Interference Networks With Random User Activity and Heterogeneous Delay Constraints

IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Transactions on Information Theory Pub Date : 2024-12-27 DOI:10.1109/TIT.2024.3523775
Homa Nikbakht;Michèle Wigger;Shlomo Shamai;Jean-Marie Gorce;H. Vincent Poor
{"title":"Interference Networks With Random User Activity and Heterogeneous Delay Constraints","authors":"Homa Nikbakht;Michèle Wigger;Shlomo Shamai;Jean-Marie Gorce;H. Vincent Poor","doi":"10.1109/TIT.2024.3523775","DOIUrl":null,"url":null,"abstract":"This paper proposes coding schemes and information-theoretic converse results for the transmission of heterogeneous delay-constrained traffic over interference networks with random user activity and random data arrivals. The heterogeneous delay-constrained traffic is composed of delay-tolerant traffic and delay-sensitive traffic where only the former can benefit from transmitter and receiver cooperation since the latter is subject to stringent delay constraints. Even for the delay-tolerant traffic, the total number of cooperation rounds at transmitter and receiver sides is limited to D rounds. Each transmitter is assumed to be active with probability <inline-formula> <tex-math>$\\rho \\in [{0,1}]$ </tex-math></inline-formula>, and we study two different models for traffic arrival, each model reflecting a different application type. In Model 1, each active transmitter sends a delay-tolerant message, and with probability <inline-formula> <tex-math>$\\rho _{f} \\in [{0,1}]$ </tex-math></inline-formula> also transmits an additional delay-sensitive message; in Model 2, each active transmitter sends either a delay-sensitive message with probability <inline-formula> <tex-math>$\\rho _{f}$ </tex-math></inline-formula> or a delay-tolerant message with probability <inline-formula> <tex-math>$1- \\rho _{f}$ </tex-math></inline-formula>. For both models, we derive inner and outer bounds on the fundamental per-user multiplexing gain (MG) region of the symmetric Wyner network as well as inner bounds on the fundamental MG region of the hexagonal model. The per-user MG of an interference network describes the logarithmic growth of the largest average per-user rate that can be achieved over the network at high signal-to-noise ratios (SNR). Our inner and outer bounds on the per-user MG are generally close and coincide in special cases. They also show that when both transmitters and receivers can cooperate, then under Model 1, transmitting delay-sensitive messages hardly causes any penalty on the sum per-user MG, and under Model 2, operating at large delay-sensitive per-user MGs incurs no penalty on the delay-tolerant per-user MG and thus even increases the sum per-user MG. However, when only receivers can cooperate, the maximum delay-tolerant per-user MG that our bounds achieve at maximum delay-sensitive per-user MG is significantly decreased.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 2","pages":"1043-1076"},"PeriodicalIF":2.9000,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Theory","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10817648/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper proposes coding schemes and information-theoretic converse results for the transmission of heterogeneous delay-constrained traffic over interference networks with random user activity and random data arrivals. The heterogeneous delay-constrained traffic is composed of delay-tolerant traffic and delay-sensitive traffic where only the former can benefit from transmitter and receiver cooperation since the latter is subject to stringent delay constraints. Even for the delay-tolerant traffic, the total number of cooperation rounds at transmitter and receiver sides is limited to D rounds. Each transmitter is assumed to be active with probability $\rho \in [{0,1}]$ , and we study two different models for traffic arrival, each model reflecting a different application type. In Model 1, each active transmitter sends a delay-tolerant message, and with probability $\rho _{f} \in [{0,1}]$ also transmits an additional delay-sensitive message; in Model 2, each active transmitter sends either a delay-sensitive message with probability $\rho _{f}$ or a delay-tolerant message with probability $1- \rho _{f}$ . For both models, we derive inner and outer bounds on the fundamental per-user multiplexing gain (MG) region of the symmetric Wyner network as well as inner bounds on the fundamental MG region of the hexagonal model. The per-user MG of an interference network describes the logarithmic growth of the largest average per-user rate that can be achieved over the network at high signal-to-noise ratios (SNR). Our inner and outer bounds on the per-user MG are generally close and coincide in special cases. They also show that when both transmitters and receivers can cooperate, then under Model 1, transmitting delay-sensitive messages hardly causes any penalty on the sum per-user MG, and under Model 2, operating at large delay-sensitive per-user MGs incurs no penalty on the delay-tolerant per-user MG and thus even increases the sum per-user MG. However, when only receivers can cooperate, the maximum delay-tolerant per-user MG that our bounds achieve at maximum delay-sensitive per-user MG is significantly decreased.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
具有随机用户活动和异构延迟约束的干扰网络
针对随机用户活动和随机数据到达的干扰网络,提出了异构时延约束业务传输的编码方案和信息论逆向结果。异构延迟约束业务由延迟容忍业务和延迟敏感业务组成,由于延迟敏感业务受严格的延迟约束,只有前者能从发送端和接收端合作中受益。即使对于容忍延迟的业务,发送端和接收端的合作总轮数也被限制在D轮以内。假设每个发射机都以$\rho \in[{0,1}]$的概率处于活动状态,我们研究了两种不同的流量到达模型,每种模型反映了不同的应用类型。在模型1中,每个主动发送器发送一个延迟容忍消息,并且概率$\rho _{f} \ In[{0,1}]$还发送一个额外的延迟敏感消息;在模型2中,每个主动发射器发送一个概率为$\rho _{f}$的延迟敏感消息或一个概率为$1- \rho _{f}$的延迟容忍消息。对于这两个模型,我们推导了对称Wyner网络的基本每用户复用增益(MG)区域的内界和外界以及六边形模型的基本MG区域的内界。干扰网络的每用户MG描述了在高信噪比(SNR)下可以在网络上实现的最大平均每用户速率的对数增长。每个用户MG的内界和外界通常是接近的,在特殊情况下是重合的。他们还表明,当发送方和接收方都可以合作时,在模型1下,发送延迟敏感消息几乎不会对每用户MG总数造成任何惩罚,而在模型2下,以大延迟敏感的每用户MG运行不会对延迟容忍的每用户MG总数造成任何惩罚,从而甚至会增加每用户MG总数。然而,当只有接收方可以合作时,我们的边界在最大延迟敏感的每用户MG下达到的最大延迟容忍度MG显着降低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory 工程技术-工程:电子与电气
CiteScore
5.70
自引率
20.00%
发文量
514
审稿时长
12 months
期刊介绍: The IEEE Transactions on Information Theory is a journal that publishes theoretical and experimental papers concerned with the transmission, processing, and utilization of information. The boundaries of acceptable subject matter are intentionally not sharply delimited. Rather, it is hoped that as the focus of research activity changes, a flexible policy will permit this Transactions to follow suit. Current appropriate topics are best reflected by recent Tables of Contents; they are summarized in the titles of editorial areas that appear on the inside front cover.
期刊最新文献
IEEE Transactions on Information Theory Information for Authors On Minimax Empirical Bayes Predictive Densities TechRxiv: Share Your Preprint Research with the World! IEEE Transactions on Information Theory Information for Authors Adaptive Monotonicity Testing in Sublinear Time
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1