Cognition and Cooperation in Interfered Multiple Access Channels †

In this work, we investigate a three-user cognitive communication network where a primary two-user multiple access channel suffers interference from a secondary point-to-point channel, sharing the same medium. While the point-to-point channel transmitter—transmitter 3—causes an interference at the primary multiple access channel receiver, we assume that the primary channel transmitters—transmitters 1 and 2—do not cause any interference at the point-to-point receiver. It is assumed that one of the multiple access channel transmitters has cognitive capabilities and cribs causally from the other multiple access channel transmitter. Furthermore, we assume that the cognitive transmitter knows the message of transmitter 3 in a non-causal manner, thus introducing the three-user multiple access cognitive Z-interference channel. We obtain inner and outer bounds on the capacity region of the this channel for both causal and strictly causal cribbing cognitive encoders. We further investigate different variations and aspects of the channel, referring to some previously studied cases. Attempting to better characterize the capacity region we look at the vertex points of the capacity region where each one of the transmitters tries to achieve its maximal rate. Moreover, we find the capacity region of a special case of a certain kind of more-capable multiple access cognitive Z-interference channels. In addition, we study the case of full unidirectional cooperation between the 2 multiple access channel encoders. Finally, since direct cribbing allows us full cognition in the case of continuous input alphabets, we study the case of partial cribbing, i.e., when the cribbing is performed via a deterministic function.


Introduction
Two of the most fundamental multi-terminal communication channels are the Multiple-Access Channel (MAC) and the Interference Channel (IFC).The MAC, sometimes referred to as the uplink channel, consists of multiple transmitters, sending messages to a single receiver (base station).The capacity region of the two-user MAC channel was determined, early on, by Ahlswede [1], and Liao [2].However, the capacity regions of many other fundamental multi-terminal channels are yet unknown.One of these channels is the Interference Channel (IFC).The two-user IFC consists of two point to point transmitter-receiver pairs, where each of the transmitters has its own intended receiver and serves as an interference to the other transmitter-receiver.The study of this channel was initiated by C.E. Shannon [3], and extended by R. Ahlswede [4] who gave simple but fundamental inner and outer bounds to the capacity region.The fundamental achievable region of the discrete memoryless two-user IC is the Han-Kobayashi (HK) region [5] which can be exressed by a simplified expression [6].Much progress has been made toward understanding this channel (see, e.g., [7][8][9][10][11][12][13] and the references therein).Although widely investigated, this problem remains unsolved except for some specific channel configurations, enforcing various constraints on the channel [14].
A common scenario of multi-terminal network is comprised of these two channels.For instance, looking at Wi-Fi or cellular communication, there are usually several portable devices (i.e., laptops, mobile phones, etc.) "talking" to a single end point (i.e., base station, Access Point, etc.).Moreover, the same frequencies are frequently used by nearby base stations, causing interferences at adjacent receivers.This increasing usage of wireless services and constant reuse of frequencies imply an ever increasing problem of optimizing the wireless medium for achieving better transmission rates.Cognitive radio technology is one of the novel strategies for overcoming the problem of inefficient spectrum usage which has been receiving a lot of attention [15][16][17].
Cognition stands for awareness of system paramters, such as operative frequencies, time schedules, space directivity, and actual transmission.The latter refers to transmitted messages of interfering transmitters, which are either monitored by receiving the interfering signals (cribbing), or on a network scale (a-priori available transmitted messages).Examples of signal awareness are reflected by Dynamic Spectrum Access (DSA) (see the tutorial [18], and references therein), as well as a variety of techniques for spectrum and activity sensing (see [19] and references therein).The timely relevance of cognitive radios and the information theoretic framework that can assess the potential benefits and limitations are reflected in recent literature (see [15] and references therein).
In our study, we focus on aspects of cognition in terms of the ability to recognize the primary (licensed) user and adapt its communication strategy to minimize the interference that it generates, while maximizing its own Quality of Service (QoS).Furthermore, cognition allows cooperation between transmitters in relaying information to improve network capacity.The shared information used by the cognitive transmitter might be achieved through a noisy observation of the channel or via a dedicated link.The cognitive transmitter may apply different strategies such as decode-and-forward (DF) or amplify-and-forward (AF) for relaying the other transmitter information.
To obtain information theoretical limits of cognitive radios, the Cognitive Interference Channel (CIFC) is defined in [20].CIFC refers to a two-user Interference Channel (IFC) in which the cognitive user (secondary user) is cognizant of the message being transmitted by the other user (primary user), either in a non-causal or causal manner.The two-user CIFC was further studied in [21][22][23][24][25]. Cognitive radio was applied to the MAC in 1985, when Willems and Van Der Meulen established the capacity region of the MAC with cribbing encoders [26].Cribbing encoders means that one or both encoders crib from the other encoder and learn the channel input(s) (to be) emitted by this encoder in a causal manner.Since then, the cognitive MAC has received much attention, recently characterizing capacity regions for various extensions [27][28][29][30][31][32].Today, there are already practical implications of advanced processing techniques in the cognitive arena.For example, [33], shows coding techniques for an Orthogonal Frequency-Division Multiple Access (OFDMA)-based secondary service in cognitive networks that outperform traditional coding schemes, see also [34].Hence, aspects of binning (dirty-paper coding [35]), as well as rate splitting [5], used in cognitive coding schemes, do have even stronger practical implications.
In this paper, we study a common wireless scenario in which a Multiple Access Channel (MAC) suffers interferences from a point-to-point (P2P) channel sharing the same medium.The main motivation behind this model is trying to interweave a MAC channel on top of a licensed P2P channel.The P2P licensed user must not suffer interference while the other users may use cognitive radio to improve performance.Adding cognition capabilities to one of the MAC transmitters, we investigate the case in which it has knowledge of signals transmitted by another user intended for the same receiver as well as signals transmitted by the P2P user on a separate channel resulting in an interference at the MAC receiver.We introduce Multiple Access Cognitive Z-Interference Channel (MA-CZIC) which consists of three transmitters and two receivers; two-user MAC as a primary network and a point-to-point channel as a secondary channel.The communication system, including the primary and secondary channels (whose outputs are Y and Z, respectively), is depicted in Figure 1.The signal X 1 is generated by Encoder 1. Encoder 2 is assumed to be a cognitive cribbing encoder, that is, it has causal knowledge of Encoder 1's signal, as well as non-causal knowledge of Encoder 3's signal.We note that while the signal X 3 interferes with the other signals creating Y, it is observed interference-free by the second decoder creating Z.The cognition of the P2P signal may model the fact that the same user produced a P2P message to another point, and hence naturally it is cognizant of the message W 3 .This channel model generalizes several previously studied setups: without Encoder 3, the system reduces to a MAC with a cribbing encoder as in [26].Replacing the signal X 3 with a state process and ignoring the structure of X 3 , we get a MAC with states available at a cribbing encoder as in [24,27].Removing Encoder 2, the problem reduces to the standard Z-Interference channel, and removing Encoder 1, we get the Cognitive Z-Interference channel, as in [36].The Z-Gaussian Cognitive Interference channel was further studied in [37].The model of a cooperative state-dependent MAC which is considered in [29] is very closely related to a special case of the MA-CZIC which is obtained by replacing the interfering signal X k of the MA-CZIC with an i.i.d.state sequence S k which is known non-causally to the cognitive transmitter.Some of the results which appear in this paper were presented in part in [38,39].The rest of the paper is organized as follows.In Section 2 we formally define the memoryless MA-CZIC with causal and strictly causal cribbing encoder.In Section 3 we proceed to derive inner and outer bounds on the capacity region of the channel with causal and strictly causal cribbing encoders including a special case of the channel where the bounds coincide and the capacity region is established.Section 4 is devoted to the case of full unidirectional cooperation from Encoder 1 to Encoder 2 (a common message setup).Section 5 deals with the case of partial cribbing.Finally, concluding remarks are given in Section 6.

Channel Model and Preliminaries
Throughout this work, we will use uppercase letters (e.g., X) to denote random variables (RVs) and lowercase letters (e.g., x) to show their realization.Boldface letters are used for denoting n-vectors, e.g., x = x n = (x 1 , ..., x n ).For a set of RVs S = {X 1 , ..., X k }, A n (S) denotes the set of -strongly, jointly typical n-sequences of S as defined in ( [40], Chapter 13).We may omit the index n from A n (S) when it is clear from the context.
A more formal definition of the problem is as follows: A discrete memoryless multiple-access Z-interference channel (MA-CZIC) is defined by the input alphabets (X 1 , X 2 , X 3 ) and output alphabets (Y, Z ) and by the transition probabilities P Y|X 1 ,X 2 ,X 3 and P Z|X 3 , that is, the channel outputs are generated in the following manner: Encoder i, i ∈ {1, 2, 3}, sends a message W i which is drawn uniformly over the set M i {1, . . ., 2 nR i } to its destined receiver.It is further assumed that Encoder 2 "cribs" causally and observes the sequence of channel inputs emitted by Encoder 1 during all past transmissions before generating its next channel input.The model is depicted in Figure 1.
An (2 nR 1 , 2 nR 2 , 2 nR 3 , n) code for the MA-CZIC with strictly causal Encoder 2 consists of: 1. Encoder 1 defined by a deterministic mapping which maps the message W 1 to a channel input codeword.2. Encoder 2 which observes X i−1 1 and W 3 prior to transmitting X 2,i , is defined by the mappings 3. Encoder 3 is defined by a deterministic mapping 4. The primary (main) decoder is defined by a mapping 5. The secondary decoder is defined by a mapping An (2 nR 1 , 2 nR 2 , 2 nR 3 , n) code for the MA-CZIC with causal Encoder 2 differs only in the fact that Encoder 2 observes X i 1 (including the current symbol, X 1,i ) before transmitting X 2,i , and is defined by a the mappings For a given code, the block average error probability is A rate-triple (R 1 , R 2 , R 3 ) is said to be achievable for the MA-CZIC if there exists a sequence of (2 nR 1 , 2 nR 2 , 2 nR 3 , n) codes with lim n→∞ P (n) e = 0.The capacity region of the MA-CZIC with a cribbing encoder is the closure of the set of achievable rate-triples.

Main Results
In this section, we provide inner and outer bounds to the capacity region of the discrete memoryless MA-CZIC.

Inner Bound
We next present achievable regions for the strictly causal and the causal MA-CZICs.Definition 1.Let R sc be the region defined by the closure of the convex hull of the set of all rate-triples for some probability distribution of the form Theorem 1.The region R sc is achievable for the MA-CZIC with a strictly causal cribbing encoder.
The proof appears in Appendix A.
Definition 2. Let R c be the region defined by the closure of the convex hull of the set of all rate-triples (R 1 , R 2 , R 3 ) satisfying (9a)-(9d), for some probability distribution of the form Theorem 2. The region R c is achievable for the MA-CZIC with a causal cribbing encoder.

The outline of the proof appears in Appendix B.
A few comments regarding the achievability region (9a)-(9d) are in order.In the coding scheme, Encoder 1 and Encoder 2 use Block-Markov superposition encoding, while the primary decoder uses backward decoding [27].In this scheme, the RV V represents the "resolution information" [26]; i.e., the current block information used for encoding the proceeding block.Encoder 3 uses rate-splitting, where the RV L represents the part of W 3 that can be decoded by both the primary and secondary decoders as can be observed by the term min{I(L; Y), I(L; Z)} which appears in (9d).The complementary part of W 3 , while fully decoded by the secondary decoder, serves as a channel state for the primary channel in the form of X 3 .To reduce interference the cognitive encoder (Encoder 2) additionally uses Gel'fand-Pinsker binning [41] of U against X 3 , assuming an already successful decoding of V and L at the primary decoder, as can be seen in (9b).
It is important to note that the achievable region R sc is consistent with previously studied special cases: By setting R 1 = 0 and X 1 = 0 we can also set V = ∅.The equations then reduce to and this results in the region achievable for the cognitive Z-Interference channel, studied in [36], with user 2 and user 3 as the cognitive and non-cognitive users, respectively.Removing Encoder 2 by setting R 2 = 0 and X 2 = 0 we can also set U = ∅ and we get the classical Z-Interference channel with the 2 users, Encoder 1 and Encoder 3. In this case Y is dependent of V only through X 1 , since V → X 1 → Y, and I(VUX 1 ; Y|L) = I(X 1 ; Y|L).We get An interesting setup arises by setting W 2 = 0 without removing Encoder 2. This models a relay channel, where Encoder 2 is a relay which has no message of its own and learns the information of the transmitter by cribbing (modeling excellent SNR conditions on this path).This model relates to [42], if the structure of the primary user (X 3 ) is not accounted for, thus assuming i.i.d.state symbols known a-causally at the relay, as in [42].
Removing Encoder 3 by setting R 3 = 0 and X 3 = 0 we can also set L = ∅, and the expression reduces to By setting U = X 2 we get the achievable region of the MAC with Encoder 2 as the cribbing encoder [26].
By setting L = 0, removing inequality (9d) and replacing X 3 by S, whose given probability distribution is not to be optimized, the region reduces to the one in [27].
It is worth noting that in the case of a Gaussian channel, Encoder 2 can become fully cognitive of the message W 1 from a single sample of X 1 .This special case can be made non-trivial by adding a noisy channel or some deterministic function (quantizer for instance) between X 1 and Encoder 2.
Finally, we examine the case where Encoder 1's output may be viewed as two parts X 1 = (X 1a , X 1b ) where only the first part of the input affects the channel; i.e., P Y|X 1 X 2 X 3 = P Y|X 1a X 2 X 3 .In this case, if the second part X 1b is rich enough (e.g.continuous alphabet) Encoder 1 is able to transfer to Encoder 2 infinite amount of data, specifically the entire message W 1 .This is equivalent to the case of full cooperation from Encoder 1 to Encoder 2; i.e., the case where Encoder 2 has full knowledge of Encoder 1's data W 1 .Hence, the cooperative state-dependent MAC where the state is known non-causally at the cognitive encoder [29] may also be considered as a special case of the MA-CZIC, when X 3 is replaced with an i.i.d.state S.

Outer Bound
In this section, we present an outer bound on the achievable region of the strictly causal and causal MA-CZIC.Theorem 3. Achievable rate-triples (R 1 , R 2 , R 3 ) for the MA-CZIC with a strictly causal cribbing encoder belong to the closure of the convex hull of all rate triples that satisfy for some probability distribution of the form The proof is provided in Appendix C, it is based on Fano's Inequality [40] and from the Csiszár and Körner's identity ( [43], Lemma 7).Theorem 4. Achievable rate-triples (R 1 , R 2 , R 3 ) for the MA-CZIC with a causal cribbing encoder belong to the closure of the convex hull of all rate regions given by (19a)-(19d) for some probability distribution of the form The outline of the proof is provided in Appendix D.
As for the alphabet cardinalities: using standard applications of Carathéodory's Theorem we obtain that it is sufficient to consider the alphabet cardinalities which are bounded as follows: The details are omitted for the sake of brevity.

Special Cases
For the special case of a more-capable MA-CZIC channel we can actually establish the capacity region of the channel, both in the causal and the strictly causal cases.Definition 3. We say that the strictly-causal MA-CZIC is more-capable if I(X 3 ; Y) ≥ I(X 3 ; Z) for all probability distributions of the form P Theorem 5.The capacity region of the more-capable strictly-causal MA-CZIC channel is the closure of the convex hull of the set of all rate-triples (R for some probability distribution of the form The proof of Theorem 5 is provided in Appendix E. Theorem 6.The capacity region of the more-capable causal MA-CZIC channel is the closure of the convex hull of the set of all rate-triples (R 1 , R 2 , R 3 ) satisfying (25a)-(25d), for some probability distribution of the form The proof of Theorem 6; i.e., the causal case, follows in the same manner as that of Theorem 5 and thus omitted.
Unfortunately, the requirement that the MA-CZIC is more-capable implies that the receiver Y has a better reception of the signal X 3 than its designated receiver Z, which is somewhat optimistic.
We next consider the cases where either one of the transmitters wishes to achieve its maximal possible rate; i.e., the vertex point of the capacity region.
• Maximal rate at Transmitter 1: Transmitter 2 may help Transmitter 1's transmission and by doing so increase its rate.Therefore, we that assume Transmitter 2 dedicates its transmission to help transmitting W 1 .Transmitter 3 should minimize its interference at the Y Receiver.Setting L = X 3 , the entire interference caused by transmitter 3 at receiver 1 may be reduced via successive cancellation decoding.With no interference caused by transmitter 3, transmitter 2 may drop the Gelfand-Pinsker scheme, setting U = X 2 to maximize the rates.Thus, from (9a)-(9d) we get From the Markov chain V − X 1 X 2 X 3 − Y we get I(VX 1 X 2 ; Y|X 3 ) = I(X 1 X 2 ; Y|X 3 ).Therefore, we can rewrite (28a)-(28c) as where in the strictly-causal MA-CZIC case, the union is over all probability distributions of the form • Maximal rate at Transmitter 2: Both Transmitter 1 and 3 are not cognitive and have no knowledge of the message W 2 , thus they cannot help convey W 2 to Y and should only reduce their interference to a minimal level.Setting L = X 3 and U = X 2 follows as in maximizing R 1 in (28a)-(29c).
Therefore, we get (28a)-(28c) where the maximization is on • Maximal rate at Transmitter 3: Looking at (9d) and (19d) we see that the lower and upper bounds on R 3 coincide.Since transmitter 3 is not affected by the transmission of both transmitters 1 and 2, we can treat the transmitter 3-receiver 3 pair as a single user channel and thus achieve the Shannon capacity; i.e., In the general case, the maximum rate at transmitter 3 is achieved by setting L = 0.In this case, the higher rate at transmitter 3 comes at the expense of the other transmitters, since L was used for conveying part of the interference X 3 to Y. Thus, (9a)-(9d) become Examining (9d), we see that maximum rate at transmitter 3 may also be achieved without affecting R 1 and R 2 .This is true when the receiver Y is less-noisy than receiver Z in the sense that I(L; Y) ≥ I(L; Z) for all probability distributions of the form (20).In this case (9d) becomes Actually, it suffices to require that the channel will be more-capable; i.e., I(X 3 ; Y) ≥ I(X 3 ; Z) for all probability distributions of the form (20), for achieving maximum rate at R 3 .

Cooperative Encoding
Let us now consider the case of full unidirectional cooperation from Encoder 1 to Encoder 2. This becomes a setup in which Encoders 1 and 2 share a common message, and Encoder 2 transmits a separate additional private message.Thus we have an interference cognitive channel (cognition in terms of W 3 ) with a common message, as depicted in Figure 2. Hence, Encoder 2 is given by the mapping For this channel setup, a simpler outer bound on the capacity region can be derived providing some insights on the original problem.A special case of this channel, in which the secondary channel is removed and X 3 is replaced with an i.i.d.state S for the main channel; i.e., P Y|X 1 X 2 S , was studied in [29] and the single-letter characterization of the capacity region was established for that channel.The following theorem provides a single-letter expression for an achievable region of the MA-CZIC with full unidirectional cooperation (common message).

Theorem 7. The closure of the convex hull of the set of all rate-triples
for some probability distribution of the form is achievable for the MA-CZIC with with full unidirectional cooperation.
The outline of the proof for Theorem 7 appears in Appendix F.
The following theorem provides a single-letter expression for an outer bound on the capacity region of the MA-CZIC with full unidirectional cooperation.Theorem 8. Achievable rate-triples (R 1 , R 2 , R 3 ) for the MA-CZIC with full unidirectional cooperation belong to the closure of the convex hull of rate-regions given by for some probability distribution of the form The outline of the proof of Theorem 8 is provided in Appendix G. Notice that inequalities (38a)-(38c) are identical to (19b)-(19d), where the probability distribution form (39) is a special case of (20).Thus, the outer bound established for R 2 , R 3 and the sum-rate R 1 + R 2 in the strictly-causal MA-CZIC, also holds for the case of full unidirectional cooperation.However, we would expect the outer bounds on R 2 and the sum-rate R 1 + R 2 to be smaller for the channel with the cribbing encoder, thus implying that the outer bound for the MA-CZIC is generally not tight.

Partial Cribbing
Next we consider the case of partial cribbing, where Encoder 2 views X 1 through a deterministic function instead of obtaining X 1 directly.This cribbing scheme is motivated by continuous input alphabet MA-CZIC, since perfect cribbing results in the degenerated case of full cooperation between the encoders and requires an infinite capacity link.We define the strictly-causal MA-CZIC with partial cribbing as in ( 2)-( 6) with the exception that Encoder 2 is defined by the mapping where y 2,k = h(x 1,k ) for k = 1, . . ., n.The causal MA-CZIC with partial cribbing differs by setting It is worth noticing that the state-dependent MAC with state information known non-causally at one encoder [44] is a special case of the MA-CZIC with partial cribbing.This case is derived by setting h(X 1 ) ≡ 0 and replacing X 3 with an i.i.d.state S. The capacity region of this simpler case remains an open problem.Therefore, it is hard to expect that capacity region would be established for the MA-CZIC with partial cribbing.Next, we establish inner and outer bounds for the MA-CZIC with partial cribbing.Theorem 9.The closure of the convex hull of the set of rate-triples (R for some probability distribution of the form is achievable for the strictly-causal MA-CZIC with partial cribbing.
The outline proof of Theorem 9 appears in Appendix H.
Theorem 10.The closure of the convex hull of the set of rate-triples (R 1 , R 2 , R 3 ) satisfying ( 43)-( 47), for some probability distribution of the form is achievable for the causal MA-CZIC with partial cribbing.
The proof of Theorem 10 is similar to that of Theorem 9 and thus is omitted.
Comparing this result to the achievability region found for the MA-CZIC we can see that inequalities (44), ( 45) and (47) are identical to (9b)-(9d), while inequality (43) differs and inequality (46) was added.In correspondence, the coding scheme for the MA-CZIC with partial cribbing differs from Theorem 1 mainly in Encoder 1. Encoder 1 now needs to transmit data in a lossy manner to both Y receiver and Encoder 2. To do so, Encoder 1 employs the rate-splitting technique.It splits its message 2 ).Next, as in the scheme which corresponds to Theorem 1 SBME coding scheme, the index of the codeword y n 2 in time i becomes the index of v n in time i + 1.For successful decoding at Encoder 2, we must require R 1a ≤ H(Y 2 |V).The rate R 1a is therefore that of the information jointly transmitted to Y by both encoders.The remaining quantity in (43), that is, I(X 1 ; Y|VY 2 UL) represents the rate R 1b super-imposed by X 1 and decoded by Y via successive decoding.One may notice that in inequalities ( 44)-( 45), the pair (X 1 , Y 2 ) can replace X 1 , however since Y 2 is a deterministic function of X 1 it can be dropped.
This result is based on [28], where a capacity region was established for the case of the two-user MAC with cribbing through a deterministic function at both encoders.
Theorem 11.Achievable rate-triples (R 1 , R 2 , R 3 ) for the strictly-causal MA-CZIC with partial cribbing belong to a closure of the convex hull of the set of rate-regions given by for some probability distribution of the form The proof of Theorem 11 as well as the following Theorem Theorem 12 appear in Appendix I.
Theorem 12. Achievable rate-triples (R 1 , R 2 , R 3 ) for the causal MA-CZIC with partial cribbing belong to the closure of the convex hull of the set of rate-regions given by (50)-( 54), for some probability distribution of the form It is easy to see that setting h(•) to be the identity function, T = V and Y 2 = X 1 , the region of Theorem 11 degenerates to the outer bound of the MA-CZIC with noiseless cribbing (Theorem 3).
A related problem is the Cognitive State-Dependent MAC with Partial Cribbing.This setup is obtained by removing user 3 and replacing X 3 with an i.i.d.state S known non-causally at Encoder 2. From the inner bound (Theorem 9) and outer bound (Theorem 11) for the MA-CZIC with partial cribbing derived in previous sections it is immediate to derive inner and outer bounds for the channel by setting L = 0 and X 3 = Z = S. Doing so yields the following inner and outer bounds.
for some probability distribution of the form is achievable for the state-dependent cognitive MAC with partial (strictly-causal) cribbing.
Theorem 14. Achievable rate-pairs (R 1 , R 2 ) for the state-dependent cognitive MAC with partial (strictly-causal) cribbing belong to the closure of the convex hull of rate-regions given by for some probability distribution of the form (66)

Discussion and Future Work
The use of cognitive radio holds tremendous promise in better exploiting the available spectrum.Sensing its environment, a cognitive radio can use it as network side information resulting in better performances for all users.The cognitive transmitter may use this information to reduce interference at its end, reduce interference for the other users or help relaying information.However, obtaining this side-information is not always practical in actual scenarios.The assumption of a-priori knowledge of the other user's information may only be applied to certain situations where the transmitters share information through a separate channel.The assumption of causally sensing the environment is more realistic in many cases of distinct transmitters.Nevertheless, the cognitive transmitter will most likely acquire a noisy version of the information limiting its ability to cooperate.In addition, sensing the environment involves complicated implementations of the transmitter as well as power consumption for which the cognition improvement is weighed against.Nevertheless, the improved transmission rates achieved via cognitive schemes motivate their integration into various wireless systems such as Wi-Fi and Cellular networks.We note that cribbing requires parallel receiver/transmit technology (duplex operation), which is useful and usually available, as in the 5G systems.Although receiving much attention recently ( [15,16]), many of the fundamental problems of cognitive multi-terminal networks remain unsolved.
In this paper we investigated some cognitive aspects of multi-terminal communication networks.We introduced the MA-CZIC as generalization of a compound cognitive multi-terminal network.The MA-CZIC incorporates various multi-terminal communication channels-MAC, Z-IFC-as well as several cognition aspects-cooperation and cribbing.For the MA-CZIC we have drawn inner and outer bounds on its capacity region.In an effort to better characterize the capacity region, we studied the extreme points of the achievability region, and were able to find the capacity region in the case the channel is more-capable.Furthermore, we investigated some variations of the channel regarding the nature of cooperation between the cognitive encoder-Encoder 2-and the non-cognitive encoder sharing its receiver-Encoder 1.The case in which Encoder 2 has better cognition abilities and obtains full knowledge of Encoder 1's message was investigated.Furthermore, the case where Encoder 2 has worse cognition abilities and cribs from Encoder 1 via a deterministic function, such as quantizer, was studied.
As for possible future work, several directions can be considered.First, it would be interesting to identify some concrete non-trivial channel specification for which the MA-CZIC inner and outer bounds coincide, at least in partial regions.Finding such a channel may help us get insight about the capacity region as well as the margins given by the inner and outer bounds.Moreover, the characterization of the capacity region may be further improved by examining different interference regimes.Determining the exact capacity region for the MA-CZIC will subsequently result in the capacity region for the cognitive Z-IFC [36] as a special case.We believe that the opposite derivation also applies; i.e., the capacity region of the MA-CZIC will follow from the capacity region of the cognitive Z-IFC.Our model assumed that the cognitive transmitter-transmitter 2-has full non-causal knowledge of the interference signal X 3 .While modeling the interference signal as a transmitter is very realistic in many scenarios, the assumption of non-causal knowledge of the signal, may not hold in practice in case the cognitive transmitter has sensing capabilities but not shared information.Therefore, the model where transmitter 2 cribs from transmitter 3 is very much in place, and it would be very interesting to see if it is possible to determine the capacity region for the channel.Possible iprovement of the achievable bounds may incorporate the fact that X 3 is associated with a coding scheme, and hence the interference can be mitigated by partial/full decoding, with possible aid of the cognizant transmitter 2. 3 ) , where the conditional law is induced by (10).
for some w 3 ).
where w0 (b) = w(b−1) 1 was determined at the end of block b − 1 and w(1) 0 = 1.At each of the decoders, if a decoding step either fails to recover a unique index (or index pair) which satisfies the decoding rule, or there is more than one index (or index pair), then an index (or index pair) is chosen at random among the indices which satisfies the decoding rule.
It can be shown that the error probability will be arbitrarily small if (9a)-(9d) hold.

Appendix A.3. Bounding the Probability of Error
We define the error events E 7 as follows: • E (b) 0 : Codebook error, the codewords v,x 1 ,l,x 3 are not jointly typical.That is 2 : Encoding error at Encoder 2, no suitable encoding index t.That is, there is no t ∈ {1, ..., 2 nβ } such that v(w 3 : Channel error, one or more of the input signals is not jointly typical with the outputs y and z.That is 3a at either one of the decoders, a false message was detected.That is, there exists w for some pair (j, t) j ∈ W 2 , t ∈ {1, ..., 2 nβ }.
for some t ∈ {1, ..., 2 nβ }.Notice that when Encoder 2 observes x 1 error-free, as in this setup, the error event E We now define the events F i , i = 0 . . . 5 as follows: ). (A4) Now, we can separately examine and upper bound each of the summands in (A3): • By the Asymptotic Equipartition Property (AEP) [40], Pr[E 1 , v (b) ) are jointly typical, and that Encoder 2 decoded correctly all the previous messages w We start with an upper bound on R 1 where (a) follows from the encoding relation in (2).Next, consider R 3 where (b) follows from the fact that decreases entropy, (c) follows from the Markov chain W 3 − X n 3 − Z n and (d) follows since the channel P Z|X 3 is memoryless.Using the Csiszár-Körner's identity ( [43], Lemma 7) we obtain where the last equality follows from (A18).Substituting (A19) into (A22) we get Notice that (A23) implies that there exists a number γ where

Theorem 13 .
The closure of the convex hull of the set of rate-pairs

Figure A1 .
Figure A1.A schematic description of the codebooks hierarchy and encoding procedure at the three encoders.

i
, b = 1, ..., B We upper bound the average probability of error Pe averaged over all codebooks and all random partitions, as in[27]where F (1...b−1) C denotes the complement of the event b−1 i=1 F(i) .Furthermore, we can upper bound each of the summands in the last component of (A3) by the union bound