The MAC with More Than Two Users

Beyond Two Users

Real systems serve many users simultaneously β€” a 5G cell may have K=10K = 10 to 100100 active users. The two-user MAC theory generalizes naturally to KK users, but the structure of the capacity region becomes richer and more complex. Instead of three inequalities, we need 2Kβˆ’12^K - 1 β€” one for every non-empty subset of users. The resulting capacity region is a polymatroid, a beautiful combinatorial-geometric object that connects information theory to discrete optimization.

Definition:

The KK-User Discrete Memoryless MAC

The KK-user DM-MAC consists of KK encoders with input alphabets X1,…,XK\mathcal{X}_1, \ldots, \mathcal{X}_K, an output alphabet Y\mathcal{Y}, and a conditional PMF p(y∣x1,…,xK)p(y | x_1, \ldots, x_K). Each encoder kk maps its message Wk∈{1,…,2nRk}W_k \in \{1, \ldots, 2^{nR_{k}}\} to a codeword xkn(Wk)x_k^n(W_k). The messages are independent. The decoder produces estimates (W^1,…,W^K)(\hat{W}_1, \ldots, \hat{W}_K) from YnY^n.

A rate tuple (R1,…,RK)(R_{1}, \ldots, R_{K}) is achievable if Pe(n)β†’0P_e^{(n)} \to 0 as nβ†’βˆžn \to \infty.

Theorem: Capacity Region of the KK-User DM-MAC

The capacity region of the KK-user DM-MAC is the closure of the convex hull of all rate tuples (R1,…,RK)∈R+K(R_{1}, \ldots, R_{K}) \in \mathbb{R}_+^K satisfying

βˆ‘k∈SRk≀I(X(S);Y∣X(Sc)),βˆ€β€…β€ŠSβŠ†{1,…,K},β€…β€ŠSβ‰ βˆ…,\sum_{k \in \mathcal{S}} R_{k} \leq I(X(\mathcal{S}); Y | X(\mathcal{S}^c)), \quad \forall \; \mathcal{S} \subseteq \{1, \ldots, K\}, \; \mathcal{S} \neq \emptyset,

for some product distribution ∏k=1Kp(xk)\prod_{k=1}^K p(x_k), where X(S)={Xk:k∈S}X(\mathcal{S}) = \{X_k : k \in \mathcal{S}\} and Sc={1,…,K}βˆ–S\mathcal{S}^c = \{1, \ldots, K\} \setminus \mathcal{S}.

Each inequality constrains the total rate of a subset of users. The bound βˆ‘k∈SRk≀I(X(S);Y∣X(Sc))\sum_{k \in \mathcal{S}} R_{k} \leq I(X(\mathcal{S}); Y | X(\mathcal{S}^c)) says: even if all users outside S\mathcal{S} are perfectly decoded and removed, the users in S\mathcal{S} cannot collectively exceed the mutual information of their combined input with the output.

For K=2K = 2, this gives three inequalities (S={1}\mathcal{S} = \{1\}, S={2}\mathcal{S} = \{2\}, S={1,2}\mathcal{S} = \{1,2\}), recovering the pentagon of Section 14.1.

For K=3K = 3, we get 23βˆ’1=72^3 - 1 = 7 inequalities: three individual, three pairwise, and one triple sum-rate.

,

Definition:

Polymatroid

A polymatroid is a polytope PβŠ‚R+K\mathcal{P} \subset \mathbb{R}_+^K defined by a submodular set function f:2{1,…,K}β†’R+f: 2^{\{1,\ldots,K\}} \to \mathbb{R}_+ with f(βˆ…)=0f(\emptyset) = 0:

P={(R1,…,RK)∈R+K:βˆ‘k∈SRk≀f(S),β€…β€Šβˆ€β€…β€ŠSβŠ†{1,…,K}}.\mathcal{P} = \left\{(R_{1}, \ldots, R_{K}) \in \mathbb{R}_+^K : \sum_{k \in \mathcal{S}} R_{k} \leq f(\mathcal{S}), \; \forall \; \mathcal{S} \subseteq \{1, \ldots, K\}\right\}.

A set function ff is submodular if for all A,BβŠ†{1,…,K}\mathcal{A}, \mathcal{B} \subseteq \{1, \ldots, K\}:

f(AβˆͺB)+f(A∩B)≀f(A)+f(B).f(\mathcal{A} \cup \mathcal{B}) + f(\mathcal{A} \cap \mathcal{B}) \leq f(\mathcal{A}) + f(\mathcal{B}).

Submodularity captures the "diminishing returns" property.

For a fixed input distribution, the MAC capacity region is a polymatroid with f(S)=I(X(S);Y∣X(Sc))f(\mathcal{S}) = I(X(\mathcal{S}); Y | X(\mathcal{S}^c)). The submodularity of this function follows from the submodularity of entropy: for independent inputs, I(X(S);Y∣X(Sc))I(X(\mathcal{S}); Y | X(\mathcal{S}^c)) is a submodular function of S\mathcal{S}.

Polymatroid

A polytope in R+K\mathbb{R}_+^K defined by 2Kβˆ’12^K - 1 inequalities indexed by subsets, where the bounding function is submodular. The MAC capacity region for a fixed input distribution has this structure.

Related: Capacity Region

Theorem: Submodularity of the MAC Rate Function

For a fixed product input distribution ∏k=1Kp(xk)\prod_{k=1}^K p(x_k), the function

f(S)=I(X(S);Y∣X(Sc))f(\mathcal{S}) = I(X(\mathcal{S}); Y | X(\mathcal{S}^c))

is a monotone submodular set function. That is, for all AβŠ†BβŠ†{1,…,K}\mathcal{A} \subseteq \mathcal{B} \subseteq \{1, \ldots, K\}:

  1. Monotonicity: f(A)≀f(B)f(\mathcal{A}) \leq f(\mathcal{B}).
  2. Submodularity: For any user kβˆ‰Bk \notin \mathcal{B}, f(Aβˆͺ{k})βˆ’f(A)β‰₯f(Bβˆͺ{k})βˆ’f(B)f(\mathcal{A} \cup \{k\}) - f(\mathcal{A}) \geq f(\mathcal{B} \cup \{k\}) - f(\mathcal{B}).

Monotonicity says that adding more users to the subset increases the mutual information (more users carry more information). Submodularity says that the marginal contribution of a new user decreases as the existing subset grows β€” adding user kk to a large group helps less than adding it to a small group. This is a "diminishing returns" property that arises because the existing users already carry some of the information that user kk provides.

SIC Orderings and Corner Points for KK Users

For the KK-user MAC, the polymatroidal capacity region has K!K! corner points on the dominant face, one for each permutation Ο€=(Ο€(1),Ο€(2),…,Ο€(K))\pi = (\pi(1), \pi(2), \ldots, \pi(K)) of the user indices.

The corner point corresponding to permutation Ο€\pi is achieved by SIC with decoding order Ο€(1)β†’Ο€(2)β†’β‹―β†’Ο€(K)\pi(1) \to \pi(2) \to \cdots \to \pi(K):

  • User Ο€(1)\pi(1) is decoded first (treating all others as noise) at rate I(XΟ€(1);Y)I(X_{\pi(1)}; Y).
  • User Ο€(2)\pi(2) is decoded second (after removing Ο€(1)\pi(1)) at rate I(XΟ€(2);Y∣XΟ€(1))I(X_{\pi(2)}; Y | X_{\pi(1)}).
  • User Ο€(k)\pi(k) is decoded kk-th at rate I(XΟ€(k);Y∣XΟ€(1),…,XΟ€(kβˆ’1))I(X_{\pi(k)}; Y | X_{\pi(1)}, \ldots, X_{\pi(k-1)}).

The sum of all rates equals I(X1,…,XK;Y)I(X_1, \ldots, X_K; Y) regardless of the permutation (by the chain rule).

The entire dominant face is the convex hull of these K!K! corner points. For K=3K = 3, this gives 6 corner points; for K=10K = 10, it gives 10!=3,628,80010! = 3,628,800 corner points.

Example: Three-User Symmetric Gaussian MAC

Consider a three-user Gaussian MAC: Y=X1+X2+X3+ZY = X_1 + X_2 + X_3 + Z, with Xk∼N(0,P)X_k \sim \mathcal{N}(0, P) independently and Z∼N(0,1)Z \sim \mathcal{N}(0, 1). Write down all 23βˆ’1=72^3 - 1 = 7 capacity region constraints and identify the symmetric rate point on the dominant face.

Massive Random Access and the Many-User MAC

The KK-user MAC framework is particularly relevant for massive random access in IoT scenarios, where KK can be very large (thousands to millions of devices). In this regime:

  • The 2Kβˆ’12^K - 1 constraints make the capacity region description exponentially complex.
  • Practical interest shifts to the symmetric sum rate and the per-user rate R/KR/K as Kβ†’βˆžK \to \infty.
  • New paradigms like unsourced random access (Polyanskiy, 2017) sidestep the exponential complexity by treating all users as identical and only requiring the decoder to recover the set of transmitted messages (without user identification).

The connection between the classical KK-user MAC and modern massive access is an active area of research, with links to compressed sensing, approximate message passing, and coded random access.

⚠️Engineering Note

Exponential Growth of MAC Constraints

The KK-user MAC capacity region requires 2Kβˆ’12^K - 1 inequalities. For practical system design with K>10K > 10 users, this exponential description is intractable. Practical approaches include:

  • Greedy SIC: Choose a specific decoding order (typically by decreasing received power) and operate at the corresponding corner point. This requires only KK rate constraints.
  • Equal-rate operation: Operate at the symmetric rate point, which is determined by a single constraint (the tightest among all subsets).
  • Clustering: Group users into small clusters (Kc≀4K_c \leq 4) and apply SIC within each cluster while treating inter-cluster interference as noise.
Practical Constraints
  • β€’

    Full capacity region requires exponential number of constraints

  • β€’

    SIC decoding order affects fairness among users

  • β€’

    Scheduling algorithms must balance throughput and fairness

Quick Check

For a 4-user MAC, how many subset inequalities define the capacity region?

4

7

15

24

Key Takeaway

The KK-user MAC capacity region is described by 2Kβˆ’12^K - 1 mutual information inequalities, one per non-empty user subset. The region has a polymatroidal structure characterized by the submodularity of the mutual information set function. SIC with a specific decoding order achieves one of K!K! corner points on the dominant face. The exponential growth of constraints motivates practical approaches like greedy SIC and user clustering.