Académique Documents
Professionnel Documents
Culture Documents
Pramod Viswanath
Sreeram Kannan
I. I NTRODUCTION
Interference is a first order issue in wireless networks. Traditional methods to handle interference such as power control
and scheduling can be suboptimal and limit the maximum
throughput in the network. Interference alignment (IA) is a
relatively recent technique to mitigate this problem in which
the transmitted signals are beam-formed in such a way that the
interference is restricted to only a subspace at each receiver.
The DoF of the K-user interference channel with ergodic
fading has been analyzed in [1] where they show that a
DoF per message of up to 21 is achievable. [2] looks at an
interference network in which every transmitter has a single
multicast message. The DoF region for networks with more
general message demands has not yet been studied. In this
paper, we present an IA scheme that generalizes the scheme
in [2] for (i) multiple-unicasts (also referred to as the XChannel), in which each transmitter can have an independent
message to each receiver and (ii) multiple-multicasts, in which
each transmitter can have an independent multicast message to
each subset of receivers. For the case of multiple-unicasts, we
show that the DoF outer bound in [3] can be achieved under
a symmetry condition. We also show that our scheme can
achieve a DoF of within 12 of the cut-set bound in both cases.
Finally we present an approximate DoF region of general fast
fading Gaussian networks under a conjecture on the flow-cut
gap of node-capacitated undirected graphs.
II. N ETWORK M ODEL
Following the model presented in [3], we consider a single
hop wireless network with K transmitters and K receivers,
each having a single antenna. Let Hji be a generic channel
matrix between transmitter i and receiver j. Assume that the
causal channel state information is known globally. Then, the
input-output relation is given by:
X
Yj (t) =
Hji (t)Xi (t) + Zj (t), j = 1, 2, . . . , K
i{1,...,K}
dm
q +
q=1
K
X
dpn dm
n 1
(1)
p=1
836
Fig. 1. An example showing the optimal arrangement of messages for the X channel with the given message demand. The red dotted lines show the interfering
messages at receiver 1. Notice that all the interfering messages are contained under (in the same columns as) the largest interference (at all receivers)
N
X
[l] [l]
Vi X
i (t)
l=1
[1]
[2]
[2]
[3]
[3]
[1]
[2]
[2]
[3]
[3]
[1]
[3]
[2]
[2]
[3]
[1]
B. Alignment scheme
X networks represent the most general class of nonmulticast communication scenario possible in a single-hop
wireless network. Let d = [dij ]KK [0, 1]KK denote the
DoF matrix, where the (i, j)th entry dij refers to the DoF of
the message from transmitter i to receiver j. Since the vertices
of the DoF region given in (1) are rational, we consider only
the achievability of points with rational coordinates. Let us
first
those points d on the outer bound for which
PK consider
i
d
=
D
i [K] for some D R, i.e., the sumj=1 j
DoF of the messages from each transmitter are equal. We later
consider the scheme for a general DoF point. For any rational
point d, let Z+ be such that n , d has all integral
entries, i.e., nij Z i, j [K] where nij = dij . We interpret
nij as the number of messages from transmitter i to receiver j.
Therefore, every transmitter has a total of N = D messages.
The following sections III-C and III-D are the two key steps
involved in our scheme.
C. Step 1: Combinatorial message alignment
Since each transmitter has N messages in total, let us use a
set of N base-vectors W = {wi , 1 i N } (where wi s are
generic) in order to evolve the beamforming matrices. Notice
that the same set of base-vectors is used in all the transmitters.
As discussed previously in section III-A, the ultimate aim here
is to optimally assign each message to one of the beamforming
matrices.
We view such an assignment of messages to beamforming
matrices or equivalently, to base-vectors, as an array B where
B(i, j) denotes the message from transmitter i listed under
base vector j. Fig. 1(c) shows an example assignment for K =
3, N = 10. We have listed only the message labels and not
the actual messages itself in the assignment B because for any
assignment of messages, exchanging of messages having the
same label does not change the performance.
Let us call a column a j-block (for j [K]) if all the entries
of that column have the label j. A column which is not a jblock for any j is called a -block. Let Nj denote the number
of j-blocks in B for j [K] and Ij , N Nj .
Proposition 1. For any point d in the outer bound region (1)
such that the sum-DoF of messages from all transmitters are
837
(a) Gn (V, E)
Fig. 2. An example showing a node capacitated graph Gn (V, E) with a single source, node 1, having a multicast message to nodes 2 and 3. In Fig. 2(a),
two possible Steiner trees are shown in red and blue dotted lines. Fig. 2(b) shows the passing of messages with time. At each time instant, the interior nodes
forward the message received in the previous time slot while the source generates a new message and in Fig. 2(c), we have shown the steady state traffic in
the network
nij + Ij
j [K]
(2)
i0 =1
nij +
nij 0
j [K].
(3)
j 0 [K]:j 0 6=j
ni1 + I1 .
(4)
i0 =1
N
since j nij i [K] and hence
j
j=1
j=1 j
the above operations require no more than N = |W | columns.
The remaining messages can be arbitrarily assigned to any
unassigned columns. The proposition follows.
Fig. 1 shows an illustration of a K = 3 case with = 20.
D. Step 2: Evolution of beamforming matrices
The next step is to generate the beamforming matrices
from the base-vectors. The subspaces are created such that
they satisfy Property 1, i.e., an interfering message from a
subspace remains within the subspace while a non-interfering
message becomes linearly independent to the subspace at the
receiver. This property, together with the previous combinatorial arrangement of the messages allows us to achieve
interference alignment. Let us use a symbol expansion of
2
[l]
= t ( + 1)K K where t = . Let Vi denote
[l]
nm
Vi =
H
nm wl :
(m,n)[K]2
B(m,l)6=n
nm {0, . . . , } if m 6= i,
nm {0, . . . , 1} if m = i
,
(5)
[l]
[l]
nm
V ,
Hnm wl : nm {0, . . . , } ,
(m,n)[K]
B(m,l)6=n
(6)
Hji Vi V
838
S(j)
denote the subspace formed by the beamforming matrices
corresponding to the message signals at receiver j:
[l]
S(j)
= [Hji Vi : B(i, l) = j, i [K], l [N ]]
(7)
so that if S(j)
and V(j)
are linearly independent, then V(j)
can be zero-forced to retrieve the information of the messages
in S(j).
Let (j) denote the combined space:
(j) = [S(j)
V(j)].
(8)
2
[l]
[l]
|Hji Vi |
1
()K1 ( + 1)K 2K+1
=
= lim
(l + 1)K 2 K
[l]
X
X
dij |s| (9)
(|s| 1)D + max
dij +
i
c
j:js
i,j
js,i[K]
j[K]
dij .
dis
s[K] i=1
js
1
2
and
dis
s[K]
1
2
i, j
(10)
839
(11)
g
n
where Rach
(P ) and Rach
(P ) stand for the achievable rate
regions in the Gaussian and the node-capacitated network
respectively. Consider the steady-state bipartite graph corresponding to the node-capacitated network as illustrated in
Fig. 2. This steady state network also has a node capacity
of 12 C(P ). From our interference alignment scheme we know
that half of the cut-set bound is achievable at high SNR for
a complete bipartite topology (10). It is easy to see that the
achievability of 12 C(P ) does not change for any other bipartite
topology (for feasible multicasts). Now, by routing information
in the Gaussian network via any set of Steiner trees that lead
to that steady state rate, we can conclude that any feasible flow
achievable in the node-capacitated network Gn (V, E) can be
achieved on the Gaussian network G(V, E). This proves (11).
Further, since the cut-set bound region for the node capacitated
graph is exactly the same as the polymatroidal cut-set bound
region, using the result in [5] we have:
g
n
Rcut
(P/bd3 )
1 g
P
Rcut
(P )
n
Rcut Rcut
(16)
3
2
bd
2f (k, t)
f (k, t)
where d is the maximum degree of the graph and b =
2
eE(log |h| )
. Now, it is shown in [6] that a flow-cut gap of
2
O(log3 (kt)) is achievable for the setting of edge-capacited
undirected graphs. We conjecture that a similar result holds
true even in our case:
Conjecture 1. In a node-capacitated undirected graph a
flow-cut gap of f (k, t) = O(logc kt) is achievable for some
constant c > 0.
Under this conjecture, combining the results so far we get:
Theorem 2. The capacity of a Gaussian wireless network with
k multicast demands as described above can be approximated
to within a poly-logarithmic factor by the cut-set bound:
g
Rcut
(P/bd3 )
g
Rach
(P ).
2O(logc kt)
B. Cut-set bounds
Let us now relate the corresponding cut-set bounds.
g
n
(P ) and Rcut
(P ) denote the Gaussian and nodeLet Rcut
capacitated cut-set regions respectively for power P . For any
cut V in the Gaussian network G(V, E), let D() =
{1 i k : i , Si c 6= } denote the set of
commodities that are separated by cut . We then have:
X
Ri cutg () = I(X ; Yc |Xc ).
(12)
iD()
C(P )
2
(13)
cutn ()
i:iD()
Di
(14)
n
Rcut
.
f (k, t)
(17)
VI. C ONCLUSION
We have presented a novel interference alignment scheme
that simplifies the problem of interference alignment to a combinatorial problem in networks with general message demands.
This framework allows us to easily see the DoF region for
simpler networks like the K user interference network. For
the X network we have shown that the achievable region
of our scheme touches a previously known outer bound. We
have also extended the result of achievability of half of the
cut-set bound to general multicast networks. And finally, we
have demonstrated a poly-logarithmic flow-cut gap in general
Gaussian wireless networks with multicast demands.
R EFERENCES
[1] V. R. Cadambe and S. A. Jafar, Interference alignment and the degrees
of freedom of the k-user interference channel, IEEE transactions on
Information Theory, vol. 54, no. 8, pp. 34253441, August 2008.
[2] L. Ke, A. Ramamoorthy, Z. Wang, and H. Yin, Degrees of freedom
region for an interference network with general message demands, CoRR,
vol. abs/1101.3068, 2011.
[3] V. R. Cadambe and S. A. Jafar, Interference alignment and the degrees
of freedom of wireless x networks, IEEE transactions on information
theory, vol. 55, no. 9, pp. 38933908, September 2009.
[4] S. A. Jafar, Interference Alignment - A New Look at Signal Dimensions
in a Communication Network, ser. Foundations and Trends in Communications and Information Theory. now, 2010, vol. 7, no. 1, dOI:
10.1561/0100000047.
[5] S. Kannan and P. Viswanath, Capacity of multiple unicast in wireless
networks: A polymatroidal approach, IEEE Transactions on Information
Theory, accepted March 2014.
[6] P. N. Klein, S. A. Plotkin, S. Rao, and E. Tardos, Approximation
algorithms for steiner and directed multicuts, Journal of Algorithms,
vol. 22, no. 2, pp. 241269, 1997.
(15)
840