Harnessing bursty interference
Interference is a central feature of wireless communication. In many scenarios, interference is bursty: interfering wireless links come and go. Designing the system assuming interference to be always present is very conservative. In this paper, we take a fundamental information theoretic stand point...
Saved in:
Published in | 2009 IEEE Information Theory Workshop on Networking and Information Theory pp. 13 - 16 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.06.2009
|
Subjects | |
Online Access | Get full text |
ISBN | 1424445353 9781424445356 |
DOI | 10.1109/ITWNIT.2009.5158532 |
Cover
Abstract | Interference is a central feature of wireless communication. In many scenarios, interference is bursty: interfering wireless links come and go. Designing the system assuming interference to be always present is very conservative. In this paper, we take a fundamental information theoretic stand point and address the issue of statistical gain associated with bursty interference in the context of a pair of unicast interfering wireless links. Modeling the problem as a ldquodegraded message setrdquo two user Gaussian interference channel, we approximately characterize the symmetric capacity region. Our results demonstrate the fundamental existence of three regimes: one where treating interference as always there is without loss of optimality, another where one can harness as well as if interference was never there and a third where the performance is in between these two regimes. |
---|---|
AbstractList | Interference is a central feature of wireless communication. In many scenarios, interference is bursty: interfering wireless links come and go. Designing the system assuming interference to be always present is very conservative. In this paper, we take a fundamental information theoretic stand point and address the issue of statistical gain associated with bursty interference in the context of a pair of unicast interfering wireless links. Modeling the problem as a ldquodegraded message setrdquo two user Gaussian interference channel, we approximately characterize the symmetric capacity region. Our results demonstrate the fundamental existence of three regimes: one where treating interference as always there is without loss of optimality, another where one can harness as well as if interference was never there and a third where the performance is in between these two regimes. |
Author | Khude, N. Prabhakaran, V. Viswanath, P. |
Author_xml | – sequence: 1 givenname: N. surname: Khude fullname: Khude, N. organization: Dept. of Electr. & Comput. Eng., Univ. of Illinois, Urbana-Champaign, Urbana, IL, USA – sequence: 2 givenname: V. surname: Prabhakaran fullname: Prabhakaran, V. organization: Dept. of Electr. & Comput. Eng., Univ. of Illinois, Urbana-Champaign, Urbana, IL, USA – sequence: 3 givenname: P. surname: Viswanath fullname: Viswanath, P. organization: Dept. of Electr. & Comput. Eng., Univ. of Illinois, Urbana-Champaign, Urbana, IL, USA |
BookMark | eNo1T01Lw0AUfKIFTc0vKEj_QOJ72a_sUYq2gaKXiMey2bxIRFfZjYf-eyPWuQwDM8NMBhfhMzDAirAkQnvbtC-PTVtWiLZUpGolqjPIralJVlJKJbQ4h-xfKLGA7NdrUdRoLiFP6Q1nqDlp6Apudi4GTmkMr-vuO6bpuB7DxHHgyMHzNSwG9544P_ESnh_u282u2D9tm83dvhjJqKkY2Oqeeukr13vlyXuchzivFTKiMMNQdap3aHTHsiY2TBo79kJbrzV1Ygmrv96RmQ9fcfxw8Xg4_RM_3ydDTg |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ITWNIT.2009.5158532 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781424445363 1424445361 |
EndPage | 16 |
ExternalDocumentID | 5158532 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AARBI AAWTH ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-fe96d1d4c2adc5c1cc0536ac650e0037ff2b5da076be481e7e160bec369c661b3 |
IEDL.DBID | RIE |
ISBN | 1424445353 9781424445356 |
IngestDate | Wed Aug 27 02:04:32 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
LCCN | 2009903807 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-fe96d1d4c2adc5c1cc0536ac650e0037ff2b5da076be481e7e160bec369c661b3 |
PageCount | 4 |
ParticipantIDs | ieee_primary_5158532 |
PublicationCentury | 2000 |
PublicationDate | 2009-June |
PublicationDateYYYYMMDD | 2009-06-01 |
PublicationDate_xml | – month: 06 year: 2009 text: 2009-June |
PublicationDecade | 2000 |
PublicationTitle | 2009 IEEE Information Theory Workshop on Networking and Information Theory |
PublicationTitleAbbrev | ITWNIT |
PublicationYear | 2009 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000558571 |
Score | 1.4737527 |
Snippet | Interference is a central feature of wireless communication. In many scenarios, interference is bursty: interfering wireless links come and go. Designing the... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 13 |
SubjectTerms | Additive white noise AWGN Context Decoding Degradation Gaussian noise Interference channels Power engineering and energy Unicast Wireless communication |
Title | Harnessing bursty interference |
URI | https://ieeexplore.ieee.org/document/5158532 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-Qkyc1YPwkO3i0sNKPdWcjAROIB4jcSD9eE2MyDI4D_vW-bgOj8eBtbbOmr137W1_7-z1C7hTkDrgSVOZMUxE0p9qLjIYYctRbLVxFFJ7O1HghnpZy2SL3By4MAFSXz6AfH6uzfL922-gqGyD2IrrggnuEn1nN1Tr4U1KJZRnbc7eE5JLvJZ2atGpUh1iaDybzl9lkXutVNtX-iK9SwcvohEz3Datvlbz1t6Xtu89fmo3_bfkp6X4T-ZLnA0SdkRYUHdIbm01c4DAnwS79KHdJFI3YNC90yWL0OH8Y0yZMAn1F7C9pgFx55rFXjXfSMedwYinj8N8LorxMCEMrvUkzZUFoBhkwleLQcZU7RGfLz0m7WBdwQRLc3-hsaJUNJgjude4zJ3HGSuAmcGMuSSfatnqvlTBWjVlXf2dfk-P67CX6LG5Iu9xs4RYhvLS9auy-AD9HlvA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwFLaqMsAEqEWcJQMjaZP6iDMjqhTaiiEV3SofzxJCalFIB_j1PCdpEYiBzYds-ZD92c_-vkfIjYDUABUs5GksQ-YkDaVlSei8y1GrJTMVUXg6E9mcPSz4okVud1wYAKg-n0HfB6u3fLs2G28qGyD2IrrghruHuM94zdbaWVQijrlJvGVvMU453Yo6NXHR6A7FUToY58-zcV4rVjYV__CwUgHM6JBMt02r_5W89jel7pvPX6qN_237Eel-U_mCpx1IHZMWrDqkl6nCb3GYEuCgvpcfgZeNKJoCXTIf3ed3Wdg4SghfEP3L0EEqbGxxXJU13MTG4NISyuDpC7zAjHNDza2KEqGByRgSiEWEk0dFahCfNT0h7dV6BackwBuOTIZaaKcco1amNjEc1ywHqhxV6ox0fN-Wb7UWxrLp1vnfyddkP8unk-VkPHu8IAf1S4y3YFySdlls4AoBvdS9ah6_AF-amj0 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+IEEE+Information+Theory+Workshop+on+Networking+and+Information+Theory&rft.atitle=Harnessing+bursty+interference&rft.au=Khude%2C+N.&rft.au=Prabhakaran%2C+V.&rft.au=Viswanath%2C+P.&rft.date=2009-06-01&rft.pub=IEEE&rft.isbn=9781424445356&rft.spage=13&rft.epage=16&rft_id=info:doi/10.1109%2FITWNIT.2009.5158532&rft.externalDocID=5158532 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424445356/sc.gif&client=summon&freeimage=true |