Fading Channelaussian fading channel. IEEE Trans. Inf. Theory 2008, 54, 2903–2918. [Google Scholar] [CrossRef] [Green Version]
  33. Ng, C.T.K.; Gunduz, D.; Goldsmith, A.J.; Erkip, E. Distortion minimization in Gaussian layered broadcast coding with successive refinement. IEEE Trans. Inf. Theory 2009, 55, 5074–5086. [Google Scholar] [CrossRef]
  34. Ng, C.T.K.; Tian, C.; Goldsmith, A.J.; Shamai (Shitz), S. Minimum expected distortion in Gaussian source coding with fading side information. IEEE Trans. Inf. Theory 2012, 58, 5725–5739. [Google Scholar] [CrossRef] [Green Version]
  35. Duhamel, P.; Kieffer, M. Joint Source-Channel Decoding. A Cross-Layer Perspective with Applications in Video Broadcasting over Mobile and Wireless Networks; Academic Press: Cambridge, NY, USA, 2009. [Google Scholar]
  36. Trott, M. Unequal error protection codes: Theory and practice. In Proceedings of the IEEE Information Theory Workshop, Haifa, Israel, 9–13 June 1996. [Google Scholar]
  37. Boucheron, S.; Salamatian, M.R. About priority encoding transmission. IEEE Trans. Inf. Theory 2000, 46, 609–705. [Google Scholar] [CrossRef]
  38. Boucheron, S.; Salamatian, M.R. Priority encoding transmission. IEEE Trans. Inf. Theory 1996, 42, 1737–1744. [Google Scholar] [CrossRef]
  39. Woyach, K.; Harrison, K.; Ranade, G.; Sahai, A. Comments on unknown channels. In Proceedings of the IEEE Information Theory Workshop, Lausanne, Switzerland, 3–7 September 2012. [Google Scholar]
  40. Cover, T.M.; Thomas, J.A. Elements of Information Theory, 2nd ed.; John Wiley & Sons: Hoboken, NJ, USA, 2006. [Google Scholar]
  41. Tse, D.N.C. Optimal power allocation over parallel Gaussian broadcast channels. In Proceedings of the IEEE International Symposium on Information Theory, Ulm, Germany, 29 June–4 July 1997; p. 27. [Google Scholar]
  42. Li, L.; Goldsmith, A. Capacity and optimal resource allocation for fading broadcast channels. I: Ergodic capacity. IEEE Trans. Inf. Theory 2001, 47, 1102–1127. [Google Scholar]
  43. Li, L.; Goldsmith, A. Capacity and optimal resource allocation for fading broadcast channels. II: Outage capacity. IEEE Trans. Inf. Theory 2001, 47, 1103–1127. [Google Scholar]
  44. Viswanath, P.; Tse, D.N.C. Sum capacity of the multiple antenna broadcast channel. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002. [Google Scholar]
  45. Vishwanath, S.; Jindal, N.; Goldsmith, A. Duality, achievable rates and sum-rate capacity of Gaussian MIMO broadcast channel. IEEE Trans. Inf. Theory 2003, 49, 2658–2668. [Google Scholar] [CrossRef] [Green Version]
  46. Kramer, G.; Vishwanath, S.; Shamai (Shitz), S.; Goldsmith, A. Information-theoretic issues concerning broadcasting. In Proceedings of the IEEE Workshop on Signal Processing for Wireless Communications, Rutgers University, NJ, USA, 7–9 October 2002. [Google Scholar]
  47. Caire, G.; Shamai (Shitz), S. On the achievable throughput of a multi-antenna Gaussian broadcast channel. IEEE Trans. Inf. Theory 2002, 49, 1691–1706. [Google Scholar] [CrossRef]
  48. Yu, W.; Cioffi, J. The sum capacity of a Gaussian vector broadcast channel. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002. [Google Scholar]
  49. El Gamal, A. Capacity of the product and sum of two unmatched broadcast channels. Probl. Peredachi Inf. 1980, 16, 3–23. [Google Scholar]
  50. Weingarten, H.; Steinberg, Y.; Shamai (Shitz), S. The capacity region of the Gaussian multiple-input multiple-output broadcast channel. IEEE Trans. Inf. Theory 2006, 52, 3936–3964. [Google Scholar] [CrossRef]
  51. Sesia, S.; Caire, G.; Vivier, G. Broadcasting a common source: Information-thoeretic results and system challenges. In Proceedings of the IEEE International Symposium on Information Theory, Monte Verita, Switzerland, 24–27February 2003. [Google Scholar]
  52. Shulman, N.; Feder, M. Source broadcasting with unknown amount of receiver side information. In Proceedings of the IEEE Information Theory Workshop, Banglore, India, 20–25 October 2002. [Google Scholar]
  53. Schramn, P. Multilevel coding with independent decoding on levels for efficient communications on static and interleaved fading channels. In Proceedings of the IEEE Personal, Indoor and Mobile Radio Communications, Helsinki, Finland, 1–4 September 1997; pp. 1196–1200. [Google Scholar]
  54. Schill, D.; Huber, J. On hierarchical signal constellations for the Gaussian broadcast channel. In Proceedings of the International Conference on Telecommunications, Porto Carras, Greece, 21–25 June 1998. [Google Scholar]
  55. Schill, D.; Yuan, D.; Huber, J. Efficient broadcasting using multilevel codes. In Proceedings of the Information Theory and Networking Workshop, Metsovo, Greece, 27 June–1 July 1999; p. 72. [Google Scholar]
  56. Sajadieh, M.; Kschischang, F.R.; Leon-Garcia, A. Analysis of two-layered adaptive transmission systems. In Proceedings of the IEEE Vehicular Technology Conference, Atlanta, Georgia, 28 April–1 May 1996; pp. 1771–1775. [Google Scholar]
  57. Liu, Y.; Lau, K.; Takeshita, C.; Fitz, M. Optimal rate allocation for superposition coding in quasi-static fading channels. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002; p. 111. [Google Scholar]
  58. Viterbi, A.J. Very low rate conventional codes for maximum theoretical performance of spread-spectrum multiple-access channels. IEEE J. Sel. Areas Commun. 1990, 8, 641–649. [Google Scholar] [CrossRef]
  59. Geldfand, I.; Fomin, S. Calculus of Variations; Courier Corporation: Mineola, NY, USA, 2000. [Google Scholar]
  60. Avestimehr, A.S.; Tse, D.N.C. Outage capacity of the fading relay channel in the low-SNR regime. IEEE Trans. Inf. Theory 2007, 53, 1401–1415. [Google Scholar] [CrossRef] [Green Version]
  61. Bustin, R.; Schaefer, R.F.; Poor, H.V.; Shamai (Shitz), S. An i-MMSE based graphical representation of rate and equivocation for the Gaussian broadcast channel. In Proceedings of the IEEE Conference on Communications and Network Security, Florence, Italy, 28–30 September 2015; pp. 53–58. [Google Scholar]
  62. Steiner, A.; Shamai (Shitz), S. Achievable rates with imperfect transmitter side information using a broadcast transmission strategy. IEEE Trans. Wirel. Commun. 2008, 7, 1043–1051. [Google Scholar] [CrossRef] [Green Version]
  63. Steiner, A.; Shamai (Shitz), S. Multi -layer broadcasting hybrid-ARQ strategies for block fading channels. IEEE Trans. Wirel. Commun. 2008, 7, 2640–2650. [Google Scholar] [CrossRef]
  64. Shen, C.; Liu, T.; Fitz, M.P. Aggressive transmission with ARQ in quasi-static fading channels. In Proceedings of the IEEE International Conference on Communications, Shanghai, China, 19–23 May 2008; pp. 1092–1097. [Google Scholar]
  65. Steiner, A.; Shamai (Shitz), S. Multi-layer broadcast hybrid-ARQ strategies. In Proceedings of the IEEE International Zurich Seminar on Information and Communication, Zurich, Switzerland, 3–5 March 2008; pp. 148–151. [Google Scholar]
  66. Telatar, E. Capacity of multi-antenna Gaussian channels. Eur. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
  67. Geng, Y.; Nair, C. The capacity region of the two-receiver Gaussian vector broadcast channel with private and common messages. IEEE Trans. Inf. Theory 2014, 60, 2087–2104. [Google Scholar] [CrossRef]
  68. Chong, H.; Liang, Y. The capacity region of the class of three-receiver Gaussian MIMO multilevel broadcast channels with two-degraded message sets. IEEE Trans. Inf. Theory 2014, 60, 42–53. [Google Scholar] [CrossRef]
  69. Chong, H.; Liang, Y. On the capacity region of the parallel degraded broadcast channel with three receivers and three-degraded message sets. IEEE Trans. Inf. Theory 2018, 64, 7–5017. [Google Scholar] [CrossRef]
  70. Steiner, A.; Shamai (Shitz), S. Hierarchical coding for a MIMO channel. In Proceedings of the IEEE Convention of Electrical and Electronics Engineers in Israel, Tel-Aviv, Israel, 6–7 September 2004; pp. 72–75. [Google Scholar]
  71. Bustin, R.; Payaro, M.; Palomar, D.P.; Shamai (Shitz), S. On MMSE crossing properties and implications in parallel vector Gaussian channels. IEEE Trans. Inf. Theory 2013, 59, 818–844. [Google Scholar] [CrossRef]
  72. Marshall, A.; Olkin, I. Inequalities: Theory of Majorization and Its Applications; Academic Press: New York, NY, USA, 1979. [Google Scholar]
  73. Shamai (Shitz), S. A broadcast approach for the multiple-access slow fading channel. In Proceedings of the IEEE International Symposium on Information Theory, Sorrento, Italy, 25–30 June 2000; p. 128. [Google Scholar]
  74. Steiner, A.; Shamai (Shitz), S. Multi-layer broadcasting over a block fading MIMO channel. IEEE Trans. Wirel. Commun. 2007, 6, 3937–3945. [Google Scholar] [CrossRef]
  75. Telatar, E.; Gallager, R.G. Combining queueing theory with information theory for multiaccess. IEEE Sel. Areas Commun. 1995, 13, 963–969. [Google Scholar] [CrossRef] [Green Version]
  76. Ephremides, A.; Hajek, B. Information theory and communication networks: An unconsummated union. IEEE Trans. Inf. Theory 1998, 44, 2416–2434. [Google Scholar] [CrossRef]
  77. Gallager, R.G. A perspective on multiaccess channels. IEEE Trans. Inf. Theory 1985, 31, 124–142. [Google Scholar] [CrossRef]
  78. Yoo, J.W.; Liu, T.; Shamai (Shitz), S.; Tian, C. Worst-case expected-capacity loss of slow-fading channels. IEEE Trans. Inf. Theory 2013, 59, 3764–3779. [Google Scholar] [CrossRef]
  79. Bettesh, I.; Shamai (Shitz), S. Optimal power and rate control for minimal average delay: The single-user case. IEEE Trans. Inf. Theory 2006, 52, 4115–4141. [Google Scholar] [CrossRef]
  80. Steiner, A.; Shamai (Shitz), S. On queueing and multilayer coding. IEEE Trans. Inf. Theory 2010, 56, 2392–2415. [Google Scholar] [CrossRef]
  81. Wolff, R.W. Stochastic Modeling and the Theory of Queues; Perentice-Hall: Englewood Cliffs, NJ, USA, 1989. [Google Scholar]
  82. Bettesh, I. Information and Network Theory Aspects of Communication Systems in Fading Enviornment. Ph.D. Thesis, Technion–Israel Institute of Technology, Shan Tou, China, 2003. [Google Scholar]
  83. Kleirock, L. Queueing Systems Volume 2: Theory; John Wiley: New York, NY, USA, 1975. [Google Scholar]
  84. Cohen, K.M.; Steiner, A.; Shamai (Shitz), S. The broadcast approach under mixed delay constraints. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012; pp. 209–213. [Google Scholar]
  85. Nikbakht, H.; Wigger, M.; Hachem, W.; Shamai (Shitz), S. Mixed delay constraints on a fading C-RAN uplink. In Proceedings of the IEEE Information Theory Workshop, Visby, Sweden, 25–28 August 2019. [Google Scholar]
  86. Nikbakht, H.; Wigger, M.A.; Shamai (Shitz), S. Multiplexing gains under mixed-delay constraints on Wyner’s soft-handoff model. Entropy 2020, 22, 182. [Google Scholar] [CrossRef] [Green Version]
  87. Whiting, P.A.; Yeh, E.M. Broadcasting over uncertain channels with decoding delay constraints. IEEE Trans. Inf. Theory 2006, 52, 904–921. [Google Scholar] [CrossRef]
  88. Cover, T.M. Comments on broadcast channels. IEEE Trans. Inf. Theory 1998, 44, 2524–2530. [Google Scholar] [CrossRef] [Green Version]
  89. Zohdy, M.; Tajer, A.; Shamai (Shitz), S. Broadcast approach to multiple access with local CSIT. IEEE Trans. Commun. 2019, 67, 7483–7498. [Google Scholar] [CrossRef]
  90. Kazemi, S.; Tajer, A. Multiaccess communication via a broadcast approach adapted to the multiuser channel. IEEE Trans. Commun. 2018, 66, 3341–3353. [Google Scholar] [CrossRef]
  91. Costa, M. Writing on dirty paper. IEEE Trans. Inf. Theory 1983, 29, 439–441. [Google Scholar] [CrossRef]
  92. Cohen, A.; Lapidoth, A. Generalized writing on dirty paper. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002. [Google Scholar]
  93. Ahlswede, R. Multi-way communication channels. In Proceedings of the IEEE International Symposium on Information Theory, Hong Kong, China, 2–8 June 1971; pp. 103–105. [Google Scholar]
  94. Kim, Y.-H.; El Gamal, A. Network Information Theory; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  95. Cemal, Y.; Steinberg, Y. The multiple-access channel with partial state information at the encoders. IEEE Trans. Inf. Theory 2005, 51, 3992–4003. [Google Scholar] [CrossRef]
  96. Sen, N.; Como, G.; Yuksel, S.; Alajaji, F. On the capacity of memoryless finite-state multiple access channels with asymmetric noisy state information at the encoders. In Proceedings of the Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, 28–30 September 2011; pp. 1210–1215. [Google Scholar]
  97. Basher, U.; Shirazi, A.; Permuter, H.H. Capacity region of finite state multiple-access channels with delayed state information at the transmitters. IEEE Trans. Inf. Theory 2012, 58, 3430–3452. [Google Scholar] [CrossRef] [Green Version]
  98. Şen, N.; Alajaji, F.; Yiiksel, S.; Como, G. Multiple access channel with various degrees of asymmetric state information. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012; pp. 1697–1701. [Google Scholar]
  99. Şen, N.; Alajaji, F.; Yüksel, S.; Como, G. Memoryless multiple access channel with asymmetric noisy state information at the encoders. IEEE Trans. Inf. Theory 2013, 59, 7052–7070. [Google Scholar] [CrossRef]
  100. Lapidoth, A.; Steinberg, Y. The multiple-access channel with causal side information: Double state. IEEE Trans. Inf. Theory 2013, 59, 1379–1393. [Google Scholar] [CrossRef]
  101. Lapidoth, A.; Steinberg, Y. The multiple-access channel with causal side information: Common state. IEEE Trans. Inf. Theory 2013, 59, 32–50. [Google Scholar] [CrossRef]
  102. Li, M.; Simeone, O.; Yener, A. Multiple access channels with states causally known at transmitters. IEEE Trans. Inf. Theory 2013, 59, 1394–1404. [Google Scholar] [CrossRef] [Green Version]
  103. Kotagiri, S.P.; Laneman, J.N. Multiaccess channels with state known to some encoders and independent messages. Eurasip J. Wirel. Commun. Netw. 2008, 2008, 450680. [Google Scholar] [CrossRef] [Green Version]
  104. Lapidoth, A.; Steinberg, Y. The multiple access channel with two independent states each known causally to one encoder. In Proceedings of the IEEE International Symposium on Information Theory, Austin, TX, USA, 13–18 June 2010; pp. 480–484. [Google Scholar]
  105. Permuter, H.H.; Shamai (Shitz), S.; Somekh-Baruch, A. Message and state cooperation in multiple access channels. IEEE Trans. Inf. Theory 2011, 57, 6379–6396. [Google Scholar] [CrossRef]
  106. Wang, I.H. Approximate capacity of the dirty multiple-access channel with partial state information at the encoders. IEEE Trans. Inf. Theory 2012, 58, 2781–2787. [Google Scholar] [CrossRef]
  107. Emadi, M.J.; Khormuji, M.N.; Skoglund, M.; Aref, M.R. Multi-layer Gelfand-Pinsker strategies for the generalised multiple-access channel. IET Commun. 2014, 8, 1296–1308. [Google Scholar] [CrossRef]
  108. Monemizadeh, M.; Bahmani, E.; Hodtani, G.A.; Seyedin, S.A. Gaussian doubly dirty compound multiple-access channel with partial side information at the transmitters. IET Commun. 2014, 8, 2181–2192. [Google Scholar] [CrossRef] [Green Version]
  109. Sreekumar, S.; Dey, B.K.; Pillai, S.R.B. Distributed rate adaptation and power control in fading multiple access channels. IEEE Trans. Inf. Theory 2015, 61, 5504–5524. [Google Scholar] [CrossRef] [Green Version]
  110. Emadi, M.J.; Zamanighomi, M.; Aref, M.R. Multiple-access channel with correlated states and cooperating encoders. IET Commun. 2012, 6, 1857–1867. [Google Scholar] [CrossRef]
  111. Permuter, H.H.; Weissman, T.; Chen, J. Capacity region of the finite-state multiple-access channel with and without feedback. IEEE Trans. Inf. Theory 2009, 55, 2455–2477. [Google Scholar] [CrossRef] [Green Version]
  112. Minero, P.; Tse, D.N.C. A broadcast approach to multiple access with random states. In Proceedings of the IEEE International Symposium on Information Theory, Nice, France, 24–29 June 2007; pp. 2566–2570. [Google Scholar]
  113. Kazemi, S.; Tajer, A. A broadcast approach to multiple access adapted to the multiuser channel. In Proceedings of the IEEE International Symposium on Information Theory, Aachen, Germany, 25–30 June 2017; pp. 883–887. [Google Scholar]
  114. Zou, S.; Liang, Y.; Shamai (Shitz), S. Multiple access channel with state uncertainty at transmitters. In Proceedings of the IEEE International Symposium on Information Theory, Istanbul, Turkey, 7 July–12 July 2013; pp. 1466–1470. [Google Scholar]
  115. Cao, J.; Yeh, E.M. Asymptotically optimal multiple-access communication via distributed rate splitting. IEEE Trans. Inf. Theory 2007, 51, 304–319. [Google Scholar] [CrossRef] [Green Version]
  116. Knopp, R.; Humblet, P.A. Information capacity and power control in single-cell multiuser communications. In Proceedings of the IEEE International Conference on Communications, Seattle, WA, USA, 18–22 June 1995; pp. 331–335. [Google Scholar]
  117. Cadambe, V.R.; Jafar, S.A. Interference alignment and degrees of freedom of the K-user interference channel. IEEE Trans. Inf. Theory 2008, 54, 3425–3441. [Google Scholar] [CrossRef] [Green Version]
  118. Maddah-Ali, M.A.; Motahari, A.S.; Khandani, A.K. Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis. IEEE Trans. Inf. Theory 2008, 54, 3457–3470. [Google Scholar] [CrossRef]
  119. Han, T.; Kobayashi, K. A new achievable rate region for the interference channel. IEEE Trans. Inf. Theory 1981, 27, 49–60. [Google Scholar] [CrossRef] [Green Version]
  120. Chong, H.-F.; Motani, M.; Garg, H.K.; el Gamal, H. On the Han–Kobayashi region for the interference channel. IEEE Trans. Inf. Theory 2008, 54, 3188–3195. [Google Scholar] [CrossRef]
  121. Etkin, R.H.; David, N.; Wang, H. Gaussian interference channel capacity to within one bit. IEEE Trans. Inf. Theory 2008, 54, 5534–5562. [Google Scholar] [CrossRef] [Green Version]
  122. Carleial, A. A case where interference does not reduce capacity. IEEE Trans. Inf. Theory 1975, 21, 569–570. [Google Scholar] [CrossRef]
  123. Sato, H. The capacity of the Gaussian interference channel under strong interference. IEEE Trans. Inf. Theory 1981, 27, 786–788. [Google Scholar] [CrossRef]
  124. Benzel, R. The capacity region of a class of discrete additive degraded interference channels. IEEE Trans. Inf. Theory 1979, 25, 228–231. [Google Scholar] [CrossRef]
  125. El Gamal, A.; Costa, M. The capacity region of a class of deterministic interference channels. IEEE Trans. Inf. Theory 1982, 28, 343–346. [Google Scholar] [CrossRef] [Green Version]
  126. Cadambe, V.R.; Jafar, S.A.; Vishwanath, S. The capacity region of a class of deterministic Z-channels. In Proceedings of the IEEE International Symposium on Information Theory, Seoul, Korea, 28 June–3 July 2009; pp. 2634–2638. [Google Scholar]
  127. Chong, H.-F.; Motani, M.; Garg, H.K. The capacity region of a class of interference channels. In Proceedings of the IEEE International Symposium on Information Theory, Nice, France, 24–29 June 2007; pp. 2856–2860. [Google Scholar]
  128. Bresler, G.; Tse, D.N.C. The two-user Gaussian interference channel: A deterministic view. Eur. Trans. Telecommun. 2008, 19, 333–354. [Google Scholar] [CrossRef] [Green Version]
  129. Villacrés, G.; Koch, T.; Sezgin, A.; Vazquez-Vilar, G. Robust signaling for bursty interference. Entropy 2018, 20, 870. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  130. Yi, X.; Sun, H. Opportunistic treating interference as noise. IEEE Trans. Inf. Theory 2020, 66, 520–533. [Google Scholar] [CrossRef]
  131. Yi, X.; Sun, H. Opportunistic topological interference management. IEEE Trans. Commun. 2020, 68, 521–535. [Google Scholar] [CrossRef]
  132. Wang, L.; Sasoglu, E.; Kim, Y.-H. Sliding-window superposition coding for interference networks. In Proceedings of the IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; pp. 2749–2753. [Google Scholar]
  133. Bandemer, B.; el Gamal, A.; Kim, Y.-H. Optimal achievable rates for interference networks with random codes. IEEE Trans. Inf. Theory 2015, 61, 6536–6549. [Google Scholar] [CrossRef]
  134. Tuan, H.D.; Tam, H.H.M.; Nguyen, H.H.; Duong, T.Q.; Poor, H.V. Superposition signaling in broadcast interference networks. IEEE Trans. Commun. 2017, 65, 4646–4656. [Google Scholar] [CrossRef]
  135. Yagi, H.; Poor, H.V. Multi-level rate-splitting for synchronous and asynchronous interference channels. In Proceedings of the IEEE International Symposium on Information Theory, St. Petersburg, Russia, 31 July–5 August 2011; pp. 2080–2084. [Google Scholar]
  136. Zhao, Y.; Tan, C.W.; Avestimehr, A.S.; Diggavi, S.N.; Pottie, G.J. On the maximum achievable sum-rate with successive decoding in interference channels. IEEE Trans. Inf. Theory 2012, 58, 3798–3820. [Google Scholar] [CrossRef]
  137. Geng, C.; Naderializadeh, N.; Avestimehr, A.S.; Jafar, S.A. On the optimality of treating interference as noise. IEEE Trans. Inf. Theory 2015, 61, 1753–1767. [Google Scholar] [CrossRef] [Green Version]
  138. Ashraphijuo, M.; Tajer, A.; Gong, C.; Wang, X. A receiver-centric approach to interference management: Fairness and outage optimization. IEEE Trans. Inf. Theory 2016, 62, 5619–5642. [Google Scholar] [CrossRef]
  139. Huang, C.; Jafar, S.A.; Shamai (Shitz), S.; Vishwanath, S. On degrees of freedom region of MIMO networks without channel state information at transmitters. IEEE Trans. Inf. Theory 2012, 58, 849–857. [Google Scholar] [CrossRef]
  140. Zhu, Y.; Guo, D. The degrees of freedom of isotropic MIMO interference channels without state information at the transmitters. IEEE Trans. Inf. Theory 2012, 58, 341–352. [Google Scholar] [CrossRef]
  141. Vaze, C.S.; Varanasi, M.K. The degree-of-freedom regions of MIMO broadcast, interference, and cognitive radio channels with no CSIT. IEEE Trans. Inf. Theory 2012, 58, 5354–5374. [Google Scholar] [CrossRef]
  142. Gou, T.; Jafar, S.A.; Wang, C. On the degrees of freedom of finite state compound wireless networks. IEEE Trans. Inf. Theory 2011, 57, 3286–3308. [Google Scholar] [CrossRef]
  143. Shin, W.; Lee, B.; Shim, B.; Lee, J. A MIMO relay with delayed feedback can improve DoF in k-user MISO interference channel with no CSIT. IEEE Trans. Veh. Technol. 2016, 65, 10188–10192. [Google Scholar] [CrossRef]
  144. Jeon, Y.-S.; Lee, N.; Tandon, R. Degrees of freedom and achievable rate of wide-band multi-cell multiple access channels with no CSIT. IEEE Trans. Commun. 2017, 66, 1772–1786. [Google Scholar] [CrossRef]
  145. Morales-Céspedes, M.; Vandendorpe, L.; Armada, A.G. Degrees of freedom of 2-tier networks without channel state information at the transmitter. IEEE Signal Process. Lett. 2019, 26, 382–386. [Google Scholar] [CrossRef]
  146. Jafar, S.A. Blind interference alignment. IEEE J. Sel. Signal Process. 2012, 6, 216–227. [Google Scholar] [CrossRef]
  147. Lu, Y.; Zhang, W. Blind interference alignment in the K-user MISO interference channel. In Proceedings of the IEEE Global Communications Conference, Atlanta, GA, USA, 9–13 December 2013; pp. 3464–3469. [Google Scholar]
  148. Lu, Y.; Zhang, W.; Letaief, K.B. Blind interference alignment with diversity in k-user interference channels. IEEE Trans. Commun. 2014, 62, 2850–2859. [Google Scholar] [CrossRef]
  149. Jafar, S.A. Exploiting channel correlations-simple interference alignment schemes with no CSIT. In Proceedings of the IEEE Global Communications Conference, Miami, FL, USA, 6–10 December 2010. [Google Scholar]
  150. Gou, T.; Wang, C.; Jafar, S.A. Aiming perfectly in the dark-blind interference alignment through staggered antenna switching. IEEE Trans. Signal Process. 2011, 59, 2734–2744. [Google Scholar] [CrossRef]
  151. Wang, C.; Papadopoulos, H.C.; Ramprashad, S.A.; Caire, G. Improved blind interference alignment in a cellular environment using power allocation and cell-based clusters. In Proceedings of the IEEE International Conference on Communications, Kyoto, Japan, 5–9 June 2011. [Google Scholar]
  152. Akoum, S.; Chen, C.S.; Debbah, M.; Heath, R.W. Data sharing coordination and blind interference alignment for cellular networks. In Proceedings of the IEEE Global Communications Conference, Anaheim, CA, USA, 3–7 December 2012; pp. 4273–4277. [Google Scholar]
  153. Wang, C. Degrees of freedom characterization: The 3-user SISO interference channel with blind interference alignment. IEEE Commun. 2014, 18, 757–760. [Google Scholar] [CrossRef]
  154. Castanheira, D.; Silva, A.; Gameiro, A. Retrospective interference alignment: Degrees of freedom scaling with distributed transmitters. IEEE Trans. Inf. Theory 2017, 63, 1721–1730. [Google Scholar] [CrossRef]
  155. Chen, X.; Zhang, Z.; Zheng, L.; Wu, L.; Dang, J.; Lu, P.-S.; Sun, C. Blind interference alignment in two-cell Z interference MIMO channel. IEEE Access 2017, 5, 10526–10532. [Google Scholar] [CrossRef]
  156. Jafar, S.A. Topological interference management through index coding. IEEE Trans. Inf. Theory 2013, 60, 529–568. [Google Scholar] [CrossRef]
  157. Naderializadeh, N.; Avestimehr, A.S. Interference networks with no CSIT: Impact of topology. IEEE Trans. Inf. Theory 2014, 61, 917–938. [Google Scholar] [CrossRef]
  158. Morales-Céspedes, M.; Plata-Chaves, J.; Toumpakaris, D.; Jafar, S.A.; Garcı, A. Blind interference alignment for cellular networks. IEEE Trans. Signal Process. 2014, 63, 41–56. [Google Scholar] [CrossRef] [Green Version]
  159. Yang, H.; Shin, W.; Lee, J. Degrees of freedom for K-user SISO interference channels with blind interference alignment. In Proceedings of the Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 8–11 November 2015; pp. 1097–1101. [Google Scholar]
  160. Akhlaghi, S.; Baghani, M. On the average achievable rate of block fading decentralized interference channel. IEEE Commun. Lett. 2011, 15, 992–994. [Google Scholar] [CrossRef]
  161. Vahid, A.; Maddah-Ali, M.A.; Avestimehr, A.S.; Zhu, Y. Binary fading interference channel with no CSIT. IEEE Trans. Inf. Theory 2017, 63, 3565–3578. [Google Scholar] [CrossRef]
  162. Zhu, Y.; Shen, C. On layered erasure interference channels without CSI at transmitters. In Proceedings of the IEEE International Symposium on Information Theory, Barcelona, Spain, 10–15 July 2016; pp. 710–714. [Google Scholar]
  163. Raja, A.; Prabhakaran, V.M.; Viswanath, P. The two-user compound interference channel. IEEE Trans. Inf. Theory 2009, 55, 5100–5120. [Google Scholar] [CrossRef] [Green Version]
  164. Zhu, Y.; Guo, D. Ergodic fading Z-interference channels without state information at transmitters. IEEE Trans. Inf. Theory 2011, 57, 2627–2647. [Google Scholar] [CrossRef]
  165. Lin, P.-H.; Jorswieck, E.A.; Schaefer, R.F. On ergodic fading Gaussian interference channels with statistical CSIT. In Proceedings of the IEEE Information Theory Workshop, Cambridge, UK, 11–14 September 2016; pp. 454–458. [Google Scholar]
  166. Lin, P.-H.; Jorswieck, E.A.; Janda, C.R.; Mittelbach, M.; Schaefer, R.F. On stochastic orders and fading Gaussian multi-user channels with statistical CSIT. In Proceedings of the IEEE International Symposium on Information Theory, Paris, France, 7–12 July 2019; pp. 1497–1501. [Google Scholar]
  167. Sebastian, J.; Karakus, C.; Diggavi, S.; Wang, I.-H. Rate splitting is approximately optimal for fading Gaussian interference channels. In Proceedings of the Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, 30 September–2 October 2015; pp. 315–321. [Google Scholar]
  168. Sebastian, J.; Karakus, C.; Diggavi, S. Approximate capacity of fast fading interference channels with no instantaneous CSIT. IEEE Trans. Commun. 2018, 66, 6015–6027. [Google Scholar] [CrossRef] [Green Version]
  169. Carleial, A. Interference channels. IEEE Trans. Inf. Theory 1978, 24, 60–70. [Google Scholar] [CrossRef]
  170. Sason, I. On achievable rate regions for the Gaussian interference channel. IEEE Trans. Inf. Theory 2004, 50, 1345–1356. [Google Scholar] [CrossRef]
  171. Zohdy, M.; Tajer, A.; Shamai (Shitz), S. Distributed interference management: A broadcast approach. IEEE Trans. On Commun. 2021, 69, 149–163. [Google Scholar] [CrossRef]
  172. Gong, C.; Abu-Ella, O.; Tajer, A.; Wang, X. Constrained group decoder for interference channels. J. Commun. Spec. Issue Future Dir. Comput. Netw. 2012, 7, 382–390. [Google Scholar] [CrossRef]
  173. Katz, M.; Shamai (Shitz), S. Transmitting to colocated users in wireless ad hoc and sensor networks. IEEE Trans. Inf. Theory 2005, 51, 3540–3563. [Google Scholar] [CrossRef]
  174. Katz, M.; Shamai (Shitz), S. Relaying protocols for two colocated users. IEEE Trans. Inf. Theory 2006, 52, 2329–2344. [Google Scholar] [CrossRef] [Green Version]
  175. Katz, M.; Shamai (Shitz), S. On the outage probability of a multiple-input single-output communication link. IEEE Trans. Wirel. Commun. 2007, 6, 4120–4128. [Google Scholar] [CrossRef]
  176. Katz, M.; Shamai (Shitz), S. Cooperative schemes for a source and an occasional nearby relay in wireless networks. IEEE Trans. Inf. Theory 2009, 55, 5138–5160. [Google Scholar] [CrossRef]
  177. Steiner, A.; Shamai (Shitz), S. Single-user broadcasting protocols over a two-hop relay fading channel. IEEE Trans. Inf. Theory 2006, 52, 4821–4838. [Google Scholar] [CrossRef] [Green Version]
  178. Steiner, A.; Sanderovich, A.; Shamai (Shitz), S. Broadcast cooperation strategies for two colocated users. IEEE Trans. Inf. Theory 2007, 53, 3394–3412. [Google Scholar] [CrossRef] [Green Version]
  179. Braginskiy, E.; Steiner, A.; Shamai (Shitz), S. Oblivious sequential decode and forward cooperative strategies for the wireless relay channel. IEEE Trans. Commun. 2012, 60, 3228–3238. [Google Scholar] [CrossRef]
  180. Zamani, M.; Khandani, A.K. Broadcast approaches to the diamond channel. IEEE Trans. Inf. Theory 2014, 60, 623–642. [Google Scholar] [CrossRef] [Green Version]
  181. Simeone, O.; Somekh, O.; Erkip, E.; Poor, H.V.; Shamai (Shitz), S. A broadcast approach to robust communications over unreliable multi-relay networks. In Proceedings of the IEEE Information Theory and Applications Workshop, San Diego, CA, USA, 8–13 February 2009; pp. 334–340. [Google Scholar]
  182. Baghani, M.; Akhlaghi, S.; Golzadeh, V. Average achievable rate of broadcast strategy in relay-assisted block fading channels. IET Commun. 2016, 10, 346–355. [Google Scholar] [CrossRef]
  183. Akhlaghi, S.; Hoseini, S.A.K. Power allocation strategies in block-fading two-way relay networks. J. Commun. Eng. 2019, 8, 2–313. [Google Scholar]
  184. Attia, M.A.; Shaqfeh, M.; Seddik, K.; Alnuweiri, H. Power optimization for layered transmission over decode-and-forward relay channels. In Proceedings of the IEEE International Wireless Communications and Mobile Computing Conference, Nicosia, Cyprus, 4–8 August 2014; pp. 594–599. [Google Scholar]
  185. Laneman, J.; Tse, D.N.C.; Wornell, G. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Trans. Inf. Theory 2004, 50, 3062–3080. [Google Scholar] [CrossRef]
  186. Gunduz, D.; Erkip, E. Opportunistic cooperation and power control strategies for delay-limited capacity. In Proceedings of the Conference on Information Sciences and Systems, Baltimore, MD, USA, 18–20 March 2005. [Google Scholar]
  187. Yuksel, M.; Erkip, E. Diversity gains and clustering in wireless relaying. In Proceedings of the IEEE International Symposium on Information Theory, Chicago, IL, USA, 27 June–2 July 2004. [Google Scholar]
  188. Boyer, J.; Falconer, D.D.; Yanikomeroglu, H. On the aggregate SNR of amplified relaying channels. In Proceedings of the IEEE Global Communications Conference, Dallas, TX, USA, 3 November–3 December 2004; pp. 3394–3398. [Google Scholar]
  189. Liu, Z.; Stankovic, V.; Xiong, Z. Practical compress-and-forward code design for the half-duplex relay channel. In Proceedings of the IEEE Conference on Information Sciences and Systems, Baltimore, MD, USA, 20–22 March 2005. [Google Scholar]
  190. Wyner, A.; Ziv, J. The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory 1976, 22, 1–10. [Google Scholar] [CrossRef]
  191. Berger, T. Rate Distortion Theory, A Mathematical Basis for Data Compression; Prentice-Hall: Englewood Cliffs, NJ, USA, 1971. [Google Scholar]
  192. Abramowitz, M.; Stegun, I. (Eds.) Handbook of Mathematical Functions; National Bureau of Standards: Gaithersburg, MD, USA, 1964. [Google Scholar]
  193. Steinberg, Y.; Merhav, N. On successive refinement for the Wyner-Ziv problem. IEEE Trans. Inf. Theory 2004, 50, 1636–1654. [Google Scholar] [CrossRef]
  194. Ishwar, P.; Puri, R.; Ramchandran, K.; Pradhan, S.S. On rate-constrained distributed estimation in unreliable sensor networks. IEEE J. Selected Areas Commun. 2005, 34, 765–775. [Google Scholar] [CrossRef]
  195. Chen, J.; Berger, T. Robust distributed source coding. IEEE Trans. Inf. Theory 2008, 54, 3385–3398. [Google Scholar] [CrossRef] [Green Version]
  196. Steiner, A.; Lupu, V.; Katz, U.; Shamai (Shitz), S. The spectral efficiency of successive cancellation with linear multiuser detection for randomly spread CDMA. IEEE Trans. Inf. Theory 2012, 58, 2850–2873. [Google Scholar] [CrossRef]
  197. Kim, J.; Park, S. Broadcast coding and successive refinement for layered UE cooperation in multi-user downlink. IEEE Wirel. Commun. Lett. 2020, 9, 893–896. [Google Scholar] [CrossRef]
  198. Steiner, A.; Shamai (Shitz), S. Broadcast approach for the information bottleneck channel. In Proceedings of the IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems, Tel Aviv, Israel, 4–6 November 2019. [Google Scholar]
  199. Steiner, A.; Shamai (Shitz), S. Broadcast approach under information bottleneck capacity uncertainty. In Proceedings of the IEEE Information Theory and Applications Workshop, San Diego, CA, USA, 6–11 February 2020. [Google Scholar]
  200. Steiner, A.; Shamai (Shitz), S. Broadcast approach for the information bottleneck channel. IEEE Trans. Commun. 2021. [Google Scholar] [CrossRef]
  201. Liang, Y.; Lai, L.; Poor, H.V.; Shamai (Shitz), S. A broadcast approach for fading wiretap channels. IEEE Trans. Inf. Theory 2014, 60, 842–858. [Google Scholar] [CrossRef] [Green Version]
  202. Liang, Y.; Lai, L.; Poor, H.V.; Shamai (Shitz), S. An improved broadcast approach for fading wiretap channels. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012. [Google Scholar]
  203. Tulino, A.; Caire, G.; Shamai (Shitz), S. Broadcast approach for the sparse-input random-sampled MIMO Gaussian channel. In Proceedings of the IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; pp. 621–625. [Google Scholar]
  204. Simeone, O.; Somekh, O.; Erkip, E.; Poor, H.V.; Shamai (Shitz), S. Multirelay channel with non-ergodic link failures. In Proceedings of the IEEE Information Theory Workshop on Networking and Information Theory, Volos, Greece, 10–12 June 2009; pp. 52–56. [Google Scholar]
  205. Park, S.-H.; Simeone, O.; Sahin, O.; Shamai (Shitz), S. Multi-Layer Transmission and Hybrid Relaying for Relay Channels with Multiple Out-of-Band Relays. arXiv 2020, arXiv:1304.3826. [Google Scholar] [CrossRef] [Green Version]
  206. Park, S.H.; Simeone, O.; Sahin, O.; Shamai (Shitz), S. Robust layered transmission and compression for distributed uplink reception in cloud radio access networks. IEEE Trans. Veh. Technol. 2014, 63, 204–216. [Google Scholar] [CrossRef]
  207. Park, S.-H.; Simeone, O.; Shamai (Shitz), S. Robust baseband compression against congestion in packet-based fronthaul networks using multiple description coding. Entropy 2019, 21, 433. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  208. Simeone, O.; Somekh, O.; Erkip, E.; Poor, H.V.; Shamai (Shitz), S. Robust communication via decentralized processing with unreliable backhaul links. IEEE Trans. Inf. Theory 2011, 57, 4187–4201. [Google Scholar] [CrossRef]
  209. Zou, S.; Liang, Y.; Lai, L.; Poor, H.V.; Shamai (Shitz), S. Broadcast Networks With Layered Decoding and Layered Secrecy: Theory and Applications. Proc. IEEE 2015, 103, 1841–1856. [Google Scholar] [CrossRef]
  210. Zou, S.; Liang, Y.; Lai, L.; Poor, H.V.; Shamai (Shitz), S. Degrade broadcast channel with secrecy outside a bounded range. IEEE Trans. Inf. Theory 2018, 64, 2104–2120. [Google Scholar] [CrossRef] [Green Version]
  211. Karasik, R.; Simeone, O.; Shamai (Shitz), S. Robust uplink communications over fading channels with variable backhaul connectivity. In Proceedings of the IEEE International Symposium on Information Theory, Istanbul, Turkey, 7–12 July 2013; pp. 1172–1176. [Google Scholar]
  212. Karasik, R.; Simeone, O.; Shamai (Shitz), S. Robust uplink communications over fading channels with variable backhaul connectivity. IEEE Trans. Wirel. Commun. 2013, 12, 5788–5799. [Google Scholar] [CrossRef] [Green Version]
  213. Huleihel, W.; Merhav, N.; Shamai (Shitz), S. On compressive sensing in coding problems: A rigorous approach. IEEE Trans. Inf. Theory 2015, 61, 5727–5744. [Google Scholar] [CrossRef] [Green Version]
  214. Simeone, O.; Erkip, E.; Shamai (Shitz), S. Robust transmission and interference management for femtocells with unreliable network access. IEEE J. Sel. Areas Commun. 2010, 28, 1469–1478. [Google Scholar] [CrossRef]
  215. Tse, D.N.C.; Hanly, S. Linear multiuser receivers: Effective interference, effective bandwidth and user capacity. IEEE Trans. Inf. Theory 1999, 45, 641–657. [Google Scholar] [CrossRef]
  216. Verdú, S.; Shamai (Shitz), S. Spectral efficiency of CDMA with random spreading. IEEE Trans. Inf. Theory 1999, 45, 622–640. [Google Scholar] [CrossRef]
  217. Shamai (Shitz), S.; Verdú, S. The impact of frequency-flat fading on the spectral efficiency of CDMA. IEEE Trans. Inf. Theory 2001, 47, 1302–1327. [Google Scholar] [CrossRef]
  218. Shamai (Shitz), S.; Zaidel, B.; Verdú, S. Strongest-users-only detectors for randomly spread CDMA. In Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, 30 June–5 July 2002. [Google Scholar]
  219. Medard, M.; Huang, J.; Goldsmith, A.J.; Meyn, S.P.; Coleman, T.P. Capacity of time-slotted ALOHA packetized multiple-access systems over the AWGN channel. IEEE Trans. Wirel. Commun. Wirel. Commun. 2004, 3, 486–499. [Google Scholar] [CrossRef]
  220. Caire, G.; Tuninetti, D.; Verdú, S. Variable-rate coding for slowly fading Gaussian multiple-access channels. IEEE Trans. Inf. Theory 2004, 50, 2271–2292. [Google Scholar] [CrossRef]
  221. Koshelev, V.N. Hierarchical coding of discrete sources. Probl. Inf. 1980, 16, 3–31. [Google Scholar]
  222. Sesia, S.; Caire, G.; Vivier, G. Lossy transmission over slow-fading AWGN channels: A comparison of progressive and superposition and hybrid approaches. In Proceedings of the IEEE International Symposium on Information Theory, Adelaide, Australia, 4–9 September 2005; pp. 224–228. [Google Scholar]
  223. Etemadi, F.; Jafarkhani, H. Optimal layered transmission over quasi-static fading channels. In Proceedings of the IEEE International Symposium on Information Theory, Seattle, WA, USA, 9–14 July 2006; pp. 1051–1055. [Google Scholar]
  224. Caire, G.; Narayanan, K. On the distortion SNR exponent of hybrid digital-analog space-time coding. IEEE Trans. Inf. Theory 2007, 53, 2867–2878. [Google Scholar] [CrossRef]
  225. Gunduz, D.; Erkip, E. Source and channel coding for quasi-static fading channels. In Proceedings of the Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, 30 October–2 November 2005; pp. 18–22. [Google Scholar]
  226. Chechik, G.; Globerson, A.; Tishby, N.; Weiss, Y. Information bottleneck for Gaussian variables. In Proceedings of the Advances in Neural Information Processing Systems, Vancouver, BC, Canada, 13–18 December 2004; Thrun, S., Saul, L.K., Schölkopf, B., Eds.; pp. 1213–1220. [Google Scholar]
  227. Tishby, N.; Pereira, F.C.; Bialek, W. The information bottleneck method. In Proceedings of the Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, 23–24 September 1999; pp. 368–377. [Google Scholar]
  228. Caire, G.; Shamai (Shitz), S.; Tulino, S.A.; Verdü, S.; Yapar, C. Information bottleneck for an oblivious relay with channel state information: The scalar case. In Proceedings of the IEEE International Conference on the Science of Electrical Engineering, Eilat, Israel, 12–14 December 2018. [Google Scholar]
  229. Zohdy, M.; Tajer, A. Broadcast approach for the single-user energy harvesting channel. IEEE Trans. Commun. 2019, 67, 3192–3204. [Google Scholar] [CrossRef]
  230. Lu, X.; Wang, P.; Niyato, D.; Kim, D.I.; Han, Z. Wireless networks with RF energy harvesting: A contemporary survey. IEEE Commun. Surv. Tutor. 2015, 17, 757–789. [Google Scholar] [CrossRef] [Green Version]
  231. Lu, X.; Niyato, D.; Wang, P.; Kim, D.I.; Han, Z. Wireless charger networking for mobile devices: Fundamentals, standards, and applications. IEEE Wirel. Commun. 2015, 22, 126–135. [Google Scholar] [CrossRef] [Green Version]
  232. Panatik, K.Z.; Kamardin, K.; Shariff, S.A.; Yuhaniz, S.S.; Ahmad, N.A.; Yusop, O.M.; Ismail, S. Energy harvesting in wireless sensor networks: A survey. In Proceedings of the IEEE International Symposium on Telecommunication Technologies, Kuala Lumpur, Malaysia, 23-27 May 2016; pp. 53–58. [Google Scholar]
  233. Jabbar, H.; Song, Y.S.; Jeong, T.T. RF energy harvesting system and circuits for charging of mobile devices. IEEE Trans. Consum. Electron. 2010, 56, 247–253. [Google Scholar] [CrossRef]
  234. Huang, K. Spatial throughput of mobile ad hoc networks powered by energy harvesting. IEEE Trans. Inf. Theory 2013, 59, 7597–7612. [Google Scholar] [CrossRef] [Green Version]
  235. Zhang, X.; Jiang, H.; Zhang, L.; Zhang, C.; Wang, Z.; Chen, X. An energy-efficient ASIC for wireless body sensor networks in medical applications. IEEE Trans. Biomed. Circuits Syst. 2010, 4, 11–18. [Google Scholar] [CrossRef] [PubMed]
  236. Nishimoto, H.; Kawahara, Y.; Asami, T. Prototype implementation of ambient RF energy harvesting wireless sensor networks. In Proceedings of the IEEE Sensors, Kona, HI, USA, 1–4 November 2010; pp. 1282–1287. [Google Scholar]
  237. Sudevalayam, S.; Kulkarni, P. Energy harvesting sensor nodes: Survey and implications. IEEE Commun. Surv. Tutor. 2011, 13, 443–461. [Google Scholar] [CrossRef] [Green Version]
  238. Tajer, A.; Zohdy, M.; Alnajjar, K. Resource allocation under sequential resource access. IEEE Trans. Commun. 2018, 66, 5608–5620. [Google Scholar] [CrossRef]
  239. Romero, H.; Varanasi, M.K. Rate splitting, superposition coding and binning for groupcasting over the broadcast channel: A general framework. arXiv 2020, arXiv:2011.04745. [Google Scholar]
  240. Gohari, A.; Nair, C. New outer bounds for the two-receiver broadcast channel. In Proceedings of the IEEE International Symposium on Information Theory, Los Angeles, CA, USA, 21–26 June 2020; pp. 1492–1497. [Google Scholar]
  241. Weingarten, H.; Liu, T.; Shamai (Shitz), S.; Steinberg, S.Y.; Viswanath, P. The capacity region of the degraded multiple-input multiple-output compound broadcast channel. IEEE Trans. Inf. Theory 2009, 55, 5011–5023. [Google Scholar] [CrossRef] [Green Version]
  242. Wu, Y.; Xiao, C.; Ding, Z.; Gao, X.; Jin, S. A Survey on MIMO Transmission With Finite Input Signals: Technical Challenges, Advances, and Future Trends. Proc. IEEE 2018, 106, 1779–1833. [Google Scholar] [CrossRef]
  243. Geng, Y.; Nair, C.; Shamai (Shitz), S.; Wang, Z.V. On broadcast channels with binary inputs and symmetric outputs. IEEE Trans. Inf. Theory 2013, 59, 6980–6989. [Google Scholar] [CrossRef] [Green Version]
  244. Marton, K. A coding theorem for the discrete memoryless broadcast channel. IEEE Trans. Inf. Theory 1979, 25, 306–311. [Google Scholar] [CrossRef]
  245. Gelfand, S.I.; Pinsker, M.S. Coding for channel with random parameters. Probl. Control. Theory 1980, 9, 1–19. [Google Scholar]
  246. Somekh-Baruch, A. On achievable rates and error exponents for channels with mismatched decoding. IEEE Trans. Inf. Theory 2015, 61, 727–740. [Google Scholar] [CrossRef]
  247. Körner, J.; Marton, K. A source network problem involving the comparison of two channels. In Proceedings of the Trans. Colloq. Inf. Theory, Keszthely, Hungary, 25–28 August 1975. [Google Scholar]
  248. Gamal, A.E. The capacity of a class of broadcast channels. IEEE Trans. Inf. Theory 1979, 25, 166–169. [Google Scholar] [CrossRef]
  249. Hyadi, A.; Rezki, Z.; Alouini, M.-S. An overview of physical layer security in wireless communication systems with CSIT uncertainty. IEEE Access 2016, 4, 6121–6132. [Google Scholar] [CrossRef] [Green Version]
  250. Guo, D.; Shamai (Shitz), S.; Verdú, S. The interplay between information and estimation measures. Found. Trends Signal Process. 2013, 6, 243–429. [Google Scholar] [CrossRef] [Green Version]
  251. Sanderovich, A.; Shamai (Shitz), S.; Steinberg, Y.; Kramer, G. Communication via decentralized processing. IEEE Trans. Inf. Theory 2008, 54, 3008–3023. [Google Scholar] [CrossRef] [Green Version]
  252. Zaidi, A.; Estella-Aguerri, I. On the information bottleneck problems: Models, connections, applications and information theoretic views. Entropy 2020, 22, 151. [Google Scholar] [CrossRef] [Green Version]
  253. Aguerri, I.E.; Zaidi, A. Distributed information bottleneck method for discrete and Gaussian sources. In Proceedings of the IEEE International Zurich Seminar on Information and Communication, Zurich, Switzerland, 21–23 February 2018. [Google Scholar]
  254. Ugur, Y.; Aguerri, I.E.; Zaidi, A. Vector Gaussian CEO problem under logarithmic loss. In Proceedings of the IEEE Information Theory Workshop, Guangzhou, China, 25–29 November 2018. [Google Scholar]
  255. Aguerri, I.E.; Zaidi, A.; Caire, G.; Shamai (Shitz), S. On the capacity of cloud radio access networks with oblivious relaying. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 25–30 June 2017; pp. 2068–2072. [Google Scholar]
  256. Wu, X.; Ozgur, A.; Peleg, M.; Shamai (Shitz), S. New upper bounds on the capacity of primitive diamond relay channels. In Proceedings of the IEEE Information Theory Workshop, Gotland, Sweden, 25–28 August 2019. [Google Scholar]
  257. Mondelli, M.; Hassani, S.H.; Urbanke, R. A new coding paradigm for the primitive relay channel. Algorithms 2019, 12, 218. [Google Scholar] [CrossRef] [Green Version]
  258. Al-qudah, Z.; al Bataineh, M.; Musa, A. A novel multiple access diamond channel model. Int. J. Commun. Syst. 2020, 33, e4616. [Google Scholar]
  259. Winkelbauer, A.; Farthofer, S.; Matz, G. The rate-information trade-off for Gaussian vector channels. In Proceedings of the IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; pp. 2849–2853. [Google Scholar]
  260. Gong, C.; Tajer, A.; Wang, X. Interference channels with partial group decoding. IEEE Trans. Commun. 2011, 59, 3059–3071. [Google Scholar] [CrossRef]
  261. Barak, O.; Erez, U.; Burshtein, D. Bounds on rates of LDPC codes for BEC with varying erasure rate. In Proceedings of the IEEE International Symposium on Information Theory, Toronto, ON, Canada, 6–11 July 2008; pp. 1133–1137. [Google Scholar]
  262. Goela, N.; Abbe, E.; Gastpar, M. Polar codes for broadcast channels. IEEE Trans. Inf. Theory 2015, 61, 758–782. [Google Scholar] [CrossRef] [Green Version]
  263. Mondelli, M.; Hassani, S.H.; Urbanke, R.; Sason, I. Achieving marton’s region for broadcast channels using polar codes. In Proceedings of the IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 July–4 July 2014; pp. 306–310. [Google Scholar]
  264. Mondelli, M.; Hassani, S.H.; Maric, I.; Hui, D.; Hong, S. Capacity-achieving rate-compatible polar codes for general channels. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, San Francisco, CA, USA, 19–22 March 2017. [Google Scholar]
  265. Bhatt, A.; Ghaddar, N.; Wang, L. Polar coding for multiple descriptions using monotone chain rules. In Proceedings of the Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, 3–6 October 2017; pp. 565–571. [Google Scholar]
  266. Li, B.; Tse, D.N.C.; Chen, K.; Shen, H. Capacity-achieving rateless polar codes. In Proceedings of the IEEE International Symposium on Information Theory, Barcelona, Spain, 10–15 July 2016. [Google Scholar]
  267. Boyle, B.D.; Walsh, J.M.; Weber, S. Channel dependent adaptive modulation and coding without channel state information at the transmitter. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal ProcessingProcessing, Vancouver, BC, Canada, 26–31 May 2013. [Google Scholar]
  268. Mary, P.; Gorce, J.-M.; Unsal, A.; Poor, H.V. Finite blocklength information theory: What is the practical impact on wireless communications? In Proceedings of the IEEE Global Communications Conference (Workshops), Washington, DC, USA, 4–8 December 2016. [Google Scholar]
  269. Ahlswede, R.; Dueck, G. Identification via channels. IEEE Trans. Inf. Theory 1989, 35, 15–29. [Google Scholar] [CrossRef]
  270. Pereg, U.; Boche, H.; Deppe, C. Deterministic identification over fading channels. arXiv 2020, arXiv:2010.10010. [Google Scholar]
  271. Qureshi, J.; Foh, C.H.; Cai, J. Primer and recent developments on fountain codes. Recent Adv. Commun. Netw. Technol. 2013, 2, 2–11. [Google Scholar] [CrossRef]
  272. Kaspi, A.H. Rate-distortion function when side-information may be present at the decoder. IEEE Trans. Inf. Theory 1994, 40, 2031–2034. [Google Scholar] [CrossRef]
  273. Park, S.; Simeone, O.; Shamai (Shitz), S. Joint optimization of cloud and edge processing for fog radio access networks. In Proceedings of the IEEE International Symposium on Information Theory, Barcelona, Spain, 10–16 July 2016. [Google Scholar]
  274. Karasik, R.; Simeone, O.; Shamai, S. Fundamental latency limits for D2D-aided content delivery in fog wireless networks. In Proceedings of the IEEE International Symposium on Information Theory, Vail, CO, USA, 17–22 June 2018. [Google Scholar]
  275. Pradhan, S.S.; Padakandla, A.; Shirani, F. An Algebraic and Probabilistic Framework for Network Information Theory. Found. Trend Commun. Inf. Theory 2020, 18, 173–379. [Google Scholar] [CrossRef]
  276. Giordani, M.; Polese, M.; Mezzavilla, M.; Rangan, S.; Zorzi, M. Toward 6G networks: Use cases and technologies. IEEE Commun. Mag. 2020, 58, 55–61. [Google Scholar] [CrossRef]
  277. Lee, H.-N.; Chung, S.-Y.; Fragouli, C.; Mao, Z.-H. Network coding for wireless networks. Eurasip J. Wirel. Commun. Netw. 2010. [Google Scholar] [CrossRef] [Green Version]
Figure 1. (a) A single-input single-output (SISO) channel with a fading parameter h. (b) The equivalent SISO broadcast channel model. For a channel realization h ( j ) , only receivers indexed up to j can decode their fractional rate d R .
Figure 1. (a) A single-input single-output (SISO) channel with a fading parameter h. (b) The equivalent SISO broadcast channel model. For a channel realization h ( j ) , only receivers indexed up to j can decode their fractional rate d R .
Entropy 23 00120 g001
Figure 2. SISO broadcast achievable average rate R bs , outage capacity R o , ergodic capacity C erg , and Gaussian channel upper bound C G versus SNR.
Figure 2. SISO broadcast achievable average rate R bs , outage capacity R o , ergodic capacity C erg , and Gaussian channel upper bound C G versus SNR.
Entropy 23 00120 g002
Figure 3. A schematic communication system with a queue buffer followed by a wireless transmitter.
Figure 3. A schematic communication system with a queue buffer followed by a wireless transmitter.
Entropy 23 00120 g003
Figure 4. Total rate for several β values and the ergodic capacity vs. the SNR P, for the flat Rayleigh channel.
Figure 4. Total rate for several β values and the ergodic capacity vs. the SNR P, for the flat Rayleigh channel.
Entropy 23 00120 g004
Figure 5. Encoding–decoding scheme of the 2 receiver Gaussian degraded product broadcast channel with users: AA, AB, BA, BB.
Figure 5. Encoding–decoding scheme of the 2 receiver Gaussian degraded product broadcast channel with users: AA, AB, BA, BB.
Entropy 23 00120 g005
Figure 6. Encoding and decoding scheme of the two receiver Gaussian degraded product broadcast channel broadcast approach.
Figure 6. Encoding and decoding scheme of the two receiver Gaussian degraded product broadcast channel broadcast approach.
Entropy 23 00120 g006
Figure 7. Equivalent degraded broadcast channel corresponding to a two-user four state multiple access channel with channel gains s 1 and s 2 .
Figure 7. Equivalent degraded broadcast channel corresponding to a two-user four state multiple access channel with channel gains s 1 and s 2 .
Entropy 23 00120 g007
Figure 8. Equivalent network when adapting the layers to the single-user channels (no CSIT).
Figure 8. Equivalent network when adapting the layers to the single-user channels (no CSIT).
Entropy 23 00120 g008
Figure 9. Streaming and codebook assignments by user 1 and user 2.
Figure 9. Streaming and codebook assignments by user 1 and user 2.
Entropy 23 00120 g009
Figure 10. Equivalent network when adapting the layers to the multiple-access channel (no CSIT).
Figure 10. Equivalent network when adapting the layers to the multiple-access channel (no CSIT).
Entropy 23 00120 g010
Figure 11. Comparison of the capacity region in Section 3.5 and achievable rate region in Section 3.6 demonstrating the trade-off between R s and R w , and R ¯ s and R ¯ w . Transmission SNR is 10, and the channel gains are ( s 1 , s 2 ) = ( 0.5 , 1 ) .
Figure 11. Comparison of the capacity region in Section 3.5 and achievable rate region in Section 3.6 demonstrating the trade-off between R s and R w , and R ¯ s and R ¯ w . Transmission SNR is 10, and the channel gains are ( s 1 , s 2 ) = ( 0.5 , 1 ) .
Entropy 23 00120 g011
Figure 12. Comparison of the capacity region in Section 3.5 and achievable rate region and outer bounds in Section 3.6.
Figure 12. Comparison of the capacity region in Section 3.5 and achievable rate region and outer bounds in Section 3.6.
Entropy 23 00120 g012
Figure 13. Average sum-rate versus p for different values of s 1 ( s 2 = 1 and SNR = 5).
Figure 13. Average sum-rate versus p for different values of s 1 ( s 2 = 1 and SNR = 5).
Entropy 23 00120 g013
Figure 14. Layering and codebook assignments.
Figure 14. Layering and codebook assignments.
Entropy 23 00120 g014
Figure 15. Average rate regions for = 2 .
Figure 15. Average rate regions for = 2 .
Entropy 23 00120 g015
Figure 16. Equivalent network for the two-user MAC (local CSIT).
Figure 16. Equivalent network for the two-user MAC (local CSIT).
Entropy 23 00120 g016
Figure 17. Outer bounds on the average achievable rate region.
Figure 17. Outer bounds on the average achievable rate region.
Entropy 23 00120 g017
Figure 18. Average rate regions for = 3 .
Figure 18. Average rate regions for = 3 .
Entropy 23 00120 g018
Figure 19. Average rate regions in Theorem 11.
Figure 19. Average rate regions in Theorem 11.
Entropy 23 00120 g019
Figure 20. Equivalent network for the symmetric Gaussian interference channel ( = 2 ).
Figure 20. Equivalent network for the symmetric Gaussian interference channel ( = 2 ).
Entropy 23 00120 g020
Figure 21. Codebook assignments at transmitter 1 in the two-state channel.
Figure 21. Codebook assignments at transmitter 1 in the two-state channel.
Entropy 23 00120 g021
Figure 22. Average rate region ( = 2 ).
Figure 22. Average rate region ( = 2 ).
Entropy 23 00120 g022
Figure 23. Average rate region ( = 3 ).
Figure 23. Average rate region ( = 3 ).
Entropy 23 00120 g023
Figure 24. Sum-rate gap versus power.
Figure 24. Sum-rate gap versus power.
Entropy 23 00120 g024
Figure 25. Bound on sum-rate gap versus power.
Figure 25. Bound on sum-rate gap versus power.
Entropy 23 00120 g025
Figure 26. Achievable average rates, for P r = P s , and for various relaying protocols and broadcasting strategies.
Figure 26. Achievable average rates, for P r = P s , and for various relaying protocols and broadcasting strategies.
Entropy 23 00120 g026
Figure 27. A schematic diagram of a source transmitter and two co-located users—destination and a helping node, performing multi-session cooperation.
Figure 27. A schematic diagram of a source transmitter and two co-located users—destination and a helping node, performing multi-session cooperation.
Entropy 23 00120 g027
Figure 28. Ranges of the average rates for both outage and broadcast approaches, over the cooperation channel, which were calculated using these approaches for either single antenna user (LB) or two antennas user (UB). The corresponding rate-range for an ergodic channel from (314) and (316) is also given for comparison.
Figure 28. Ranges of the average rates for both outage and broadcast approaches, over the cooperation channel, which were calculated using these approaches for either single antenna user (LB) or two antennas user (UB). The corresponding rate-range for an ergodic channel from (314) and (316) is also given for comparison.
Entropy 23 00120 g028
Figure 29. Broadcast approach: average rates of Naive amplify-and-forward (AF), AF with separate preprocessing, multi sessions AF, and narrow-band (NB) naive compress-and-forward (CF) compared to upper and lower bounds, as function of the channels quality ratio P r P s . ( P s = 20 dB).
Figure 29. Broadcast approach: average rates of Naive amplify-and-forward (AF), AF with separate preprocessing, multi sessions AF, and narrow-band (NB) naive compress-and-forward (CF) compared to upper and lower bounds, as function of the channels quality ratio P r P s . ( P s = 20 dB).
Entropy 23 00120 g029
Figure 30. The diamond channel.
Figure 30. The diamond channel.
Entropy 23 00120 g030
Figure 31. Schematic description of a parallel multiuser decoder, without SIC.
Figure 31. Schematic description of a parallel multiuser decoder, without SIC.
Entropy 23 00120 g031
Figure 32. Schematic description of an iterative successive interference cancellation multiuser decoder for multi-layer coded transmission with M layers. Every iteration includes multiple sub-iterations of iterative-SIC decoding per code layer.
Figure 32. Schematic description of an iterative successive interference cancellation multiuser decoder for multi-layer coded transmission with M layers. Every iteration includes multiple sub-iterations of iterative-SIC decoding per code layer.
Entropy 23 00120 g032
Figure 33. Expected sum-rate for a Rayleigh fading channel, with different transmission and decoding strategies, based on a matched filter multiuser detector ( β = 0.2 ).
Figure 33. Expected sum-rate for a Rayleigh fading channel, with different transmission and decoding strategies, based on a matched filter multiuser detector ( β = 0.2 ).
Entropy 23 00120 g033
Figure 34. Expected sum-rate throughput for a Rayleigh fading channel, with different transmission and decoding strategies, based on a decorrelator multiuser detector ( β = 0.2 ).
Figure 34. Expected sum-rate throughput for a Rayleigh fading channel, with different transmission and decoding strategies, based on a decorrelator multiuser detector ( β = 0.2 ).
Entropy 23 00120 g034
Figure 35. Minimal average distortion, a comparison of outage approach and broadcast approach, for bandwidth expansions b = 0.5 , 1 , 2 .
Figure 35. Minimal average distortion, a comparison of outage approach and broadcast approach, for bandwidth expansions b = 0.5 , 1 , 2 .
Entropy 23 00120 g035
Figure 36. Information bottleneck fading channel system model block diagram.
Figure 36. Information bottleneck fading channel system model block diagram.
Entropy 23 00120 g036
Figure 37. Oblivious vs. non-oblivious single layer coding and broadcast approach compared to the ergodic capacity, for bottleneck channel capacity of C = 4 [Nats/Channel Use].
Figure 37. Oblivious vs. non-oblivious single layer coding and broadcast approach compared to the ergodic capacity, for bottleneck channel capacity of C = 4 [Nats/Channel Use].
Entropy 23 00120 g037
Table 1. Successive decoding order when adapting the layers to the single-user channels.
Table 1. Successive decoding order when adapting the layers to the single-user channels.
( h 1 2 , h 2 2 ) Decoding Stage 1Decoding Stage 2
( s 1 , s 1 ) W 1 1 , W 1 2
( s 2 , s 1 ) W 1 1 , W 1 2 W 2 1
( s 1 , s 2 ) W 1 1 , W 1 2 W 2 2
( s 2 , s 2 ) W 1 1 , W 1 2 W 2 1 , W 2 2
Table 2. Successive decoding order of the streams adapted to the MAC.
Table 2. Successive decoding order of the streams adapted to the MAC.
( h 1 2 , h 2 2 ) Stage 1Stage 2Stage 3
( s 1 , s 1 ) W 11 1 , W 11 2
( s 2 , s 1 ) W 11 1 , W 11 2 W 12 1 , W 21 2
( s 1 , s 2 ) W 11 1 , W 11 2 W 21 1 , W 12 2
( s 2 , s 2 ) W 11 1 , W 11 2 W 12 1 , W 12 2 , W 21 1 , W 21 2 W 22 1 , W 22 2
Table 3. Successive decoding order for the -state MAC.
Table 3. Successive decoding order for the -state MAC.
h 1 2 s 1 s 2 ·· s q ·· s
h 2 2
s 1
W 11 1 , W 11 2
U 11
W 12 1 , W 21 2
····· U 1 ( 1 )
W 1 1 , W 1 2
s 2 U 11
W 21 1 , W 12 2
U 11 , U 12 , U 21
W 22 1 , W 22 2
····· U 1 ( 1 ) , U 2 ( 1 ) , U 1 l
W 2 l 1 , W l 2 2
·········
s p ···· U ( p 1 ) ( q 1 ) , U p ( q 1 ) , U ( p 1 ) q ,
W p q 1 , W q p 2
···
·········
s U ( 1 ) 1
W 1 1 , W 1 2
U ( 1 ) 1 , U 1 , U ( 1 ) 2 ,
W 2 1 , W 2 2
····· U ( 1 ) ( 1 ) , U ( 1 ) , U ( 1 )
W 1 , W 2
Table 4. Successive decoding scheme in [114].
Table 4. Successive decoding scheme in [114].
( h 1 , h 2 ) Stage 1Stage 2Stage 3Stage 4
( s 1 , s 1 ) T 11 1 T 11 2 T 12 1 T 12 2
( s 1 , s 2 ) T 11 1 T 21 2 T 12 1 T 22 2
( s 2 , s 1 ) T 21 1 T 11 2 T 22 1 T 12 2
( s 2 , s 2 ) T 21 1 T 21 2 T 22 1 T 22 2
Table 5. Decoding scheme.
Table 5. Decoding scheme.
( h 1 2 , h 2 2 ) Stage 1Stage 2
( s 1 , s 1 ) U 11 1 , U 11 2
( s 2 , s 1 ) U 12 1 , U 11 2 U 22 1
( s 1 , s 2 ) U 11 1 , U 12 2 U 22 2
( s 2 , s 2 ) U 12 1 , U 12 2 U 22 1 , U 22 2
Table 6. Successive decoding stages for -state MAC with local CSIT.
Table 6. Successive decoding stages for -state MAC with local CSIT.
h 1 s 1 s 2 s q s
h 2
s 1 U 11 1
U 11 2
U 12 1 , U 22 1
V 11 2
· U 1 1 , , U 1
V ( 1 ) 1 2
s 2 V 11 1
U 12 2 , U 22 2
V 12 1
V 21 2
· V 1 1
V 2 ( 1 ) 2
·····
s p ·· V ( p 1 ) q 1
V p ( q 1 ) 2
·
·····
s V ( 1 ) 1 1
U 1 2 , , U 2
V ( 1 ) 2 1
V 1 2
· V ( 1 ) 1
V ( 1 ) 2
Table 7. Successive decoding order at the receivers.
Table 7. Successive decoding order at the receivers.
ReceiverStage 1Stage 2Stage 3Stage 4Stage 5Stage 6Stage 7Stage 8Stage 9
y i 1 V i 1 V j 1 V i 2 V i 3 U i 1
y i 2 V i 1 V j 1 V i 2 V j 2 V i 3 U i 1 U i 2
y i 3 V j 1 V i 1 V j 2 V i 2 V j 3 V i 3 U i 1 U i 2 U i 3
Table 8. Successive decoding for -state channel.
Table 8. Successive decoding for -state channel.
a 1 β 1 β 2 β q β K
a 2
β 1 { V 1 s } s = 1 K , U 1 1 , V 2 1
{ V 2 s } s = 1 K , U 2 1 , V 1 1
C 1 1 , U 1 2 , V 2 2
C 2 1
· C 1 K 1 , U 1 K , V 2 K
C 2 1
β 2 C 1 1
C 2 1 , U 2 2 , V 1 2
C 1 1 , U 1 2 , V 2 2
C 2 1 , U 2 2 , V 1 2
· C 1 K 1 , U 1 K , V 2 K
C 2 1 , U 2 2 , V 1 2
·····
β p ·· C 1 q 1 , U 1 q , V 2 q
C 2 p 1 , U 2 p , V 1 p
·
·····
β K C 1 1
C 2 K 1 , U 2 K , V 1 K
C 1 1 , U 1 2 , V 2 2
C 2 K 1 , U 2 K , V 1 K
· C 1 K 1 , U 1 K , V 2 K
C 2 K 1 , U 2 K , V 1 K
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tajer, A.; Steiner, A.; Shamai, S. The Broadcast Approach in Communication Networks. Entropy 2021, 23, 120. https://0-doi-org.brum.beds.ac.uk/10.3390/e23010120

AMA Style

Tajer A, Steiner A, Shamai S. The Broadcast Approach in Communication Networks. Entropy. 2021; 23(1):120. https://0-doi-org.brum.beds.ac.uk/10.3390/e23010120

Chicago/Turabian Style

Tajer, Ali, Avi Steiner, and Shlomo Shamai (Shitz). 2021. "The Broadcast Approach in Communication Networks" Entropy 23, no. 1: 120. https://0-doi-org.brum.beds.ac.uk/10.3390/e23010120

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop