1 Introduction

One of the main difficulties in communication over wireless networks is interference, many of whose characteristics can be modeled and understood via the Gaussian interference channel [1] (see Fig. 1). This model, which can be used as a building block for other interference networks, has a capacity that is not known in the most general case, but in recent years much progress has been made in understanding its complicated behavior, e.g., [2].

It is known that capacity of this channel model is non-monotonic in the strength of interference links. In particular, if the interference is strong enough, the capacity of each link is equivalent to interference-free capacity [3]. More recent developments have shown that the capacity of the interference channel is very sensitive to channel coefficients; the operational significance of this fact is in the proliferation of sets or “pockets” in the vector space of channel gains, called “outage sets,” that are unable to support a desired set of transmission rates.

Furthermore, evidence has been accumulating [4] that discrete signaling imparts tangible benefits in managing interference, because if applied at the right scale, it can push interference to locations in the signal space that are less damaging to the desired signal. This is especially important when the decoder does not know the structure of the interference, or for complexity reasons does not wish to decode the interference.

Motivated by the observations made above, this paper makes contributions to interference mitigation that are of an interdisciplinary nature, via advances in signaling and coding as well as antenna design. The two key components of this paper mirror the issues highlighted above: (1) to get as close to the capacity of the interference channel as possible via discrete signaling and to efficiently and accurately characterize these achievable rates and (2) to address the issue of the sensitivity of the interference channel capacity with respect to link gains. The former is addressed by developing new bounds on the mutual information of the two-user Gaussian Interference channel under discrete modulations, subject to an outage set. The latter is addressed by a reconfigurable antenna technology to avoid as much as possible the aforementioned outage sets.

For a discrete modulation transmission strategy at the transmitter, and a receiver that does not decode or peel off the interference (also known as treating interference as noise, specifically TINnoTS—Treating interference as noise with no time sharing [4]), we calculate a bound on mutual information with a constant gap \(O\left( \log \gamma \right)\) to capacity (excepting an outage set) in the strong interference channel (where capacity is known). Our technique builds on Ozarow and Wyner [5], and the gap is an improvement over the \(O\left( \log \left( \gamma ^{-1}\ln {\mathrm{min}} \left\{ h_1^2P,h_2^2P\right\} \right) \right)\) gap reported in [4] with mixed inputs.

For avoiding the channel gains leading to outage, we propose to use liquid metal reconfigurable antennas. Liquid metal devices and circuits have been implemented using various reported techniques [6,7,8,9,10,11]. Liquid metal antennas have the capability of changing the radiation [12, 13], polarization [14, 15], and resonant frequency of individual antennas [16, 17], thereby modifying the gains between different nodes in a manner beyond what is possible with signal processing alone. The feasibility of avoiding problematic or singular channel gains with liquid metal antennas is demonstrated via experimental extraction of the operating parameters of the proposed liquid metal antennas and then using these parameters in extensive simulations of the channel states produced by the liquid metal antennas and matching it with the low minimum-distance channel gains suggested by analysis.

An early version of this work appeared in [18]; the present paper goes beyond [18] in the following aspects: (a) Theorem 2 is reformulated and its expression is distinct from the results of [18], (b) Sect. 5 on successive interference cancellation is novel, (c) Sect. 6.1 involving analytical and simulation modeling based on a dipole model is new, (d) several insightful simulations, including those represented in Figs. 91112, are novel with respect to [18].

1.1 Definitions and notation

Throughout the paper, we use pulse amplitude modulation (PAM) for transmitted signals. Specifically, by n-PAM modulation we mean a uniform distribution over the points

$$\begin{aligned} \pm \sqrt{\frac{3}{n^{2}-1}},\pm 3\sqrt{\frac{3}{n^{2}-1}},\ldots \pm \left( n-1\right) \sqrt{\frac{3}{n^{2}-1}},&\quad n \,\,{\text{even}} \\ 0,\pm 2\sqrt{\frac{3}{n^{2}-1}},\pm 4\sqrt{\frac{3}{n^{2}-1}},\ldots \pm \left( n-1\right) \sqrt{\frac{3}{n^{2}-1}},&\quad n\,\,{\text{odd}} \end{aligned}$$
(1)

which results in zero mean and unit variance.

The support of a real-valued random variable, denoted with \({{\text{supp}}}[\cdot ]\), is the set of points \(x\in {\mathbb{R}}\) that have nonzero probability under that random variable. The cardinality of a set (including that of a support) is denoted with \(|\cdot |\). The symbol \(\sim\) is used as an operator which means a random variable being drawn according to a probability law, e.g., \({\mathcal{N}}\left( \beta \right)\) denotes a Gaussian probability law with zero mean and variance \(\beta \in {\mathbb{R}}^{+}\). With a constant on the right hand side, e.g., \(a\sim b\), this notation indicates that ab are of the same order.

2 Methods

The aim of the paper is to show that a combination of discrete modulation and liquid metal antennas can be used to achieve close to capacity in interference channels while treating interference as noise.

The methodology used is fairly unique. The paper combines information theory calculations, specifically novel bounds on discrete modulation, with realistic simulations of liquid metal antennas. The simulations were conducted with ANSYS High-Frequency Structure Simulator (HFSS) software. The simulated antenna patterns are fed into the information theory bounds, while transmit powers are set at realistic values, as shown in results section.

3 Channel model and discrete modulation

As argued in Introduction, to investigate the effect of interference, we consider the interferencer channel in Fig. 1.

Fig. 1
figure 1

Channel model

The received signals are

$$\begin{aligned} Y_{1}&=\sqrt{P}h_{1}X_{1}+\sqrt{P}h_{2}X_{2}+Z_{1} \\ Y_{2}&=\sqrt{P}h_{1}X_{2}+\sqrt{P}h_{2}X_{1}+Z_{2}, \end{aligned}$$
(2)

where the random variables \(X_{i},X_{j},Z_{i},Z_{j}\) are mutually independent, \(Z_{i},Z_{j}\sim {\mathcal{N}}(N)\) are independent Gaussian random variable with variance N, and \({\mathbb{E}}\left[ X_{1}^{2}\right] ,{\mathbb{E}}\left[ X_{2}^{2}\right] \le 1\), and P is the power constraint on the transmitters. The coefficients \(h_{1}\) and \(h_{2}\) are the channel gains.

As shown in Fig. 1 and Eq. (2), we only consider the symmetric interference channel. In principle, results can be generalized to non-symmetric channels, but results become quite messy; in many expositions on the interference channel [1, 2], the authors start with the symmetric channel, which we will follow. In line with the symmetry of the channel, we will consider symmetric capacity, i.e., where the users share the capacity equally.

There are a few cases where the capacity of the interference channel is known. If the interference is (very) weak, \(|h_{2}|\ll |h_{1}|\), specifically \(\frac{|h_{2}|}{|h_{1}|}\left( 1+h_{2}^{2}\frac{P}{N}\right) \le \frac{1}{2}\), the sum capacity is achieved by using Gaussian signaling and treating interference as noise (TIN) [19, 20],

$$\begin{aligned} C_{\mathrm{sum}}=\log \left( \frac{h_{1}^{2}\frac{P}{N}}{1+h_{2}^{2}\frac{P}{N}}\right) , \end{aligned}$$
(3)

i.e., a symmetric capacity of \(C=\frac{1}{2} \log \left( \frac{h_{1}^{2}{P/N}}{1+h_{2}^{2}{P/N}}\right)\) On the other hand, if the interference is strong \(|h_{2}|>|h_{1}|\), capacity can be achieved with Gaussian signaling and joint decoding at the receivers [21, 22], achieving the following symmetric capacity

$$\begin{aligned} C={\mathrm{min}} \left\{ \frac{1}{2}\log \left( 1+h_{1}^{2}\frac{P}{N}\right) ,\frac{1}{4}\log \left( 1+(h_{1}^{2}+h_{2}^{2})\frac{P}{N}\right) \right\} . \end{aligned}$$
(4)

While treating interference as noise might be optimal for weak interference, the rate (3) is far from capacity (4) for strong interference. However, [4] showed that when discrete modulation is used, it is often possible to get close to the capacity (4) with TIN (specifically TINnoTS—treating interference as noise with no time sharing). This is explained in Fig. 2. To decode the desired signal, we can simply take the modulus with respect to the interfering signal [4, Sect. VIII] and then decode as though there was no interference. Specifically, we “fold” the signal into the interval \(\left[ -|h_2|\sqrt{\frac{3}{n^2-1}},|h_2|\sqrt{\frac{3}{n^2-1}}\right]\) for n odd (see (1)). This only requires knowledge of the modulation of the interfering signal, not the encoding. Thus, discrete modulation is advantageous for treating interference as noise.

Fig. 2
figure 2

Discrete interference. The red curve is the pdf of the received signal. The blue curve is the pdf of the received signal after modulus with the interference constellation; this is the same as if there had been no interference

In this paper, we extend the results in [4] to show that TINnoTS can always get close to capacity, except in a few outage regions. We will then show that these outage regions can be avoided through liquid metal antennas.

A major issue with discrete modulation is that it is difficult to calculate mutual information and therefore achievable rate. An elegant lower bound was derived by Ozarow and Wyner in [5] and improved in [4]. Let \(X_d\) be any discrete random variable; then

$$\begin{aligned} I\left( X_{d};\sqrt{P}h_{1}X_{d}+Z\right) \ge H\left( X_{d}\right) -\frac{1}{2}\log \left( 1+\frac{12}{\frac{P}{N}d_{{\mathrm{min}} }^{2}\left( h_{1}X_{d}\right) }\right) -c_{0}, \end{aligned}$$
(5)

where \(c_{0}=\frac{1}{2}\log \left( \frac{2\pi e}{12}\right)\), \(H(\cdot )\) is discrete entropy; the key parameter in this bound is \(d_{{\mathrm{min}} }(h_{1}X_{d})\), which is the smallest distance between constellation points in the received signal. This bound, for the point-to-point channel, can also be used to bind the achievable rate in the interference channel. Let

$$\begin{aligned} {\widetilde{X}}_{d}=Y_{1}-Z_{1}=\sqrt{h_1^2P}X_{1}+\sqrt{h_2^2P}X_{2} \end{aligned}$$

be the received signal at receiver 1 before noise is added. Notice that except on a set of probability zero of \(h_1, h_2\) there is a one-to-one map \((X_1,X_2)\leftrightarrows {\widetilde{X}}_d\) as \(X_1\) and \(X_2\) are discrete. We can then bound the achievable rate by

$$\begin{aligned} & I\left( X_{1};Y_{1}\right) \,{\mathop{=}\limits^{a}}\,I\left( {\widetilde{X}}_{d};Y_{1}\right) -I\left( X_{2};\sqrt{h_{2}^{2P}}X_{2}+Z_{1}\right) \\ & \quad\, {\mathop{\ge }\limits^{b}}\, I\left( {\widetilde{X}}_{d};Y_{1}\right) -H\left( X_{2}\right) . \\ & \quad \,{\mathop{\ge }\limits^{c}} \,H\left( {\widetilde{X}}_{d}\right) -\frac{1}{2}\log \left( 1+\frac{12}{\frac{P}{N}d_{\mathrm{min}}^{2}\left( {\widetilde{X}}_{d}\right) }\right) -c_{0}-H\left( X_{2}\right) . \end{aligned}$$
(6)

Here (a) is from the chain rule of entropy [23]: \(I({{\widetilde{X}}}_d;Y_1)=I(X_1,X_2;Y_1)=I(X_1;Y_1)+I(X_2;Y_1|X_1)\), where in the first step we have used the one-to-one map \((X_1,X_2)\leftrightarrows {\widetilde{X}}_d\). The inequality (b) is because mutual information is upper bounded by entropy, and (c) is from (5).

Fig. 3
figure 3

Minimum distance. Minimum distance of sum of two PAM signals with \(n=10\) as a function of \(h_2\) with \(h_{1}=1\). \(d_{{\mathrm{min}} }\left( {\widetilde{X}}_{d}\right)\) is plotted by calculating the smallest distance in the sum constellation \(\sqrt{h_{1}^{2}P}X_{1}+\sqrt{h_{2}^{2}P}X_{2}\) with \(X_{1},X_{2}\) generated as n-PAM inputs

The bound depends critically on \(d_{{\mathrm{min}} }\left( {\widetilde{X}}_{d}\right)\). The minimum distance of a sum of discrete distributions is a complicated function. Even if each distribution has a large minimum distance, the sum can have a small minimum distance, and the minimum distance is very sensitive to the values of \(h_{1}\) and \(h_{2}\) (Fig. 3). Small changes can lead to large changes in \(d_{{\mathrm{min}} }\). For some values of \(h_{1}\) and \(h_{2}\) the rate can be very small. This leads to the second thrust in this paper: the only way to overcome this problem is to change \(h_{1}\) and \(h_{2}\), perhaps by small amounts. For this purpose, we analyze liquid metal antennas.

We first present an improved lower bound.

Proposition 1

Let \(p_{{\mathrm{max}} }={\mathrm{max}} \{P(X_{d})\}\) be the maximum probability assumed by the discrete random variable \(X_{d}\) and \(c_{2}=\frac{1}{2}\log \left( \frac{2}{e}\right)\). Then,

$$\begin{aligned} I\left( X_{d};\sqrt{P}X_{d}+Z\right)&\ge c_{2}-\log \left( p_{{\mathrm{max}} }\right) -\log \Biggl [1+2e^{-\frac{1}{4}\frac{P}{N}d_{{\mathrm{min}} }^{2}\left( X_{d}\right) } \\ &\quad +\sqrt{\frac{\pi }{\frac{{P/N}}{4}d_{{\mathrm{min}} }^{2}\left( X_{d}\right) }}{\text{Erfc}}\left( \sqrt{\frac{{P/N}}{4}d_{{\mathrm{min}} }^{2}\left( X_{d}\right) }\right) \Biggr ] \end{aligned}$$
(7)
$$\begin{aligned} &\ge c_{2}-\log \left( p_{{\mathrm{max}} }\right) -\log \Biggl [1+\sqrt{\frac{\pi }{\frac{{P/N}}{4}d_{{\mathrm{min}} }^{2}\left( X_{d}\right) }}\Biggr ]. \end{aligned}$$
(8)

The proof is in “Proof of Proposition 1” Appendix.

The bound (8) does not utilize special functions (e.g., error function) and offers analytical convenience similar to the Ozarow–Wyner bound. The benefit of (7) in Proposition 1 is that it is both analytical while close to the numerical bound of [4, Eq. (18a)].

4 Treating interference as noise (TIN)

As discussed above, we consider the strong interference regime with capacity given by (4). For large P, the second term in (4) dominates, which expresses that the the receiver has to jointly be able to decode the two messages. We will show that by instead treating interference as noise, we can achieve essentially the same rate, specificallyFootnote 1

$$\begin{aligned} R>C-c=\frac{1}{4}\log \left( 1+(h_{1}^{2}+h_{2}^{2})\frac{P}{N}\right) -c, \end{aligned}$$
(9)

where c is a constant independent of P, but potentially dependent on \(h_{1},h_{2}\). This is called a constant gap approximation [2]. When P is large, this is close to capacity as the first term increases while the second stays constant.

The following Theorem formalizes this:

Theorem 2

In the strong interference regime \(\left| h_{2}\right| >\left| h_{1}\right|\), discrete modulation achieves a constant gap to capacity,

$$\begin{aligned} R>\frac{1}{4}\log \left( 1+(h_{1}^{2}+h_{2}^{2})\frac{P}{N}\right) -c, \end{aligned}$$
(10)

as follows

  1. 1.

    \(h_{2}^{2}\ge h_{1}^{4}\frac{P}{N}\): (10) is true for all values of \(h_{1},h_{2}\) and c is independent of \(h_{1},h_{2}\).

  2. 2.

    \(h_{1}^{2}<h_{2}^{2}<h_{1}^{4}\frac{P}{N}\): Let

    $$\begin{aligned} {\tilde{h}}_{i}\triangleq 2^{\mathrm{frac}(\frac{1}{2}\log (h_{i}^{2}{P/N}))}\in [1,2), \end{aligned}$$

    where \(\mathrm{frac}(x)\triangleq x-\lfloor x\rfloor\). Then for every \(0<\gamma <1\) there exists a set \(B\in [1,2)^{2}\) with area less than \(\gamma <1\) so for \({\tilde{h}}_{1},{\tilde{h}}_{2}\notin B\), (10) is true and where now \(c=O(\log \gamma )\).

The proof is in “Proof of Theorem 2” Appendix.

For Case (1) of Theorem 2, from the proof it can be seen that the rate can be achieved with symmetrical PAM modulation with

$$\begin{aligned} n=\left\lceil \sqrt{\frac{3}{4}}\frac{|h_{2}|}{|h_{1}|}\right\rceil . \end{aligned}$$
(11)

On the other hand, in Case (2), the rate is achieved with

$$\begin{aligned} n&=\left\lfloor \left( 1+h_1^2\frac{P}{N}+h_2^2\frac{P}{N}\right) ^{\frac{1}{4}}\right\rfloor -1. \end{aligned}$$
(12)

In Fig. 4, we use the bound developed in Sect. 3 and the input specified in (11) to illustrate the constant gap to capacity. The constant gap in Case (2) was obtained by a probabilistic argument, where the channel coefficients \(\left( h_{1},h_{2}\right)\) were varied while keeping other parameters fixed. This is because the minimum distance of the received signals varies (see Fig. 5), thus affecting the achievable rate using PAM inputs.

Fig. 4
figure 4

Gap to capacity using PAM input specified in (11). Here \(h_{2}=\sqrt{h_{1}^{4}\frac{P}{N}+\frac{h_{1}^{2}}{2}}\). The top curve ‘blue dashed line’ is the analytic lower bound of Eq. (5). The curve in the middle plotted with ‘green line’ is the analytic lower bound of Prop. 1, and the marker ‘red square’ is the numerical lower bound using Eq. (26). Analytical bounds only need the value of \(d_{{\mathrm{min}} }\left( Y_{i}-Z_{i}\right)\), whereas the numerical bound (26) requires the entire \({\text{supp}}\left[ \sqrt{h_1^2P}X_{i}+\sqrt{h_2^2P}X_{j}\right]\)

Fig. 5
figure 5

Minimum distance. Minimum distance at the receiver \(Y_{1}\) for the discrete constellation \({\widetilde{X}}_d\) as the channel coefficients vary. Here \(P/N=27.3\) dB, and we use n from (12)

Theorem 2 is significant as it achieves constant gap to capacity for the complete strong interference channel. It contradicts the claim in [4, Sect. IV B, Remark 6] that an improvement from the log–log gap might be impossible. Case 2), as opposed to Case 1), relies on certain good channel coefficients \(\left( h_{1},h_{2}\right)\) to achieve a constant gap independent of P, from capacity using discrete inputs. The set of channel coefficients where this is not possible are termed as bad channel coefficients as they lead to outages whose probability can be controlled.

Outages is of course a problem in a fixed channel. The outages are permanent, i.e., little information can be transmitted. They are an unfortunate downside to use of discrete modulation and can only be avoided by changing \(h_{1}\) or \(h_{2}\). In Sect. 6, we therefore consider liquid metal antennas to deal with the outages.

5 Successive interference cancellation (SIC)

In successive interference cancellation, the receiver decodes the interfering signal first, subtracts it from the received signal, and then decodes the desired signal. We show that using discrete modulation can also increase the rate of SIC.

In [24], the authors showed that by dividing each user’s transmission into multiple streams and alternatingly decoding the streams, higher rates can be achieved. Specifically, User i transmits \(X_{i}=\sum _{k=1}^{L}X_{i}^{\left\{ k\right\} }\), and the decoding order is

$$\begin{aligned} X_{2}^{\left\{ 1\right\} },X_{1}^{\left\{ 1\right\} },X_{2}^{\left\{ 2\right\} },X_{1}^{\left\{ 2\right\} },\ldots ,X_{2}^{\left\{ L\right\} },X_{1}^{\left\{ L\right\} },&\quad \text{for}\,\,\,\,Y_{1} \\ X_{1}^{\left\{ 1\right\} },X_{2}^{\left\{ 1\right\} },X_{1}^{\left\{ 2\right\} },X_{2}^{\left\{ 2\right\} },\ldots ,X_{1}^{\left\{ L\right\} },X_{2}^{\left\{ L\right\} },&\quad \text{for}\,\,\,\,Y_{2}. \end{aligned}$$
(13)

It turns out that using discrete modulation for the streams can further increase rate. Now, instead of treating interference as Gaussian noise when decoding higher layers, it is treated as discrete noise, and the techniques for treating interference as noise from Sect. 4 can be used.

Unfortunately, it is difficult to calculate exact rate expressions, so we instead show this with an example. When using discrete modulation, one has to optimize over the number of streams L, the power allocation for each stream \(\mathtt{P}_{k}\) and the number of levels \(n_{k}\). For the former two, we heuristically use the same parameters as for the Gaussian case, and we then numerically optimize over \(n_{k}\).

Figure 6 shows the performance in one case. In this case \(L=2\) (which is optimum for the Gaussian case). We calculate rate two ways: using [4, Eq. (18a)] (the lower bound) and using numerical integration for calculating entropies of mixture Gaussians. We plot the performance of two schemes SIC and TIN: 2 Layers in Fig. 6. The sum rate for both users in the SIC case is found to be

$$\begin{aligned}&2\Biggl ({\mathrm{min}} \left\{ I\left( X_{2}^{\left\{ 1\right\} };Y_{1}\right) ,I\left( X_{2}^{\left\{ 1\right\} };Y_{2}\mid X_{1}^{\left\{ 1\right\} }\right) \right\} \\ &\quad +{\mathrm{min}} \left\{ I\left( X_{2}^{\left\{ 2\right\} };Y_{1}\mid X_{1}^{\left\{ 1\right\} },X_{2}^{\left\{ 1\right\} }\right) ,I\left( X_{2}^{\left\{ 2\right\} };X_{2}^{\left\{ 2\right\} }+Z_{2}\right) \right\} \Biggr ), \end{aligned}$$

whereas for the TIN: 2 Layers case is

$$\begin{aligned} 2\left( I\left( X_{1}^{\left\{ 1\right\} };Y_{1}\right) +I\left( X_{1}^{\left\{ 2\right\} };Y_{1}\mid X_{1}^{\left\{ 1\right\} }\right) \right) . \end{aligned}$$
(14)

We briefly discuss rate expressions for the SIC scheme. Consider the receiver at \(Y_{2}\) interested in layers \(X_{2}^{\left\{ 1\right\} }\) and \(X_{2}^{\left\{ 2\right\} }\) (of User 2). The rate for Layer 1 is the minimum of two terms. The first term \(I\left( X_{2}^{\left\{ 1\right\} };Y_{1}\right)\) exists as \(X_{2}^{\left\{ 1\right\} }\) is interference to User 1 and needs to be decoded and peeled off. The second term \(I\left( X_{2}^{\left\{ 1\right\} };Y_{2}\mid X_{1}^{\left\{ 1\right\} }\right)\) ensures User 2 can successfully decode Layer 1 after subtracting the interference of Layer 1 from User 1. Similar is the case for Layer 2 which is decoded first at User 1 (after decoding \(X_{2}^{\left\{ 1\right\} },X_{1}^{\left\{ 1\right\} }\)) and then at User 2. The lower bounds for each scheme are also plotted. For the SIC scheme, we use the following lower bound.

$$\begin{aligned}&2\left({\mathrm{min}} \left\{ I_{\mathrm{DTD}}\left( Y_{1};Y_{1}-Z_{1}\right) -\log \left( n_{1}n_{2}n_{2}\right) ,\right.\right. \\ &\quad \left. I_{\mathrm{DTD}}\left( Y_{1};Y_{1}-Z_{1}\mid X_{2}^{\left\{ 1\right\} }\right) -\log \left( n_{2}n_{2}\right) \right\} \\ &\quad +{\mathrm{min}} \left\{ I_{\mathrm{DTD}}\left( Y_{1};Y_{1}-Z_{1}\mid X_{2}^{\left\{ 1\right\} },X_{1}^{\left\{ 1\right\} }\right) -\log \left( n_{2}\right) ,\right. \\ &\quad \left.\left. I_{\mathrm{DTD}}\left( Y_{1};Y_{1}-Z_{1}\mid X_{2}^{\left\{ 1\right\} },X_{1}^{\left\{ 1\right\} },X_{2}^{\left\{ 2\right\} }\right) \right\} \right). \end{aligned}$$

In the TIN: 2 Layers case, we lower bound the expression in (14) with

$$\begin{aligned} 2\left( I_{\mathrm{DTD}}\left( Y_{1};Y_{1}-Z_{1}\right) -\log \left( n_{1}n_{2}n_{2}\right) +I_{\mathrm{DTD}}\left( Y_{1};Y_{1}-Z_{1}\mid X_{1}^{\left\{ 1\right\} }\right) -\log \left( n_{1}n_{2}\right) \right) . \end{aligned}$$

Here, the mutual information terms with a subscript ‘DTD,’ e.g., \(I_{\mathrm{DTD}}\) \(\left( Y_{1};Y_{1}-Z_{1}\right)\), are lower bounds to the usual mutual information expression \(I\left( Y_{1};Y_{1}-Z_{1}\right)\). These are calculated via the numerical lower bound provided in [4, Eq. (18a)], or (26).

Fig. 6
figure 6

Performance of successive interference cancellation. Here \(P/N=37\) dB and \(h_{1}=1\). The top curve ‘red line’ is the upper bound by evaluating \(0.5\log \left( 1+h_2^2\frac{P}{N}+h_1^2\frac{P}{N}\right)\). The markers ‘green asterisk’ and ‘blue plus’ are lower bounds for Discrete Modulated inputs with SIC. Similarly, The markers ‘green square box’ and ‘violet circle’ are lower bounds for Discrete Modulated inputs with 2 layers and TIN. In each scheme, the first marker is evaluated using a numerical bound and the latter is plotted with the analytical lower bound. The ‘black triangle’ marker is the rate with Gaussian Modulation as proposed in [24]

The important conclusions for this figure are

  • Discrete modulation outperforms Gaussian modulation. This is proved by Proposition 1 and further by numerical integration.

  • The discrete modulation uses PAM and therefore has a shaping loss. Using binomial modulation or quantized Gaussian would give a further gain.

  • Treating interference as noise with discrete modulation is mostly better than successive interference cancellation with Gaussian modulation.

  • Successive interference cancellation with discrete modulation gives a modest gain over treating interference as noise with discrete modulation.

  • The fluctuations in the curves are not due to inaccurate numerical calculation. They are due to the outage behavior explained in Sect. 3, which also affects successive interference cancellation.

6 Minimizing outages with liquid metal antennas

Reconfigurable antennas with adjustable directive gain have the potential to minimize network outages by varying the channel coefficients. One approach to realizing reconfigurable antennas is using liquid metal as the radiating element [6, 7, 9,10,11,12,13,14,15,16,17]. To quantify the effects of liquid metal reconfigurable antennas, an interference channel is simulated assuming standard microstrip patch antennas as the transmitters (\({\mathrm{Tx}}_1\) and \({\mathrm{Tx}}_2\)) and two reconfigurable liquid metal dipole antennas as the receivers (\({\mathrm{Rx}}_1\) and \({\mathrm{Rx}}_2\)) in a square configuration (Fig. 7). The microstrip patch antenna is designed to radiate at 1.58 GHz, with a maximum gain of 7.1 dBi at 0° with respect to receiver \({\mathrm{Rx}}_1\) and a gain of 2.9 dBi at 45° with respect to \({\mathrm{Rx}}_2\). The distance between each transmitter–receiver pair is varied between 100 and 500 m. Figure 8a shows the architecture of a liquid metal dipole antenna which is capable of reconfigurable lengths and orientations, resulting in variable radiation patterns with lobes and nulls in varying direction.

Fig. 7
figure 7

Antenna model. Gaussian interference channel model with a static transmit (Tx) antennas and reconfigurable receive (Rx) antennas, used for simulating various states

Fig. 8
figure 8

Adapted from [14]

Liquid metal antennas. The reconfigurable liquid metal dipole antenna (a) device structure (b) simulated radiation patterns. This structure allows the flexibility to vary independently both the length and orientation in each arm.

6.1 Analytical and simulation modeling for finite-length dipoles

To obtain the channel performance discussed in Sect. 4, the channel coefficients \(h_1\) and \(h_2\) are calculated from the ratio of the transmitted power and received power using the Friis equation [25]

$$\begin{aligned} h_1^2&= \frac{P_{Rx1}}{P_{Tx1}}={{G_{Tx}(\theta _1)}}\ {{G_{Rx1}(\theta _1+r_1)}}\left( \frac{\lambda }{4\pi d_1}\right) ^2 \end{aligned}$$
(15)
$$\begin{aligned} h_2^2&= \frac{P_{Rx2}}{P_{Tx1}}={{G_{Tx}(\theta _2)}}\ {{G_{Rx2}(\theta _2+r_2)}}\left( \frac{\lambda }{4\pi d_2}\right) ^2, \end{aligned}$$
(16)

where \(d_1\) and \(d_2\) are the distances in [m] between \(Tx_1-Rx_1\) and \(Tx_1-Rx_2\), respectively; \(r_1\) and \(r_2\) are the angle rotations for receiving antennas as illustrated in Fig. 8; \(\theta _1=0^\circ\) and \(\theta _2=45^\circ\) are the angles between \(Tx_1-Rx_1\) and \(Tx_1-Rx_2\), respectively; \(G_{T_x} (0)=7.1\) dBi and \(G_{T_x} (\pi /4 )= 2.9\) dBi are the gains of \(T_x\) at angle \(\theta _1\) and \(\theta _2\), respectively. The gain of an antenna can be calculated from [25]:

$$\begin{aligned} G(\theta ) = D_m F_n(\theta ), \end{aligned}$$
(17)

where \(D_m\) is the maximum directivity and \(F_n(\theta )\) is the normalized power density function. The receiving antennas in Fig. 7 are assumed to be dipole antennas, with \(F_n(\theta )\) and \(D_m\) for a finite-length dipole antenna calculated from [25]:

$$\begin{aligned} F_n(\theta ) = \frac{F(\theta )}{F(\theta )|_{{\mathrm{max}}}} \end{aligned}$$
(18)
$$\begin{aligned} F(\theta ) = \left[ \frac{{\mathrm{cos}} \left[ k\frac{L}{2} {\mathrm{cos}} \theta \right] -{\mathrm{cos}} \left[ k\frac{L}{2}\right] }{\sin \theta }\right] ^2, \qquad k = \frac{2\pi }{\lambda } \end{aligned}$$
(19)
$$\begin{aligned} D_m = \frac{4\pi }{\Omega _A} \end{aligned}$$
(20)
$$\begin{aligned} \Omega _A = 2\pi \int _0^\pi F_n(\theta )\sin \theta \; d\theta , \end{aligned}$$
(21)

where \(\Omega _A\) is defined as the beam solid angle and L is the dipole length \([n\times \lambda ]\)

Fig. 9
figure 9

Radiation pattern. Simulated radiation pattern for a dipole antenna at different lengths

Fig. 10
figure 10

Gain. Unnormalized gain of a dipole antenna with reconfigurable length. For a 2\(\lambda\) antenna, there is a 27.4-dB difference in gain between the − 45° and − 90° directions

Although a dipole antenna is typically operated at the frequency where its physical length corresponds to 0.5\(\lambda\), Fig. 9 shows the change in radiation pattern when the physical length is increased to 2\(\lambda\) and 3\(\lambda\). The simulations were conducted with ANSYS High-Frequency Structure Simulator (HFSS) software, with the dipoles modeled as 500-μm-diameter wires separated by a 1-mm gap. Changing the length of the dipole while keeping the operating frequency constant results in a variety of radiation patterns, with lobes and nulls in varying directions. Figure 10 illustrates the contrast in directive gain at − 90° and − 45°, corresponding to the directions of the two transmitters in Fig. 7. The contrast in gain results in a corresponding contrast in the channel coefficients. A dipole antenna with a variable length can be realized by using liquid metal as the radiating elements, enabling adaptive reconfiguration of the radiation pattern.

6.2 Liquid metal antennas

Gallium-based liquid metal alloys have been used to implement reconfigurable antennas that change operating frequency [17], polarization [15], and radiation pattern [12, 13]. Galinstan is a non-toxic eutectic liquid metal that is made of gallium, indium, and tin, with an electrical conductivity of \(3.5\times 10^{5}\) S/m and a surface tension of 0.535 N/m [26]. Actuating Galinstan to realize a pattern-reconfigurable liquid metal antenna can alter the receivers’ gain, providing a wide range of antenna states. Here, liquid metal is used to realize a pattern-reconfigurable antenna that can alter its gain and radiation pattern to increase achievable capacity.

Fig. 11
figure 11

Simulated radiation pattern 1. Simulated radiation patterns for a liquid metal dipole antenna with varying angles between the radiating elements

Fig. 12
figure 12

Simulated radiation pattern 2. Simulated radiation patterns for a liquid metal dipole antenna with superpositions of dipole elements

In [14], we reported the experimental results of a liquid metal polarization-pattern-reconfigurable dipole antenna. The liquid metal was electrically actuated using a low-voltage (5-VDC) electrocapillary actuation [27] signal to create five discrete states. Each state was active at a time when the liquid metal is actuated to fill the arms of the desired state, corresponding to the angle of the dipole antenna arms (0°, ± 45°, and ± 90° configurations). These states varied the polarizations and the radiation patterns. The device architecture (Fig. 8a) can be modified to enable more states by adjusting the length of each arm, thus enhancing the tunability of the channel coefficients (\(h_{1}\) and \(h_{2}\)). To implement dipole elements of any length, a gallium-based liquid metal such as Galinstan is used in the dipole arms. The lengths of the arms can be continuously changed using hybrid electrocapillary actuation [27]. Figure 8b shows that this gives flexibility in changing the channel coefficients, which is of crucial importance in the interference channel because of the sensitivity to channel coefficients. This would be difficult to achieve with other technologies. The total number of simulated states for this architecture is 87, obtained by varying both the dipole arm lengths (from 0.1\(\lambda\) to 3\(\lambda\) with a step of 0.1\(\lambda\)), the angle between the arms (Fig. 11), and creating superpositions of the previously mentioned states (Fig. 12).

7 Results and discussion

We now show the results of using discrete modulation together with liquid metal antennas in the setup in Fig. 7.

As mentioned above, for each distance d we simulate 87 channel states which we denote \({\mathcal{S}}_{d}=\left\{ \left( h_{1,1},h_{2,1}\right) ,\left( h_{1,2},h_{2,2}\right) ,\ldots \left( h_{1,87},h_{2,87}\right) \right\}\). Our goal is specifically to demonstrate how liquid metal antennas can be used to avoid outages; outages happen for channel coefficients in states that satisfy the condition of Case 2) in Theorem 2, and we therefore only consider channel coefficients in the following set

$$\begin{aligned} {\mathcal{S}}_{d}^{\prime}:=\left\{ \left( h_{1,k},h_{2,k}\right) \Bigl |\left( h_{1,k},h_{2,k}\right) \in {\mathcal{S}}_{d},\ h_{1,k}^{2}<h_{2,k}^{2}<h_{1,k}^{4}\frac{P}{N}\right\} \end{aligned}$$
(22)

The transmit power is \(4\times 10^{-10}\) W/Hz, which corresponds to a received SNR of around 25 dB at a distance of 250 m.

Fig. 13
figure 13

Capacity for antenna states. For different liquid metal states that satisfy \(h_{1}^{2}<h_{2}^{2}<h_{1}^{4}\frac{P}{N}\), we plot the capacity with Gaussian inputs ‘\(-\square -\) and the achievable sum rate (via the lower bound in Proposition 1) using discrete PAM inputs ‘\(-\circ\)

To visualize the variability in the performance across different antenna states, in Fig. 13 we plot both the achievable rate with discrete modulated n-PAM signals and the capacity. The achievable rate for PAM inputs is plotted using the lower bound developed in Proposition 1. The number of levels n is based on Theorem 2, specifically (12). For reference, at 25 dB the interference-free capacity per user is 4 bits, i.e., a sum capacity of 8 bits. We notice from the figure that the capacity varies only moderately with the state: most states give a good rate. On the other hand, the achievable rate varies widely and many states give poor performance, which is exactly the outage behavior. The figure illustrates how liquid metal antennas can avoid the outages: The capacity is maximized in state 9, but the rate with discrete modulation is poor; moving to state 12 gives a rate close to maximum capacity.

Fig. 14
figure 14

Gap to capacity. The plot shows the ratio of achievable rate to capacity for different channel coefficients (i.e., due to a change in the geometry of the setup in Fig. 7). From top to bottom, the curves represent the maximum, average, and minimum performance for all states in \({\mathcal{S}}_d^{\prime}\) of the liquid metal antenna of Fig. 8

In Fig. 14, we illustrate the variability of rate with discrete modulation for different distances, d. The y-axis is the ratio of the sum rate achieved using discrete modulation to the capacity.

Fig. 15
figure 15

Outage avoidance. Demonstration of how liquid metal antennas avoid outages. See text for explanation

We further investigate the behavior in Fig. 13 by plotting the metrics

$$\begin{aligned} \rho _{1}\left( d\right)&=\frac{{\mathrm{max}} _{{\mathcal{S}}_{d}^{\prime}} R_{\mathrm{discrete}}}{{\mathrm{max}} _{{\mathcal{S}}_{d}^{\prime}} C} \end{aligned}$$
(23)
$$\begin{aligned} \rho _{2}\left( d\right)&=\frac{R_{\mathrm{discrete}}(s^*)}{{\mathrm{max}} _{{\mathcal{S}}_{d}^{\prime}} C}. \end{aligned}$$
(24)

Here \(R_{\mathrm{discrete}}(s^*)\) denotes the rate with discrete modulation in the state \(s^*\) that maximizes capacity. For example, in Fig. 13\(s^*\) is state 9, so (24) is the ratio of discrete rate to capacity in state 9. On the other hand, (23) is the ratio of the maximum discrete rate, achieved in state 12, to the maximum capacity achieved in state 9. The metrics are plotted in Fig. 15. The result can be seen as evidence that the liquid metal antennas are not only maximizing capacity, but also fine-tuning the channel to avoid outages. Namely, \(\rho _1(d)>\rho _2(d)\) means that the capacity-maximizing state is in outage. The liquid metal antenna can then move to a similar state which gives a much higher rate. In the figures, this happens when the receivers are close to the transmitters.

8 Conclusion

This paper investigated interference reduction via discrete modulation and liquid metal antennas. Discrete modulation can be used to reduce the effect of interference when treated as noise. The tradeoff is that there are certain configurations where the rate is very bad, leading to outage regions. A key insight of this paper is to utilize discrete modulation for good performance excepting some few weak spots and using liquid metal antennas to mitigate any weaknesses of discrete modulation.