Exercises
ex-ch15-01
EasyConsider a degraded broadcast channel with binary inputs and two BSC sub-channels: user 1 sees BSC() with , and user 2 sees BSC() with .
(a) Compute the individual channel capacities and .
(b) What is the TDMA achievable rate pair when time fraction is given to user 1?
BSC capacity is where is the binary entropy function.
For TDMA, each user's rate scales linearly with its time fraction.
Individual capacities
bits.
bits.
TDMA rates
bits.
bits.
ex-ch15-02
EasyFor the Gaussian BC with , , :
(a) Compute the two corner points of the capacity region.
(b) Compute the rate pair at .
Corner points: gives all rate to user 1; gives all to user 2.
Use and .
Corner points
: bits, .
: , bits.
Rate pair at $\alpha = 0.5$
bits.
bits.
ex-ch15-03
EasyVerify that the Gaussian BC with and (independent noise) is stochastically degraded when . Construct the explicit degrading channel.
Add independent noise to to produce a variable with the same marginal as .
Construct the degrading channel
Let where , independent of everything. Then .
Since , we have , which matches the marginal of . Therefore is Markov, and the channel is stochastically degraded.
ex-ch15-04
MediumFor the degraded BSC broadcast channel with and (so ), compute the capacity region boundary by evaluating the rate pair at . Plot the boundary and compare with TDMA.
Recall .
, .
Compute $p_2$
.
Evaluate rate pairs
| 0 | 0.05 | 0.122 | 0 | |
| 0.1 | 0.058 | 0.134 | ||
| 0.2 | 0.074 | 0.162 | ||
| 0.3 | 0.099 | 0.200 | ||
| 0.4 | 0.131 | 0.245 | ||
| 0.5 | 0.168 | 0.293 |
(Values are approximate; use numerical binary entropy computation.) The boundary is a convex curve above the TDMA line from to .
ex-ch15-05
MediumProve that the sum rate of the Gaussian BC is maximized at one of the corner points, i.e., either all power to user 1 or all power to user 2. Find which corner gives the higher sum rate.
Write the sum rate as a function of and take the derivative.
Alternatively, argue directly using .
Sum rate as function of $\alpha$
$
Simplify
\alpha = 0S(0) = \frac{1}{2}\log(1 + P/N_1)\alpha = 1S(1) = \frac{1}{2}\log(1 + P/N_2)N_1 < N_2S(0) > S(1)\frac{1}{2}\log(1 + P/N_1)$, achieved by giving everything to the strong user.
Monotonicity argument
We can verify that for all when . Computing the derivative and simplifying:
The first term is always larger in magnitude (because ), so . The sum rate is strictly decreasing in , maximized at .
ex-ch15-06
MediumConsider a Gaussian BC with , , . A system designer wants both users to achieve equal rates: .
(a) Find the maximum equal rate achievable with superposition coding.
(b) Find the maximum equal rate with TDMA (equal time fractions).
(c) Compute the ratio of (a) to (b).
For (a), set the two rate expressions equal and solve for .
For (b), equal time means .
(a) Equal rate with superposition
Set .
This gives , which simplifies to .
Let . Then , giving , so .
.
Taking the smaller root: , so .
bits.
(b) Equal rate with TDMA
bits.
Wait β with equal time fractions, and . The equal rate is bits.
(c) Ratio
.
Superposition coding achieves nearly 3 times the equal rate compared to equal-time TDMA.
ex-ch15-07
MediumShow that the data processing inequality implies for the degraded BC with .
The Markov chain means .
Apply the data processing inequality
Since is a Markov chain, the sub-chain is also Markov. By the data processing inequality:
This is the key property that guarantees the strong user can decode the weak user's cloud center: if the cloud is decodable at rate , then receiver 1 can certainly decode it.
ex-ch15-08
MediumThe binary erasure broadcast channel has , with probability and (erasure) with probability , and similarly is a BEC with erasure probability .
(a) Show this channel is degraded.
(b) Find the capacity region using the general degraded BC formula.
A BEC can be obtained by further erasing a BEC output.
For the BEC, the optimal auxiliary is binary.
(a) Degradedness
Given from BEC(), apply a further erasure channel: if , set ; if , erase with probability .
Then , and . So is Markov.
(b) Capacity region
For the BEC, let and with independent. The capacity region is:
for . This traces a boundary parameterized by , analogous to in the Gaussian case.
Actually, for the BEC the capacity region takes a simpler form. The BEC capacity is . By the degraded BC theorem: and .
Setting : and .
The boundary is a straight line! The BEC broadcast channel achieves no gain from superposition over time-sharing.
ex-ch15-09
MediumFor the Gaussian BC, show that the boundary of the capacity region is a convex curve (concave function ).
Express as a function of by eliminating .
Show the second derivative is negative.
Express $\alpha$ in terms of $\ntn{rate}_2$
From :
so , giving .
Substitute into $\ntn{rate}_1$
\logR_{2}\logR_{1}(R_{2})$ is concave. This confirms the boundary is a convex curve.
ex-ch15-10
MediumConsider a three-user degraded Gaussian BC with , , . The transmitter uses three-layer superposition coding with power fractions () where is allocated to user 's layer.
Write the achievable rate expressions for all three users.
User 3 (weakest) treats layers 1 and 2 as noise. User 1 (strongest) decodes all layers.
Three-user superposition rates
User 3 (weakest): decodes only its own layer, treating layers 1 and 2 as noise:
User 2: decodes layer 3 first (SIC), then decodes its own layer treating layer 1 as noise:
User 1 (strongest): decodes layers 3, 2 by SIC, then its own:
The capacity region is the set of all satisfying these bounds for some , .
ex-ch15-11
HardProve the achievability part of the degraded BC capacity region theorem by bounding the error probability of the superposition code. Specifically, show that if and for any .
Use the packing lemma twice: once for the weak user's cloud center, once for the strong user's satellite.
The degradedness condition ensures that the strong user can decode the cloud center (data processing inequality).
Bound the error probability using the union bound over wrong cloud centers and wrong satellites.
Error events
Let be the sent message pair. Define:
- : (true cloud atypical at weak Rx).
- : with (wrong cloud typical at weak Rx).
- : (true pair atypical at strong Rx).
- : with .
Bounding each event
by the joint AEP.
if (packing lemma for the weak user).
by the conditional AEP.
For , we split into three sub-events:
- Wrong cloud, any satellite: probability if .
- Right cloud, wrong satellite: probability if .
The binding constraints are and (the sum-rate constraint is implied since ).
Conclusion
By the union bound, for rates in the interior of the stated region. Time-sharing and taking the closure completes the achievability.
ex-ch15-12
HardProve that for the Gaussian BC, giving all rate to user 2 (weak user) yields , which is the capacity of the point-to-point AWGN channel with noise . Explain why the presence of user 1 does not reduce the weak user's maximum achievable rate.
Set so all power goes to the cloud.
Since there is no satellite (), this is effectively single-user coding.
Setting $\alpha = 1$
With : and .
This is exactly the capacity of the AWGN channel with power and noise .
Why user 1 doesn't interfere
When , the entire transmitted signal carries the weak user's message β there is no satellite layer. The strong user simply gets no data. The broadcast channel reduces to a point-to-point channel for user 2.
The deeper point: the presence of user 1 in the system design does not inherently degrade user 2's maximum rate. The constraint is only on the total power, not on some shared resource that would be degraded by having two users. This is fundamentally different from the MAC, where adding a user creates interference.
ex-ch15-13
HardLet denote the maximum on the boundary of the Gaussian BC capacity region for a given . Show that
at the boundary point parameterized by . Interpret this expression.
Differentiate both rate expressions with respect to and take the ratio.
Parametric derivatives
R_{2} = \frac{1}{2}\log\frac{P+N_2}{(1-\alpha)P+N_2}\frac{dR_{2}}{d\alpha} = \frac{P}{2\ln 2 \cdot ((1-\alpha)P+N_2)}$.
The slope
$
Interpretation
The slope is always negative (transferring power from user 1 to user 2 decreases and increases ).
At : slope , which is close to for large . At : slope , which can be very steep if .
The slope magnitude increases with : near the weak user's corner point, each unit of gained costs many units of β the tradeoff becomes increasingly unfavorable for the weak user.
ex-ch15-14
HardConsider the "more capable" broadcast channel: where for all input distributions . This is weaker than degradedness. Show that superposition coding still achieves the capacity region.
The key property needed is for all with .
El Gamal and Van der Meulen (1981) showed this.
More capable implies cloud decodability
For any :
For the more capable condition, this requires a more delicate argument. The result of El Gamal and Van der Meulen shows that "more capable" implies , which is exactly what the achievability proof needs.
Converse follows the same structure
The converse uses Fano's inequality and single-letterization. The more capable condition ensures the converse bounds match the achievability region. The capacity region is:
the same as for the degraded BC. Hence superposition coding achieves the capacity region for more capable channels.
ex-ch15-15
HardMAC-BC duality for the Gaussian case. Show that the capacity region of the two-user Gaussian BC with total power and noise variances equals the set of achievable on the dual Gaussian MAC where , with individual power constraints satisfying (the normalized sum-power constraint).
Map the BC power split to MAC power allocations.
Verify the corner points match.
BC corner points
BC at : .
BC at : .
Dual MAC
In the dual MAC with noise variance 1 (after normalization), user has power . The MAC corner where user 2 is decoded first: and .
Setting and ... the mapping requires careful normalization. The key result is that the two regions coincide under the transformation with the sum-power constraint.
Significance
The duality means that computing the BC capacity (hard, EPI needed) can be replaced by computing the MAC capacity (easier). This extends to the MIMO case and is the basis for practical algorithms that optimize MIMO broadcast channel beamforming via the dual MAC formulation.
ex-ch15-16
ChallengeEntropy power inequality proof of the Gaussian BC converse. Give a detailed proof that the Gaussian BC capacity region is not enlarged by using non-Gaussian inputs. Specifically, show that for any with :
for .
Use the EPI to lower-bound and the max-entropy property to upper-bound .
For the strong user, .
Set up notation
Let and , so .
Bound $\ntn{mi}(U; Y_2)$
.
Upper bound: (max entropy).
Lower bound on : Given , with . By the EPI:
Since (any distribution's entropy power is at least its variance under the max-entropy property), we get .
Taking expectations and using Jensen's inequality on the concave function : .
Therefore: .
Bound $\ntn{mi}(X; Y_1 | U)$
.
(Gaussian maximizes entropy).
So .
Conclusion
Both bounds match the Gaussian superposition rates. Since the bounds hold for any , the Gaussian choice is optimal, and the capacity region is exactly as stated.
ex-ch15-17
ChallengeThe -user degraded Gaussian BC. Consider users with . Show that -layer superposition coding with power fractions () achieves the capacity region:
(Convention: user 1 is strongest, user is weakest. Layer is the outermost cloud; layer 1 is the innermost satellite.)
Generalize the two-user proof with auxiliary random variables .
The achievability uses successive decoding: user decodes layers first.
Auxiliary variables
Define auxiliary variables forming a Markov chain: .
Set (outermost cloud), , ..., , and , with independent.
Rate expressions
User 's rate: (with conventions , ).
For Gaussian inputs:
User sees layers plus noise as interference, totaling .
Converse
The converse extends the two-user argument by applying Fano's inequality to each user and using the EPI recursively to establish Gaussian optimality at each layer. The details follow Bergmans' original argument, generalized to layers.
ex-ch15-18
MediumShow that the superposition coding region for the degraded BC contains the time-sharing region as a special case.
Time-sharing corresponds to a specific (degenerate) choice of auxiliary variable .
Time-sharing as a special case
Time-sharing with fraction corresponds to a time-sharing auxiliary variable with . When , transmit for user 1 at power ; when , transmit for user 2.
This is a special case of superposition coding where and the codebook has a particular product structure. The achievable rates are and , which traces the time-sharing line.
Since the superposition coding region optimizes over all including this special case, it contains the time-sharing region.
ex-ch15-19
HardNumerical optimization. For the Gaussian BC with , , , find the power-splitting that maximizes the weighted sum rate for weights .
Take the derivative of the weighted sum with respect to and set to zero.
The solution will be a root of a polynomial in .
Weighted sum rate
$
First-order condition
Setting :
Simplifying (after clearing denominators), this gives a quadratic in that can be solved numerically for each .
Numerical solutions
For : , favoring the weak user.
For : , balanced.
For : , favoring the strong user.
The weighted sum rate optimization traces the Pareto boundary of the capacity region. Different weights select different operating points.
ex-ch15-20
MediumShow that for the degraded BC, the strong user can always achieve its single-user capacity by choosing (no cloud, all satellite). Explain why the weak user cannot simultaneously achieve its single-user capacity.
With , and .
Strong user at capacity
Set (deterministic). Then:
- . Maximizing over : .
- .
So user 1 achieves its full capacity when user 2 gets zero rate. This is the corner point .
Why both cannot achieve single-user capacity
At the other corner, gives and . So the corner points are and .
For any interior point with and : because resources must be shared. The sum is never simultaneously achievable.