Information Theory of Wireless Networks: A Deterministic Approach David Tse Wireless Foundations U.C. Berkeley CISS 2008 March 21, 2008 Joint work with Salman Avestimehr, Guy Bresler, Suhas Diggavi, Abhay Parekh. The Holy Grail • Shannon’s information theory provides the basis for all modern-day communication systems. • His original theory was point-to-point. • After 60 years we are still very far away from generalizing the theory to networks. • We propose an approach to make progress in the context of wireless networks. Modeling the Wireless Medium • broadcast • superposition • high dynamic range in channel strengths between different nodes • Basic model: additive Gaussian channel: Gaussian Network Capacity: What We Know Tx Rx point-to-point (Shannon 48) C = log2 (1 + SNR) Tx 1 Rx1 Rx Tx 2 multiple-access (Alshwede, Liao 70’s) Tx Rx 2 broadcast (Cover, Bergmans 70’s) What We Don’t Know Unfortunately we don’t know the capacity of most other Gaussian networks. Tx 1 Rx 1 Tx 2 Rx 2 Interference (Best known achievable region: Han & Kobayashi 81) Relay S relay D (Best known achievable region: El Gamal & Cover 79) 30 Years Have Gone by….. We are still stuck. How to make progress? It’s the model. • Shannon focused on noise in point-to-point communication. • But many wireless networks are interference rather than noise-limited. • We propose a deterministic channel model emphasizing interaction between users’ signals rather than on background noise. • Far more analytically tractable and can be used to determine approximate Gaussian capacity Agenda Warmup: • point-to-point channel • multiple access channel • broadcast channel The meat: • relay networks (Avestimehr, Diggavi & T. 07) • interference channels (Bresler &T. 08, Bresler,Parekh & T. 08) Example 1: Point-to-Point Link Gaussian Cawgn (SNR) = 1 2 Deterministic log(1 + SNR) Transmit a real number Least significant bits are truncated at noise level. If p SNR = 2n we have Cdet (n) = n n / SNR on the dB scale Example 2: Multiple Access Gaussian SNR1 ¸ SNR2 SNR1 Deterministic user 2 SNR2 user 1 sends cloud centers, user 2 sends clouds. mod 2 addition user 1 Comparing Multiple Access Capacity Regions Gaussian Deterministic SNR1 ¸ SNR2 SNR1 user 2 SNR2 mod 2 addition user 1 R2 R2 R1 + R2 = n2 logSNR2 log(1 + SNR1 + SNR2 ) ¼ logSNR1 accurate to within (3; 2) 1 bit per user logSNR1 R1 n 1 R1 Example 3: Broadcast Gaussian Deterministic n1 = 5 user 1 SNR1 ¸ SNR2 SNR1 SNR2 n2 = 2 log(1 +SNR2 ) n2 R2 To within 1 bit R1 n1 log(1 +SNR1) user 2 Agenda Warmup: • point-to-point channel • multiple access channel • broadcast channel The meat: • relay networks • interference channels History • The (single) relay channel was first proposed by Van der Meulen in 1971. • Cover and El Gamal (1979) provided a whole array of achievable strategies. • Recent generalization of these techniques to more than 1 relay. • Do not know how far they are from optimal ¹ cut set • General upper bound: cutset bound C The Relay Channel Gaussian hSR R hSD S Deterministic hRD D nSR nRD Theorem (Avestimehr et al 07) Gap from cutset bound is at most 1 bit. nSD ¹ cut set = min (max(nSD ; nSR ); max(nSD ; nRD )) C | hRD |2 | hSD |2 gap | hSR |2 | hSD |2 On average it is much less than 1-bit Decode-Forward is near optimal ¡ ¢ = nSD + min (nSR ¡ nSD ) + ; (nR D ¡ nSD ) + Cutset bound is achievable. Decode-Forward is optimal Generalization to Relay Networks • Can the cutset bound be achievable in the deterministic model? • Can one always achieve to within a contant gap of the cutset bound in the Gaussian case? General Relay Networks Sc S Main Theorem: Cutset bound is achievable for deterministic networks. ¹ cut set = min rank(G S;S c ) Cr elay = C S (Avestimehr, Diggavi & T. 07) Main Theorem Cr elay = min rank(G S;S c ) S Theorem generalizes to arbitrary linear MIMO channels on finite fields. In the case of wireline graph, rank G S;S c is the number of links crossing the cut. Our theorem is a generalization of Ford-Fulkerson max-flow min-cut theorem. Connections to Network Coding • Achievability: random linear coding at relays • Proof style: similar to Ahlswede et al 2000 for wireline networks. • Technical innovation: dealing with “inter-symbol interference” between signals arriving along paths of different lengths. Back to Gaussian Relay Networks Approximation Theorem: There is a scheme that achieves within a constant gap to the cutset bound, independent of the SNR’s of the links. (Avestimehr, Diggavi and T. 2008) Agenda Warmup: • point-to-point channel • multiple access channel • broadcast channel The meat: • relay networks • interference channels Interference • So far we have looked at single source, single destination networks. • All the signals received is useful. • With multiple sources and multiple destinations, interference is the central phenomenon. • Simplest interference network is the two-user interference channel. Two-User Gaussian Interference Channel message m1 want m1 message m2 want m2 • Capacity region unknown • Best known achievable region: Han & Kobayashi 81. Gaussian to Deterministic Interference Channel Gaussian Deterministic n In symmetric case, channel described by two parameters: SNR, INR n $ log2 SNR: m $ log2 INR Capacity can be computed using a result by El Gamal and Costa 82. m Symmetric Deterministic Capacity r= 1 1/2 ® = = ®= r = 2 3 1 3 ®= r = 2 3 2 3 log INR log SNR m n Back to Gaussian • Theorem: Constant gap between capacity regions of the twouser deterministic and Gaussian interference channels. (Bresler & T. 08) • A deeper view of earlier 1-bit gap result on two-user Gaussian interference channel (Etkin,T. & Wang 06). • Bounds further sharpened to get exact results in the low-interference regime ( < 1/3) (Shang et al 07,Annaprueddy&Veeravalli08,Motahari&Khandani07) Extension: Many-to-One Interference Channel Gaussian Deterministic Deterministic capacity can be computed exactly . Gaussian capacity to within constant gap, using structured codes and interference alignment. (Bresler, Parekh & T. 07) Example Tx0 Rx0 Tx1 Rx1 Tx2 Rx2 • Interference from users 1 and 2 is aligned at the MSB at user 0’s receiver in the deterministic channel. • How can we mimic it for the Gaussian channel ? Gaussian Lattice codes Han-Kobayashi can achieveNot constant Optimal gap • Suppose users 1 and 2 use a random Gaussian codebook: Random Code Sum of Two Random Codebooks Lattice Code for Users 1 and 2 Interference from users 1 and 2 fills the space: no room for user 0. User 0 Code Tx0 Rx0 Tx1 Rx1 Tx2 Rx2 Interference Channels: Recap • In two-user case, we showed that an existing strategy can achieve within 1 bit to optimality. • In many-to-one case, we showed that a new strategy can do much better. • General K-user interference channel still open. Evolution of Ideas • deterministic network capacity in 1980’s: – broadcast channels (Marton 78, Pinsker 79) – 2-user interference channel (El Gamal & Costa 82) – single-relay channel (El Gamal & Aref 82) – relay networks with broadcast but no interference (Aref 79) • inspired by network coding in early 2000’s: – finite-field model with erasures (Gupta et al 06) but connection to Gaussian networks missing. • 2-user Gaussian interference channel capacity to within 1 bit (Etkin, T & Wang 06) • Linear deterministic model (Avestimehr, Diggavi & T 07) and applied to relay networks. Parting Words • Main message: If something can’t be computed exactly, approximate. • Similar evolution has happened in other fields: – fluid and heavy-traffic approximation in queueing networks – approximation algorithms in CS theory • Approximation should be good in engineering-relevant regimes.
© Copyright 2026 Paperzz