Exercises
ex-ch26-01
EasyCompute the capacity region of the two-user Gaussian MAC with , , .
(a) Write the three rate constraints. (b) Find the two corner points. (c) Plot the capacity region (pentagon). (d) What is the sum capacity?
The symmetric case gives a symmetric pentagon.
Rate constraints
(a) bits/c.u. bits/c.u. bits/c.u.
Corner points
(b) Corner A (decode 1 first): , .
Corner B (decode 2 first): , .
The pentagon is symmetric about the line .
Pentagon description
(c) The pentagon has vertices at , , , , .
Sum capacity
(d) bits/c.u. Same as a single user with power .
ex-ch26-02
EasyCompare the MAC sum capacity with TDMA for , , .
(a) Compute the MAC sum capacity. (b) Compute the TDMA sum rate with equal time sharing (). (c) Compute the TDMA sum rate with optimal time sharing. (d) What is the percentage loss of TDMA compared to SIC?
TDMA: .
MAC sum capacity
(a) bits/c.u.
TDMA equal sharing
(b) . . Sum: bits/c.u.
TDMA optimal sharing
(c) Optimise via : At : . . Sum: bits/c.u.
Loss comparison
(d) Equal TDMA loss: %. Optimal TDMA loss: %.
The SIC gain over TDMA is modest (3--10%), but it is achieved with no penalty in fairness.
ex-ch26-03
EasyFor a three-user Gaussian MAC with , :
(a) How many rate constraints define the capacity region? (b) How many corner points (vertices) does the region have? (c) Compute the sum capacity. (d) At the corner point where user 3 is decoded last, what rate does user 3 achieve?
For users, the MAC region has constraints.
Number of constraints
(a) constraints (one for each non-empty subset of ): , , , , , , .
Corner points
(b) corner points (one for each SIC ordering).
Sum capacity
(c) bits/c.u.
User 3 rate at corner
(d) If decoding order is 1, 2, 3: user 3 decoded last (after cancelling users 1 and 2): bits/c.u. (interference-free capacity).
ex-ch26-04
EasyFor the degraded Gaussian BC with , , :
(a) Compute the single-user capacities for each user. (b) With power split (60% to weak user), compute both users' rates. (c) Is the sum rate maximised at or ?
.
Single-user capacities
(a) bits/c.u. bits/c.u.
Rates at $\alpha = 0.6$
(b) bits/c.u. bits/c.u. Sum: bits/c.u.
Sum rate comparison
(c) At : , , sum . At : sum .
Sum rate is maximised at (all power to the strong user). Fairness requires at the cost of sum rate.
ex-ch26-05
EasyState the capacity of the dirty-paper channel where , , .
(a) What is the capacity? (b) What would the capacity be if were unknown at the transmitter? (c) Compute the DPC gain in dB.
Costa showed that known interference does not reduce capacity.
DPC capacity
(a) bits/c.u. Same as without .
Unknown interference
(b) bits/c.u.
DPC gain
(c) Rate gain: . Equivalent SNR gain: to achieve 1.73 bits without DPC, need SNR , i.e., dB. With unknown , effective SNR dB.
DPC gain dB.
ex-ch26-06
EasyCompute the channel dispersion and finite blocklength rate for an AWGN channel at SNR = 10 dB, , .
(a) Compute and . (b) Compute . (c) What fraction of capacity is lost?
.
Capacity and dispersion
(a) SNR . bits/c.u. bits.
Finite blocklength rate
(b) . bits/c.u.
Capacity loss
(c) Loss: %.
At and , the loss is modest. At : , , loss %.
ex-ch26-07
MediumFor a two-user MIMO BC with transmit antennas and 2 single-antenna users with channel vectors: , , and total power .
(a) Compute the zero-forcing beamforming rates. (b) Is DPC necessary here? Why or why not? (c) What is the sum capacity via MAC-BC duality?
The channels are orthogonal: .
Zero-forcing rates
(a) Since , ZF beamformers are .
No inter-user interference. Each user sees: .
With equal power: . bits/c.u. Sum: bits/c.u.
DPC necessity
(b) DPC is not necessary because the channels are orthogonal. ZF eliminates all inter-user interference without rate loss. DPC would achieve the same rates (ZF is optimal when channels are orthogonal).
MAC-BC duality
(c) Dual MAC: . Sum capacity: .
Since channels are orthogonal, this simplifies to: . With : bits/c.u. Matches ZF.
ex-ch26-08
MediumDerive the MAC-BC duality for the scalar case. Consider:
- MAC: ,
- BC: , ,
(a) Show that the MAC sum capacity with and equals the BC rate for the strong user with (all power to user 1). (b) Find the MAC power allocation that corresponds to BC power split . (c) Verify the duality for , , , .
The duality maps BC power split to MAC power allocation.
Sum capacity equivalence
(a) MAC sum capacity: . BC with : , . These are equal, confirming duality at the extreme point.
Power allocation mapping
(b) BC rates: , .
Dual MAC: decode user 2 first (treating 1 as noise): , (after SIC, noise is for user 1).
Setting and matching rates: does not directly simplify. The correct mapping involves solving the SINR duality equations.
Numerical verification
(c) , , , : BC: , .
Dual MAC with appropriate power split: , ... (solving the duality equations confirms the same rates).
ex-ch26-09
MediumFor a symmetric two-user Gaussian IC with SNR dB, compute the per-user rate for:
(a) INR dB (TIN). (b) INR dB (TIN vs. decoding interference). (c) INR dB (strong interference, decode and cancel). (d) Plot the per-user rate vs. INR and identify the regime boundaries.
TIN: .
Very weak interference
(a) : bits. Close to interference-free ( bits): 86% of capacity.
Moderate interference
(b) : TIN: bits. Decode interference: subject to MAC sum constraint. . Per user: (but this requires decoding both).
HK with optimal split: bits. TIN is suboptimal by bits.
Strong interference
(c) (): Decode and cancel: bits. TIN: bits.
Decoding interference recovers single-user capacity β a rate improvement over TIN.
Regime boundaries
(d) The per-user rate vs. INR follows the "W-curve":
- INR SNR: TIN near-optimal, rate .
- INR SNR: worst case, rate drops.
- INR SNR: strong interference, rate recovers to .
ex-ch26-10
MediumFor the symmetric IC with and , compute the generalised DoF for .
(per user, normalised by ).
GDoF computation
| Regime | Dominant strategy | ||
|---|---|---|---|
| 0 | No interference | 1 | TIN |
| 0.5 | Boundary | 1 | TIN |
| 0.75 | Moderate (W-shape) | 0.5 | HK |
| 1 | Equal SNR=INR | 2/3 | HK |
| 1.5 | Moderately strong | 3/4 | Partial decode |
| 2.5 | Very strong | 1 | Full decode |
The minimum DoF occurs near (), where neither TIN nor full decoding is efficient.
ex-ch26-11
MediumVerify the Etkin-Tse-Wang 1-bit gap for a specific example: (20 dB), (10 dB).
(a) Compute the TIN per-user rate. (b) Compute the ETW inner bound (simple HK split). (c) Compute the ETW outer bound. (d) Verify the gap is bit per user.
Simple HK: .
TIN rate
(a) bits.
ETW inner bound
(b) Private power: . Common power: .
Rate from private: . Rate from common at own receiver: .
Total: bits (sum of private and common rates minus constraints from other receiver).
Using the exact ETW formula: bits.
ETW outer bound
(c) bits. Tighter: bits.
Gap verification
(d) Gap: bits. Well within the 1-bit guarantee.
ex-ch26-12
MediumA relay channel has , , .
(a) Compute the cut-set bound as a function of . (b) Compute the DF rate as a function of (with ). (c) For what range of does DF achieve % of the cut-set bound?
With : .
Cut-set bound
(a)
.
DF rate
(b) .
For : bottleneck is the source-relay link (). For : the destination link may also contribute.
90% of cut-set
(c) At : . . Ratio: %.
At : . . Ratio: % (DF poor, CF would be better).
DF achieves % for (strong source-relay link).
ex-ch26-13
MediumCompare decode-forward and compress-forward for the relay channel with , :
(a) , (relay near source). (b) , (relay near destination). (c) Which strategy is better in each case and why?
DF is limited by the weaker of source-relay and relay-destination links.
Relay near source
(a) DF: .
CF: Relay-dest capacity: . Quantisation quality is limited by the weak . (modest improvement).
Both achieve similar rates; bottleneck is .
Relay near destination
(b) DF: .
CF: Relay-dest capacity: . Source-relay: . . With good quantisation ( small due to large ): .
CF is better than DF.
Strategy comparison
(c) DF is better when is large (relay can decode). CF is better when is large (relay can forward high-quality compressed observation). This is a fundamental design guideline for relay placement.
ex-ch26-14
HardProve that the sum DoF of the -user SISO IC is upper bounded by .
(a) Show that for any pair : . (b) Sum over all pairs. (c) Use the symmetry argument to derive . (d) Why does TDMA achieve only ?
For a pair of users, providing all other messages as side information reduces to a 2-user IC.
Pairwise bound
(a) Give receiver all messages except , and give receiver all messages except . The channel reduces to a 2-user IC, which has sum DoF (single antenna at each end). Hence .
Sum over pairs
(b) Summing: .
LHS .
DoF bound
(c) . .
TDMA limitation
(d) TDMA gives each user of the time, so and . IA achieves because it allows all users to transmit simultaneously with aligned interference.
ex-ch26-15
HardFor the 3-user SISO IC with time-varying channels over symbol extensions:
(a) Write the alignment conditions at each receiver for stream per user. (b) Show that suffices for . (c) For , show that is insufficient. (d) What is the minimum for with ?
At each receiver, interference from 2 users must fit in dimensions.
Alignment conditions
(a) At receiver , interference from users must align:
This ensures interference occupies 1 dimension (not 2), leaving 1 dimension for the desired signal.
$n = 2$ for $K = 3$
(b) With and : each . Alignment at receiver 1: . This is 1 condition (direction alignment) in a 2D space.
Given , choose . Similarly for other receivers. For generic channels, the system is consistent (3 conditions, 3 free vectors).
$n = 2$ fails for $K = 4$
(c) At receiver 1, interference from users 2, 3, 4 occupies . In 2D, this is generically all of (3 vectors in 2D). No room for the desired signal.
Minimum $n$ for $K = 4$
(d) Need , i.e., . For , : .
With : interference occupies 3 dimensions, desired signal in the remaining 1 dimension. Per user DoF: . Sum: .
For : need . The Cadambe-Jafar construction uses growing with : for streams.
ex-ch26-16
HardCompare the sum DoF of the following channels with users:
(a) -user SISO IC. (b) MIMO IC with antennas per user. (c) -user X-channel (each transmitter has a message for each receiver). (d) MIMO BC with , single-antenna users.
SISO IC: . MIMO IC: . X-channel: .
SISO IC
(a) (Cadambe-Jafar).
MIMO IC
(b) (IA with MIMO). Each user achieves DoF.
X-channel
(c) . More than the SISO IC (2.0) because the X-channel has messages vs. for the IC.
MIMO BC
(d) . The MIMO BC with achieves DoF via ZF or DPC β each user gets 1 full DoF.
Summary: BC (4) MIMO IC (4) X-channel (2.29) SISO IC (2). Centralised transmission (BC) achieves the most DoF.
ex-ch26-17
HardAnalyse the finite blocklength performance for a URLLC system:
(a) At SNR = 0 dB, compute for and . (b) What blocklength is needed to achieve 80% of Shannon capacity? (c) Compare with : what blocklength achieves 80% of capacity? (d) Compute the "reliability tax" β the additional blocklength needed to go from to .
At SNR = 0 dB: , bits.
Rate table
(a) , , .
| Penalty | ||||
|---|---|---|---|---|
| 50 | 0.125 | 0.533 | -0.033 | |
| 100 | 0.088 | 0.377 | 0.123 | 24.6% |
| 200 | 0.062 | 0.266 | 0.234 | 46.8% |
| 500 | 0.039 | 0.168 | 0.332 | 66.4% |
| 1000 | 0.028 | 0.119 | 0.381 | 76.2% |
80% capacity blocklength
(b) Need : .
Need for 80% of capacity at .
With $\epsilon = 10^{-1}$
(c) . .
Reliability tax
(d) Additional blocklength: . Factor: .
Going from to requires more channel uses for the same throughput at 0 dB SNR. This is the fundamental cost of URLLC reliability.
ex-ch26-18
HardDerive the channel dispersion for the BSC() with crossover probability .
(a) Compute the capacity . (b) Compute the information density for all pairs. (c) Compute at the optimal uniform input. (d) Evaluate for and compute .
The information density is where for uniform input.
BSC capacity
(a) .
Information density
(b) For uniform input : . .
or : . or : .
Dispersion
(c) .
bits.
Numerical evaluation
(d) : bits. bits.
bits/c.u.
At , the BSC(0.1) achieves only 45% of capacity at .
ex-ch26-19
HardA URLLC system uses HARQ with chase combining. The first transmission at and code rate has BLER . If the first transmission fails, a retransmission of symbols is sent (total ).
(a) At SNR = 5 dB, compute using the normal approximation at . (b) After chase combining, the effective blocklength is at the same rate . Compute (BLER of combined signal). (c) Compute the effective BLER: . (d) Does this meet ?
from the normal approximation.
First transmission BLER
(a) SNR . bits. bits.
.
Wait β this is very small. At and , the first transmission already succeeds with very high probability. Let us use instead.
Adjusted first transmission
With : .
After chase combining
(b) Effective SNR after combining: (8 dB). . .
At effective : .
Effective BLER
(c) .
(d) Yes, this massively exceeds the target. HARQ chase combining is extremely effective because the combined SNR gain pushes well below . A higher initial rate or lower SNR would make the HARQ more necessary.
ex-ch26-20
HardCompare the multiuser capacity region bounds for a two-user system at SNR = 10 dB across the MAC, BC, and IC models. All channels have unit noise variance.
(a) MAC: . Compute sum capacity and plot region. (b) BC: , , . Compute sum capacity. (c) Symmetric IC: , . Compute TIN and HK sum rates. (d) Rank the three channels by sum capacity and explain the ordering.
The MAC and BC with equal noise are equivalent in sum capacity.
MAC
(a) Sum capacity: bits/c.u.
Region: pentagon with and .
BC
(b) With : the BC is not degraded (equal channels). The "degraded" model does not apply directly, but with equal channels, superposition coding reduces to time-sharing. Sum capacity: bits/c.u. (all power to one user).
IC
(c) TIN: bits. Sum (TIN): bits.
HK (with optimal split): sum bits. Outer bound: bits (but not achievable for moderate interference).
Ranking
(d) MAC sum = BC sum = IC sum .
The MAC and BC achieve the same sum capacity because the sum rate is determined by the total power-to-noise ratio. The IC achieves less because interference from the other user cannot be perfectly cancelled (each receiver only decodes its own message in the moderate regime). The MAC/BC benefit from either joint decoding (MAC) or joint encoding (BC), while the IC has neither.