Approximate Capacity of the Two-User MISO Broadcast Channel with Delayed CSIT
arXiv:1405.1143v1 [cs.IT] 6 May 2014
Alireza Vahid, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Abstract— We consider the problem of the two-user multipleinput single-output complex Gaussian Broadcast Channel where the transmitter has access to delayed knowledge of the channel state information. We characterize the capacity region of this channel to within a constant number of bits for all values of the transmit power. The proposed signaling strategy utilizes the delayed knowledge of the channel state information and the previously transmitted signals, in order to create a signal of common interest for both receivers. This signal is the quantized version of the summation of the previously transmitted signals. To guarantee the independence of quantization noise and signal, we extend the framework of lattice quantizers with dither, together with an interleaving step. For converse, we use the fact that the capacity region of this problem is upper-bounded by the capacity region of a physically degraded broadcast channel with no channel state information where one receiver has two antennas. We then derive an outer-bound on the capacity region of this degraded broadcast channel which in turn provides an outer-bound on the capacity region of the two-user multipleinput single-output complex Gaussian broadcast channel with delayed knowledge of the channel state information. By careful examination, we show that the achievable rate region and the outer-bound are within 1.81 bits/sec/Hz per user.
I. I NTRODUCTION In fast-fading scenarios, the coherence time of the channel is smaller than the delay of the feedback channel, and as a result, providing the transmitters with up-to-date channel state information is practically infeasible. Thus, we are left with no choice but to try and understand the behavior of wireless networks under such constraint. In the context of multiple-input single-output (MISO) broadcast channels (BCs), it has been shown that even completely stale CSIT (also known as delayed CSIT) can still be very useful and can change the scale of the capacity, measured by the degrees of freedom (DoF) [1]. The impact of delayed CSIT has also been studied in wireless networks with distributed transmitters. This includes studying the DoF region of multiple-antenna interference channels (ICs) and X channels with delayed CSIT [2]–[6], the capacity region of two-user IC with binary fading with delayed CSIT [7]–[9], the DoF region of K-user Gaussian IC and X channels with delayed CSIT [5], [6], and multiantenna two-user Gaussian IC with delayed CSIT and ShanA. Vahid and A. S. Avestimehr are with the School of Electrical and Computer Engineering, Cornell University, Ithaca, NY, USA. Email:
[email protected] and
[email protected]. Mohammad Ali Maddah-Ali is with Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA. Email:
[email protected]. The work of A. S. Avestimehr and A. Vahid is in part supported by NSF Grants CAREER-0953117, CCF-1161720, NETS-1161904, AFOSR Young Investigator Program Award, ONR award N000141310094, and 2013 Qualcomm Innovation Fellowship.
non feedback [10], [11]. Also, in multi-hop networks with delayed CSIT, it is shown that the DoF can still scale with the number of users [12]. Moreover, researchers have considered variations of the assumption on the available CSIT at the transmitter (see [13]–[16]), these variations assume that in addition to the delayed CSIT, the transmitter has an imperfect estimate of the current channel realization. The degrees of freedom by definition provides a first order approximation of the capacity. While DoF has been found useful in understanding the behavior of the capacity in high power regimes, it is not suitable for practical settings with finite signal-to-noise ratio (SNR). In this work, we consider the two-user MISO BC and focus on the impact of delayed CSIT at finite SNR regime, as opposed to the asymptotic DoF analysis. There are some prior works in the literature (for example [17]) that have proposed and analyzed several achievability strategies at finite SNR regime, however, characterizing the capacity region of the two-user MISO BC with delayed CSIT, even to within a constant gap, has been an open problem. We propose new inner-bound and outer-bound on the capacity region of this network that are to within 1.81 bits/sec/Hz per user of each other at any SNR. Hence, we obtain a constant-gap characterization of the capacity region of the two-user MISO BC with delayed CSIT. The proposed achievability scheme has three phases, which are briefly explained here. In Phase 1 and Phase 2, the transmitter respectively sends messages intended for receivers one and two. In each of these phases, the unintended receiver overhears and saves some signal (interference), which is only useful for the other receiver. In the third phase, the transmitter will swap the overheard signals between the receivers. Note that at this time, the transmitter can evaluate the overheard signals using delayed CSIT. The swapping is performed exploiting the overheard signals as available sideinformation at receivers side. The overall information that each receiver collects in the three phases is enough to decode the original intended message. The main idea of outer-bound is similar to [1], however, here our objective is capacity result rather than DoF characterization. We create a physically degraded BC by providing the received signal of user one to user two. Then, since we know that feedback does not enlarge the capacity region of a physically degraded BC [18], we ignore the delayed knowledge of the channel state information at the transmitter (i.e. no CSIT assumption). We derive an outer-bound on the capacity region for this channel. This outer-bound in turn provides an outer-bound on the capacity region of the two-
user MISO complex Gaussian BC with delayed CSIT. We can take similar steps and provide the received signal of user two to user one. The capacity region of the two-user multipleinput single-output complex Gaussian broadcast channel with delayed CSIT is included in the intersection of the outerbounds we obtain. We show that the achievable rate region and the outer-bound are within 1.81 bits/sec/Hz per user for all values of the transmit power. The rest of the paper is organized as follows. In Section II, we formulate our problem. In Section III, we present our main results. We describe our achievability strategy in Section IV. Section V is dedicated to deriving the outer-bound. In Section VI, we show that our inner-bound and outer-bound are within a constant number of bits. Section VII concludes the paper and describes interesting future directions. II. P ROBLEM S ETTING We consider the two-user multiple-input single-output (MISO) complex Gaussian broadcast channel (BC) with Rayleigh fading as depicted in Fig. 1. The channel gains from the transmitter to receivers one and two are denoted by h[t], g[t] ∈ C2×1 , respectively, where the entries of h[t] and g[t] are distributed i.i.d. across time, antenna, and users, and are distributed as CN (0, 1). At each receiver, the received signal can be expressed as follows. y1 [t] = h> [t]x[t] + z1 [t], y2 [t] = g> [t]x[t] + z2 [t],
(1)
where x[t] ∈ C2×1 is the transmit signal subject to power constraint P , i.e. E x† [t]x[t] ≤ P for P > 0. The noise processes are independent from the transmit signal and are distributed i.i.d. as zk [t] ∼ CN (0, 1). Furthermore, we define s1 [t] = h> [t]x[t], s2 [t] = g> [t]x[t],
(2)
to be the noiseless versions of the received signals.
Rx1
Tx Rx2
Fig. 1. Two-user MISO Broadcast Channel: Transmitter has access to the delayed knowledge of the channel state information.
Transmitter wishes to reliably communicate independent and uniformly distributed messages w1 ∈ {1, 2, . . . , 2nR1 } and w2 ∈ {1, 2, . . . , 2nR2 } to receivers 1 and 2, respectively, during n uses of the channel. We denote the channel state information at time t by (h[t], g[t]) ,
t = 1, 2, . . . , n.
(3)
The transmitter has access to the delayed (outdated) channel state information, meaning that at time instant t, the transmitter has access to t−1
(h[`], g[`])`=1 ,
t = 1, 2, . . . , n.
(4)
Due to the delayed knowledge of the channel state information, the encoded signal x[t] is a function of both the messages and the previous channel realizations. Each receiver k, k = 1, 2, uses a decoding function ϕk,n to get the estimate w ˆk from the channel outputs {yk [t] : t = 1, . . . , n}. An error occurs whenever w ˆk 6= wk . The average probability of error is given by λk,n = E[P (w ˆk 6= wk )],
k = 1, 2,
(5)
where the expectation is taken with respect to the random choice of the transmitted messages w1 and w2 . We say that a rate pair (R1 , R2 ) is achievable, if there exists a block encoder at the transmitter, and a block decoder at each receiver, such that λk,n goes to zero as the block length n goes to infinity, k = 1, 2. The capacity region C is the closure of the set of the achievable rate pairs. III. S TATEMENT OF M AIN R ESULT Our main contribution is the characterization of the capacity region of the two-user MISO complex Gaussian BC to within a constant number of bits. The achievability scheme has three phases. In Phase 1 and Phase 2, the transmitter respectively sends messages intended for receiver one and receiver two. In each of these phases, the unintended receiver overhears and saves some signal (interference), which is only useful for the other receiver. Later, the transmitter will provide these overheard signals to the intended receivers with some distortion during Phase 3. In fact, in the third phase, the transmitter evaluates what each receiver overheard about the other receiver’s message using the delayed knowledge of the channel state information and provides these overheard signals efficiently to both receivers exploiting available side information at each receiver. The outer-bound is derived based on creating a physically degraded broadcast channel where one receiver is enhanced by having two antennas. In this channel, feedback and in particular delayed knowledge of the channel state information, does not increase the capacity region. Thus, we can ignore the delayed knowledge of the channel state information and consider a degraded BC with no CSIT. This would provide us with the outer-bound. Before stating our main result, we need to define what we mean by constant gap approximation of the capacity region. Definition 1: For a region C◦ ⊆ R2 , we define 4
C◦ (τ, τ ) = {(R1 , R2 ) |R1 , R2 ≥ 0, (R1 + τ, R2 + τ ) ∈ C0 } . (6) Definition 2: The capacity region of the two-user MISO BC with delayed CSIT, C, is said to be within τ ∈ R+ bits/sec/Hz per user of C◦ , if C◦ (τ, τ ) ⊆ C ⊆ C◦ .
noise process at one receiver has variance 1 while the noise process at the other receiver has variance (1 + D) for some positive constant D, see Fig. 3.
1
2
Rx
Tx
2
Fig. 3. C2×2 (D) is the ergodic capacity of a complex Gaussian pointto-point channel with no CSIT, average transmit power of P , and with 2 transmit antennas and 2 receive antennas where z1 [t] ∼ CN (0, 1) and z2 [t] ∼ CN (0, 1 + D).
2
Fig. 2. The outer-bound on the capacity region of the two-user MISO BC with delayed CSIT is the intersection of C1 and C2 , we prove that the capacity region is within 1 bit/sec/Hz per user of this outer-bound.
In order to state our main result, we also need to define the following region. Definition 3: Rate region Ck , k = 1, 2, is defined as Ck = {R1 , R2 ≥ 0 |Rk + 2Rk¯ ≤ 2C2×1 }
k = 1, 2, (7)
4 where k¯ = 3 − k, and
C2×1
P † = E log2 1 + g g , 2
(8)
where g is a 2 by 1 vector where entries are i.i.d. CN (0, 1). Remark 1: C2×1 is in fact the ergodic capacity of a complex Gaussian point-to-point channel with 2 transmit antennas and 1 receive antenna where only the receiver has access to the channel state information (no CSIT assumption). This following Theorem 1 states our main contribution. Theorem 1: The capacity region of the two-user MISO BC with delayed CSIT, C, is within 1.81 bits/sec/Hz per user of C◦ = C1 ∩ C2 where C1 and C2 are given in Definition 3. Rest of the paper is dedicated to the proof of Theorem 1. In Section IV, we provide the achievability proof of Theorem 1. In particular, we demonstrate how the transmitter can utilize the outdated channel state information and the previously transmitted signal to reduce future communication time. Then, we provide the converse proof in Section V.
We are now ready to describe our achievable rate region. For parameter D ≥ 4, and for R1 , R2 ∈ R+ , we show that a rate region R(D) given by R1 + C3C2×1 − 1 R2 ≤ C2×1 , (D) 2×2 (9) R(D) = 3C2×1 C2×2 (D) − 1 R1 + R2 ≤ C2×1 , for k = 1, 2, is achievable1 . Later in Section VI, we show that for D = 4 the achievable rate region is within 1.81 bits/sec/Hz per user of the outerbound, i.e. for any rate tuple (R1 , R2 ) on the boundary of it, (R1 + 1.81, R2 + 1.81) is beyond the outer-bound stated in Theorem 1. Fig. 4 depicts our achievable rate region R(D) for D ≥ 4. The achievable rate region, R(D), is obtained by time sharing corner points A, B, and C. The corner points B and C of the rate region are achievable using the work of Telatar on the ergodic capacity of multiple-antenna point-to-point channels with no CSIT [19]. Therefore, we only need to describe the achievability strategy for corner point A. 1
A:
IV. ACHIEVABILITY P ROOF OF T HEOREM 1 In this section, we describe the achievability strategy of Theorem 1. First, we need to introduce some notations. As mentioned before, C2×1 denotes the ergodic capacity of a complex Gaussian point-to-point channel with average transmit power of P and with 2 transmit antennas and 1 receive antennas where only the receiver has access to the channel state information. Furthermore, let C2×2 (D) denote the ergodic capacity of a complex Gaussian point-to-point channel with average transmit power of P and with 2 transmit antennas and 2 receive antennas where only the receiver has access to the channel state information, moreover, the
2 Fig. 4. The achievable rate region, R, is obtained by time sharing among corner points A, B, and C.
A. Transmission Strategy for Corner Point A Our achievability strategy is carried on over n blocks, each block consisting of 3 phases. As we shall prove by the end of 1 We note that power P .
3C2×1 C2×2 (D)
≥ 1 for D ≥ 4 and for all positive values of
this section, upon completion of all n blocks, each receiver will be able to decode all the messages intended for it with λ1,n , λ2,n → 0 as n → ∞. Denote by wkb , the message of user k in block b, k ∈ {1, 2}, b = 1, 2, . . . , n. We assume that wkb ∈ {1, 2, . . . , 2nR } and that the messages are distributed uniformly and independently. • Encoding: At the transmitter, message wkb is mapped to a Gaussian codeword ub,n picked from a codebook of size k 2nR where anyelement of this codebook is drawn i.i.d. from CN ~0, P/2I2 . Here, I2 is the 2 × 2 identity matrix. We set R = C2×2 (D) − ,
(10) +
where C2×2 (D) is defined before and ∈ R . We note that given message wkb , ubk [t1 ] and ubk [t2 ] are not independent anymore, k = 1, 2, t1 , t2 = 1, 2, . . . , n, t1 6= t2 , which is an important property we require later in our transmission strategy. Hence, we create the transmit signal intended for user k during block b and at time instant t, xbk [t], using interleaving as depicted in Fig. 5, according to the following mapping xbk [t] = utk [b],
(11)
where k = 1, 2, b = 1, 2, . . . , n and t = 1, 2, . . . , n. It is important to notice that with this interleaving, the transmit signals at different time instants of a given phase at a given block are independent from each other. This is due to the fact that these signals are created from independent messages.
w11
1,n 1
1,n 1
w12
2,n 1
2,n 1
w1n
n,n 1
n,n 1
Fig. 5. Transmitter first encodes each message wkb as ub,n k , then it creates the transmit signals using xbk [t] = utk [b].
We now describe the transmission during each phase of communication block b. • Communication during Phase j of block b: During this phase, the transmitter communicates xb,n from its two j b,n transmit antennas, j = 1, 2. Receiver one obtains y1j and b,n receiver two obtains y2j . • Communication during Phase 3 of block b: Using the delayed CSIT, the transmitter has access to sb,n 21 which is the
b,n , minus received signal at Rx2 during Phase 1 of block b, y21 b,n the noise term, and s12 which is the received signal at Rx1 b,n during Phase 2 of block b, y12 , minus the noise term. Transmitter then creates the summation of the two aforementioned signals, i.e. b,n sb,n 21 + s12 .
(12)
b,n sb,n 21 +s12
Note that is useful for both receivers since each receiver can subtract its previously received signal to obtain what the other receiver has, up to the noise term. Therefore, b,n the goal is to provide sb,n 21 + s12 to the receivers with a certain distortion D. Moreover, we would like the distortion to be independent of the signals. Note that given the previous channel realizations, the signal in (12) at each time has a Gaussian distribution but its variance varies from each time instant to the other. Furthermore, since the codewords are i.i.d. and due to the interleaving process, the signal in (12) is independent across time. Furthermore, at different time b,n instants, sb,n 21 + s12 has different variance. Thus, in order to be able to quantize it, we need a generalization of the ratedistortion function to ergodic setting. Below, we discuss this issue. Consider an ergodic, independently distributed Gaussian source where at time instant t, it has zero mean and vari2 ance distribution) with 2σ [t] (drawn from some continuous E σ < ∞. The sequence of σ 2 over time is non-causally known by both encoder and decoder. Then, with squarederror distortion, any rate greater than or equal to + σ2 , (13) min E log2 Dσ Dσ :E[Dσ ]≤D is achievable at distortion D (per sample), where the expectation is with respect to the distribution of σ 2 . It is easy to see that any rate than or equal to σ2 E log2 1 + , (14) D is also achievable at distortion D (per sample). Basically, we have ignored the optimization over D and added a 1 to remove max{., 0} (or .+ ). This helps us avoid the hassle of the optimization involved in (13). In order to have a distortion that is independent of the signal and is uncorrelated across time, we can incorporate lattice quantization with “dither” as described in [20]. b,n From (14), we conclude that we can quantize sb,n 21 + s12 with squared-error distortion D at rate RQ (D) (per sample), defined as P 4 2 2 ||g||2 + ||h||2 , (15) RQ (D) = E log2 1 + 2D where the channel gains are distributed as described in Section II. Transmitter encodes this quantized signal at rate RQ (D) using the coding strategy of [19], and communicates it from the two transmit antennas during Phase 3. Phase 3 has nRQ (D) (16) C2×1 − δ
s 1,n
time instants for some δ > 0. Next, we need to show that given the appropriate choice of parameters, receivers can recover the corresponding messages with vanishing error probability as n → ∞.
s 2,n
sn,n
B. Decoding In order to obtain a constant-gap approximation of the capacity region, we need the quantization rate RQ (D) to be less than or equal to C2×1 . In Appendix I, we show that for D = 4, we have RQ (D)/C2×1 ≤ 1 for all values of P . However, we have plotted RQ (D) and C2×1 in Fig. 6 for D = 3 and as we can see, we have RQ (3)/C2×1 ≤ 1. Therefore, our choice of D = 4 is not the minimum value of D to satisfy RQ (D)/C2×1 ≤ 1. For the rest of this section, we assume RQ (D)/C2×1 ≤ 1.
1,n y12
2,n y12 1,n
y21 Fig. 7.
n,n y12 2,n
y21
n,n
y21
b,n b,n with distortion term z˜Q . Receiver one reconstructs y21
20 18
Ergodic Capacity
16
Quantization Rate
An error may occur in either of the following steps: (1) if an error occurs in decoding message wkb provided required signals to the receiver, k = 1, 2; (2) if an error b,n occurs in quantizing sb,n 21 + s12 ; and (3) if an error occurs b,n b,n b,n in decoding s21 + s12 + zQ at either of the receivers, b = 1, 2, . . . , n. The probability of each one of such errors decreases exponentially in n (see [19], [21] and references therein). Using union bound and given that we have O n2 terms, the total error probability goes to zero as n → ∞.
14
bits
12 10 8 6 4 2 0 0
10
20
30
40
50
60
Power (dB)
Fig. 6.
Numerical evaluation of RQ (D) and C2×1 for D = 3.
Upon completion of Phase 3 of block b, each receiver decodes the quantized signal. We know that as δ → 0 and n → ∞, this could be done with arbitrary small decoding error probability. Therefore, each receiver has access to sb,n 21
+
sb,n 12
+
b,n zQ ,
(17)
b,n where zQ is the quantization noise with variance D which b [t1 ] is independent of the transmit signals. Note that zQ b and zQ [t2 ] are uncorrelated but not necessarily independent, t1 , t2 = 1, 2, . . . , n, t1 6= t2 . Receiver 1 at the end of the nth communication block, reconstructs signals by reversing the interleaving procedure b,n to described above as depicted in Fig. 7, and removes y12 obtain b,n b,n b,n y˜21 = y21 + z˜Q ,
(18)
b,n here z˜Q is the quantization noise with variance D which b is independent of the transmit signals. Moreover, z˜Q [t1 ] and b z˜Q [t2 ] are independent, t1 , t2 = 1, 2, . . . , n, t1 6= t2 .. Note that since the messages are encoded at rate b,n C2×2 (D)− for > 0, if receiver one has access to y21 up to b distortion D, it can recover w1 with arbitrary small decoding b,n error probability as → 0 and n → ∞. Thus, from y11 and b,n b y˜21 , receiver one can decode w1 , b = 1, 2, . . . , n. Similar argument holds for receiver two.
C. Achievable Rate Using the achievable strategy described above, provided that RQ (D)/C2×1 ≤ 1, as , δ → 0 and n → ∞, we can achieve a (symmetric) sum-rate point of C2×2 (D) C2×2 (R1 , R2 ) = , . 2 + RQ (D)/C2×1 2 + RQ (D)/C2×1 (19) Given RQ (D)/C2×1 ≤ 1, a (symmetric) sum-rate point of C2×2 (D) C2×2 (D) (R1 , R2 ) = , , (20) 3 3 is achievable. V. C ONVERSE The main idea behind the converse proof is to create two physically degraded BCs such that the capacity region of the two-user MISO BC with delayed CSIT, is included in the intersection of the capacity region of these two physically degraded BCs. We create a new channel by providing y2n to Rx1 . This channel is physically degraded and from [18], we know that feedback does not enlarge the capacity region. Therefore, we ignore the delayed knowledge of the channel state information at the transmitter (i.e. no CSIT assumption), see Fig. 8. We derive an outer-bound on the capacity region of this new channel denoted by C1 . Similarly, we define C2 by providing y1n to Rx2 . We have C ⊆ C1 ∩ C2 . In what follows, we derive C1 and the derivation of C2 would be similar. Suppose there exists encoders and decoders at the transmitter and receivers such that each message can be decoded
VI. G AP A NALYSIS Rx1
In this section, we evaluate the gap between our achievable rate-region and the outer-bound. Since the inner-bound and outer-bound are defined by straight lines, the gap has its maximum value at the symmetric sum-rate point. Thus, we evaluate the gap between the inner-bound in (20), i.e. C2×2 (D) C2×2 (D) , , (24) (R1 , R2 ) = 3 3
Tx Rx2 Fig. 8. By providing y2n to Rx1 , we create a physically degraded BC. We can ignore the delayed knowledge of the channel state information at the transmitter.
at its corresponding receiver with arbitrary small decoding error probability2 . n (R1 + 2R2 − 3n )
and the sum-rate outer-bound obtained from Theorem 1, i.e. 2C2×1 2C2×1 (R1 , R2 ) = , . (25) 3 3 A numerical evaluation of the gap between the sumrate inner-bound and outer-bound is plotted in Fig. 9. The gap between the two bounds results from the gap between C2×2 (D) and 2C2×1 . We first study this gap.
(a)
n n n ≤ I (w1 ; y11 , y12 |w2 , Hn , gn ) + I (w2 ; y11 |Hn , gn )
2.6
n + I (w2 ; y12 |Hn , gn ) n n n n = h (y11 , y12 |w2 , Hn , gn ) − h (y11 , y12 |w1 , w2 , Hn , gn ) n n n n n + h (y11 |H , g ) − h (y11 |w2 , H , gn ) n n + h (y12 |Hn , gn ) − h (y12 |w2 , Hn , gn )
2.4
(b)
n n = h (y11 |Hn , gn ) − h (z11 |Hn , gn ) n n + h (y12 |Hn , gn ) − h (z12 |Hn , gn ) n n n + h (y11 , y12 |w2 , Hn , gn ) − h (y11 |w2 , Hn , gn ) n n n − h (y12 |w2 , H , g )
P † n n ; y12 |w2 , Hn , gn ) ≤ 2E log2 1 + g g − I (y11 2 (d) P † ≤ 2E log2 1 + g g , 2
Gap (bits)
2 1.8 1.6 1.4 1.2 1 0.8
0
(c)
100
200
300
400
500
600
700
800
900
1000
Power (Watts)
(21)
where (a) follows from Fano’s inequality, the mutual independence of the messages and the channel realizations, and the fact that due to no CSIT assumption, we have n h (w2 |y11 , Hn , gn ) ≤ nn , n h (w2 |y12 , Hn , gn ) ≤ nn ;
2.2
(22)
Fig. 9. Numerical evaluation of the gap between the sum-rate inner-bound and outer-bound.
Corollary 1: Consider a MIMO point-to-point channel with 2 transmit antennas and 2 receive antennas as described in [19]. The only difference is that the additive noise at one antenna has variance 1 while the additive noise at the other antenna has variance (1 + D). The ergodic capacity of this channel, C2×2 (D), satisfies C2×2 (D)
(b) holds since
(27) P ≥ max E log2 det I2 + HH† − log2 (1 + D) , 0 . 2 The proof is provided at the top of the page in (26) where (a) holds since the right hand side is obtained by evaluating the mutual information between the input and output, for a complex Gaussian input with covariance matrix E xx† = P/2I2 . Moreover, we have C2×2 (D) ≥ 0. This completes the proof of Corollary 1. Therefore, the gap between the sum-rate inner-bound and outer-bound can be upper-bounded by
h (y1n |w1 , w2 , Hn , gn ) = h (y1n |w1 , w2 , xn , Hn , gn ) n n = h (z11 , z12 |w1 , w2 , xn , Hn , gn ) n n = h (z11 |Hn , gn ) + h (z12 |Hn , gn ) ;
(23)
(c) follows from the results in [19]; and (d) follows from fact that mutual information is always positive. Dividing both sides by n and letting n → ∞, we obtain the desired result. This completes the derivation of C1 . Similarly, we can derive C2 , and we have C ⊆ C1 ∩ C2 which completes the converse proof for Theorem 1. 2 In this section, the transfer matrix from the transmitter to Rx is denoted 1 by H which is a 2 × 2 matrix.
2C2×2 (D) 4C21 − 3 3 2 (2C2×1 − C2×2 + log2 (1 + D)) ≤ . 3
(28)
√ † P h11 h12 h11 h†21 / 1 + D √ √ √ C2×2 (D) ≥ E log2 det I2 + 2 h21 / 1 + D h22 / 1 + D h† h†22 / 1 + D √ 12 † † 2 2 / |h | + |h | h h + h h 1 + D 11 12 11 12 P 21 22 √ = E log2 det I2 + † † 2 2 2 h11 h21 + h12 h22 / 1 + D |h21 | + |h22 | / (1 + D) √ † † P / + h h h h 1 + P2 |h11 |2 + |h12 |2 1 + D 12 11 22 21 2 √ = E log2 det † † P P 2 2 h / h + h h 1 + D 1 + |h | + |h | / (1 + D) 21 22 12 22 11 21 2 2 √ † P P h11 h21 + h12 h†22 / 1 + D 1 + 2 |h11 |2 + |h12 |2 2 √ ≥ E log2 det † † P P 2 2 1 + D 1 + h h + h h / |h | + |h | / (1 + D) 21 22 21 22 11 12 2 2 P = E log2 det I2 + HH† − log2 (1 + D) . 2 (a)
For P ≤ 2, the sum-rate outer-bound is smaller than 2 bits (smaller than the gap itself). So, we assume P > 2. We have 2C2×1 − C2×2 P P † † = 2E log2 1 + g g − E log2 det I2 + HH 2 2 2 P = 2E log2 + g† g + 2 log2 P 2 2 P 2 I2 + HH† − log2 − E log2 det P 4 2 2 = 2E log2 + g† g − E log2 det I2 + HH† P P ≤ 2E log2 1 + g† g − E log2 det HH† . (29) Thus, we have 4C2×1 2C2×2 (D) 2 − ≤ 2E log2 1 + g† g 3 3 3 −E log2 det HH† + log2 (1 + D) ≈ 3.62,
(26)
This result can be extended to the case of K-user MISO Gaussian Broadcast Channel with delayed CSIT. An important consideration there would be the issue of noise accumulation. Another interesting direction is to consider a two-user MISO BC with delayed CSIT where the noise processes and the channel gains are not distributed as i.i.d. random variables. For example, consider the scenario where the noise processes have different variances. This model captures the scenario where users are located at different distances to the base station. For this setting, even the (generalized) DoF region is not known.
A PPENDIX I D ETERMINING D SUCH THAT RQ (D)/C2×1 ≤ 1 As mentioned in Section VI, we are interested in P > 2. Using Jensen’s inequality, we have
(30)
or 1.81 bits per user. Note that there is no closed form solution for the expectations in the inequality above, see [19]. We mention that in (30), we have shown the gap is a constant independent of power P . However, we could use numerical analysis of the gap to see that the sum-rate inner-bound and outer-bound are at most 2.6 bits (or 1.3) away from each other, see Fig. 9. VII. C ONCLUSION AND F UTURE D IRECTIONS We studied the capacity region of the two-user multipleinput single-output complex Gaussian Broadcast Channel with delayed CSIT. We described our transmission strategy for finite SNR regime that incorporates delayed CSIT to obtain an inner-bound which is within a constant number of bits of the outer-bound. Currently, the gap is 1.81 bits/sec/Hz/user. When talking about constant gap approximation of the capacity region of wireless networks, from a practical point of view, it is very important that the gap is small. Thus, one future direction would be to improve the outer-bound and the inner-bound to tighten the gap.
P 2 2 RQ (D) = E log2 1 + ||g||2 + ||h||2 2D P E ||g||22 + ||h||22 ≤ log2 1 + 2D 2P = log2 1 + . (31) D Moreover, from [19], we have Z ∞ C2×1 = log2 (1 + P λ/2) λe−λ dλ 0 Z 1 = log2 (1 + P λ/2) λe−λ dλ Z 0∞ + log2 (1 + P λ/2) λe−λ dλ 1
=
∞ Z X m=1
21−m
2−m
log2 (1 + P λ/2) λe−λ dλ
Z + +
2
log2 (1 + 1 45 Z 2+.1j X
P λ/2) λe−λ dλ log2 (1 + P λ/2) λe−λ dλ
j=1 2+.1(j−1) ∞
Z
log2 (1 + P λ/2) λe−λ dλ
+ 6.5 (a)
1
Z
≥ log2 (1 + P/2)
λe
−λ
dλ −
0
∞ X
Z
21−m
λe−λ dλ
m 2−m
m=1
{z
|
}
0.4
∞
log2 (1 + P λ/2) λe−λ dλ Z ∞ > log2 (1 + P/2) λe−λ dλ
+
6.5
0
= log2 (1 + P/2) .
(32)
where (a) holds since ∞ Z 21−m X log2 (1 + P λ/2) λe−λ dλ −m
m=1 2 ∞ X
Z
21−m
log2 1 + 2−m P/2 λe−λ dλ
≥
2−m
≥
m=1 ∞ Z 21−m X m=1
2−m
[log2 (1 + P/2) − log2 (2m )] λe−λ dλ 1
Z
λe−λ dλ −
= log2 (1 + P/2) 0
and
P∞
m=1
m
(33)
R 21−m 2−m
(
∞ X
Z
21−m
m
m=1
λe−λ dλ,
2−m
λe−λ dλ converges since )∞ Z 1−m 2
λe−λ dλ
m 2−m
,
(34)
m=1
is a Cauchy sequence. Thus, for D = 4, we have RQ (D)/C2×1 < 1. R EFERENCES [1] M. A. Maddah-Ali and D. N. T. Tse, “Completely stale transmitter channel state information is still very useful,” in Forty-Eighth Annual Allerton Conference on Communication, Control, and Computing, Sept. 2010. [2] C. S. Vaze and M. K. Varanasi, “The degrees of freedom region and interference alignment for the MIMO interference channel with delayed CSIT,” IEEE Transactions on Information Theory, vol. 58, no. 7, pp. 4396–4417, 2012. [3] A. Ghasemi, A. S. Motahari, and A. K. . Khandani, “On the degrees of freedom of X channel with delayed CSIT,” in 2011 IEEE International Symposium on Information Theory Proceedings, (Saint-Petersburg, Russia), pp. 909–912, July 2011.
[4] C. Vaze and M. Varanasi, “The degrees of freedom region and interference alignment for the MIMO interference channel with delayed CSIT,” IEEE Transactions on Information Theory, vol. 58, no. 7, pp. 4396–4417, 2012. [5] H. Maleki, S. Jafar, and S. Shamai, “Retrospective interference alignment,” Arxiv preprint arXiv:1009.3593, 2010. [6] M. J. Abdoli, A. Ghasemi, and A. K. Khandani, “On the degrees of freedom of K-user SISO interference and X channels with delayed CSIT,” Submitted to IEEE Transactions on Information Theory, Available online at: Arxiv preprint arXiv:1109.4314, 2011. [7] A. Vahid, M. Maddah-Ali, and A. Avestimehr, “Interference channel with binary fading: Effect of delayed network state information,” in 49th Annual Allerton Conference on Communication, Control, and Computing, pp. 894–901, 2011. [8] A. Vahid, M. Maddah-Ali, and A. Avestimehr, “Binary fading interference channel with delayed feedback,” in Proceedings of IEEE International Symposium on Information Theory (ISIT), pp. 1882– 1886, 2012. [9] A. Vahid, M. A. Maddah-Ali, and A. S. Avestimehr, “Capacity results for binary fading interference channels with delayed CSIT,” arXiv preprint arXiv:1301.5309, 2013. [10] R. Tandon, S. Mohajer, V. Poor, and S. Shamai, “Degrees of freedom region of the MIMO interference channel with output feedback and delayed CSIT,” accepted for publication in IEEE Transactions on Information Theory, 2012. [11] C. Vaze and M. Varanasi, “The degrees of freedom region of the MIMO interference channel with Shannon feedback,” arXiv preprint arXiv:1109.5779, 2011. [12] M. J. Abdoli and A. S. Avestimehr, “Layered interference networks with delayed CSI: DoF scaling with distributed transmitters,” arXiv preprint arXiv:1302.4788, 2013. [13] S. Yang, M. Kobayashi, D. Gesbert, and X. Yi, “Degrees of freedom of time correlated MISO broadcast channel with delayed CSIT,” IEEE transactions on information theory, vol. 59, no. 1, pp. 315–328, 2013. [14] P. de Kerret, X. Yi, and D. Gesbert, “On the degrees of freedom of the K-user time correlated broadcast channel with delayed CSIT,” arXiv preprint arXiv:1301.2138, 2013. [15] R. Tandon, S. A. Jafar, H. Poor, et al., “On the synergistic benefits of alternating CSIT for the MISO BC,” [16] T. Gou and S. A. Jafar, “Optimal use of current and outdated channel state information: Degrees of freedom of the MISO BC with mixed CSIT,” IEEE Communications Letters, vol. 16, no. 7, pp. 1084–1087, 2012. [17] X. Yi and D. Gesbert, “Precoding methods for MISO broadcast channel with delayed CSIT,” arXiv preprint arXiv:1207.2103, 2012. [18] A. Gamal, “The feedback capacity of degraded broadcast channels (corresp.),” IEEE Transactions on Information Theory, vol. 24, no. 3, pp. 379–381, 1978. [19] E. Telatar, “Capacity of multi-antenna gaussian channels,” European transactions on telecommunications, vol. 10, no. 6, pp. 585–595, 1999. [20] R. Zamir and M. Feder, “On lattice quantization noise,” Information Theory, IEEE Transactions on, vol. 42, no. 4, pp. 1152–1159, 1996. [21] A. Gersho, “Asymptotically optimal block quantization,” IEEE Transactions on Information Theory, vol. 25, no. 4, pp. 373–380, 1979.