Interference: An Information Theoretic View
Context
Interference
State-of-the-Art
Outline
Part I: 2-User Gaussian IC
Two-User Gaussian Interference Channel
Related Results
State-of-the-Art in 2006
Review: Strong Interference Capacity
Han-Kobayashi Achievable Scheme
Interference-Limited Regime
Baselines (Symmetric Channel)
Generalized Degrees of Freedom
Dof plot
Dof-Optimal Han-Kobayashi
Why set INRp = 0 dB?
Can we do Better?
Upper Bound: Z-Channel
How Good is this Bound?
What’s going on?
New Upper Bound
New Upper Bound + Z-Channel Bound is Tight
Back from Infinity
Symmetric Weak Interference
From 1-Bit to 0-Bit
From Low-Noise to No-Noise
Part 2: Resource, Feedback and Cooperation
Basic Questions
Point-to-Point Communication: An Abstraction
A Deterministic Model
Superposition
Comparing Multiple Access Capacity Regions
Generalized Degrees of Freedom
Broadcast
Interference
Applying El Gamal and Costa
Symmetric Capacity
A Resource Sharing View
Resource: Traditional View
Resource is at the Receivers
A New Dimension
Resource and Cost
Symmetric Capacity
Follow-Up Questions
Feedback
Can Feedback Help?
Example:  = 0.5
Example:  = 0.5
Gaussian Case
Can We Do Better than the V-curve?
Cheaper Cooperation
Conferencing Capacity
Part 3: Multiple Interferers and Interference Alignment
IC With More than 2 Users
Many-to-One IC
Deterministic Many to One IC
Achievable Scheme
Example
Gaussian Han-Kobayashi Not Optimal
Approximate Capacity
What Have we Learnt
Interference Alignment: History
2-User MIMO X Channel
2-User MIMO X Channel
MIMO X-Channel vs Interference Channel
3-User MIMO IC
3-User MIMO IC
3-User Parallel IC
3-User IC: Summary
Interference Alignment can still be useful
10.27M
Категории: ИнтернетИнтернет ФизикаФизика

Interference: An Information Theoretic View

1. Interference: An Information Theoretic View

David Tse
Wireless Foundations
U.C. Berkeley
ISIT 2009 Tutorial
June 28
Thanks: Changho Suh.

2. Context

• Two central phenomena in wireless communications:
– Fading
– Interference
• Much progress on information theory of fading
channels in the past 15 years
• Led to important communication techniques:
– MIMO
– Opportunistic communication
• Already implemented in many wireless systems.

3. Interference

• These techniques improve point-to-point and single
cell (AP) performance.
• But performance in wireless systems are often limited
by interference between multiple links.
• Two basic approaches:
– orthogonalize into different bands
– full sharing of spectrum but treating interference as noise
• What does information theory have to say about the
optimal thing to do?

4. State-of-the-Art

• The capacity of even the simplest two-user
interference channel (IC) is open for 30 years.
• But significant progress has been made in the past
few years through approximation results.
• Some new ideas:
– generalized degrees of freedom
– deterministic modeling
– interference alignment.
• Goal of the tutorial is to explain these ideas.

5. Outline

• Part 1: two-user Gaussian IC.
• Part 2: Resource-sharing view and role of feedback
and cooperation.
• Part 3: Multiple interferers and interference alignment.

6. Part I: 2-User Gaussian IC

7. Two-User Gaussian Interference Channel

message m1
want m1
message m2
want m2
• Characterized by 4 parameters:
– Signal-to-noise ratios SNR1, SNR2 at Rx 1 and 2.
– Interference-to-noise ratios INR2->1, INR1->2 at Rx 1 and 2.

8. Related Results

• If receivers can cooperate, this is a
multiple access channel. Capacity is
known. (Ahlswede 71, Liao 72)
• If transmitters can cooperate , this is a
MIMO broadcast channel. Capacity
recently found.
(Weingarten et al 05)
• When there is no cooperation of all, it’s
the interference channel. Open
problem for 30 years.

9. State-of-the-Art in 2006

• If INR1->2 > SNR1 and INR2->1 > SNR2, then capacity
region Cint is known (strong interference, HanKobayashi 1981, Sato 81)
• Capacity is unknown for any other parameter ranges.
• Best known achievable region is due to HanKobayashi (1981).
• Hard to compute explicitly.
• Unclear if it is optimal or even how far from capacity.
• Some outer bounds exist but unclear how tight (Sato
78, Costa 85, Kramer 04).

10. Review: Strong Interference Capacity

• INR1->2 > SNR1, INR2->1> SNR2
• Key idea: in any achievable
scheme, each user must be able
to decode the other user’s
message.
• Information sent from each
transmitter must be common
information, decodable by all.
• The interference channel capacity
region is the intersection of the
two MAC regions, one at each
receiver.

11. Han-Kobayashi Achievable Scheme

common
W1
private
U1
decode
W1
W2
U1
decode
common
private
W2
U2
W2
W1
U2
• Problems of computing the HK region:
- optimal auxillary r.v.’s unknown
- time-sharing over many choices of auxillary r.v,’s may be
required.

12. Interference-Limited Regime

• At low SNR, links are noise-limited and interference
plays little role.
• At high SNR and high INR, links are interferencelimited and interference plays a central role.
• Classical measure of performance in the high SNR
regime is the degree of freedom.

13. Baselines (Symmetric Channel)

• Point-to-point capacity:
Cawgn = log(1 + SNR)
d:o:f : :=
lim
SNR! 1
C
= 1
log SNR
• Achievable rate by orthogonalizing:
1
R = log(1 + 2SNR)
2
d:o:f : :=
1
2
• Achievable rate by treating interference as noise:
SNR
R = log(1 +
)
1 + INR
d:o:f: :=
?

14. Generalized Degrees of Freedom

• Let both SNR and INR to grow, but fixing the ratio:
log INR
= ®:
log SNR
• Treating interference as noise:
R
=
d :=
SNR
log(1 +
)
1 + INR
R
lim
= 1¡ ®
SNR;INR! 1 log SNR

15. Dof plot


®
2
Optimal Gaussian HK
®
1¡ ®
®
2

16. Dof-Optimal Han-Kobayashi

• Only a single split: no time-sharing.
• Private power set so that interference is received
at noise level at the other receiver.

17. Why set INRp = 0 dB?

• This is a sweet spot where the damage to the other
link is small but can get a high rate in own link since
SNR > INR.

18. Can we do Better?

• We identified the Gaussian HK scheme that achieves
optimal gdof.
• But can one do better by using non-Gaussian inputs
or a scheme other than HK?
• Answer turns out to be no.
• The gdof achieved by the simple HK scheme is the
gdof of the interference channel.
• To prove this, we need outer bounds.

19. Upper Bound: Z-Channel

• Equivalently, x1 given to Rx 2 as side information.

20. How Good is this Bound?

2
3

21. What’s going on?

Scheme has 2 distinct regimes of operation:
log INR
2
log INR
2
>
<
log SNR
3
log SNR
3
Z-channel bound is tight.
Z-channel bound is not tight.

22. New Upper Bound

• Genie only allows to give away the common
information of user i to receiver i.
• Results in a new interference channel.
• Capacity of this channel can be explicitly computed!

23. New Upper Bound + Z-Channel Bound is Tight

2
3

24. Back from Infinity

In fact, the simple HK scheme can achieve within 1
bit/s/Hz of capacity for all values of channel
parameters:
For any(R1 ; R2 ) in Cint, this scheme can achieve
~1 ; R
~2 )
rates ( R
~1
R
~2
R
(Etkin, T. & Wang 06)
¸
R1 ¡ 1
¸
R2 ¡ 1

25. Symmetric Weak Interference

The scheme achieves a symmetric rate per user:
(
R = min
µ

µ
)

1
1
SNR
SNR
log(1+ INR+ SNR)+ log 2 +
¡ 1; log 1 + INR +
¡ 1
2
2
INR
INR
The symmetric capacity is upper bounded by:
Csy m · min
µ

µ
1
1
SNR
SNR
log (1 + SNR)+ log 1 +
; log 1 + INR +
2
2
1 + INR
1 + INR
The gap is at most one bit for
all values of SNR and INR.
1
1
0.8
Gap (bits/Hz/s)
(
0.6
0.4
0.2
60
0
60
40
40
20
20
0
0
-20
INR (dB)
-20
SNR (dB)
¶)

26. From 1-Bit to 0-Bit

The new upper bound can further be sharpened to
get exact results in the low-interference regime (
< 1/3).
(Shang,Kramer,Chen 07,
Annaprueddy & Veeravalli08,
Motahari&Khandani07)

27. From Low-Noise to No-Noise

• The 1-bit result was obtained by first analyzing the
dof of the Gaussian interference channel in the lownoise regime .
• Turns out there is a deterministic interference
channel which captures exactly the behavior of the
interference-limited Gaussian channel.
• Identifying this underlying deterministic structure
allows us to generalize the approach.

28. Part 2: Resource, Feedback and Cooperation

29. Basic Questions

1) How to abstract a higher view of the 2-user IC result?
2) In particular: how to quantify the resource being
shared?
The key is deterministic modeling of the IC.

30. Point-to-Point Communication: An Abstraction

Transmit a real number
b1 b2 ¢¢¢bn :bn+ 1 ¢¢¢
Least significant bits are
truncated at noise level.
Matches approx:

31. A Deterministic Model

(Avestimehr,Diggavi & T. 07)

32. Superposition

Gaussian
SNR1 ¸ SNR2
SNR1
Deterministic
user 2
SNR2
user 1 sends cloud centers, user 2
sends clouds.
mod 2
addition
user 1

33. Comparing Multiple Access Capacity Regions

Gaussian
Deterministic
SNR1 ¸ SNR2
SNR1
user 2
SNR2
mod 2
addition
user 1
R2
R2
R1 + R2 =
n2
logSNR2
log(1 + SNR1 + SNR2 )
¼ logSNR1
accurate to within
(3; 2)
1 bit per user
logSNR1
R1
n 1 R1

34. Generalized Degrees of Freedom

Broadcast
Gaussian
Deterministic
n1 = 5
user 1
SNR1 ¸ SNR2
SNR1
SNR2
n2 = 2
log(1 +SNR2 )
n2
R2
To within 1 bit
R1
n1
log(1 +SNR1)
user 2

35. Broadcast

Interference
Gaussian
Deterministic
n
In symmetric case, channel
described by two parameters:
SNR, INR
n $ log2 SNR: m $ log2 INR
Capacity can be computed using
a result by El Gamal and Costa 82.
m

36. Interference

Symmetric Capacity
(Bresler & T. 08)
time/freq orthogonalization
Tx 1
Rx 1
Tx 1
Rx 1
Tx 1
Rx 1
Tx 2
Rx 2
Tx 2
Rx 2
Tx 2
Rx 2

37. Applying El Gamal and Costa

A Resource Sharing View
The two communication links share common
resources via interference.
But what exactly is the resource being shared?
We can quantify this using the deterministic model.

38. Symmetric Capacity

Resource: Traditional View
time-frequency grid as a common ether.
freq.
time
Each transmission costs one time-frequency slot.
If a tree falls in a forest and no one is around to
hear it, does it make a sound?

39. A Resource Sharing View

Resource is at the Receivers
• The action is at the receivers.
• No common ether: each Rx has its own resource.
• Signal strengths have to come into picture.
• Signal level provides a new dimension.

40. Resource: Traditional View

A New Dimension
freq.
freq.
time
time
signal level
Resource at a receiver:
# of resolvable bits per sample £ bandwidth £ time
T
W
log 2 SNR

41. Resource is at the Receivers

Resource and Cost
Resource available at each Rx
= max(m,n) signal levels ($)
Cost to transmit 1 bit:
= $2 if visible to both Rx.
= $1 if visible to only own Rx.
n
m

42. A New Dimension

Symmetric Capacity
cost
increases
resource
increases
(Bresler & T. 08)
time/freq orthogonalization
Tx 1
Rx 1
Tx 1
Rx 1
Tx 1
Rx 1
Tx 2
Rx 2
Tx 2
Rx 2
Tx 2
Rx 2

43. Resource and Cost

Follow-Up Questions
How does feedback and cooperation improve
resource utilization?

44. Symmetric Capacity

Feedback
Delay
n
Tx 1
Rx 1
m
n
Tx 2
Rx 2
Delay
m

45. Follow-Up Questions

Can Feedback Help?
cost
increases
resource
increases
w/ feedback
w/o feedback
(Suh & T. 09)
Feedback does not reduce cost, but it maximizes
resource utilization.

46. Feedback

Example: = 0.5
w/o feedback
Tx 1
Rx 1
Tx 2
Rx 2
consumption: 2 levels
resource: 4 levels
Potential to squeeze 1 more bit in with feedback

47. Can Feedback Help?

Example: = 0.5
feedback
decode
cost $0
Tx 1
Rx 1
cost $2
Tx 2
decode
Rx 2
1 bit feedback
buys 1 bit
Tx 1 sending b1 helps Rx 1 to recover a1 without causing
interference to Rx 2.

48. Example:  = 0.5

Gaussian Case
• There is a natural analog of this feedback scheme for
the Gaussian case.
• Using this scheme, the feedback capacity of the 2user IC can be achieved to within 1 bit/s/Hz.
• To find out, go to Changho Suh’s talk on Thurs!

49. Example:  = 0.5

Can We Do Better than the V-curve?
w/ feedback
??
(Wang & T. 09)
Tx 1
Rx 1
2 cooperation bits
buys 1 bit
Backhaul
Tx 2
Rx 2
Cooperation reduces cost.

50. Gaussian Case

Cheaper Cooperation
1
2
Tx 1
1 cooperation bit
buys 1 bit
Rx 1
Backhaul
Tx 2
Rx 2

51. Can We Do Better than the V-curve?

Conferencing Capacity
• Devised a cooperation scheme for the Gaussian IC
with conferencing decoders.
• Achieves capacity region to within 2 bits.
• Related work: cooperation via wireless links
(Prabhakaran & Viswanath 08)

52. Cheaper Cooperation

Part 3: Multiple Interferers and
Interference Alignment

53. Conferencing Capacity

IC With More than 2 Users
• So far we have focused on the two-user interference
channel.
• What happens where there are more than 2 users?
• Do the ideas generalize in a straightforward way?
• Not at all.
• We are far from a complete theory for K-user IC’s.
• We will go through a few examples to get a sense of
what’s going on.

54. Part 3: Multiple Interferers and Interference Alignment

Many-to-One IC
• In the 2 user case a HanKobayashi achievable scheme
with Gaussian inputs is 1-bit
optimal.
• Is Han-Kobayashi scheme with
Gaussian inputs optimal for
more than 2 users?

55. IC With More than 2 Users

Deterministic Many to One IC
Gaussian
Deterministic

56. Many-to-One IC

Achievable Scheme
.
• Interference alignment: two (or
more) users transmit on a level,
cost to user 0 is same of that for
a single interferer.
• Equivalently, cost of transmitting
1 bit for interferer is 1.5 levels.
• Turns out that scheme achieves
capacity on the deterministic
channel.

57. Deterministic Many to One IC

Example
Tx0
Rx0
Tx1
Rx1
Tx2
Rx2
• Interference from users 1 and 2 is aligned at the MSB
at user 0’s receiver in the deterministic channel.
• How can we mimic it for the Gaussian channel ?

58. Achievable Scheme

Gaussian
Lattice
codes
Han-Kobayashi
can achieveNot
constant
Optimal
gap
• Suppose users 1 and 2 use a random
Gaussian codebook:
Random Code
Sum of Two Random Codebooks
Lattice Code for Users 1 and 2
Interference from users 1 and 2 fills the space: no
room for user 0. User 0 Code
Tx0
Rx0
Tx1
Rx1
Tx2
Rx2

59. Example

Approximate Capacity
Theorem: (Approximate Capacity of K-user
Many-to-One Gaussian IC).
Achievable scheme is within log2K bits of capacity, for
any channel gains.
(Bresler, Parekh and T. 07)

60. Gaussian Han-Kobayashi Not Optimal

What Have we Learnt
• In two-user case, we showed that an existing strategy
can achieve within 1 bit to optimality.
• In many-to-one case, we showed that a new strategy
can do much better.
• Two elements:
– Structured coding instead of random coding
– Interference alignment

61. Approximate Capacity

Interference Alignment: History
• First observed in the analysis of the X-Channel
(Maddah-Ali et al 06)
• Concept crystallized by Jafar & Shamai 06
• Applied to the K-user parallel interference channel
(Cadambe & Jafar 07)
• Applied to the many-to-one scalar IC (Bresler et al 07)
• Two types of interference alignment:
– along time/frequency/space dimension
– along signal scale

62. What Have we Learnt

2-User MIMO X Channel
MIMO IC
X
Tx 1
Rx a
Dec a
Enc1
Tx 2
Enc2
Rx b
Dec b

63. Interference Alignment: History

2-User MIMO X Channel
Tx 1
Rx a
Tx 2
Rx b
M (# of ant.) ¸ 2

64. 2-User MIMO X Channel

MIMO X-Channel vs Interference Channel
total dof of a 2-user MIMO with M antennas:
Interference Channel: M
(Jafar and Fakhereddin 06)
X- Channel: 4M/3
(Jafar and Shamai 06)
Interference alignment gain.

65. 2-User MIMO X Channel

3-User MIMO IC
Need Simultaneous Interference Alignment
a1
Tx 1
a1
Rx 1
a1
c1
Tx 2
Rx 2
b1
b1
b1
b1
b1 c1
3 conditions
3 vectors
c1
a1 c1
Tx 3
Rx 3
a1
a1 b1
a1
c1
c1
# of conditions
matches # of variables
c1
b1

66. MIMO X-Channel vs Interference Channel

3-User MIMO IC
:eigenvector of
Rx 1
a1
Rx 2
b1
b1 c1
Check rank condition:
a1 c1
Rx 3
a1 b1
c1
MIMO channel: rank=2 w.h.p.

67. 3-User MIMO IC

3-User Parallel IC
Use 2 subcarriers
:eigenvector of
Rx 1
a1
Rx 2
b1
b1 c1
Check rank condition:
All matrices are diagonal.
a1 c1
Rx 3
a1 b1
rank=1
c1

68. 3-User MIMO IC

3-User IC: Summary
• With MIMO, can achieve optimal total dof of 3/2 per
antenna.
• With finite number of parallel sub-channels, cannot.
(Cadambe & Jafar 07)
• As the number of parallel sub-channels grows, 3/2
can be achieved asymptotically.
• Key idea: partial subspace alignment
• In general, for K-user IC, K/2 can be achieved
asymptotically.
2
2
K
• However, number of sub-channels scales like (K )

69. 3-User Parallel IC

Interference Alignment can still be useful
Use 2 subcarriers
a1
Tx 1
Gallokota et al 09
a1
Rx 1
a1
c1
Tx 2
Rx 2
b1
b1
b1
b1
b1 c1
Backha
ul
a1
Tx 3
c1
c1 a1
a1
Rx 3
c1
b1
a1
c1
b1

70. 3-User IC: Summary

Capacity
• For 2 user IC and many-to-one IC, we have constant gap
capacity approximation.
• For 2-user X-channel and 3-user fully connected IC, we do not,
even for single antenna.
• In fact, we don’t even know the d.o.f.
• Interference alignment on signal scale is useful for very specific
channel parameter values (Cadambe, Jafar & Shamai 08, Huang,
Cadambe & Jafar 09, Etkin & Ordentlich 09)
• But we don’t know if it’s useful for many parameter values.

71. Interference Alignment can still be useful

Conclusions
• A good understanding of the 2-user IC, even with
feedback and cooperation.
• Deterministic modeling is a useful technique.
• Interference alignment has been shown to be a
useful technique when there are multiple
interfererers.
• But we don’t have a good understanding on the
capacity when there are multiple interferers.
English     Русский Правила