Next Article in Journal
Maximum-Entropy Method for Evaluating the Slope Stability of Earth Dams
Next Article in Special Issue
Optimization of MIMO Systems Capacity Using Large Random Matrix Methods
Previous Article in Journal
On Extracting Probability Distribution Information from Time Series
Previous Article in Special Issue
Network Coding for Line Networks with Broadcast Channels
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

A Survey on Interference Networks: Interference Alignment and Neutralization

1
School of Computer and Communication Sciences, Ecole Polytechnique Fédérale de Lausanne (EPFL), Lausanne 1015, Switzerland
2
Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, CA 94720, USA
*
Author to whom correspondence should be addressed.
Entropy 2012, 14(10), 1842-1863; https://doi.org/10.3390/e14101842
Submission received: 20 July 2012 / Revised: 6 September 2012 / Accepted: 21 September 2012 / Published: 28 September 2012
(This article belongs to the Special Issue Information Theory Applied to Communications and Networking)

Abstract

:
In recent years, there has been rapid progress on understanding Gaussian networks with multiple unicast connections, and new coding techniques have emerged. The essence of multi-source networks is how to efficiently manage interference that arises from the transmission of other sessions. Classically, interference is removed by orthogonalization (in time or frequency). This means that the rate per session drops inversely proportional to the number of sessions, suggesting that interference is a strong limiting factor in such networks. However, recently discovered interference management techniques have led to a paradigm shift that interference might not be quite as detrimental after all. The aim of this paper is to provide a review of these new coding techniques as they apply to the case of time-varying Gaussian networks with multiple unicast connections. Specifically, we review interference alignment and ergodic interference alignment for multi-source single-hop networks and interference neutralization and ergodic interference neutralization for multi-source multi-hop networks. We mainly focus on the “degrees of freedom” perspective and also discuss an approximate capacity characterization.

Graphical Abstract

1. Introduction

Characterizing the capacity of Gaussian networks is a fundamental problem in network information theory. (Unless otherwise specified, we assume Gaussian networks having a single antenna at each node throughout the paper.) Unfortunately, even for the simplest setting of a single source and a single destination with a single relay, the capacity is not completely characterized for general channel parameters [1]. Recent applications of interest involve networks with multiple source–destination (SD) pairs (which we will also refer to as multiple “sessions”), and the capacity characterization appears to be much more challenging for these networks. One of the main difficulties for multi-source networks arises from the fact that the transmission of other sessions acts as interference and, as a result, how to efficiently manage interference from other sessions is of crucial importance for overall network performance. Exact capacity results being notoriously difficult to obtain, many researchers have recently studied approximate capacity characterizations in the shape of so-called “degrees of freedom” for multi-source networks. Degrees of freedom capture the behavior of capacity as the signal-to-noise ratio (SNR) becomes large, and they are believed to provide insight into the fundamental characteristics of multi-source networks. In recent years, there has been significant progress on this area and new coding paradigms have emerged. The aim of this paper is to review recent achievements relating to the capacity characterization of multi-source networks.

1.1. Traditional Approaches

For multi-source networks consisting of multiple SD pairs, the dominant feature is the interference between multiple sessions. In existing wireless communication systems, two approaches of dealing with interference are predominant. On the one hand, in some systems, interference is avoided by orthogonalization, meaning for example that at any given point in time (or frequency), only a single transmitter is active. On the other hand, interference is sometimes ignored and thus, treated as additional noise, meaning that communication strategies are employed that can deal with an increased noise level. These simple strategies have widely been adapted to cell planning in cellular systems and collision avoidance and detection protocols in media access control.
From a fundamental perspective, however, these two approaches are insufficient to attain optimal performance. It was proved in [2] that decoding interference first and then decoding the intended message can enlarge an achievable rate region of the 2-user interference channel depicted in Figure 1, compared with orthogonalization and treating interference as additional nose when the cross channel gains | h 21 | 2 and | h 12 | 2 are large enough. For example, destination 1 first decodes W 2 , then reconstructs the full signal transmitted by transmitter 2 and subtracts this interference signal from the received signal. Thus, destination 1 has removed all interference from the other transmitter and can now decode W 1 . In the same manner, destination 2 first decodes W 1 and removes all interference. More generally, each message can be divided into common and private messages, i.e., W 1 = ( W 1 c , W 1 p ) and W 2 = ( W 2 c , W 2 p ) , and each destination can decode a part of interfering message. That is, destination 1 decodes ( W 1 c , W 1 p , W 2 c ) and destination 2 decodes ( W 2 c , W 2 p , W 1 c ) [3]. Recently, this rate splitting with decoding a part of interfering message has been shown to achieve the capacity of the 2-user interference channel to within one bit/sec/Hz regardless of the channel parameters and SNR [4]. It was also shown in [5] that decoding interference can significantly improve the expected sum rate in medium access control with two sources, compared with orthogonalization and treating inference as noise. These results suggest that decoding a part of the interfering message performs well for many important classes of two-user communication systems.
Figure 1. Two-user interference channel, where source S k wishes to send an independent message W k to destination D k .
Figure 1. Two-user interference channel, where source S k wishes to send an independent message W k to destination D k .
Entropy 14 01842 g001

1.2. New Paradigms

As will be explained later, the traditional approaches, i.e., orthogonalization, treating as noise, and interference decoding, turn out to be significantly suboptimal for general multi-source networks. In the seminal work [6,7], interference alignment has been proposed to achieve the optimal sum degrees of freedom of K / 2 for the K-user Gaussian interference channel with time-varying channel coefficients, which minimizes the overall interference space by aligning multiple interfering signals from the unintended sources at each destination. Considering that orthogonalization (such as time-sharing between the SD pairs) only provides 1 degree of freedom, interference alignment significantly improves the degrees of freedom of the K-user interference channel, especially for large K. The concept of interference alignment has been successfully adapted to various network environments such as X networks [7,8], multiple-input multiple-output (MIMO) interference channels [9], cellular downlink and uplink [10,11], interference channels with cooperation and general message demands [12,13,14], etc.
A different strategy of interference alignment was developed in [15] under the name of ergodic interference alignment. This approach is more amenable to analysis. It has not only provided a simpler proof of the K / 2 degrees of freedom attainable for the K-user interference channel, but also to a tighter characterization of capacity. It has also been extended to various network environments. For multi-source single-hop networks, it appears that some form of “interference alignment” is required when the number of SD pairs is more than two.
Following up on these successes for single-hop networks, more recent and emerging work has considered multi-source multi-hop networks. For multi-source multi-hop networks, interference can be not only aligned but also cancelled or partially cancelled through multiple paths [16,17], which is referred to as interference neutralization. It was pointed out in [16] that for the K-user 2-hop network with L relays, interference can completely be neutralized if L K ( K - 1 ) + 1 . Recently developed interference neutralization with symbol extension has tightened the required number of relays, and as a result, characterizes the optimal sum degrees of freedom of the 2-user 2-hop network with 2 relays [18].
Although the degrees of freedom characterizes the capacity to within o ( log SNR ) bits/sec/Hz, this gap can be dominant depending on the operational regime of a network. (For positive functions f ( x ) and g ( x ) , f ( x ) = o ( g ( x ) ) means that for every positive constant ϵ there exists a constant x 0 such that f ( x ) ϵ g ( x ) for all x x 0 .) When channel coefficients are varying over time, ergodic pairing of particular channel states and then encoding over this paired channel states make interference aligned or neutralized in a finite SNR regime, which are referred to as ergodic interference alignment [15] and ergodic interference neutralization [19,20,21], respectively. These ergodic interference alignment and neutralization techniques provide explicit rate expressions for any finite SNR and have recently been verified to characterize an approximate ergodic capacity to within a constant number of bits/sec/Hz, regardless of SNR for some classes of multi-source networks.
The basic purpose of this paper is to provide a review of recently developed new coding techniques and related work. In Section 2, we consider multi-source single-hop networks and review interference alignment techniques. In Section 3, we consider multi-source multi-hop networks and review interference neutralization techniques. As a performance metric, we mainly focus on the degrees of freedom in Section 2 and Section 3. In Section 4, we discuss some interesting results beyond the degrees of freedom. Finally, we conclude in Section 5.

1.3. Layered Multi-Source Multi-Hop Networks

In this subsection, we formally define multi-source multi-hop networks and the degrees of freedom mainly considered in this paper. Of particular interest in this paper is the general layered multi-source multi-hop network depicted in Figure 2. Each source k wishes to send an independent message W k to destination k over M hop transmission, where k { 1 , , K } . Let K m denote the number of nodes in each layer, where m { 0 , , M } . The nodes in the 0th layer and the nodes in the Mth layer are the sources and destinations, respectively. That is, K = K 0 = K M . For m { 1 , , M } , let X ( m ) [ t ] = { x j ( m ) [ t ] } j { 1 , , K m - 1 } denote the input vector of the set of K m - 1 nodes in the ( m - 1 ) th layer at time t and Y ( m ) [ t ] = { y i ( m ) [ t ] } i { 1 , , K m } denote the output vector of the set of K m nodes in the mth layer at time t. Then the input–output relation of the mth hop at time t is given by
Y ( m ) [ t ] = H ( m ) [ t ] X ( m ) [ t ] + Z ( m ) [ t ]
where H ( m ) [ t ] = { h i j ( m ) [ t ] } i { 1 , , K m } , j { 1 , , K m - 1 } is the complex channel matrix of the mth hop at time t, i.e., the channel matrix from the set of K m - 1 nodes in the ( m - 1 ) th layer to the set of K m nodes in the mth layer, and Z ( m ) [ t ] = { z i ( m ) [ t ] } i { 1 , , K m } is the additive noise vector of the mth hop at time t. We assume that the elements of Z ( m ) [ t ] are independent and identically distributed (i.i.d.) drawn from the zero-mean and unit-variance circularly symmetric complex Gaussian distribution CN ( 0 , 1 ) . Each node should satisfy the average power constraint P during the transmission, i.e., E [ | x j ( m ) [ t ] | 2 ] P for all j { 1 , , K m - 1 } and m { 1 , , M } . Notice that if M = 1 then the considered model coincides with the K-user interference channel.
Figure 2. Layered multi-source multi-hop networks, where S k and D k denote the kth source and its destination, respectively.
Figure 2. Layered multi-source multi-hop networks, where S k and D k denote the kth source and its destination, respectively.
Entropy 14 01842 g002
Unless otherwise specified, we will assume that the channel coefficients are i.i.d. drawn from a continuous function f ( x ) , x C , and also independent over time. That is, the probability density function of H ( m ) [ t ] is given as f H ( m ) [ t ] ( H ) = i , j f ( h i j ) , where H = { h i j } . The channel coefficients are assumed to be revealed to every node in the network.
Throughout the paper, we will deal with the capacity (or approximate capacity) and the degrees of freedom. For this, we briefly introduce the definitions of the achievable rate and achievable degrees of freedom. Let W k be the message of source k uniformly distributed over { 1 , , 2 n R k } , where n denotes the block length. A rate tuple ( R 1 , , R K ) is said to be achievable if there exists a sequence of ( 2 n R 1 , , 2 n R K , n ) codes such that the probabilities of error for W 1 to W K converge to zero as n increases. For an achievable sum rate k = 1 K R k , the corresponding achievable sum degrees of freedom is defined as
DoF : = lim P k = 1 K R k log P
Finally, the sum capacity is defined as the maximum achievable sum rate and the optimal degrees of freedom is the maximum achievable sum degrees of freedom.
Remark 1 (Notation) We will denote matrices or vectors by uppercase letters. We will also denote time-extended matrices and time-extended vectors by boldface uppercase letters and boldface lowercase letters, respectively. Specifically, for a sequence of { a [ 1 ] , , a [ T ] } , we define a : = [ a [ 1 ] , , a [ T ] ] T and A : = diag ( a [ 1 ] , , a [ T ] ) , where ( · ) T denotes the transpose and diag ( a [ 1 ] , , a [ T ] ) denotes the diagonal matrix with a [ i ] as the ( i , i ) th element.
To describe the ergodic interference alignment and ergodic interference neutralization schemes, we find it convenient to introduce the notation H G to indicate that the two matrices H and G are almost equal, in the following sense: Consider a long sequence of matrices H [ t ] , drawn i.i.d. according to a certain probability density function. We partition this long sequence judiciously into pairs of matrices ( H [ t ] , H [ t + τ ] ) such that H [ t + τ ] and F ( H [ t ] ) , where F ( · ) is a cleverly chosen mapping to be discussed below, are almost equal. The main argument is that by considering a longer and longer sequence of matrices, we can make these two matrices arbitrarily close (provided the partitioning into pairs is done optimally). The formal and technical details of this argument can be found in [15].

2. Single-Hop Networks: Interference Alignment

In this section, we consider a single-hop network, which corresponds to the case where M = 1 in Section 1.3. For notational convenience, we will omit the superscript m in Equation (1) if M = 1 . That is, the input–output relation is given by
Y [ t ] = H [ t ] X [ t ] + Z [ t ]
where X [ t ] = { x j [ t ] } , Y [ t ] = { y i [ t ] } , H [ t ] = { h i j [ t ] } , and Z [ t ] = { z i [ t ] } , which corresponds to the K-user interference channel.

2.1. Signal-Space Interference Alignment

Interference alignment has been observed in the context of the index coding problem [22] and the 2-user X network [7]. A general interference alignment scheme for the K-user interference channel has been developed by Cadambe and Jafar [6] showing that the optimal DoF = K / 2 is achievable. The result is quite encouraging since it implies that interference is not a fundamental limiting factor for multi-source single-hop networks.
For a conceptual understanding, consider the 3-user interference channel in Figure 3 in which a transmit signal will be received by each destination with few symbol delay according to its propagation distance (see also [6, Appendix I]). For example, destination 1 will receive the intended signal from source 1 with 2 symbol delay, but will receive the interference signals from sources 2 and 3 with 1 and 3 symbol delays, respectively. Therefore, if each source transmits only using odd time, t { 1 , 3 , 5 , } , then each destination is able to receive its interference-free intended signal at odd time, since all interference signals from the other sources will arrive only at even time. That is, interference will be aligned within even time and, as a result, each SD pair can achieve 1 / 2 degrees of freedom, which provides DoF = 3 / 2 . This achievability is strictly better than DoF = 1 achievable by time-sharing between SD pairs. Notice that half of the signal dimensions are used for receiving the intended signal and the other half of the signal dimensions are used for aligning K - 1 interference signals.
The interference alignment technique described above is only possible when the nodes are employed at specific locations, e.g., as shown in Figure 3. In the seminal work [6], Cadambe and Jafar showed that linear interference alignment, i.e., signal space alignment after time extension and linear beamforming, can be done for the general K-user interference channel, which holds almost surely if the channel coefficients are i.i.d. drawn from a continuous function as assumed in Section 1.3. The same principle in the example in Figure 3 can asymptotically be achieved by linear interference alignment as the size of symbol extension increases. That is, almost half of the signal dimensions are used for receiving the intended signal and the rest of the signal dimensions are used for aligning interference at each destination, leading to the fact that DoF = K / 2 is achievable.
Figure 3. The 3-user interference channel with propagation delay, where the first dotted circle from each source denotes the distance experiencing one-symbol propagation delay, the second dotted circle denotes the distance experiencing two-symbol propagation delay, etc.
Figure 3. The 3-user interference channel with propagation delay, where the first dotted circle from each source denotes the distance experiencing one-symbol propagation delay, the second dotted circle denotes the distance experiencing two-symbol propagation delay, etc.
Entropy 14 01842 g003
To illustrate the strategy of linear interference alignment, we quote an example given in [6, Section III. C], establishing the achievability of DoF = 4 / 3 for the 3-user interference channel with 3 symbol extension. Figure 4 illustrates linear beamforming at each source and the received beams experiencing the channel coefficients at each destination. Here, H i j denotes diag ( h i j [ 1 ] , h i j [ 2 ] , h i j [ 3 ] ) and v l denotes the 3 × 1 transmit beam vector transmitted over t { 1 , 2 , 3 } . To send two symbols s 1 and s 2 , source 1 uses two transmit beams v 1 and v 2 . On the other hand, sources 2 and 3 send s 3 and s 4 using v 3 and v 4 , respectively. That is, x 1 = v 1 s 1 + v 2 s 2 , x 2 = v 3 s 3 , and x 3 = v 4 s 4 . Therefore, if the following conditions are satisfied, then s 1 to s 4 can be extracted with nonzero (effective) channel gains:
H 12 v 3 = H 13 v 4 : Interference alignment at destination  1
H 21 v 1 = H 23 v 4 : Interference alignment at destination  2
H 31 v 2 = H 32 v 3 : Interference alignment at destination  3
span ( H 11 v 1 , H 11 v 2 , H 12 v 3 ) = C 3 × 3 : Linearly independence at destination  1
span ( H 21 v 1 , H 21 v 2 , H 22 v 3 ) = C 3 × 3 : Linearly independence at destination  2
span ( H 31 v 1 , H 31 v 2 , H 33 v 4 ) = C 3 × 3 : Linearly independence at destination  3
where s p a n ( · ) denotes the vector space spanned by a set of vectors.
For an arbitrarily chosen v 3 , we can set
v 4 = H 13 - 1 H 12 v 3
v 1 = H 21 - 1 H 23 v 4 = H 21 - 1 H 23 H 13 - 1 H 12 v 3
v 2 = H 31 - 1 H 32 v 3
which satisfy the alignment conditions (4a) to (4c). Since the beamforming vectors were set independent of the direct channel matrices H 11 , H 22 , and H 33 , we can guarantee almost surely that H 12 v 3 s p a n ( H 11 v 1 , H 11 v 2 ) , H 22 v 3 s p a n ( H 21 v 1 , H 21 v 2 ) , and H 33 v 4 s p a n ( H 31 v 1 , H 31 v 2 ) for genetic channel coefficients, i.e., when the channel coefficients are i.i.d. drawn from a continuous distribution. Similarly, v 1 and v 2 in Equations (5b) and (5c) are linearly independent almost surely, which leads to H 11 v 1 s p a n ( H 11 v 2 ) , H 21 v 1 s p a n ( H 21 v 2 ) , and H 31 v 1 s p a n ( H 31 v 2 ) almost surely. Therefore, we can guarantee almost surely that the beamforming vectors in Equations (5a)–(5c) also satisfy the linearly independence conditions in Equations (4d)–(4f).
Figure 4. Linear interference alignment for the 3-user interference channel with 3 symbol extension.
Figure 4. Linear interference alignment for the 3-user interference channel with 3 symbol extension.
Entropy 14 01842 g004
Although the above example shows that DoF = 4 / 3 is achievable with 3 symbol extension for the 3-user interference channel, it is still hard to capture the main idea of achieving the optimal DoF = 3 / 2 , as the size of symbol extension increases by this example. For the general K-user interference channel, Cadambe and Jafar proposed linear interference alignment and showed that the optimal DoF = K / 2 is asymptotically achievable as the size of symbol extension increases. We refer to [6, Appendix III] for the detailed proof.
Remark 2 (Extensions) Linear interference alignment has been widely and successfully adapted to the interference channel with multiple antennas [9], cooperation [12,13], general message demand [8,14], etc. It also has potential for distributed storage problem [23,24] and index coding problem [25].
Remark 3 (Complexity and Delay) For the K-user interference channel, the optimal DoF = K / 2 is achievable as the size of symbol extension T tends to infinity. Specifically,
DoF = ( T + 1 ) N + ( K - 1 ) T N ( T + 1 ) N + T N
is achievable with T symbol extension, where N = ( K - 1 ) ( K - 2 ) - 1 [6, Appendix III]. In practice, however, due to the system complexity and delay, it is hard to let T be arbitrarily large and, thus, the rate of convergence in Equation (6) to the optimal K / 2 can be critical for practical systems. Choi et al. [26] addressed this issue and proposed another beamforming design that improves the convergence rate of Equation (6).

2.2. Ergodic Interference Alignment

The K-user interference channel with time-varying channel coefficients, which corresponds to the network in Section 1.3 with M = 1 , is in general non-separable [27,28]. This means that coding jointly over multiple channel states can generally outperform coding separately in each individual channel state. For instance, suppose the 2-user inference channel in Figure 5 in which
H [ t ] = 1 1 1 1 for  t { 1 , 3 , 5 , } 0 - 1 - 1 0 for  t { 2 , 4 , 6 , }
If we apply coding for odd time and even time separately, then it is immediately clear that we have the upper bound DoF 1 / 2 : the rank of H [ t ] is one for odd t (thus one degree of freedom is achievable for this channel state) and the direct channel coefficients in H [ t ] are zeros for even t (thus zero degree of freedom is achievable for this channel state). However, by transmitting the same signal twice over two adjacent time indices, i.e., X [ 1 ] = X [ 2 ] and X [ 3 ] = X [ 4 ] , and so on, interference can first be decoded at each destination based on { Y [ 2 ] , Y [ 4 ] , } and its effect can then be subtracted in { Y [ 1 ] , Y [ 3 ] , } . Then each destination can decode its message from the interference-free received signals { Y [ 1 ] , Y [ 3 ] , } . This simple joint coding scheme achieves a rate of 1 2 log 2 ( 1 + P ) for each SD pair, proving that we can attain DoF = 1 . Therefore, this joint coding scheme is strictly better than any separation-based coding scheme.
Figure 5. Example of the 2-user interference channel having two channel states.
Figure 5. Example of the 2-user interference channel having two channel states.
Entropy 14 01842 g005
There is a second interesting observation concerning this simple example. Namely, if each receiver simply adds up two adjacent received signals, i.e., Y [ 1 ] + Y [ 2 ] , Y [ 3 ] + Y [ 4 ] , and so on, we observe that the interference directly disappears. This is due to the fact that in our simple example, H [ t ] + H [ t + 1 ] is the identity matrix.
This idea can be pushed further, leading to the concept of ergodic interference alignment. For the K-user finite field interference channel (with time-varying channel coefficients), this was independently proposed by Nazer et al. [29] and Jeon and Chung [30] in two slightly different versions. When the channel coefficients are drawn from a continuous function (such as, for example, Rayleigh fading), it is not immediately clear that one can again align channel matrices as in the above simple example. Nevertheless, using a channel quantization argument, for the K-user Gaussian interference channel (with time-varying channel coefficients), Nazer et al. [15,29] showed the achievability of
R k = 1 2 E [ log ( 1 + 2 | h k k [ t ] | 2 P ) ]
for all k { 1 , , K } , where the expectation is taken over the channel coefficients. To explain the achievability, for a given channel state H = { h i j } , define F ( H ) = { f i j } such that f i j = h i j if i = j and f i j = - h i j if i j for all i , j { 1 , , K } . Therefore,
H + F ( H ) = diag ( 2 h 11 , 2 h 22 , , 2 h K K )
The same principle explained in Figure 5 can be applied by transmitting the same signal twice through two particularly paired channel states, approximately given by H and F ( H ) . Suppose that the sources transmit X [ t ] at time t. The sources transmit X [ t ] repeatedly with an appropriate delay τ, i.e., X [ t + τ ] = X [ t ] , such that H [ t + τ ] is approximately given as H [ t + τ ] F ( H [ t ] ) . Then the destinations add two received signals Y [ t ] and Y [ t + τ ] , which gives
Y [ t ] + Y [ t + τ ] ( H [ t ] + F ( H [ t ] ) ) X [ t ] + Z [ t ] + Z [ t + τ ]
= diag ( 2 h 11 [ t ] , 2 h 22 [ t ] , , 2 h K K [ t ] ) X [ t ] + Z [ t ] + Z [ t + τ ]
In order to utilize almost all channel instances for transmission, the probability density functions between two paired channels should be the same. That is,
f H [ t ] ( H ) = f H [ t ] ( F ( H ) )
should be satisfied for all H C K × K . Under i.i.d. channel coefficients as assumed in Section 1.3, this condition is satisfied if f ( h ) = f ( - h ) for all h C , which holds for a broad class of channel distributions. Therefore, assuming that f ( h ) = f ( - h ) , almost all channel realizations can be utilized for this ergodic pairing as the block length n increases. More specifically, this statement can be verified by quantization of channel space and then pairing quantized channel spaces based on the function F ( H ) . From the strong typicality, the numbers of channel instances belonging to the paired quantized channel spaces are almost the same as the block length n increases, since Equation (11) are the same for all H C K × K . For the rigorous proof, we need to carefully consider channel quantization and randomness of channel realizations. We omit the detailed proof here and refer to [15, Theorem 2]. From Equation (10), the signal-to-noise-interference ratio (SINR) at destination k is approximately given by 4 | h k k [ t ] | 2 P 2 = 2 | h k k [ t ] | 2 P . Hence we can show that Equation (8) is achievable.
Remark 4 (Approximate Ergodic Capacity) From Equation (8), this new coding strategy provides at least 1 / 2 of its interference-free ergodic capacity at any P since it makes interference aligned at a finite P. This property leads to characterize the ergodic capacity to within a constant number of bits/sec/Hz for some important class of channel distributions, which will be discussed in Section 4.1.
Remark 5 (Extensions) Ergodic interference alignment has been extended to a certain class of general message demand and 2-user X channel (see [15, Theorems 4,5]). It can also be applied to communication with secrecy constraints [31].
Remark 6 (Complexity and Delay) For ergodic interference alignment, even though the transmission itself is a simple repeated transmission with some delay, ergodic pairing of channel instances satisfying arbitrarily small quantization error requires unbounded buffer or storage at each node and also causes unbounded delay. The work [32] studied a delay–rate trade-off achievable by ergodic interference alignment and also modified the original ergodic interference alignment scheme [15] to enhance the delay–rate trade-off.

2.3. Other Interference Alignment Techniques

We have discussed two recently developed techniques to attain interference alignment. Both techniques rely on time-varying channel coefficients in order to obtain a sufficiently rich environment to allow aligning the interference signals. Other techniques have also been studied in the literature.
Most notably, it was shown that interference alignment can also be attained on fixed (not time-varying) interference channels. In [33], asymmetric complex signaling has been used to show that DoF = 6 / 5 and DoF = 4 / 3 are achievable for the 3-user interference channel and 2-user X channel respectively. It was shown later that for the general K-user interference channel, the optimal DoF = K / 2 is achieved via a framework using rational dimensions, i.e., signal scaling alignment, and we refer to [34,35] for details.

3. Multi-Hop Networks: Interference Neutralization

In this section, we consider multi-hop networks of the type defined in Section 1.3 (with M 2 ). For multi-source multi-hop networks, interference can be cancelled by aligning multiple paths through a network, a technique referred to as interference neutralization. Proper use of such interference neutralization is the key for an approximate capacity [17] and the degrees of freedom characterization [18,19] of multi-source multi-hop networks.
Figure 6 illustrates the general two-hop network, i.e., M = 2 with K 0 = K 2 = K and K 1 = L in Section 1.3. Assume that relay i amplifies its received signal y i ( 1 ) [ t ] with amplification factor α i [ t ] and forwards it to the destinations as shown in Figure 6. That is, x i ( 2 ) [ t ] = α i [ t ] y i ( 1 ) [ t ] . Then, the interference from source 1 to destination 2 is neutralized if we choose the coefficients { α i [ t ] } such that
i = 1 L h 2 i ( 2 ) [ t ] α i [ t ] h i 1 ( 1 ) [ t ] = 0
is satisfied. We note that this is a linear equation with respect to the coefficients { α i [ t ] } . Now, clearly, it is not sufficient to only neutralize the interference from source 1 to destination 2. Rather, we want to completely neutralize all interference from every source to every destination. This leads to K ( K - 1 ) linear constraints of the above form. There are L coefficients { α i [ t ] } . Hence, to neutralize all interference in this direct fashion, a necessary condition is L K ( K - 1 ) , and a sufficient condition is L K ( K - 1 ) + 1 . Thus, if L K ( K - 1 ) + 1 , we can find nonzero { α i [ t ] } to neutralize all the interference by amplify-and-forward relaying [16]. Thus, as long as the resulting equivalent gains from each source to its corresponding destination are nonzero for this choice of coefficients, we can attain K degrees of freedom. It is also clear that it is not possible to attain more than K degrees of freedom, and thus, this is optimal in a degree-of-freedom sense.
Figure 6. Amplify-and-forward-based interference neutralization for two-hop networks.
Figure 6. Amplify-and-forward-based interference neutralization for two-hop networks.
Entropy 14 01842 g006
What to do if the number of relays L is comparable to the number of SD pairs K , hence L < K ( K - 1 ) + 1 ? In this case, it is impossible to select the coefficients { α i [ t ] } in such a way as to neutralize all interference. More precisely, it is not difficult to show that in general, for the above strategy, any choice of the coefficients { α i [ t ] } will lead to a number of degrees of freedom that is strictly smaller than K . We note that a simple cut-set upper bound for the general two-hop network in Figure 6 evaluates to K degrees of freedom as long as L K , and thus, one interesting question is whether there is a different strategy that can attain K degrees of freedom. The general answer to this question is open, but for some important classes of networks, the optimal DoF = K is achievable using the recently developed aligned interference neutralization and ergodic interference neutralization techniques [18,19]. This is explained in detail in the following two subsections.

3.1. Neutralization with Symbol Extension

Let us now consider the special case where M = 2 with K 0 = K 1 = K 2 = 2 in Section 1.3. This model is also referred to as the 2 × 2 × 2 network in the literature. For this network, the cut-set bound evaluates to 2 degrees of freedom, yet the simple strategy outlined above does not permit to completely neutralize interference, and hence, fails to attain 2 degrees of freedom. More specifically, with reference to Figure 6, in order to neutralize interference completely, we need to choose the coefficients { α i [ t ] } to satisfy
h 21 ( 1 ) [ t ] α 1 [ t ] h 11 ( 1 ) [ t ] + h 22 ( 1 ) [ t ] α 2 [ t ] h 21 ( 1 ) [ t ] = 0
h 11 ( 1 ) [ t ] α 1 [ t ] h 12 ( 1 ) [ t ] + h 12 ( 1 ) [ t ] α 2 [ t ] h 22 ( 1 ) [ t ] = 0
which are two linear equations with two variables, α 1 [ t ] and α 2 [ t ] . For generic channel coefficients, however, α 1 [ t ] = α 2 [ t ] = 0 is the only solution that satisfies Equation (13), which prevents communication completely.
Progress can be made by considering so-called symbol extension, by which we mean that we do not treat every time instant the same, and that the coefficients { α i [ t ] } are allowed to vary over time. Specifically, it was shown in [18, Section III. D] that the optimal DoF = 2 is asymptotically achievable for the 2 × 2 × 2 network by symbol extension and as the size of symbol extension increases. In particular, we combine T consecutive channel inputs into a “supersymbol” and apply a generalized amplify-and-forward relaying strategy at relay i by setting x i ( 1 ) = A i y i ( 1 ) , where A i denotes the T × T matrix consisting of T 2 amplification factors (the coefficients { α i [ t ] } of the relay for the T channel uses). The main trick is now that source 1 sends T symbols with arbitrarily chosen T transmit beams (vectors of length T), but source 2 only sends T - 1 symbols using T - 1 arbitrarily chosen transmit beams (vectors of length T). Thus, a total of 2 T - 1 symbols is transmitted over T channel uses. As we will now show, all of these 2 T - 1 symbols are received without any interference by their respective receivers. Specifically, in order to avoid interference, we have to satisfy T 2 + T ( T - 1 ) equations that are linear in terms of the entries of the two matrices of relaying coefficients A 1 and A 2 . However, these matrices have a total of 2 T 2 entries that can be selected freely, and since 2 T 2 > T 2 + T ( T - 1 ) , we are guaranteed to have a solution that leads to complete interference neutralization (except in the case of degenerate channel coefficients, but in that case, the cut-set bound can also be tightened; we omit a more detailed discussion of this less interesting case here). Therefore DoF = 2 T - 1 T is achievable via symbol extension of length T, and hence, lim T DoF = 2 is achievable in the limit.
A more systematic way of interference neutralization with symbol extension has also been proposed in [18, Section III. A], referred to as aligned interference neutralization. The underlying technique is linear interference alignment introduced in Section 2.1, but the purpose of interference alignment is to neutralize interference at the destinations. To explain the notion of aligned interference neutralization, we quote an example given in [18, Section I. E] achieving DoF = 3 / 2 with 2 symbol extension, which is illustrated in Figure 7. Source 1 sends two symbols s 1 and s 2 using two transmit beams v 1 and v 2 and source 2 sends one symbol s 3 using v 3 . For an arbitrarily chosen v 3 , setting v 2 = ( H 11 ( 1 ) ) - 1 H 12 ( 1 ) v 3 and v 1 = ( H 21 ( 1 ) ) - 1 H 22 ( 1 ) v 3 provides interference alignment in Figure 7 at the end of the first hop:
H 11 ( 1 ) v 2 = H 12 ( 1 ) v 3 : Interference alignment at relay  1
H 21 ( 1 ) v 1 = H 22 ( 1 ) v 3 : Interference alignment at relay  2
Hence, after the first hop, relay 1 can extract s 1 and s 2 + s 3 and relay 2 can extract s 2 and s 1 + s 3 . Then relay 1 sends s 1 and s 2 + s 3 using v 4 and v 5 and relay 2 sends s 1 + s 3 using v 6 . Again, for an arbitrarily chosen v 6 , setting v 5 = - ( H 11 ( 2 ) ) - 1 H 12 ( 2 ) v 6 and v 4 = - ( H 21 ( 2 ) ) - 1 H 22 ( 2 ) v 6 provides interference neutralization in Figure 7 at the end of the second hop:
H 11 ( 2 ) v 5 = - H 12 ( 2 ) v 6 : Interference neutralization at destination  1
H 21 ( 2 ) v 4 = - H 22 ( 2 ) v 6 : Interference neutralization at destination  2
Therefore, destination 1 can extract s 1 and s 2 and destination 2 can extract s 3 with nonzero (effective) channel gains and DoF = 3 / 2 is achievable.
Figure 7. Aligned interference neutralization for the 2 × 2 × 2 network with 2 symbol extension.
Figure 7. Aligned interference neutralization for the 2 × 2 × 2 network with 2 symbol extension.
Entropy 14 01842 g007
For the general 2 × 2 × 2 network, Gou et al. proposed aligned interference neutralization and showed the optimal DoF = 2 is asymptotically achievable as the size of symbol extension increases. We refer to [18, Section III. A] for the detailed proof.
Remark 7 (Extensions) Interference neutralization with symbol extension has been extended to the general 2-user network [36] and 2-user X network [37], and also to the case of multi-antenna nodes [38]. However, for generic channel coefficients, the optimal degrees of freedom characterization is in general open for more than two users. For instance, for the model defined in Section 1.3 with M = 2 with K 0 = K 1 = K 2 = 3 , also referred to as the 3 × 3 × 3 network, the optimal DoF is still unknown.

3.2. Ergodic Interference Neutralization

To start our discussion of ergodic interference neutralization, we observe that multi-hop networks consisting of multiple SD pairs are in general non-separable. This should not come as a surprise and parallels our observation for single-hop networks. For instance, consider the 2 × 2 × 2 network in Figure 8 in which
H ( 1 ) [ t ] = 1 0 0 1 and  H ( 2 ) [ t ] = 1 1 1 0 for  t { 1 , 3 , 5 , }
and
H ( 1 ) [ t ] = 0 1 1 - 1 and  H ( 2 ) [ t ] = 1 0 0 1 for  t { 2 , 4 , 6 , }
If we apply coding for odd times and even times separately, then the achievable degrees of freedom cannot exceed DoF 1 : there is no path from source 2 to destination 2 at odd time and from source 1 to destination 1 at even time. By contrast, if we code over both channel instances, we can attain DoF = 2 , which is optimal. To see how we can achieve this performance, we simply let the relays amplify and forward their received signals with one symbol delay, i.e., X ( 2 ) [ t + 1 ] = α [ t ] Y ( 1 ) [ t ] . That way, interference can completely be neutralized at each destination since
H ( 2 ) [ t + 1 ] α [ t ] 0 0 α [ t ] H ( 1 ) [ t ] = α [ t ] 1 0 0 1
for any α [ t ] > 0 satisfying the power constraint P. Therefore, the optimal DoF = 2 is achievable for this case.
Figure 8. Example of the 2 × 2 × 2 network having two channel states.
Figure 8. Example of the 2 × 2 × 2 network having two channel states.
Entropy 14 01842 g008
Under i.i.d. isotropic fading, Jeon et al. showed in [19] that the optimal DoF = K is achievable for K-user K-hop networks with K relays in each layer, i.e., M = K and K m = K for all m { 1 , , K } in Section 1.3. This class of channel distributions includes i.i.d. uniform phase fading and i.i.d. Rayleigh fading as a special case. The basic concept of ergodic interference neutralization is similar to the previous example in Figure 8. Suppose that the sources transmit at time t 1 . For m { 2 , , K } , the relay nodes in the mth hop transmission amplify and forward the corresponding received signal with an appropriate delay t m - t m - 1 > 0 such that the matrix product
H ( K ) [ t K ] H ( 2 ) [ t 2 ] H ( 1 ) [ t 1 ]
becomes approximately a diagonal matrix with nonzero diagonal elements, which means that interference is neutralized at each destination. For i.i.d. isotropic fading, a novel ergodic pairing satisfying this condition has been proposed in [19] based on the unordered singular value decomposition.
To explain the notion of the proposed ergodic interference neutralization in [19], consider the case where K = 3 , i.e., the 3 × 3 × 3 × 3 network. Denote the unordered singular value decomposition of H C 3 × 3 as S ( H ) : = ( U , Σ , V ) , where U is the 3 × 3 left unitary matrix, Σ is the 3 × 3 diagonal matrix with unordered singular values, and V is the 3 × 3 right unitary matrix. Then H can be represented as H = U Σ V , where ( · ) denotes the complex conjugate transpose. Figure 9 illustrates the ergodic pairing rule proposed in [19]. Suppose that the sources transmit at time t 1 and S ( H ( 1 ) [ t 1 ] ) = ( U , diag ( λ 1 , λ 2 , λ 3 ) , V ) . The relays in the second hop amplify and forward at an appropriate time t 2 such that S ( H ( 2 ) [ t 2 ] ) ( W , diag ( λ 2 , λ 3 , λ 1 ) , U ) , where W can be chosen as any arbitrary unitary matrix. Then the relays in the last hop amplify and forward at an appropriate time t 3 such that S ( H ( 3 ) [ t 3 ] ) ( V , diag ( λ 3 , λ 1 , λ 2 ) , W ) . This ergodic pairing satisfies
H ( 3 ) [ t 3 ] H ( 2 ) [ t 2 ] H ( 1 ) [ t 1 ] V λ 3 0 0 0 λ 1 0 0 0 λ 2 W W λ 2 0 0 0 λ 3 0 0 0 λ 1 U U λ 1 0 0 0 λ 2 0 0 0 λ 3 V
= ( λ 1 λ 2 λ 3 ) I ,
where I denotes the identity matrix. Therefore, this pairing satisfies the previous interference neutralization condition. Notice that the probability density functions of the paired channel states are the same for i.i.d. isotropic fading since in this case, f H ( m ) [ t ] ( H ) is only a function of the singular values of H C 3 × 3 . Therefore, similar to ergodic interference alignment, almost all channel realizations can be utilized for this ergodic pairing as the block length n increases. Finally, this scheme makes interference arbitrarily small at each destination, verified from Equation (20) and, as a result, the optimal DoF = 3 is achievable. For general K, we refer to [19, Appendix II] for the achievability proof of the optimal DoF = K .
Figure 9. Ergodic channel pairing based on unordered singular value decomposition.
Figure 9. Ergodic channel pairing based on unordered singular value decomposition.
Entropy 14 01842 g009

4. Beyond Degrees of Freedom

So far, we have discussed recently developed new coding techniques mainly focusing on degrees of freedom of layered multi-source networks. Degrees of freedom are an important performance measure to understand multi-source networks. They characterize capacity to within o ( log P ) bits/sec/Hz, meaning that they characterize capacity up to an (additive) gap that can be arbitrarily large as P increases. In this sense, degrees of freedom are a coarse measure of performance: Depending on the operational regime of a network, this o ( log P ) bits/sec/Hz gap in practice may be critical for overall network performance.
Consequently, several works have recently established tighter bounds on the gap to capacity. In particular, it is interesting to establish a gap that does not depend on P . Several flavors of such studies have been undertaken. For example, one can consider fixed Gaussian networks and strive to establish a gap to capacity that is independent of the channel strengths. For the 2-user interference channel, for instance, time-sharing between the two users can also achieve the optimal DoF = 1 . However, a simple Han–Kobayashi scheme can tighten the gap to within one bit/sec/Hz [4], which provides an arbitrarily larger rate compared to the time-sharing for a certain operational regime and channel parameters. This kind of universal performance guarantee, independent of power P and channel parameters, has actively been studied for Gaussian non-fading networks in [39,40,41,42] and the references therein. A different flavor of such bounds on the gap from capacity concerns the model considered in this paper, namely, time-varying channel models. For those, the goal is to bound the gap to the ergodic capacity, i.e., averaged over all channel states. In the next subsection, we review these results.

4.1. Approximate Ergodic Capacity

We now show how such finite-gap results can be obtained for a certain class of fading networks by ergodic interference alignment and ergodic interference neutralization. These techniques make interference aligned or neutralized for any finite P and, as a result, can tighten the gap from the ergodic capacity to within a constant number of bit/sec/Hz for a broad class of channel distributions, independent of P.
It was shown in [29] that ergodic interference alignment can achieve the ergodic sum capacity of the K-user interference channel for i.i.d. phase fading, i.e., h i j [ t ] = exp ( j θ i j ) in which θ i j is uniformly distributed over [ 0 , 2 π ) . It was also shown in [20] that the same ergodic interference alignment can characterize the ergodic sum capacity assuming no power control to within K 2 log 6 bits/sec/Hz.
We can also tighten the gap to within a constant number of bits/sec/Hz for 2-user 2-hop networks. Recently, the ergodic sum capacity of 2-user 2-hop networks has been characterized to within a constant number of bits/sec/Hz independent of P for a certain class of channel distributions [21]. For the achievability, ergodic interference neutralization has been proposed where the relays are partitioned into several pairs and interference is neutralized separately by each pair of relays.
To introduce the essence of the proposed scheme in [21], consider 2 × 2 L × 2 networks. Let H l ( 1 ) [ t ] denote the 2 × 2 channel matrix at time t from the sources to relays 2 l - 1 and 2 l . Similarly, let H l ( 2 ) [ t ] denote the 2 × 2 channel matrix at time t from the relays 2 l - 1 and 2 l to the destinations. Then H ( 1 ) [ t ] = [ ( H 1 ( 1 ) [ t ] ) T , , ( H L ( 1 ) [ t ] ) T ] T and H ( 2 ) [ t ] = [ H 1 ( 2 ) [ t ] , , H L ( 2 ) [ t ] ] . As pointed out in Section 3.2, a simple amplify-and-forward scheme with an appropriate delay τ can neutralize interference at both destinations if H ( 2 ) [ t + τ ] H ( 1 ) [ t ] approximately becomes a diagonal matrix with nonzero diagonal elements. For a given H = { h i j } C 2 × 2 , define
G ( H ) : = h 22 h 12 h 21 h 11
The relays then amplify and forward with delay τ such that H l ( 2 ) [ t + τ ] is approximately given by G ( H l ( 1 ) [ t ] ) for all l { 1 , , L } . For relaying, relays 2 l - 1 and 2 l amplify and forward with the amplification coefficients γ det ( H l ( 1 ) [ t ] ) * | det ( H l ( 1 ) [ t ] ) | and - γ det ( H l ( 1 ) [ t ] ) * | det ( H l ( 1 ) [ t ] ) | respectively, where γ = P 1 + 2 P is needed to satisfy the average power constraint P. Then the effective channel matrix of the lth block, the channel submatrix from the sources to the destinations through relays 2 l - 1 and 2 l is given by
γ det ( H l ( 1 ) [ t ] ) * | det ( H l ( 1 ) [ t ] ) | H l ( 2 ) [ t + τ ] 1 0 0 - 1 H l ( 1 ) [ t ]
γ det ( H l ( 1 ) [ t ] ) * | det ( H l ( 1 ) [ t ] ) | G ( H l ( 1 ) [ t ] ) 1 0 0 - 1 H l ( 1 ) [ t ]
= γ | det ( H l ( 1 ) [ t ] ) | 1 0 0 - 1
As a result, the overall channel gain from each source to its destination is approximately given by γ 2 ( l = 1 L | det ( H l ( 1 ) [ t ] ) | ) 2 . Here interference is separately neutralized by each pair of relays and at the same time the overall channel gain increases with the number of pairs L because of coherent combining over L pairs. This block-wise ergodic interference neutralization achieves
R k = E log 1 + P γ 2 l = 1 L | det ( H l ( 1 ) [ t ] ) | 2 1 + γ 2 l = 1 L ( | h l , 3 - k , 3 - k ( 1 ) [ t ] | 2 + | h l , k , 3 - k ( 1 ) [ t ] | 2 )
for all k { 1 , 2 } , where H l ( 1 ) [ t ] = [ h l , 1 , 1 ( 1 ) [ t ] , h l , 1 , 2 ( 1 ) [ t ] ] T [ h l , 2 , 1 ( 1 ) [ t ] , h l , 2 , 2 ( 1 ) [ t ] ] T T . Here, the expectation is taken over the channel coefficients. The term γ 2 l = 1 L ( | h l , 3 - k , 3 - k ( 1 ) [ t ] | 2 + | h l , k , 3 - k ( 1 ) [ t ] | 2 ) is due to the noise propagation of amplify-and-forward relaying.
For a broad class of channel distributions, this scheme can characterize the ergodic sum capacity to within a constant number of bits/sec/Hz independent of power P. It was proved in [20, Theorems 2,3] that if L = 1 , i.e., the 2 × 2 × 2 network, the achievable sum rate from Equation (23) characterizes the ergodic sum capacity to within 4 bits/sec/Hz for i.i.d. uniform phase fading and approximately within 4 . 7 bits/sec/Hz for i.i.d. Rayleigh fading. It was also proved in [21, Theorems 2,3] that the gap between the ergodic sum capacity and Equation (23) is less than 4 ( log π - 1 ) , approximately 2.6, for i.i.d. uniform phase fading and 4 ( 4 - log 3 π ) , approximately 3.1, for i.i.d. Rayleigh fading in the limit of large L.

5. Conclusions

In this review paper, we have discussed recently developed interference management techniques: interference alignment, ergodic interference alignment, interference neutralization, and ergodic interference neutralization. These techniques are the key for characterizing the degrees of freedom or an approximate ergodic capacity for many classes of multi-source networks. One drawback of the reviewed coding techniques is to require channel state information (CSI) at the transmitters (CSIT), which is hard to obtain for many practical systems due to feedback overhead and delay. Some works have shown better achievability than the simple time-sharing based on delayed CSIT or even without CSIT for certain cases. However, interference alignment or neutralization with delayed CSIT or imperfect CSIT for general multi-source networks is still not known.
Another aspect is the possibility of interference alignment or neutralization based on lattice codes for general multi-source networks. Recent works have shown that introducing structure over codewords can be helpful to decode the sum of interfering messages and shown significant rate gain compared to decoding every interfering message separately. Generally, we can represent this problem as a function computation and it was demonstrated in certain networks that computation can be helpful for the multi-source communication problem.
Further techniques, beyond the ones discussed here, can be used to obtain interference alignment and neutralization. One technique involves function decoding, i.e., decoding a linear combination of lattice points. This has been studied in [43], referred to as compute-and-forward. As a relay strategy, compute-and-forward naturally extends the decode-and-forward (decoding one or several messages separately) and also includes decoding the sum of lattice points as a special function decoding. It has been shown that compute-and-forward is not only beneficial for function computation but it also outperforms the previous relay strategies such as amplify-and-forward, decode-and-forward, and compress-and-forward for multi-source communication problems [44,45].

Acknowledgments

This work has been supported in part by the European ERC Starting Grant 259530-ComCom.

References

  1. Cover, T.M.; El-Gamal, A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 1979, IT-25, 572–584. [Google Scholar] [CrossRef]
  2. Carleial, A.B. A case where interference does not reduce capacity. IEEE Trans. Inf. Theory 1975, IT-21, 569–570. [Google Scholar] [CrossRef]
  3. Han, T.S.; Kobayashi, K. A new achievable rate region for the interference channel. IEEE Trans. Inf. Theory 1981, IT-27, 49–60. [Google Scholar] [CrossRef]
  4. Etkin, R.H.; Tse, D.N.C.; Wang, H. Gaussian interference channel capacity to within one bit. IEEE Trans. Inf. Theory 2008, 54, 5534–5562. [Google Scholar] [CrossRef]
  5. Minero, P.; Franceschetti, M.; Tse, D.N.C. Random access: An information-theoretic perspective. IEEE Trans. Inf. Theory 2012, 58, 909–930. [Google Scholar] [CrossRef]
  6. Cadambe, V.R.; Jafar, S.A. Interference alignment and degrees of freedom of the K-user interference channel. IEEE Trans. Inf. Theory 2008, 54, 3425–3441. [Google Scholar] [CrossRef]
  7. Maddah-Ali, M.; Motahari, A.; Khandani, A. Communication over MIMO X channels: Interference alignment, decomposition, and performance analysis. IEEE Trans. Inf. Theory 2008, 54, 3457–3470. [Google Scholar] [CrossRef]
  8. Cadambe, V.R.; Jafar, S.A. Interference alignment and the degrees of freedom of wireless X networks. IEEE Trans. Inf. Theory 2009, 54, 3893–3908. [Google Scholar] [CrossRef]
  9. Gou, T.; Jafar, S.A. Degrees of freedom of the K user M × N MIMO interference channel. IEEE Trans. Inf. Theory 2010, 56, 6040–6057. [Google Scholar] [CrossRef]
  10. Suh, C.; Ho, M.; Tse, D.N.C. Downlink interference alignments. IEEE Trans. Commun. 2011, 59, 2616–2626. [Google Scholar] [CrossRef]
  11. Suh, C.; Tse, D.N.C. Interference alignment for cellular networks. In Proceedings of the Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 23–26 September 2008.
  12. Cadambe, V.R.; Jafar, S.A. Degrees of freedom of wireless networks with relays, feedback, cooperation and full duplex operation. IEEE Trans. Inf. Theory 2009, 55, 2334–2344. [Google Scholar] [CrossRef]
  13. Annapureddy, V.S.; El-Gamal, A.; Veeravalli, V.V. Degrees of freedom of interference channels with CoMP transmission and reception. IEEE Trans. Inf. Theory 2012, 58, 5740–5760. [Google Scholar] [CrossRef]
  14. Ke, L.; Ramamoorthy, A.; Wang, Z.; Yin, H. Degrees of freedom region for an interference network with general message demands. IEEE Trans. Inf. Theory 2012, 58, 3787–3797. [Google Scholar] [CrossRef]
  15. Nazer, B.; Gastpar, M.; Jafar, S.A.; Vishwanath, S. Ergodic interference alignment. IEEE Trans. Inf. Theory 2012, 58, 6355–6371. [Google Scholar]
  16. Rankov, B.; Wittneben, A. Spectral efficient protocols for half- duplex fading relay channels. IEEE J. Select. Areas Commun. 2007, 25, 379–389. [Google Scholar] [CrossRef]
  17. Mohajer, S.; Diggavi, S.N.; Fragouli, C.; Tse, D.N.C. Approximate capacity region for a class of relay-interference networks. IEEE Trans. Inf. Theory 2011, 57, 2837–2864. [Google Scholar] [CrossRef]
  18. Gou, T.; Jafar, S.A.; Wang, C.; Jeon, S.-W.; Chung, S.-Y. Aligned interference neutralization and the degrees of freedom of the 2 × 2 × 2 interference channel. IEEE Trans. Inf. Theory 2012, 58, 4381–4395. [Google Scholar] [CrossRef]
  19. Jeon, S.-W.; Chung, S.-Y.; Jafar, S.A. Degrees of freedom region of a class of multisource Gaussian relay networks. IEEE Trans. Inf. Theory 2011, 57, 3032–3044. [Google Scholar] [CrossRef]
  20. Jeon, S.-W.; Wang, C.-Y.; Gastpar, M. Approximate Ergodic Capacity of a Class of Fading 2 × 2 × 2 Networks. In Proceedings of the Information Theory and Applications Workshop, San Diego, CA, USA, 5–10 February 2012.
  21. Jeon, S.-W.; Wang, C.-Y.; Gastpar, M. Approximate ergodic capacity of a class of fading 2-user 2-hop networks. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012.
  22. Birk, Y.; Kol, T. Coding on demand by an informed source (ISCOD) for efficient broadcast of different supplemental data to caching clients. IEEE Trans. Inf. Theory 2006, 52, 2825–2830. [Google Scholar] [CrossRef]
  23. Suh, C.; Ramchandran, K. Exact-repair MDS code construction using interference alignment. IEEE Trans. Inf. Theory 2011, 57, 1425–1442. [Google Scholar] [CrossRef]
  24. Cadambe, V.R.; Jafar, S.A.; Maleki, H.; Ramchandran, K.; Suh, C. Asymptotic interference alignment for optimal repair of MDS codes in distributed storage. IEEE Trans. Inf. Theory 2011. Submitted. [Google Scholar] [CrossRef]
  25. Maleki, H.; Cadambe, V.R.; Jafar, S.A. Index Coding–An Interference Alignment Perspective. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012.
  26. Choi, S.W.; Jafar, S.A.; Chung, S.-Y. On the beamforming design for efficient interference alignment. IEEE Commun. Lett. 2009, 13, 847–849. [Google Scholar] [CrossRef]
  27. Cadambe, V.R.; Jafar, S.A. Parallel Gaussian interference channels are not always separable. IEEE Trans. Inf. Theory 2009, 55, 3983–3990. [Google Scholar] [CrossRef]
  28. Sankar, L.; Shang, X.; Erkip, E.; Poor, H.V. Ergodic Two-User Interference Channels: Is Separability Optimal? In Proceedings of the Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 23–26 September 2008.
  29. Nazer, B.; Gastpar, M.; Jafar, S.A.; Vishwanath, S. Ergodic Interference Alignment. In Proceedings of the IEEE International Symposium on Information Theory, Seoul, Korea, 28 June–3 July 2009.
  30. Jeon, S.-W.; Chung, S.-Y. Capacity of a Class of Multi-Source Relay Networks. In Proceedings of the Information Theory and Applications Workshop, La Jolla, CA, USA, 8–13 February 2009.
  31. Koyluoglu, O.O.; El Gamal, H.; Lai, L.; Poor, H.V. Interference alignment for secrecy. IEEE Trans. Inf. Theory 2011, 57, 3323–3332. [Google Scholar] [CrossRef]
  32. Johnson, O.; Aldridge, M.; Piechocki, R. Delay–Rate Tradeoff in Ergodic Interference Alignment. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012.
  33. Cadambe, V.R.; Jafar, S.A. Interference alignment with asymmetric complex signaling—Settling the Høst-Madsen–Nosratinia conjecture. IEEE Trans. Inf. Theory 2010, 56, 4552–4565. [Google Scholar] [CrossRef]
  34. Motahari, A.; Gharan, S.; Maddah-Ali, M.; Khandani, A. Real interference alignment: Exploiting the potential of single antenna systems. Available online: arxiv.org/abs/0908.2282/ (accessed on 28 September 2012).
  35. Motahari, A.; Gharan, S.; Khandani, A. Real interference alignment with real numbers. Available online: arXiv:cs.IT/0908.1208/ (accessed on 28 September 2012).
  36. Shomorony, I.; Avestimehr, A. S. Two-unicast wireless networks: Characterizing the degrees-of-freedom. IEEE Trans. Inf. Theory 2012. [Google Scholar] [CrossRef]
  37. Wang, C.; Gou, T.; Jafar, S.A. Multiple Unicast Capacity of 2-source 2-sink Networks. In Proceedings of the IEEE Global Telecommunications Conference, Houston, TA, USA, 5–9 December 2011.
  38. Vaze, C.S.; Varanasi, M.K. Beamforming and aligned interference neutralization achieve the degrees of freedom region of the 2 × 2 × 2 MIMO interference network. In Proceedings of the Information Theory and Applications Workshop, San Diego, CA, USA, 5–10 February 2012.
  39. Bresler, G.; Parekh, A.; Tse, D.N.C. The approximate capacity of the many-to-one and one-to-many Gaussian interference channels. IEEE Trans. Inf. Theory 2010, 56, 4566–4592. [Google Scholar] [CrossRef]
  40. Nam, W.; Chung, S.-Y.; Lee, Y.H. Capacity of the Gaussian two-way relay channel to within 1 2 bit. IEEE Trans. Inf. Theory 2010, 56, 5488–5494. [Google Scholar] [CrossRef]
  41. Avestimehr, A.S.; Diggavi, S.N.; Tse, D.N.C. Wireless network information flow: A deterministic approach. IEEE Trans. Inf. Theory 2011, 57, 1872–1905. [Google Scholar] [CrossRef]
  42. Lim, S.H.; Kim, Y.-H.; El Gamal, A.; Chung, S.-Y. Noisy network coding. IEEE Trans. Inf. Theory 2011, 57, 3132–3152. [Google Scholar] [CrossRef]
  43. Nazer, B.; Gastpar, M. Compute-and-forward: Harnessing interference through structured codes. IEEE Trans. Inf. Theory 2011, 57, 6463–6486. [Google Scholar] [CrossRef]
  44. Niesen, U.; Nazer, B.; Whiting, P. Computation alignment: Capacity approximation without noise accumulation. In Proceedings of the Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, 28–30 September 2011.
  45. Ordentlich, O.; Erez, U.; Nazer, B. The approximate sum capacity of the symmetric Gaussian K-user interference channel. In Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, 1–6 July 2012; pp. 2072–2076.

Share and Cite

MDPI and ACS Style

Jeon, S.-W.; Gastpar, M. A Survey on Interference Networks: Interference Alignment and Neutralization. Entropy 2012, 14, 1842-1863. https://doi.org/10.3390/e14101842

AMA Style

Jeon S-W, Gastpar M. A Survey on Interference Networks: Interference Alignment and Neutralization. Entropy. 2012; 14(10):1842-1863. https://doi.org/10.3390/e14101842

Chicago/Turabian Style

Jeon, Sang-Woon, and Michael Gastpar. 2012. "A Survey on Interference Networks: Interference Alignment and Neutralization" Entropy 14, no. 10: 1842-1863. https://doi.org/10.3390/e14101842

Article Metrics

Back to TopTop