Blind Interference Alignment (BIA)
Blind Interference Alignment (BIA) originated in the following paper as the idea that it is possible to align interference in a wireless network without requiring the knowledge of precise channel coefficient values at the transmitter(s), by exploiting the knowledge of channel coherence patterns instead. Syed A. Jafar, Blind Interference Alignment, IEEE Journal of Selected Topics in Signal Processing, Vol. 6, No. 3, Pages: 216-227, June 2012. From a practical perspective, BIA is promising because acquiring precise channel state information at the transmitters (CSIT) can be challenging. The potential for BIA exists because in addition to the diversity of coherence patterns that is already present in a wireless network, it may be possible to manipulate coherence patterns through switching patterns of reconfigurable antennas, and intelligent reflecting surfaces. From a theoretical standpoint, it is especially intriguing because it provides us a window through which we can peer into the mysterious role of coherence in a communication network − a topic whose deeper significance goes well beyond wireless networks, and is far from understood. Remark: Channel uncertainty and coherence in this context should not be confused with non-coherent communication, which typically refers to communication in the absence of channel state information at the receiver(s), i.e., in the absence of CSIR. BIA deals primarily with channel uncertainty on the transmitter side. Indeed, perfect CSIR is assumed throughout this discussion. This webpage offers a coarse sampling, in the form of interactive toy examples, of some of the foundational ideas around BIA that originated in our research group. It is not intended to be an in-depth tutorial or a comprehensive survey of state of art. The goal of this effort is to explore the utility of presenting information theoretic content in an interactive format. Feedback and suggestions for improvement are welcome.
Remark: The solution for Toy Example 1 is capacity achieving, i.e., the sum-capacity of this X-channel is 4/3 (symbols from \(\mathbb{F}\) per channel-use). The same Blind Interference Alignment idea also works in the wireless setting where the field is \(\mathbb{C}\), the inputs are constrained to transmit power P, and there is zero mean unit variance i.i.d. Additive White Gaussive Noise (AWGN) combined with the signals seen at each receiver. The corresponding result in the wireless setting is that this X-channel has 4/3 Degrees of Freedom (DoF). Notably, even if perfect channel state information at the transmitters (CSIT) was available, the X-channel has only 4/3 DoF. Correspondingly, the finite field setting of Toy Example 1 has only capacity 4/3 even with perfect CSIT. That the same capacity is achieved without the knowledge of channel coefficient values at the transmitters, based on the knowledge of coherence patterns alone, makes BIA particularly intriguing. It is also worth noting that there is no further benefit of transmitter cooperation, i.e., even if the two transmitters jointly code their data in Toy Example 1, the capacity of the MISO broadcast channel thus obtained remains 4/3 symbols/channel-use. Evidently, the benefits of zero-forcing are lost when the transmitters do not have perfect CSIT.
Tiangao Gou, Chenwei Wang, Syed A. Jafar, Aiming Perfectly in the Dark - Blind Interference Alignment through Staggered Antenna Switching, IEEE Transactions on Signal Processing, Vol. 59, No. 6, Pages: 2734-2744, June 2011 The results are generalized to MIMO settings, i.e., where nodes have multiple reconfigurable antennas, in this paper. Chenwei Wang, Tiangao Gou, Syed A. Jafar, Interference Alignment Through Staggered Antenna Switching for MIMO BC With No CSIT, Proceedings of Asilomar Conference on Signals, Systems and Computers, Nov., 2010.
Choose the correct answer from the choices listed below.
Remark: Toy Example 2 generalizes easily to K users, to show that with the right coherence pattern, a K user interference channel has K/2 DoF without the knowledge of channel coefficient values at the transmitters, due to BIA. Recall that K/2 is also the DoF value of a K user interference channel under perfect (instantaneous and infinite precision) CSIT, as shown in this work. Viveck R. Cadambe, Syed A. Jafar, Interference Alignment and the Degrees of Freedom of the K User Interference Channel, IEEE Transactions on Information Theory, Aug 2008, Vol. 54, Issue 8, Pages: 3425-3441 As promising as that sounds, note that the coding scheme that promises K/2 DoF with perfect CSIT requires asymptotically long precoding delays, infinite precision CSIT, and that these gains manifest primarily at asymptotically high SNRs, none of which is practical. Albeit, the latter issue of high SNRs can be circumvented through Ergodic Interference Alignment, as shown in this work. Bobak Nazer, Michael Gastpar, Syed A. Jafar, Sriram Vishwanath, Ergodic Interference Alignment, IEEE Transactions on Information Theory, Vol. 58, No. 10, Pages: 6355-6371, October 2012. On the other hand, with no CSIT (not even coherence patterns) the K user interference channel has only 1 DoF as shown in this work. Arash G. Davoodi, Syed A. Jafar, Aligned Image Sets under Channel Uncertainty: Settling Conjectures on the Collapse of Degrees of Freedom under Finite Precision CSIT, IEEE Transactions on Information Theory, Vol. 62, Number 10, Pages: 5603-5618, October 2016. This dramatic increase from 1 DoF to K/2 DoF, especially without the burden of learning the precise channel coefficient values at the transmitters, without the need for asymptotically long precoding sequences, and without the need for asymptotically high SNRs, could potentially obliterate the interference barrier some day, making the ambitious dream of `everyone gets half the cake' a reality, provided that future technologies can find a way to achieve desired coherence patterns. Wouldn't that be exciting? Achieving interference-free transmission, at any SNR, for any number of interfering users, in just two channel uses! At the moment though, there is no known way to impose such a coherence pattern in practice.
Choose the correct answer from the choices listed below.
Remark: The achievable scheme in the solution presented above is quite simple. However, Question 3 is not so simple. That is because we also need a converse argument, i.e., an impossibility result, to show that no scheme can achieve a sum-rate higher than 4 symbols/channel-use. The converse is quite insightful but also highly non-trivial, so we will not try to summarize it here. Instead, let us point out that the converse relies on Aligned Images arguments, and follows from the results presented in this paper. Arash G. Davoodi, Syed A. Jafar, Network Coherence Time Matters – Aligned Image Sets and the Degrees of Freedom of Interference Networks with Finite Precision CSIT and Perfect CSIR, IEEE Transactions on Information Theory, Vol. 64, No. 12, Pages: 7780-7791, December 2018.
Now, let us see what happens if we increase the network coherence time from 1 to 2 in the same network that we considered above for Toy Example 3. This takes us to our next toy example.
Choose the correct answer from the choices listed below.
Remark: The answer to Question 4 requires both an achievable scheme and a converse bound. Only the achievable scheme is shown in the solution presented in the figure above. The converse is quite straightforward and is summarized at a high level as follows. Two copies of User 1, who have collectively a total of 6 observations (with independent channel realizations), are jointly able to solve for all 6 channel inputs from those 6 observations. This allows them to recover not only their own message (individually, so twice) but also User 2's message (collectively, so once), yielding the bound \(2R_1+R_2\leq 6\). Combined with the trivial single user capacity bound \(R_2\leq 3\) we obtain the sum-capacity bound \(R_1+R_2\leq 4.5\). Indeed, while the converse is straightforward, it is the achievability that is the more interesting aspect of Toy Example 4. Note that this problem also has a non-trivial topological aspect, because not all inputs are connected to all outputs. As such, the achievable scheme makes use of the idea of Topological Interference Management (TIM) that was introduced in this paper. Syed A. Jafar, Topological Interference Management through Index Coding, IEEE Transactions on Information Theory, Vol. 60, No. 1, Pages: 529-568, January 2014. To summarize, Toy Examples 3 and 4 have shown us that network coherence time matters, i.e., even when all channels in a network have the same coherence times/patterns, and the CSI is already available perfectly to the receivers (so there is no benefit of training the receiver) and there is no feedback to the transmitters, the capacity of the network still increases with coherence time.
BIA is related to a number of important problems in theoretical computer science − problems like Locally Decodable Codes (LDC) and Private Information Retrieval (PIR). The connection is quite strong. Every BIA scheme can be translated into a locally decodable code, and since every LDC can be translated into a PIR scheme, it follows that every BIA scheme also gives us a PIR scheme. BIA and Smooth Locally Decodable Codes
Toy Example 5: Define X(n)=[X1(n), X2(n)], so that according to the solution for Toy Example 1, we have
Identify which connected components (sets of 3 nodes connected by edges of the same color) correspond to each message. Choose the correct answer from the choices listed below.
Remark: An important open problem in theoretical computer science is to find optimal constructions of smooth locally decodable codes, i.e., constructions that achieve optimal tradeoffs between code lengths and locality for a given number of source symbols, typically for code symbols over the same alphabet as the source symbols. Much less important but perhaps still interesting is the question of finding the minimum code length possible for a smooth locally decodable code for a given coded symbol size given the locality and the number of source symbols. Codes that have the smallest possible code symbol size are of particular interest from the BIA perspective because they correspond to optimal BIA schemes. These codes are explored in this paper. Hua Sun, Syed A. Jafar, On the Capacity of Locally Decodable Codes, December 2018, e-print, ArXiv:1812.05566.
Since Blind Interference Alignment is closely related to locally decodable codes, and locally decodable codes are in turn closely related to Private Information Retrieval schemes, it follows naturally that BIA should have deep connections to Private Information Retrieval. This connection is highlighted by our next toy example. Toy Example 6: Let us construct a 3 Server PIR scheme for 2 messages using the locally decodable code of Toy Example 5. This construction is shown in the figure below. Messages W1=(a1, a2), W2=(b1, b2) are stored in coded form at 3 servers as shown in the figure. A user wishes to retrieve one of the two messages without revealing to any individual server which message he wants. In order to do so the user can randomly download one of the two stored coded symbols from Server 1, and its blue neighbors (i.e., nodes connected by blue edges) from Server 2 and Server 3 if the desired message is W1. Similarly, if the desired message is W2 then the user downloads the red neighbors from Server 2 and Server 3. With this scheme, the user is equally likely to download either of the two stored symbols from each server, thus revealing no information to any individual server about his desired message. Since the same query can be repeated for each symbol of the desired message, for large messages, the communication cost of PIR is dominated by the download cost. The rate of a PIR setting is the number of bits of the desired symbol that can be retrieved per bit of total download from all the servers. The supremum of achievable rates for a PIR setting is called the capacity of that PIR setting. Question 6. What is the rate of the PIR scheme shown in the figure? Choose the correct answer from the choices listed below. Remark: Incidentally, 2/3 is the capacity of PIR with 2 messages and 3 servers if the upload from each server is restricted to 1 bit, i.e., there are only two possible answers from each server. In this sense, the PIR scheme shown above is optimal/capacity-achieving. Without upload constraints it is possible to do better, and the capacity turns out to be 3/4. The capacity of PIR is characterized for arbitrary number of servers and messages in this paper. Hua Sun, Syed A. Jafar, The Capacity of Private Information Retrieval, IEEE Transactions on Information Theory, IEEE Transactions on Information Theory, Vol. 63, No. 7, Pages: 4075-4088, July 2017.
© Syed A. Jafar
|