Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro:...

56
ISIT 2008: Compute-and-Forward 1 / 23 Compute-and-Forward: Harnessing Interference with Structured Codes Bobak Nazer and Michael Gastpar Department of Electrical Engineering and Computer Sciences University of California, Berkeley July 8, 2008 ISIT 2008 UC Berkeley Wireless Foundations Nazer and Gastpar

Transcript of Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro:...

Page 1: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward 1 / 23

Compute-and-Forward: Harnessing Interference with

Structured Codes

Bobak Nazer and Michael Gastpar

Department of Electrical Engineering and Computer SciencesUniversity of California, Berkeley

July 8, 2008

ISIT 2008

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 2: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 2 / 23

Wireless Relay Network

E1

E2

• Encoders want to send messages

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 3: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 2 / 23

Wireless Relay Network

E1

E2

D1

D2

D3

• Encoders want to send messages to decoders

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 4: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 2 / 23

Wireless Relay Network

E1

E2

D1

D2

D3

• Encoders want to send messages to decoders

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 5: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 2 / 23

Wireless Relay Network

E1

E2

D1

D2

D3

• Encoders want to send messages to decoders

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 6: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 2 / 23

Wireless Relay Network

E1

E2

R1

R2

R3

R4

D1

D2

D3

• Encoders want to send messages to decoders

• Assisted by relays

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 7: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 2 / 23

Wireless Relay Network

E1

E2

R1

R2

R3

R4

D1

D2

D3

• Encoders want to send messages to decoders

• Assisted by relays

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 8: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 2 / 23

Wireless Relay Network

E1

E2

R1

R2

R3

R4

D1

D2

D3

• Encoders want to send messages to decoders

• Assisted by relays

• Wireless channel: interference and noise

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 9: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 3 / 23

Basic Relaying Strategies

Relaying schemes are usually some mixture of:

• Decode-and-Forward: Relays reliably recover transmittedcodewords.(Cover-El Gamal ’79, Kramer-Gastpar-Gupta ’05,

Sanderovich-Somekh-Poor-Shamai ’08, . . . )

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 10: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 3 / 23

Basic Relaying Strategies

Relaying schemes are usually some mixture of:

• Decode-and-Forward: Relays reliably recover transmittedcodewords.(Cover-El Gamal ’79, Kramer-Gastpar-Gupta ’05,

Sanderovich-Somekh-Poor-Shamai ’08, . . . )

• Compress-and-Forward: Relays quantize their noisy observationsand send them towards the destination.(Cover-El Gamal ’79, Kramer-Gastpar-Gupta ’05, Cover-Kim ’07,

Aleksic-Razaghi-Yu ’07, Sanderovich-Somekh-Poor-Shamai ’08, . . . )

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 11: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 3 / 23

Basic Relaying Strategies

Relaying schemes are usually some mixture of:

• Decode-and-Forward: Relays reliably recover transmittedcodewords.(Cover-El Gamal ’79, Kramer-Gastpar-Gupta ’05,

Sanderovich-Somekh-Poor-Shamai ’08, . . . )

• Compress-and-Forward: Relays quantize their noisy observationsand send them towards the destination.(Cover-El Gamal ’79, Kramer-Gastpar-Gupta ’05, Cover-Kim ’07,

Aleksic-Razaghi-Yu ’07, Sanderovich-Somekh-Poor-Shamai ’08, . . . )

• Amplify-and-Forward: Relays retransmit their noisy observations.

(Schein-Gallager ’00, Gastpar-Vetterli ’05, Borade-Zheng-Gallager ’06,

El Gamal-Hassanpour-Mammen ’07, . . . )

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 12: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 4 / 23

Pros and Cons

Decode-and-Forward:

• Pro: Relays remove noise by decoding codewords.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 13: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 4 / 23

Pros and Cons

Decode-and-Forward:

• Pro: Relays remove noise by decoding codewords.

• Con: If there is more than one transmitter, relays areinterference-limited.

Compress-and-Forward and Amplify-and-Forward:

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 14: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 4 / 23

Pros and Cons

Decode-and-Forward:

• Pro: Relays remove noise by decoding codewords.

• Con: If there is more than one transmitter, relays areinterference-limited.

Compress-and-Forward and Amplify-and-Forward:

• Pro: Interference left for receiver which can treat network as onebig MIMO channel.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 15: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 4 / 23

Pros and Cons

Decode-and-Forward:

• Pro: Relays remove noise by decoding codewords.

• Con: If there is more than one transmitter, relays areinterference-limited.

Compress-and-Forward and Amplify-and-Forward:

• Pro: Interference left for receiver which can treat network as onebig MIMO channel.

• Con: Relays do not decode so noise builds along the way to thereceiver.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 16: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 4 / 23

Pros and Cons

Decode-and-Forward:

• Pro: Relays remove noise by decoding codewords.

• Con: If there is more than one transmitter, relays areinterference-limited.

Compress-and-Forward and Amplify-and-Forward:

• Pro: Interference left for receiver which can treat network as onebig MIMO channel.

• Con: Relays do not decode so noise builds along the way to thereceiver.

Can a strategy handle both interference and noise?

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 17: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 5 / 23

Something in Between

Tx1x1

Tx2x2

Channel Rx x1 + x2

• Compute-and-Forward: Relays reliably recover linear functions oftransmitted codewords.

• Nazer-Gastpar IT Trans. Oct. ’07 : Can exploit channels to reliablycompute functions using structured codes (computation coding).

• Example: Multiple-access channel is a noisy sum. Decode just thesum of codewords.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 18: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 6 / 23

Motivating Example: Sum-Difference Relay Channel

m1 E1

X1

m2 E2

X2

H

Z1

Y1

Z2

Y2

R1

R0

R2

R0

Dm1

m2

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 19: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 6 / 23

Motivating Example: Sum-Difference Relay Channel

m1 E1

X1

m2 E2

X2

[

1 11 −1

]

Z1

Y1

Z2

Y2

R1

R0

R2

R0

Dm1

m2

• Y1 = X1 + X2 + Z1 and Y2 = X1 − X2 + Z2

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 20: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 6 / 23

Motivating Example: Sum-Difference Relay Channel

m1 E1

X1

m2 E2

X2

[

1 11 −1

]

Z1

Y1

Z2

Y2

R1

X1 + X2

R0

R2

X1 − X2

R0

Dm1

m2

• Y1 = X1 + X2 + Z1 and Y2 = X1 − X2 + Z2

• Compute-and-Forward: Relay 1 decodes the sum. Relay 2 decodesthe difference.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 21: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 7 / 23

“Structural Gain”

• Compute-and-Forwardnearly reaches upperbound

0 2 4 6 8 100

0.5

1

1.5

2

SNR

Rat

e

Upper Bound

Compute−Forward

Compress−Forward

Decode−Forward

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 22: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 8 / 23

Overview

Main ideas for this talk:

=⇒ Reducing a relay network into a system of (reliable) linearequations.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 23: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 8 / 23

Overview

Main ideas for this talk:

=⇒ Reducing a relay network into a system of (reliable) linearequations.

=⇒ Using a new coding technique, Compute-and-Forward, thatlets relays decode linear functions of codewords.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 24: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Motivation 8 / 23

Overview

Main ideas for this talk:

=⇒ Reducing a relay network into a system of (reliable) linearequations.

=⇒ Using a new coding technique, Compute-and-Forward, thatlets relays decode linear functions of codewords.

=⇒ Based on (algebraically) structured codes (i.e., lattices)that can exploit the structure of the interference andprotect against noise.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 25: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Problem Statement 9 / 23

Problem Statement

m1 E1

X1

m2 E2

X2

.

.

.

mM EM

XM

H

Z1

Y1

Z2

Y2

ZM

YM

R1

R0

R2

R0

.

.

.

RM

R0

D

m1

m2.

.

.

mM

• M encoders, M relays, 1 decoder• Usual power constraints: 1

n

∑ni=1

(Xk[i])2 ≤ SNR

• i.i.d. Gaussian noise Zk ∼ N (0, 1)• Each relay observes a noisy linear combination:

Yk[i] =

M∑

j=1

hjkXj [i] + Zk[i]

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 26: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Problem Statement 10 / 23

Oblivious Transmitters

m1 E1

X1

m2 E2

X2

.

.

.

mM EM

XM

H

Z1

Y1

Z2

Y2

ZM

YM

R1

R0

R2

R0

.

.

.

RM

R0

D

m1

m2.

.

.

mM

• Fixed channel matrix H

• Encoders: No channel knowledge

• Relays: Each knows its own coefficients hk = [h1k h2k · · · hMk]

• Decoder: Knows entire channel matrix H

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 27: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Problem Statement 11 / 23

Metrics of Interest

• Rate per User: maximize symmetric rate, R

mj ∈ {1, 2, . . . , 2nR} j = 1, 2, . . . ,M

Pr(mj 6= mj) → 0

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 28: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Problem Statement 11 / 23

Metrics of Interest

• Rate per User: maximize symmetric rate, R

mj ∈ {1, 2, . . . , 2nR} j = 1, 2, . . . ,M

Pr(mj 6= mj) → 0

• Degrees of Freedom: high SNR analysis

d = limSNR→∞

R1

2log (1 + SNR)

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 29: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 12 / 23

Compute-and-Forward with Lattices

First, pick a good lattice Λ (using Erez-Litsyn-Zamir ’05):

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 30: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 12 / 23

Compute-and-Forward with Lattices

First, pick a good lattice Λ (using Erez-Litsyn-Zamir ’05):

1 Each encoder transmits a point from the lattice Λ.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 31: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 12 / 23

Compute-and-Forward with Lattices

First, pick a good lattice Λ (using Erez-Litsyn-Zamir ’05):

1 Each encoder transmits a point from the lattice Λ.

2 Each relay decodes a linear function with integer coefficients, Uk,of the transmitted codewords. Integer coefficients approximatechannel coefficients.

Yk =∑

j=1

hjkXj + Zk

Uk =∑

j=1

ajkXj where ajk ∈ Z

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 32: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 12 / 23

Compute-and-Forward with Lattices

First, pick a good lattice Λ (using Erez-Litsyn-Zamir ’05):

1 Each encoder transmits a point from the lattice Λ.

2 Each relay decodes a linear function with integer coefficients, Uk,of the transmitted codewords. Integer coefficients approximatechannel coefficients.

Yk =∑

j=1

hjkXj + Zk

Uk =∑

j=1

ajkXj where ajk ∈ Z

3 Decoder collects equations of codewords. If integer equations arefull rank, decoding is successful.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 33: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 13 / 23

Relays Decode Linear Functions

m1 E1

X1

m2 E2

X2

...

mM EM

XM

H

Z1

Y1

Z2

Y2

ZM

YM

R1

j aj1Xj

R0

R2

j aj2Xj

R0

...

RM

j ajMXj

R0

D

m1

m2...

mM

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 34: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 35: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 36: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 37: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

• Sum of codewords is not acodeword.

• Must decode individualmessages.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 38: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

• Sum of codewords is not acodeword.

• Must decode individualmessages.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 39: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

• Sum of codewords is not acodeword.

• Must decode individualmessages.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 40: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

• Sum of codewords is not acodeword.

• Must decode individualmessages.

• Sum of codewords is acodeword.

• Can decode linearfunctions of messages.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 41: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

• Sum of codewords is not acodeword.

• Must decode individualmessages.

• Sum of codewords is acodeword.

• Can decode linearfunctions of messages.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 42: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Encoding Strategy 14 / 23

Random Coding vs. Lattice Coding

• Sum of codewords is not acodeword.

• Must decode individualmessages.

• Sum of codewords is acodeword.

• Can decode linearfunctions of messages.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 43: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 15 / 23

Achievable Rates

• Channel to relay k given by Yk = hTk X + Zk.

• Relay k decodes integer equation Uk = aTk X

Theorem

The following symmetric rate is achievable for our relay network:

R = mink

maxak∈ZM

1

2log

(

SNR

1 + SNR‖hk − ak‖2

)

• ‖hk − ak‖2 is a mismatch penalty (or approximation error).

• Actually, we can do better!

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 44: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 16 / 23

Noise-Approximation Tradeoff

• Channel to relay k given by Yk = hTk X + Zk.

• hk may not be close to integer vector (large approximation error‖hk − ak‖

2)

• Idea: Relay scales observed channel output by λ ∈ R beforedecoding:

λYk = λhTk X + λZk

Yk = hTk X + Zk

• New approximation error minak‖λhk − ak‖ may be smaller than

original minak‖hk − ak‖.

• Noise variance goes from 1 to λ2.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 45: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 17 / 23

Noise-Approximation Tradeoff

λh

λ = 1

h = (1, 5

4), λh = (1, 5

4)

Noise Variance = 1

Approximation Error =(

1

4

)2= 1

16

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 46: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 17 / 23

Noise-Approximation Tradeoff

λh

λ = 2

h = (1, 5

4), λh = (2, 10

4)

Noise Variance = 4

Approximation Error =(

1

2

)2= 1

4

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 47: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 17 / 23

Noise-Approximation Tradeoff

λh

λ = 3

h = (1, 5

4), λh = (3, 15

4)

Noise Variance = 9

Approximation Error =(

1

4

)2= 1

16

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 48: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 17 / 23

Noise-Approximation Tradeoff

λh

λ = 4

h = (1, 5

4), λh = (4, 5)

Noise Variance = 16

Approximation Error = 0

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 49: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 18 / 23

Achievable Rates

Theorem

The following symmetric rate is achievable for our relay network:

R = mink

maxak∈ZM

maxλk∈R

1

2log

(

SNR

λ2

k + SNR‖λkhk − ak‖2

)

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 50: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 18 / 23

Achievable Rates

Theorem

The following symmetric rate is achievable for our relay network:

R = mink

maxak∈ZM

maxλk∈R

1

2log

(

SNR

λ2

k + SNR‖λkhk − ak‖2

)

= mink

maxak∈ZM

1

2log

(

1

‖a‖2 − λMMSE < a,h >

)

• The optimal choice of λ is always given by the MMSE coefficient:

λMMSE =SNR < h,a >

1 + SNR‖h‖2

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 51: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 18 / 23

Achievable Rates

Theorem

The following symmetric rate is achievable for our relay network:

R = mink

maxak∈ZM

maxλk∈R

1

2log

(

SNR

λ2

k + SNR‖λkhk − ak‖2

)

= mink

maxak∈ZM

1

2log

(

1

‖a‖2 − λMMSE < a,h >

)

• The optimal choice of λ is always given by the MMSE coefficient:

λMMSE =SNR < h,a >

1 + SNR‖h‖2

• Optimal λ might be smaller than 1. (Example: h = [10 20 10])

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 52: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 19 / 23

Multiple-Access is a Special Case

• For any channel hk, if ak = [1 0 0 · · · 0], (meaning try to decodejust x1) then:

R =1

2log

(

1 +|h1k|

2SNR

1 + SNR∑M

j=2|hjk|2

)

• This is just the corner point of the MAC rate region.

• Multiple-access emerges naturally by simply trying to decode theindividual messages.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 53: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 20 / 23

Degrees of Freedom

• If all the channel coefficients, hjk, are rational then all we need todo is pick λ large enough to make all the coefficients integers.Then we get to the full degrees of freedom:

dCPF = M, H is rational

• Otherwise, using Dirichlet’s Theorem we can lower bound theperformance for general hjk:

dCPF ≥ 1

• One can show that for Decode-and-Forward the sum degrees offreedom is dDF = 1.

• Compress-and-Forward can get all the way to the optimumdCF = M .

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 54: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Main Results 21 / 23

Example: Complex Phase Fading

• Complex uniform phasefading, unknown attransmitters.

• Relays have fixed rate tothe decoder (R0 = 4).

• Similar results for Rayleighfading.

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 55: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Conclusions 22 / 23

Related Work

The key to our achievable scheme is the use of structured randomcodes. These are useful for proving new capacity results:

• Parallel Relay Channels (Kochman-Khina-Erez-Zamir ’08)

• Computation over MACs (Nazer-Gastpar ’05, ’07)

• Wireless Network Coding (Nazer-Gastpar ’06, ’07, ’08)

• Distributed Source Coding (Korner-Marton ’79, Krithivasan-Pradhan ’07,

’08, Tavildar-Viswanath-Wagner ’08)

• Two-Way Relay Channel (Wilson-Narayanan-Pfister-Sprintson ’07, ’08,

Nam-Chung-Lee ’08)

• Dirty Multiple-Access Channel (Philosof-Khisti-Erez-Zamir ’07)

• Interference Channels (Bresler-Parekh-Tse ’07, Jafar-Vishwanath ’08)

Interested? See our paper, The Case for Structured Random Codes in

Network Capacity Theorems in ETT July ’08 for more . . .

UC Berkeley Wireless Foundations Nazer and Gastpar

Page 56: Compute-and-Forward: Harnessing Interference with ... · Pros and Cons Decode-and-Forward: • Pro: Relays remove noise by decoding codewords. • Con: If there is more than one transmitter,

ISIT 2008: Compute-and-Forward > Conclusions 23 / 23

Conclusions

• Relays can remove noise without fully decoding the transmittedcodewords by decoding linear equations of codewords.

• Enabled by structured random codes (specifically lattice codes).

• Allows us to think of networks as systems of linear equations (verysimilar to network coding).

• Performs better than classical strategies in some regimes. Morework needed to characterize compute-and-forward performance ingeneral.

UC Berkeley Wireless Foundations Nazer and Gastpar