The Two-User Interference Channel

A Fundamentally Different Multiuser Model

In the MAC (Chapter 14), all users cooperate toward a common receiver. In the BC (Chapter 16), a single transmitter serves all users. The interference channel is different from both: each transmitter has its own receiver, and the other transmitters create interference that is neither desired nor controllable by the affected receiver.

This model captures the essence of wireless cellular systems: your cell phone talks to your base station, while the neighboring cell's phone talks to its base station β€” and each pair interferes with the other. Understanding the fundamental limits of this channel is one of the central (and still largely unsolved) problems in network information theory.

The point is that the interference channel does not have a single "nice" capacity result like the DMC (C=max⁑I(X;Y)C = \max I(X;Y)) or even the degraded BC. Instead, we will see a mosaic of partial results: exact capacity in certain regimes, the best known inner bound (Han-Kobayashi), and the degrees-of-freedom characterization that reveals a surprising structure at high SNR.

Definition:

The Two-User Interference Channel

The two-user discrete memoryless interference channel consists of:

  • Two input alphabets X1,X2\mathcal{X}_1, \mathcal{X}_2
  • Two output alphabets Y1,Y2\mathcal{Y}_1, \mathcal{Y}_2
  • A channel transition probability PY1,Y2∣X1,X2(y1,y2∣x1,x2)P_{Y_1, Y_2 | X_1, X_2}(y_1, y_2 | x_1, x_2)

Encoder kk maps message Mk∈[1:2nRk]M_k \in [1:2^{nR_{k}}] to a codeword xkn(Mk)x_k^n(M_k). Decoder kk observes YknY_k^n and produces an estimate M^k\hat{M}_k. A rate pair (R1,R2)(R_{1}, R_{2}) is achievable if Pe(n)=Pr⁑(M^1β‰ M1Β orΒ M^2β‰ M2)β†’0P_e^{(n)} = \Pr(\hat{M}_1 \neq M_1 \text{ or } \hat{M}_2 \neq M_2) \to 0.

The capacity region CICC_{\text{IC}} is the closure of all achievable rate pairs.

Definition:

The Two-User Gaussian Interference Channel

The standard Gaussian IC model is: Y1=X1+aX2+Z1Y_1 = X_1 + a X_2 + Z_1 Y2=bX1+X2+Z2Y_2 = b X_1 + X_2 + Z_2 where:

  • XkX_k is the signal from transmitter kk, with power constraint E[Xk2]≀Pk\mathbb{E}[X_k^2] \leq P_k
  • aa is the interference channel gain from Tx 2 to Rx 1
  • bb is the interference channel gain from Tx 1 to Rx 2
  • Zk∼N(0,Οƒ2)Z_k \sim \mathcal{N}(0, \sigma^2) is i.i.d. Gaussian noise

The key parameters are:

  • SNR1=P1/Οƒ2\text{SNR}_{1} = P_1 / \sigma^2 and SNR2=P2/Οƒ2\text{SNR}_{2} = P_2 / \sigma^2 (signal-to-noise ratios)
  • INR12=a2P2/Οƒ2\text{INR}_{12} = a^2 P_2 / \sigma^2 (interference from Tx 2 at Rx 1)
  • INR21=b2P1/Οƒ2\text{INR}_{21} = b^2 P_1 / \sigma^2 (interference from Tx 1 at Rx 2)

The channel gains aa and bb can be real or complex. Without loss of generality, we normalize the direct links to 1 (absorbing the direct gain into the power constraint) and let a,ba, b represent the relative cross-link strengths.

Interference channel

A multiuser channel where each transmitter has a dedicated receiver, and the signals from all transmitters are received (with different gains) at all receivers. Each receiver treats the signals from non-intended transmitters as interference.

Related: Multiple access channel, Broadcast channel, Cognitive radio

Interference-to-noise ratio (INR)

The ratio of the received interference power to the noise power. For the two-user Gaussian IC, INR12=a2P2/Οƒ2\text{INR}_{12} = a^2 P_2 / \sigma^2 quantifies how strong the interference from Tx 2 is at Rx 1, relative to the noise floor.

Related: Signal-to-noise ratio, Signal-to-interference-plus-noise ratio

Interference Regimes

RegimeConditionCapacity StatusOptimal Strategy
Very strongINRβ‰₯SNR(1+SNR)\text{INR} \geq \text{SNR}(1 + \text{SNR})Fully knownDecode interference, then desired signal
StrongINRβ‰₯SNR\text{INR} \geq \text{SNR}Fully knownJoint decoding (MAC at each Rx)
Moderate1<INR<SNR1 < \text{INR} < \text{SNR}Within 1 bitHan-Kobayashi (rate splitting)
Weak/noisyINR≀1\text{INR} \leq 1Within 1 bit; TIN optimal under conditionsTreat interference as noise

Interference Channel Regimes

Visualize the different interference regimes for the symmetric Gaussian IC as a function of SNR and INR. The plot shows the boundaries between very strong, strong, moderate, and weak interference.

Parameters
30

Common Mistake: The IC Is Not a MAC

Mistake:

Treating the interference channel as two overlapping MACs and applying SIC at each receiver to achieve the full MAC rate region.

Correction:

In the MAC, both transmitters cooperate (at least in the codebook design) and the single receiver decodes both messages. In the IC, each receiver decodes only its own message. A receiver in the IC can choose to decode the interfering message as well (which helps when interference is strong), but it is not required to β€” and in many regimes, it should not attempt this. The IC capacity region is generally smaller than the intersection of two MAC regions.

The Two-User Interference Channel

Animated diagram of the two-user interference channel: direct links (solid, gain 1) and cross links (dashed, gains aa and bb). The channel equations are built step by step.

Quick Check

In the two-user Gaussian IC Y1=X1+aX2+Z1Y_1 = X_1 + aX_2 + Z_1, what does the parameter aa represent physically?

The relative strength of the interference link from Tx 2 to Rx 1, compared to the direct link

The noise correlation between the two receivers

The antenna gain at receiver 1

Key Takeaway

The interference channel is uniquely challenging because each receiver sees a mixture of desired and interfering signals but only needs to decode its own message. The interplay between SNR and INR defines distinct operating regimes (very strong, strong, moderate, weak), each with different optimal strategies. The capacity region of the general Gaussian IC remains unknown β€” one of the most prominent open problems in information theory.