Have a personal or library account? Click to login
Critical Factors are Affecting the Application of Information Theory in Broadband Communication Channel Capacity Cover

Critical Factors are Affecting the Application of Information Theory in Broadband Communication Channel Capacity

By: Yasir Shah and  Ameen Ullah  
Open Access
|Sep 2025

Full Article

I.
Introduction

An endless thirst for faster, more dependable broadband communication channels has been created by the unrelenting advancement of communication technologies. Information theory, a foundational field in communication engineering that aims to decipher the complexities of data transfer within the limited bandwidth available, is at the center of this endeavor [1]. The optimization of broadband communication channel capacity becomes critical as we approach beyond the fifth generation (5G) to meet the growing data demands of an interconnected world [2]. This research endeavors to conduct a thorough investigation of the pivotal elements that mold the utilization of information theory within the framework of broadband communication. Each aspect—from modulation techniques, error correction, and adaptive systems to bandwidth restrictions and channel noise—is carefully examined for how it contributes to reaching the maximum data speeds while guaranteeing dependable and secure transmissions [3]. In addition, the study explores current issues with a view to the future of broadband communication, including the incorporation of machine learning methods, dynamic spectrum availability, and the impact of various network topologies [4]. Knowing the intricacies of information theory is crucial as we move through a time when connectivity is not only a luxury but a need. The purpose of this study is to offer relevant information to network designers, engineers, and policymakers who are responsible for developing communication systems that are dependable, effective, and adaptable enough to evolve in response to user demands and the rapidly evolving field of technology. The next chapters provide a road map for negotiating the tricky nexus between theory and practice in the pursuit of optimal communication channel capacity by revealing the layers of information theory's influence on broadband communication[5]. Thanks to the Internet of Things (IoT), the development of multimedia material, and people's insatiable need for real-time connectivity, data consumption has seen an unparalleled spike in the 21st century. Broadband communication networks, which act as conduits for a wide range of information, have emerged as the lifeline of contemporary civilization in response to this ravenous need. Information theory is the science that not only holds the keys to the mysteries of data transmission but also plays a crucial role in the search for high-capacity and efficient communication channels[6].

In light of this, the planned study objective to address the following research inquiries:

  • A.

    What are the key factors influencing the optimization of broadband communication channel capacity, and how do they interrelate within the framework of information theory?

  • B.

    How can the model and analysis of the intricate and dynamic interactions between these aspects be done using the Fuzzy Decision-Making Trial and Evaluation Laboratory (DEMATEL) technique?

  • C.

    Considering uncertainties and imprecisions inherent in the broadband communication domain?

To summaries, the following are the main research contributions from this study's modeling and literature sections:

  • 1)

    In this study a comprehensive literature review was conducted on the application of information theory in Broadband Communication channel capacity Moreover, the authors detailed a study of the previous research on Broadband Communication channel capacity and identified the research gap. This research gap is from both the modeling and literature side.

  • 2)

    To clarify and quantify the interdependencies among crucial aspects influencing the application of information theory in maximizing broadband communication channel capacity, this research will use using the DEMATEL (Fuzzy Decision-Making Trial and Evaluation Laboratory) method.

  • 3)

    This research aims to clarify the complex links and causalities among the identified components by a thorough analysis utilizing fuzzy set theory, offering a nuanced knowledge of their impact on the overall performance of broadband communication networks.

The paper is structured into several key sections. It begins with an Abstract summarizing the study's purpose and findings, followed by an (1) Introduction that outlines the significance and objectives of the research. Next, the (2) Literature Review examines existing studies and identifies research gaps. The (3) Research Methodology details the use of the Fuzzy DEMATEL approach to analyze and rank enablers, with the (4) Results and Discussion section presenting the findings. The paper concludes with (5) Study Implications, followed by a (6) Conclusion summarizing the key insights.

II.
Literature review

The appetite for fast data speeds, low latency, and dependable connectivity has caused the broadband communication landscape to expand at an unprecedented rate[7]. Information theory, a discipline that offers a theoretical framework for comprehending and enhancing the efficiency of data transmission, is fundamental to optimizing broadband communication networks[8]. This literature review's objective is to examine the corpus of knowledge. that currently exists on the use of information theory to optimize the capacity of broadband communication channels by looking at important aspects, difficulties, and developments[9].

A. Proposed Factors

This study proposed success factors affecting on application of information theory in Broadband Communication channel capacity. The detail of these factors is given below.

Bandwidth enhancement (C1) The bandwidth of broadband communication channels is limited. When maximizing data transmission rates within this constrained bandwidth, information theory helps take interference and channel noise into account[10]. Channel Access Protocols (C2) Multiple users may require simultaneous channel access in broadband communication networks. Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA) are two examples of, two successful multiple access protocols that guarantee fair and effective utilization of the available bandwidth, are designed using information theory[11].Data Rate and Transmission Efficiency (C3) Enhancing transmission efficiency and obtaining greater data rates can be accomplished with the help of information theory. The efficiency with The capacity of a communication channel is determined by what data can be encoded and sent. To increase data speeds, sophisticated coding systems and modulation techniques are applied [1]. Modulation Schemes (C4) Broadband communication uses many modulation algorithms to send data over the channel. The selection of suitable modulation schemes to get the desired data rate while taking the constraints and features of the channel into account is guided by information theory[12]. Multipath and Fading (C5) Multipath propagation and fading, in which signals take several pathways and face fluctuations in signal strength, are common occurrences in broadband communication networks. By using methods like diversity reception and equalization, information theory aids in when creating communication systems that can control and mitigate the impacts of multipath and fading[13]. Channel Coding and Error Correction (C6) When creating error repair codes to restore data that was corrupted during transmission, information theory plays a crucial role. For dependable data transfer in broadband communication, when errors are more likely to occur, channel coding becomes essential[1]. Capacity Planning (C7) Capacity planning for broadband communication systems is aided by information theory. Through an awareness of the basic constraints imposed by channel capacity, network operators are able to plan for future growth and allocate resources optimally[14]. Power Consumption Considerations (C8) Reducing power usage is essential for mobile and battery-operated devices. Information theory aids in the design of energy-efficient communication systems by taking power consumption, signal quality, and data rate tradeoffs into account[15].Adaptive Systems (C9) The construction of adaptive systems which may dynamically modify their parameters in response to shifting channel conditions is facilitated by information theory. This flexibility is necessary to maximize performance in a variety of situations[16]. Regulatory and Standardization Aspects (C10) In broadband communication, regulatory requirements compliance is essential. Achieving these standards, guaranteeing interoperability, and making effective use of the available frequency spectrum all depend on information theory considerations [17]. Channel Noise and Distortion (C11) Information theory addresses how distortion and noise affect signals that are sent. Signal quality in broadband communication can be weakened by noise coming from a variety of sources, including other electrical equipment and environmental factors. To lessen these impacts, strategies like modulation schemes and error-correcting codes are used [18]. Quality of Service (QoS) Requirements (C12) In order to satisfy particular QoS criteria in broadband communication, information theory principles are utilized. This entails adjusting latency, jitter, and reliability factors according to the type of data being transferred for example (voice, video, or data)[19]. Diversity Techniques (C13) In broadband communication, diversity techniques like spatial and frequency diversity are used to counteract fading and enhance reliability. The application of these methods to improve signal robustness is guided by information theory[20]. Security Considerations (C14) Ensuring the security of transmitted data also involves the application of information theory principles. Sensitive data is protected and communications are kept secure with the use of cryptographic techniques grounded in information theory[21].Dynamic Spectrum Access (C15) Information theory is used by cognitive radio and dynamic spectrum access to intelligently distribute spectrum resources based on current channel circumstances. This dynamic allocation helps prevent interference and improves spectrum efficiency[22]. MIMO Systems (C16) Multiple antennas are used by MIMO systems for both transmitting and receiving. MIMO systems are designed using the principles of information theory to take advantage of spatial diversity, boost data rates, and expand the overall capacity of broadband communication channels[23]. Propagation Characteristics (C17) Signal intensity is affected by the communication channel's propagation properties, such as route loss and attenuation. To get over these propagation obstacles, transmission characteristics and antenna layouts are optimized using information theory[24]. Network Topology and Architecture (C18) The communication network's architecture and topology have an impact on how well data is transmitted. Network designs that support seamless connectivity and high-capacity broadband communication can be designed with the help of information theory[25].

TABLE I.

Summary of identified enablers

CategoriesEnablersSources
C1Bandwidth enhancement[26]
C2Channel Access Protocols[27]
C3Data Rate and Transmission Efficiency[28]
C4Modulation Schemes[29]
C5Multipath and fading[30]
C6Channel Coding and Error Correction[31]
C7Capacity Planning[32]
C8Power Consumption Considerations[33]
C9Adaptive Systems[34]
C10Regulatory and Standardization Aspects[35]
C11Channel Noise and Distortion[36]
C12Quality of Service (QoS) Requirements[37]
C13Diversity Techniques[38]
C14Security Considerations[39]
C15Dynamic Spectrum Access[40]
C16MIMO (Multiple Input Multiple Output)[41]
C17Propagation Characteristics[42]
C18Network Topology and Architecture[43]
III.
Research Methodology

The research methodology employed in this study is grounded in the Fuzzy Decision-Making Trial and Evaluation Laboratory (Fuzzy DEMATEL) technique, designed to analyze the interdependencies among enablers influencing broadband communication channel capacity within the framework of information theory [44] [45]. The methodology begins with the identification of 18 critical enablers derived from a comprehensive review of 118 scholarly articles, followed by expert evaluation to assess the influence relationships among these factors. A panel of fifteen domain experts—five from academia and ten from industry—each with a minimum of five years of experience, participated in the assessment. Experts evaluated the degree of influence each enabler exerts on the others using a five-point linguistic scale: No Influence (NI), Very Low Influence (VL), Low Influence (L), "High Influence (H), and Very High Influence (VHI). These linguistic terms were mapped to Triangular Fuzzy Numbers (TFNs) as follows: (0, 0.1, 0.3) for NI, (0.1, 0.3, 0.5) for VL, (0.3, 0.5, 0.7) for L, (0.5, 0.7, 0.9) for H, and (0.7, 0.9, 1) for VHI.

To handle the fuzziness and uncertainty inherent in expert judgments, the Convert Fuzzy Data into Crisp Scores (CFCS) method was applied for defuzzification. The process begins with normalization of the lower, medium, and upper values of the TFNs. For a given fuzzy number pij, qij, rij representing the influence of enabler i on enabler j, the left-normalized value xls and right-normalized value xrs are computed using the equations: 1xls=pij1ml,xrs=rijlml

Where l = 0 and m = 0 are the lower and upper bounds of the normalization range. The total normalized crisp value is then calculated as: 2xs=xls(1xls)+xrs·xls

Followed by the computation of the crisp value: 3yij=l+xs(ml)

This yields a crisp direct relation matrix from the aggregated fuzzy assessments. The next step involves constructing the normalized direct relation matrix \( X \), using the formula: 4X=Ymax1inj=1nyij

Where Y is the aggregated crisp matrix and n=18 is the number of enablers. Subsequently, the total relation matrix T is computed as: 5T=X(IX)1

Where I is the identity matrix. This matrix captures both direct and indirect influences among enablers. The sum of rows R and sum of columns S are then derived from T as: 6Ri=j=1ntij,Sj=i=1ntij

The prominence of each enabler is determined by R+S, indicating its overall influence within the system, while the net effect RS identifies whether an enabler belongs to the cause group (if RS>0) or the effect group (if RS<0). These values are used to construct the causal diagram (Figure 1), which visually represents the interrelationships and categorizes enablers based on their roles in influencing broadband channel capacity. This systematic approach enables a nuanced understanding of the structural dynamics among the identified factors, supporting strategic decision-making in communication network design and optimization.

Figure 1

Causes and effects for facilitator.

IV.
Results and Discussions

The results of this study are derived from the Fuzzy DEMATEL analysis, which systematically evaluates the interdependencies and relative influence of 18 enablers affecting the optimization of broadband communication channel capacity within the framework of information theory. The analysis begins with the aggregation of expert judgments from fifteen domain specialists, five from academia and ten from industry, each with a minimum of five years of experience in communication systems. These experts assessed the pairwise influence among the identified enablers using a five-point linguistic scale: No Influence (NI), Very Low Influence (VL), Low Influence (L), High Influence (H), and Very High Influence (VHI), as detailed in Table 2. These linguistic terms were converted into Triangular Fuzzy Numbers (TFNs) to handle uncertainty and imprecision in human judgment.

The fuzzy assessments were defuzzified using the Convert Fuzzy Data into Crisp Scores (CFCS) method, which involves normalization, left and right normalized value computation, total normalized crisp value derivation, and final crisp score calculation. This process yielded a crisp direct relation matrix, which was then normalized to form the initial direct-relation matrix \( X \), as shown in Table 5. The normalization was performed using the formula: 7X=Ymax1i18j=118yij

Where Y is the aggregated crisp matrix. Subsequently, the total relation matrix T was computed using the equation: 8T=X(IX)1

This matrix captures both direct and indirect influences among the 18 enablers, reflecting the complex network of interactions within the broadband communication system. From the total relation matrix, the sum of rows Ri=j=118tij and the sum of columns Sj=i=118tij were calculated for each enabler. These values are crucial for determining the prominence and causal role of each enabler.

The prominence of an enabler is given by R+S, indicating its overall influence within the system, while the net effect RS determines whether it belongs to the cause group (if RS > 0 or the effect group (if RS < 0. As shown in Table 4, Security Considerations (C14) emerged as the most influential enabler with the highest prominence value of R+S=8.522 and a net effect of RS=0.6422, placing it firmly in the cause group. This indicates that Security Considerations exert a strong driving influence on other enablers, such as Channel Access Protocols, Modulation Schemes, and QoS Requirements. The growing importance of security in broadband systems especially with the proliferation of IoT, cloud services, and cyber-physical systems—underscores its foundational role in ensuring reliable and trustworthy communication.

Second in ranking is Channel Access Protocols (C2) with R+S=8.095, although it falls into the effect group RS=–0.1939, suggesting it is significantly influenced by other factors while also playing a critical role in system performance. This reflects the dependency of access protocols on higher-level design choices such as security policies, propagation conditions, and regulatory standards. Nevertheless, its high prominence confirms its operational centrality in managing shared bandwidth and minimizing interference in multi-user environments.

Third is Propagation Characteristics (C17) with R+S=7.75 and RS= –0.061, placing it in the effect group. Despite being influenced by other system-level decisions, propagation characteristics such as path loss, attenuation, and multipath effects are fundamental physical constraints that directly affect signal integrity and achievable data rates. Their high ranking reaffirms the importance of environmental and topological factors in real-world deployment scenarios.

Other notable cause-group enablers include Bandwidth Enhancement (C1), Channel Coding and Error Correction (C6), Capacity Planning (C7), Power Consumption Considerations (C8), Quality of Service Requirements (C12), and Regulatory and Standardization Aspects (C10). These factors, characterized by positive RS values, act as drivers that influence the configuration and performance of the broader system. For instance, effective capacity planning and regulatory compliance set the foundational rules within which technical implementations must operate.

In contrast, the effect group includes enablers such as MIMO Systems (C16), Modulation Schemes (C4), Adaptive Systems (C9), and Network Topology and Architecture (C18), which, while essential for performance, are largely shaped by the decisions made in the cause group. This hierarchical relationship is visualized in Figure 1, the causal diagram, where the horizontal axis represents R+S (prominence) and the vertical axis represents RS (causal direction). The clustering of enablers reveals that strategic and foundational factors (like security and regulations) form the core drivers, while technological implementations respond to these constraints.

The findings challenge traditional assumptions that focus solely on physical-layer optimizations (e.g., modulation, MIMO) as primary levers for capacity enhancement. Instead, they highlight that non-technical and cross-layer factors particularly security and access control are now central to the effective application of information theory in broadband systems. This shift reflects the evolving nature of communication networks, where trust, reliability, and dynamic access are as critical as spectral efficiency.

Moreover, the robustness of the Fuzzy DEMATEL approach is evident in its ability to model uncertainty and expert subjectivity while producing a clear, quantifiable ranking. The use of TFNs and CFCS ensures that linguistic assessments are transformed into reliable numerical values, enhancing the validity of the outcomes.

The results demonstrate that optimizing broadband channel capacity is not merely a technical challenge but a systemic one, requiring a holistic understanding of interdependencies among diverse enablers. The prioritization of Security Considerations, Channel Access Protocols, and Propagation Characteristics provides a strategic roadmap for researchers and practitioners aiming to enhance network performance in nextgeneration communication systems. These insights are particularly relevant for 5G/6G, IoT, and cognitive radio networks, where dynamic, secure, and adaptive communication is paramount.

V.
Study Implication
A. Theoretical implication

The utilization of Fuzzy DEMATEL presents opportunities for further investigation into the amalgamation of fuzzy set theory and information theory. Theoretical implications facilitate the exploration of increasingly sophisticated models that may effectively encompass the intricacies of communication networks, while also considering uncertainties and the ability to adapt to future technological improvements. Information theory, a fundamental principle in communication engineering, conventionally focuses on accurate and predictable connections. The theoretical significance of using Fuzzy DEMATEL resides in the incorporation of uncertainty into models of information theory. This deviation from deterministic models enhances the inclusiveness and accuracy of portraying the dynamic characteristics of broadband communication.

B. Managerial implication

Fuzzy DEMATEL offers a methodical approach to ranking the parameters that impact the capacity of broadband communication channels. Managers can utilize the calculated priority values to efficiently distribute resources, concentrating on the most crucial aspects that have a substantial influence on system performance. This prioritization facilitates the optimization of investments in technology, infrastructure, and human resources. It provides managers with guidance for making educated decisions on the adoption and integration of technology. Managers can strategically deploy technologies like adaptive modulation, error correction codes, and machine learning integration by comprehending the interdependencies across components. This guarantees that the implementation of technology is in line with the main objective of maximizing channel capacity.

VI.
Conclusions

This study presents a comprehensive analysis of the enablers influencing broadband communication channel capacity through an integrative application of information theory and the Fuzzy DEMATEL method. Based on a systematic review of 118 scholarly articles, 18 critical enablers were identified, encompassing technical, regulatory, and strategic dimensions such as Bandwidth Enhancement, Channel Access Protocols, Security Considerations, and Propagation Characteristics. These enablers were evaluated by a panel of 15 domain experts using linguistic variables converted into Triangular Fuzzy Numbers (TFNs) to account for uncertainty in human judgment. The CFCS defuzzification technique was applied to transform fuzzy assessments into crisp values, followed by the construction of a normalized direct relation matrix and computation of the total relation matrix using matrix algebra. The resulting prominence (R+S) and net influence (R-S) values revealed that Security Considerations (C14), Channel Access Protocols (C2), and Propagation Characteristics (C17) are the most influential enablers, with C14 emerging as the top priority due to its strong causal impact. The causal diagram further classified enablers into cause and effect groups, highlighting the central role of security and access control in driving system performance. This research fills a critical gap by introducing an enabler-to-enabler interrelationship model, offering IT managers and network designers a strategic framework for prioritizing investments and optimizing channel capacity in next-generation communication systems.

Language: English
Page range: 43 - 53
Published on: Sep 30, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2025 Yasir Shah, Ameen Ullah, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.