Abstract
The downlink of symmetric Cloud Radio Access Networks (C-RANs) with multiple relays and a single receiver is studied. Lower and upper bounds are derived on the capacity. The lower bound is achieved by Marton’s coding, which facilitates dependence among the multiple-access channel inputs. The upper bound uses Ozarow’s technique to augment the system with an auxiliary random variable. The bounds are studied over scalar Gaussian C-RANs and are shown to meet and characterize the capacity for interesting regimes of operation.
1. Introduction
Cloud Radio Access Networks (C-RANs) are expected to be a part of future mobile network architectures. In C-RANs, information processing is done in a cloud-based central unit that is connected to remote radio heads (or relays) by rate-limited fronthaul links. C-RANs improve energy and bandwidth efficiency and reduce the complexity of relays by facilitating centralized information processing and cooperative communication. We refer to [,,] and the references therein for an overview of the challenges and coding techniques for C-RANs. Several coding schemes have been proposed in recent years for the downlink of C-RANs including message sharing [], backhaul compression [], hybrid schemes [] and generalized data sharing using Marton’s coding [,]. The paper [] gives an upper bound on the sum-rate of two-relay C-RANs with two users and numerically compares the performance of the aforementioned schemes with the upper bound.
We consider the downlink of a C-RAN with multiple relays and a single receiver. This network may be modeled by an M-relay diamond network where the broadcast component is modeled by rate-limited links and the multiaccess component is modeled by a memoryless Multiple Access Channel (MAC); see Figure 1. The capacity of this class of networks is not known in general, but lower and upper bounds were derived in [,,] for two-relay networks. Moreover, the capacity was found for binary adder MACs [] and for certain regimes of operation in Gaussian MACs [,]. In this work, we derive lower and upper bounds for C-RANs with multiple relays and find the capacity in interesting regimes of operation for symmetric Gaussian C-RANs.

Figure 1.
A C-RAN downlink.
This paper is organized as follows. Section 2 introduces the notation and the problem setup. In Section 3, we propose a coding strategy based on Marton’s coding and discuss simplifications for symmetric networks. In Section 4, we generalize the bounding technique in [,]. The case of symmetric Gaussian C-RANs is studied in Section 5, where we compute lower and upper bounds on the capacity and show that they meet in certain regimes of operation characterized in terms of power, number of users and broadcast link capacities.
2. Preliminaries and Problem Setup
2.1. Notation
Random variables are denoted by uppercase letters, e.g., X; their realizations are denoted by lowercase letters, e.g., x; and their corresponding probabilities are denoted by or . The probability mass function (pmf) describing X is denoted by . denotes the set of sequences that are -typical with respect to ([], p. 25). When is clear from the context, we write . The entropy of X is denoted by ; the conditional entropy of X given Y is denoted by ; and the mutual information of X and Y is denoted by . Similarly, differential entropies and conditional differential entropies are denoted by and .
Matrices are denoted by bold letters, e.g., . We denote the entry of matrix in row i and column j by . Sets are denoted by script letters, e.g., . The Cartesian product of and is denoted by , and the n-fold Cartesian product of is denoted by . The cardinality of is denoted by .
2.2. Model
Consider the C-RAN in Figure 1, where a source communicates a message W with bits to a sink with the help of M relays. Let be the set of relays. The source encodes W into descriptions that are provided to relays , respectively, and where satisfies:
Each relay m, , maps its description into a sequence , which is sent over a multiple access channel. The MAC is characterized by the input alphabets , the output alphabet and the transitional probabilities for all . From the received sequence , the sink decodes an estimate of W.
A coding scheme consists of an encoder, M relay mappings and a decoder and is said to achieve the rate R if, by choosing n sufficiently large, we can make the error probability as small as desired. We are interested in characterizing the largest achievable rate R. We refer to the supremum of achievable rates as the capacity of the network.
In this work, we focus on symmetric networks.
Definition 1.
When the MAC is Gaussian, the input and output alphabets are the set of real numbers, and the output is given by:
where Z is Gaussian noise with zero mean and unit variance. We consider average block power constraints :
The Gaussian C-RAN is symmetric if and for all .
3. A Lower Bound
We outline an achievable scheme based on Marton’s coding. We remark that this scheme can be improved for certain regimes of C by using superposition coding (e.g., see ([], Theorem 2) and ([], Theorem 2)).
Fix the pmf , , and the auxiliary rates , , such that:
3.1. Codebook Construction
Set:
For every , generate sequences , , , in an i.i.d. manner according to , independently across . For each bin index , pick a jointly typical sequence tuple:
3.2. Encoding
Represent message w as a tuple , and send to relay m, .
3.3. Relay Mapping at Relay m,
Relay m sends over the MAC.
3.4. Decoding
Upon receiving , the receiver looks for indices for which the following joint typicality test holds for some :
We show in Appendix A that the above scheme has a vanishing error probability as if, in addition to (8)–(10), we have:
One can use Fourier–Motzkin elimination to eliminate , , from (8)–(10), (13), (14), and characterize the set of achievable rates R. For symmetric networks (see Definition 1), we bypass the above step and proceed by choosing to be “symmetric”.
We say is symmetric if:
and, for all subsets , with , we have:
We simplify the problem defined by (8)–(10), (13), (14) for symmetric distributions and prove the following result in Appendix B.
Theorem 1.
For symmetric C-RAN downlinks, the rate R is achievable if:
for some symmetric distribution .
4. An Upper Bound
Our upper bound is motivated by [,,,].
Theorem 2.
The capacity is upper bounded by:
where forms a Markov chain. Moreover, the alphabet size of Q may be chosen to satisfy .
Remark 1.
For , Theorem 2 reduces to ([], Theorem 3).
Proof outline.
We start with the following n-letter upper bound (see Appendix C):
For any sequence , we have:
By substituting (22) into (20), we obtain:
We now choose , , to be the output of a memoryless channel with input . The auxiliary channel will be optimized later. With this choice, we single-letterize (21) and (23) and obtain:
where forms a Markov chain. ☐
5. The Symmetric Gaussian C-RAN
We specialize Theorem 1 to the symmetric Gaussian C-RAN defined in (6) and (7) where for all . Choose to be jointly Gaussian with the covariance matrix:
Remark 2.
Choosing to be jointly Gaussian (and/or symmetric) is not necessarily optimal for (13) and (14), but it gives a lower bound on the capacity.
Theorem 3.
The rate R is achievable if it satisfies the following constraints for some non-negative parameter ρ, :
Remark 3.
One can recursively calculate :
Let be the maximum achievable rate given by (27) and (28). The RHS of (27) is non-increasing in , and the RHS of (28) is increasing in . Therefore, we have the following two cases for the optimizing solution :
- If then
- Otherwise, is the unique solution of in:
We next specialize Theorem 2 to symmetric Gaussian C-RANs.
Theorem 4.
The rate R is achievable only if there exists ρ, , such that the following inequalities hold for all :
Proof.
Set:
where are identically distributed according to the normal distribution and are independent of each other and . The variance N is to be optimized.
In order to find a computable upper bound in (19), we need to lower bound . Recall that U is a noisy version of Y. We thus use the conditional entropy power inequality ([], Theorem 17.7.3):
Substituting (36) into the first constraint of (19), we obtain:
Now, consider the second term in (19) with :
Note that the RHSs of (37), (38) are both concave in and symmetric with respect to . Therefore, a symmetric maximizes them. Let denote the covariance matrix of an optimal symmetric solution. We have:
Using the conditional version of the maximum entropy lemma [], we can upper bound the differential entropies that appear with a positive sign in (37) and (38) by their Gaussian counterparts, and and can be written explicitly because the channels from to U and Y are Gaussian. We obtain (33) and (34). Note that the RHSs of both bounds are increasing in P, and therefore there is no loss of generality in choosing (among ). ☐
The upper bound of Theorem 4 and the lower bound of Theorem 3 are plotted in Figure 2 for and , and they are compared with the lower bounds of message sharing [] and compression []. One sees that our lower and upper bounds are close, and they match over a wide range of C. Moreover, establishing partial cooperation among the relays through Marton’s coding offers significant gains. Figure 3 plots the capacity bounds for and different values of M.

Figure 2.
Capacity bounds as functions of C (, ).

Figure 3.
Capacity bounds as functions of C for and different values of M.
We next compare the lower and upper bounds. We define:
where:
Theorem 5.
The lower bound of Theorem 3 matches the upper bound of Theorem 4 if:
or if:
where are defined in (40)–(42).
Remark 4.
Theorem 5 recovers ([], Theorem 5), for .
Remark 5.
For , no cooperation is needed among the transmitters, and the capacity is equal to .
Remark 6.
For C large enough, full cooperation is possible through superposition coding, and the capacity is:
where
The rate (46) is not achievable by Theorem 3 except when . This rate is achievable by message sharing.
Proof of Theorem 5.
To find regimes of P and C for which the lower and upper bounds match, we mimic the analysis in ([], Appendix F). Consider the lower bound in Theorem 3 and in particular its maximum achievable rate , which is attained by ; see (30)–(32). If (44) holds, we have , , and thus the cut-set bound is achieved. Otherwise, we proceed as follows.
Consider (33). Since and using the definition of in (32), we can further upper bound (33) and obtain:
Call the RHS of (48) and the RHS of (34) . Fix N as a function of such that:
where is evaluated for a fully-symmetric Gaussian distribution with correlation factor . One can verify that the following choice of N satisfies (49):
The right inequality in (45) ensures .
6. Concluding Remarks
We studied the downlink of symmetric C-RANs with multiple relays and a single receiver and established lower and upper bounds on the capacity. The lower bound uses Marton’s coding to establish partial cooperation among the relays and improves on schemes that are based on message sharing and compression for scalar Gaussian C-RANs (see Figure 2). The upper bound generalizes the bounding techniques of [,]. When specialized to symmetric Gaussian C-RANs, the lower and upper bounds meet over a wide range of C, and this range gets large as M and/or P get large.
Future directions include generalizing the techniques to address C-RANs with multiple receivers (e.g., []), secrecy constraints at the receivers (e.g., []) and secrecy constraints at individual relays (e.g., []).
Acknowledgments
The work of S. Saeedi Bidokhti was supported by the Swiss National Science Foundation fellowship No. 158487. The work of G. Kramer was supported by the German Federal Ministry of Education and Research in the framework of the Alexander von Humboldt-Professorship. The work of S. Shamai was supported by the European Union’s Horizon 2020 Research and Innovation Program, Grant Agreement No. 694630.
Author Contributions
All authors conceived the problem and solution. S. Saeedi Bidokhti wrote the paper.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A. Analysis of the Achievable Scheme
The scheme fails only if one of the following events occurs:
- (12) holds for indices where . We show that this event has a vanishing error probability as if we have (14). Since the codebook is symmetric with respect to all messages, we assume without loss of generality that and . Fix the sets such that . Consider the case where
Appendix B. Simplification for Symmetric Networks with Symmetric Distributions
Choose and for all . The problem defined by (8)–(10), (13), (14) simplifies using the definition in (16):
We prove that the tightest inequality in (A7) and (A8) is given by . Eliminating from the remaining inequalities concludes the proof.
Let be any subset of and be an element of such that . This is possible if . Define . We show that:
and:
The following equalities come in handy in the proof:
Suppose and . We have:
where (a) and (c) hold by (16) and (b) is by (A12), written for .
Appendix C. Proof of Theorem 2
We first prove the multi-letter bound in (20) using Fano’s inequality and the data processing inequality. For any , we have:
where (a) is by Fano’s inequality and (b) is by the data processing inequality as follows:
Similarly, for any subset and , we have:
where (a) is because forms a Markov chain and (b) is because conditioning does not increase entropy and because forms a Markov chain.
Next, we single-letterize (23) as follows:
where T is a uniform random variable on the set independent of everything in the system, Q is defined by and , Y and U are defined by , and , respectively. Note that forms a Markov chain.
Finally, we expand (21) as follows:
where (a) is because forms a Markov chain, (b) is because forms a Markov chain and (c) is by a standard time sharing argument. The cardinality of is bounded using the Fenchel–Eggleston–Carathéodory theorem ([], Appendix A) (see also ([], Appendix B)).
References
- Park, S.H.; Simeone, O.; Sahin, O.; Shamai, S. Fronthaul compression for cloud radio access networks: Signal processing advances inspired by network information theory. IEEE Signal Proc. Mag. 2014, 31, 69–79. [Google Scholar] [CrossRef]
- Yu, W. Cloud radio-access networks: Coding strategies, capacity analysis, and optimization techniques. In Proceedings of the Communications Theory Workshop, Toronto, ON, Canada, 6 May 2016. [Google Scholar]
- Peng, M.; Wang, C.; Lau, V.; Poor, H.V. Fronthaul-constrained cloud radio access networks: Insights and challenges. IEEE Wirel. Commun. 2015, 22, 152–160. [Google Scholar] [CrossRef]
- Dai, B.; Yu, W. Sparse beamforming and user-centric clustering for downlink cloud radio access network. IEEE Access 2014, 2, 1326–1339. [Google Scholar]
- Park, S.H.; Simeone, O.; Sahin, O.; Shamai, S. Joint precoding and multivariate backhaul compression for the downlink of cloud radio access networks. IEEE Trans. Signal Proc. 2013, 61, 5646–5658. [Google Scholar] [CrossRef]
- Patil, P.; Yu, W. Hybrid compression and message-sharing strategy for the downlink cloud radio-access network. In Proceedings of the Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 9–14 February 2014; pp. 1–6. [Google Scholar]
- Liu, N.; Kang, W. A new achievability scheme for downlink multicell processing with finite backhaul capacity. In Proceedings of the IEEE International Symposium on Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; pp. 1006–1010. [Google Scholar]
- Wang, C.; Wigger, M.A.; Zaidi, A. On achievability for downlink cloud radio access networks with base station cooperation. arXiv, 2016; arXiv:1610.09407. [Google Scholar]
- Yang, T.; Liu, N.; Kang, W.; Shamai, S. An upper bound on the sum capacity of the downlink multicell processing with finite backhaul capacity. arXiv, 2016; arXiv:1609.00833. [Google Scholar]
- Traskov, D.; Kramer, G. Reliable communication in networks with multi-access interference. In Proceedings of the Information Theory Workshop, Tahoe City, CA, USA, 2–6 September 2007; pp. 343–348. [Google Scholar]
- Kang, W.; Liu, N.; Chong, W. The Gaussian multiple access diamond channel. IEEE Trans. Inf. Theory 2015, 61, 6049–6059. [Google Scholar] [CrossRef]
- Saeedi Bidokhti, S.; Kramer, G. Capacity bounds for diamond networks with an orthogonal broadcast channel. IEEE Trans. Inf. Theory 2016, 62, 7103–7122. [Google Scholar] [CrossRef]
- El Gamal, A.; Kim, Y.H. Network Information Theory; Cambridge University Press: Cambridge, UK, 2011. [Google Scholar]
- Venkataramani, R.; Kramer, G.; Goyal, V.K. Multiple description coding with many channels. IEEE Trans. Inf. Theory 2006, 49, 2106–2114. [Google Scholar] [CrossRef]
- Saeedi Bidokhti, S.; Kramer, G. Capacity bounds for a class of diamond networks. In Proceedings of the International Symposium Information Theory, Honolulu, HI, USA, 29 June–4 July 2014; pp. 1196–1200. [Google Scholar]
- Ozarow, L. On a source-coding problem with two channels and three receivers. Bell Syst. Tech. J. 1980, 59, 1909–1921. [Google Scholar] [CrossRef]
- Cover, T.M.; Thomas, J.A. Elements of Information Theory; Wiley-Interscience: New York, NY, USA, 2006. [Google Scholar]
- Thomas, J. Feedback can at most double Gaussian multiple access channel capacity. IEEE Trans. Inf. Theory 1987, 33, 711–716. [Google Scholar] [CrossRef]
- Lee, S.H.; Zhao, W.; Khisti, A. Secure degrees of freedom of the Gaussian diamond-wiretap channel. IEEE Trans. Inf. Theory 2017, 63, 496–508. [Google Scholar] [CrossRef]
- Zou, S.; Liang, Y.; Lai, L.; Shamai, S. An information theoretic approach to secret sharing. IEEE Trans. Inf. Theory 2015, 61, 3121–3136. [Google Scholar] [CrossRef]
- Minero, P.; Lim, S.H.; Kim, Y.H. A unified approach to hybrid coding. IEEE Trans. Inf. Theory 2005, 61, 1509–1523. [Google Scholar] [CrossRef]
- Grover, P.; Wagner, A.B.; Sahai, A. Information embedding meets distributed control. arXiv, 2010; arXiv:1003.0520. [Google Scholar]
- Saeedi Bidokhti, S.; Prabhakaran, V.M. Is non-unique decoding necessary? IEEE Trans. Inf. Theory 2014, 60, 2594–2610. [Google Scholar] [CrossRef]
- Willems, F.; van der Meulen, E. The discrete memoryless multiple-access channel with cribbing encoders. IEEE Trans. Inf. Theory 1985, 31, 313–327. [Google Scholar] [CrossRef]
© 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).