Harnessing bursty interference

Interference is a central feature of wireless communication. In many scenarios, interference is bursty: interfering wireless links come and go. Designing the system assuming interference to be always present is very conservative. In this paper, we take a fundamental information theoretic stand point...

Full description

Saved in:
Bibliographic Details
Published in2009 IEEE Information Theory Workshop on Networking and Information Theory pp. 13 - 16
Main Authors Khude, N., Prabhakaran, V., Viswanath, P.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.06.2009
Subjects
Online AccessGet full text
ISBN1424445353
9781424445356
DOI10.1109/ITWNIT.2009.5158532

Cover

Abstract Interference is a central feature of wireless communication. In many scenarios, interference is bursty: interfering wireless links come and go. Designing the system assuming interference to be always present is very conservative. In this paper, we take a fundamental information theoretic stand point and address the issue of statistical gain associated with bursty interference in the context of a pair of unicast interfering wireless links. Modeling the problem as a ldquodegraded message setrdquo two user Gaussian interference channel, we approximately characterize the symmetric capacity region. Our results demonstrate the fundamental existence of three regimes: one where treating interference as always there is without loss of optimality, another where one can harness as well as if interference was never there and a third where the performance is in between these two regimes.
AbstractList Interference is a central feature of wireless communication. In many scenarios, interference is bursty: interfering wireless links come and go. Designing the system assuming interference to be always present is very conservative. In this paper, we take a fundamental information theoretic stand point and address the issue of statistical gain associated with bursty interference in the context of a pair of unicast interfering wireless links. Modeling the problem as a ldquodegraded message setrdquo two user Gaussian interference channel, we approximately characterize the symmetric capacity region. Our results demonstrate the fundamental existence of three regimes: one where treating interference as always there is without loss of optimality, another where one can harness as well as if interference was never there and a third where the performance is in between these two regimes.
Author Khude, N.
Prabhakaran, V.
Viswanath, P.
Author_xml – sequence: 1
  givenname: N.
  surname: Khude
  fullname: Khude, N.
  organization: Dept. of Electr. & Comput. Eng., Univ. of Illinois, Urbana-Champaign, Urbana, IL, USA
– sequence: 2
  givenname: V.
  surname: Prabhakaran
  fullname: Prabhakaran, V.
  organization: Dept. of Electr. & Comput. Eng., Univ. of Illinois, Urbana-Champaign, Urbana, IL, USA
– sequence: 3
  givenname: P.
  surname: Viswanath
  fullname: Viswanath, P.
  organization: Dept. of Electr. & Comput. Eng., Univ. of Illinois, Urbana-Champaign, Urbana, IL, USA
BookMark eNo1T01Lw0AUfKIFTc0vKEj_QOJ72a_sUYq2gaKXiMey2bxIRFfZjYf-eyPWuQwDM8NMBhfhMzDAirAkQnvbtC-PTVtWiLZUpGolqjPIralJVlJKJbQ4h-xfKLGA7NdrUdRoLiFP6Q1nqDlp6Apudi4GTmkMr-vuO6bpuB7DxHHgyMHzNSwG9544P_ESnh_u282u2D9tm83dvhjJqKkY2Oqeeukr13vlyXuchzivFTKiMMNQdap3aHTHsiY2TBo79kJbrzV1Ygmrv96RmQ9fcfxw8Xg4_RM_3ydDTg
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ITWNIT.2009.5158532
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781424445363
1424445361
EndPage 16
ExternalDocumentID 5158532
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AARBI
AAWTH
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-fe96d1d4c2adc5c1cc0536ac650e0037ff2b5da076be481e7e160bec369c661b3
IEDL.DBID RIE
ISBN 1424445353
9781424445356
IngestDate Wed Aug 27 02:04:32 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009903807
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-fe96d1d4c2adc5c1cc0536ac650e0037ff2b5da076be481e7e160bec369c661b3
PageCount 4
ParticipantIDs ieee_primary_5158532
PublicationCentury 2000
PublicationDate 2009-June
PublicationDateYYYYMMDD 2009-06-01
PublicationDate_xml – month: 06
  year: 2009
  text: 2009-June
PublicationDecade 2000
PublicationTitle 2009 IEEE Information Theory Workshop on Networking and Information Theory
PublicationTitleAbbrev ITWNIT
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000558571
Score 1.4737527
Snippet Interference is a central feature of wireless communication. In many scenarios, interference is bursty: interfering wireless links come and go. Designing the...
SourceID ieee
SourceType Publisher
StartPage 13
SubjectTerms Additive white noise
AWGN
Context
Decoding
Degradation
Gaussian noise
Interference channels
Power engineering and energy
Unicast
Wireless communication
Title Harnessing bursty interference
URI https://ieeexplore.ieee.org/document/5158532
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-Qkyc1YPwkO3i0sNKPdWcjAROIB4jcSD9eE2MyDI4D_vW-bgOj8eBtbbOmr137W1_7-z1C7hTkDrgSVOZMUxE0p9qLjIYYctRbLVxFFJ7O1HghnpZy2SL3By4MAFSXz6AfH6uzfL922-gqGyD2IrrggnuEn1nN1Tr4U1KJZRnbc7eE5JLvJZ2atGpUh1iaDybzl9lkXutVNtX-iK9SwcvohEz3Datvlbz1t6Xtu89fmo3_bfkp6X4T-ZLnA0SdkRYUHdIbm01c4DAnwS79KHdJFI3YNC90yWL0OH8Y0yZMAn1F7C9pgFx55rFXjXfSMedwYinj8N8LorxMCEMrvUkzZUFoBhkwleLQcZU7RGfLz0m7WBdwQRLc3-hsaJUNJgjude4zJ3HGSuAmcGMuSSfatnqvlTBWjVlXf2dfk-P67CX6LG5Iu9xs4RYhvLS9auy-AD9HlvA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwFLaqMsAEqEWcJQMjaZP6iDMjqhTaiiEV3SofzxJCalFIB_j1PCdpEYiBzYds-ZD92c_-vkfIjYDUABUs5GksQ-YkDaVlSei8y1GrJTMVUXg6E9mcPSz4okVud1wYAKg-n0HfB6u3fLs2G28qGyD2IrrghruHuM94zdbaWVQijrlJvGVvMU453Yo6NXHR6A7FUToY58-zcV4rVjYV__CwUgHM6JBMt02r_5W89jel7pvPX6qN_237Eel-U_mCpx1IHZMWrDqkl6nCb3GYEuCgvpcfgZeNKJoCXTIf3ed3Wdg4SghfEP3L0EEqbGxxXJU13MTG4NISyuDpC7zAjHNDza2KEqGByRgSiEWEk0dFahCfNT0h7dV6BackwBuOTIZaaKcco1amNjEc1ywHqhxV6ox0fN-Wb7UWxrLp1vnfyddkP8unk-VkPHu8IAf1S4y3YFySdlls4AoBvdS9ah6_AF-amj0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+Information+Theory+Workshop+on+Networking+and+Information+Theory&rft.atitle=Harnessing+bursty+interference&rft.au=Khude%2C+N.&rft.au=Prabhakaran%2C+V.&rft.au=Viswanath%2C+P.&rft.date=2009-06-01&rft.pub=IEEE&rft.isbn=9781424445356&rft.spage=13&rft.epage=16&rft_id=info:doi/10.1109%2FITWNIT.2009.5158532&rft.externalDocID=5158532
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/sc.gif&client=summon&freeimage=true