Achievability: Joint Typicality Decoding and Successive Cancellation
Two Routes to the MAC Capacity Region
We now prove that every rate pair inside the pentagon is achievable. We present two decoding strategies:
-
Joint typicality decoding β the decoder searches for a unique pair of codewords that are jointly typical with the received sequence. This achieves the entire pentagon in one shot, but requires the decoder to search over all codeword pairs.
-
Successive cancellation decoding (SIC) β the decoder first decodes one user (treating the other as noise), subtracts the decoded signal, then decodes the second user. This achieves only the corner points, but time-sharing between the two decoding orders traces out the entire dominant face.
Joint typicality decoding is theoretically cleaner, but successive cancellation is the basis of practical receivers (MMSE-SIC in CDMA, LTE uplink, 5G).
Definition: Joint Typicality Decoding for the MAC
Joint Typicality Decoding for the MAC
Given the received sequence , the joint typicality decoder for the two-user MAC declares if there exists a unique pair such that
where denotes the set of jointly -typical sequences with respect to the joint distribution . If no such unique pair exists, an error is declared.
This is a direct extension of the single-user joint typicality decoder. The key difference is that we search for a pair of codewords, which creates three types of error events rather than one.
Theorem: Achievability of the MAC Pentagon via Joint Typicality Decoding
For any product distribution and any rate pair satisfying
there exists a sequence of codes with average error probability as .
The proof extends the single-user random coding argument. We generate codebooks independently for both users and use joint typicality decoding. The three error events β wrong user 1 only, wrong user 2 only, both wrong β each contribute a term that vanishes when the corresponding inequality is strict.
Random codebook generation
Fix a product distribution . Generate codebooks independently:
- For user 1: generate codewords , each i.i.d. according to .
- For user 2: generate codewords , each i.i.d. according to .
The codebooks are revealed to all parties (encoders and decoder).
Error event decomposition
Assume was sent (by symmetry of the random code construction). Define the error events:
- : the sent pair is not jointly typical: .
- : there exists such that (wrong user 1, correct user 2).
- : there exists such that (correct user 1, wrong user 2).
- : there exist and such that (both wrong).
The total error probability satisfies .
Bounding each error event
: By the joint AEP, this tends to 0 as .
: For any , the codeword is generated independently of . By the joint typicality lemma:
Since and are independent, . By the union bound over wrong codewords:
which tends to 0 if .
: By symmetry, this tends to 0 if .
: For and , both codewords are independent of . By the joint typicality lemma:
which tends to 0 if .
Conclusion
Since is arbitrary, we conclude that for any strictly inside the pentagon, the average error probability . By the random coding argument, there exists at least one deterministic code achieving this performance. The closure of the region gives the MAC capacity region.
Definition: Successive Cancellation Decoding (SIC)
Successive Cancellation Decoding (SIC)
Successive cancellation decoding (also called successive interference cancellation or SIC) for the two-user MAC proceeds in two stages:
Order 2 1 (decode user 2 first):
-
Stage 1: Decode user 2 by treating user 1's signal as noise. Find such that are jointly typical. User 2 is decoded at rate up to .
-
Stage 2: Subtract user 2's contribution. Knowing , decode user 1 from . Find such that are jointly typical. User 1 is decoded at rate up to .
This achieves the corner point .
Reversing the order (decode user 1 first) achieves the other corner point .
The term "cancellation" is slightly misleading in the discrete case β we do not literally subtract signals but rather condition the second decoder on the decoded codeword. For Gaussian channels (Section 14.3), cancellation becomes literal: subtract the estimated signal and decode in reduced noise.
Successive Interference Cancellation (SIC)
A multiuser decoding strategy where users are decoded one at a time. After each user is decoded, its signal is subtracted (or conditioned upon), allowing subsequent users to be decoded with reduced interference.
Related: Multiple Access Channel (MAC), Dominant Face
Theorem: SIC Achieves the Corner Points
For a fixed product distribution , successive cancellation decoding achieves the corner points of the MAC pentagon:
- Decoding order : achieves .
- Decoding order : achieves .
The entire dominant face is achieved by time-sharing between the two decoding orders.
At each stage, SIC reduces to a single-user decoding problem. In stage 1, the "noise" includes the other user's signal. In stage 2, the other user's signal is known and can be removed, so the effective channel is cleaner. The key insight is that the sum of the two rates equals at both corner points, which follows from the chain rule of mutual information:
Chain rule verification
We verify that the sum rate at the corner point equals . By the chain rule:
where we used the independence of and . Therefore:
Similarly, for the other order:
Single-user achievability at each stage
Stage 1 (decode user 2): The effective channel is . By the single-user channel coding theorem, any rate is achievable.
Stage 2 (decode user 1, given ): Conditioned on the correctly decoded , the effective channel for user 1 is with known. By the single-user theorem, any rate is achievable.
Error propagation
If stage 1 makes an error (decodes ), then stage 2 will subtract the wrong signal, likely causing an error in user 1's decoding as well. However, since as when , the probability of error propagation also vanishes. Formally, the total error probability is bounded by the sum of the stage 1 and stage 2 error probabilities:
Example: SIC on the Binary Adder MAC
For the binary adder MAC () with independently, describe the SIC decoding procedure for decoding order and identify the achievable rate pair.
Stage 1: Decode user 2 treating user 1 as noise
The effective channel for user 2 (marginalizing over user 1) is:
This is a binary symmetric channel with crossover probability 0, viewed differently: with equal probability regardless of . Actually, .
We compute (uniform binary given ) and . So bits.
Stage 2: Decode user 1 given user 2
Given , we know , so bit.
The achievable rate pair is , which is the corner point where user 1 gets its maximum rate.
The other corner
Reversing the order: decode user 1 first at rate , then user 2 at rate 1. This gives the symmetric corner point .
The entire dominant face is traced by time-sharing: for .
Why This Matters: From SIC to MMSE-SIC in Cellular Uplink
Successive interference cancellation is the information-theoretic foundation of MMSE-SIC receivers used in practical cellular systems. In the uplink of LTE and 5G NR, multiple user equipments (UEs) transmit simultaneously to a base station. The base station decodes users one at a time:
- Apply an MMSE filter to suppress interference from undecoded users.
- Decode the selected user.
- Subtract the decoded signal from the received signal.
- Repeat for the next user.
The key difference from the information-theoretic analysis is that practical systems use structured codes (LDPC, polar codes) rather than random codes, and MMSE filtering rather than optimal joint typicality decoding. Nevertheless, the achievable rate region with MMSE-SIC approaches the information-theoretic MAC capacity region as the number of antennas grows (massive MIMO regime).
Common Mistake: SIC Error Propagation at Finite Block Length
Mistake:
Assuming that SIC works perfectly at finite block lengths. In practice, if user 2 is decoded incorrectly in stage 1, the wrong codeword is subtracted, causing a "ghost signal" that corrupts user 1's decoding in stage 2. This error propagation effect is ignored in the asymptotic () analysis.
Correction:
At finite block lengths, SIC suffers from error propagation. The total error probability includes a term for the event that stage 1 fails and this failure corrupts stage 2. Practical systems mitigate this with CRC-aided detection (declare an erasure if CRC fails rather than propagating a wrong decision) and iterative SIC with soft information. The penalty is especially severe when the first-decoded user has a high error rate.
Successive Cancellation Decoding for the Two-User MAC
Complexity: Stage 1: typicality checks. Stage 2: typicality checks. Total: , which is exponentially smaller than the joint decoder's .SIC has lower computational complexity than joint typicality decoding because it searches over each user's codebook separately. The trade-off is that SIC only achieves corner points, not the entire pentagon.
Quick Check
In a two-user MAC with , , , and , what rate pair does SIC with decoding order (decode user 1 first, then user 2) achieve?
Decoding user 1 first: . Then subtract user 1 and decode user 2: . Sum rate: , confirming the chain rule.
SIC Time-Sharing Traces the Dominant Face
Watch how time-sharing between the two SIC decoding orders traces out the dominant face of the MAC capacity pentagon. The animation sweeps the time-sharing parameter from 0 (corner point A) to 1 (corner point B), showing the achievable rate pair at each value.
Parameters
Key Takeaway
Joint typicality decoding achieves the full MAC capacity region but requires exponential complexity in the sum rate. Successive cancellation decoding achieves the corner points with complexity exponential only in each individual rate. The entire dominant face is obtained by time-sharing between the two SIC decoding orders. This is the information-theoretic foundation of SIC-based receivers in modern wireless systems.