The Generalized Degrees-of-Freedom of the Asymmetric Interference Channel with Delayed CSIT
Abstract
In this paper, we investigate the generalized degrees-of-freedom (GDoF) of the asymmetric interference channel with delayed channel state information at the transmitter (CSIT), where each transmitter has two antennas, each receiver has one antenna, and the strength for each interfering link can vary. The optimal sum-GDoF is characterized by matched converse and achievability proof. Through our results, we also reveal that in our antenna setting, the symmetric GDoF lower bound in [Mohanty et. al, TIT 2019] can be elevated, and the symmetric GDoF upper bound in [Mohanty et. al, TIT 2019] is tight in fact.
Index Terms:
Delayed CSIT, sum-GDoF, interference channel.I Introduction
The degrees-of-freedom (DoF) characterization with delayed channel state information at the transmitter (CSIT) has attracted a plenty of research interests in the past decade. For example, the DoF region of multiple-input multiple-output (MIMO) interference channel with delayed CSIT was derived in [1]. The study of DoF of MIMO broadcast channel with delayed CSIT can be found in [2, 3, 4, 5], whose exact value was still not completely obtained. The linear DoF region of MIMO X channel with delayed CSIT was characterized in [6].
One limitation of DoF is that the strength of each link is assumed to be equal, whereas the link strength can vary tremendously in wireless. Nevertheless, the generalized degrees-of-freedom (GDoF) overcomes this drawback by considering the different strength of each link, which was first proposed in [7]. The GDoF characterization with delayed CSIT can be found in [8, 9, 10, 11]. In [8], the GDoF was studied in the two-user multiple-input single-output (MISO) broadcast channel under alternating delayed, perfect, and no CSIT, where sum-GDoF upper and lower bounds were shown to be partially coincided. In [9], the secure GDoF was investigated in the two-user MISO broadcast channel with an external eaversdropper and alternating delayed, perfect, and no CSIT. The GDoF region of the MIMO Z channel with delayed CSIT was characterized in [10]. For MIMO interference channel with delayed CSIT and symmetric interfering link strengths, symmetric GDoF upper and lower bounds were derived in [11], where the symmetric GDoF was characterized partially, and the upper and lower bounds do not change with antenna ratio, i.e., number of antenna at each transmitter over number of antennas at each receiver, if the antenna ratio is equal to or larger than two111A representative antenna setting for this antenna configuration case is that the transmitter has 2 antennas and the receiver has 1 antenna..
In this paper, we study the GDoF of the asymmetric interference channel with delayed CSIT, where the transmitter has two antennas, the receiver has one antenna, and the strength for each interfering link can vary. We characterize the sum-GDoF by presenting matched converse and achievability proof. Then, via this result, we reveal that in our antenna setting, the symmetric GDoF lower bound in [11] can be elevated, and the symmetric GDoF upper bound in [11] is tight in fact. The idea of elevating the GDoF lower bound comes from [9], where the authors in [9] fully exploit the receiver signal space by sending new fresh symbols in each time slot. Our transmission scheme generalizes the scheme in [9, Appendix C], which was designed for achieving the corner points of GDoF region of MISO broadcast channel with delayed CSIT.

II System Model
The considered asymmetric interference channel has two transmitters, denoted by and , each with two antennas, and two receivers, denoted by and , each with one antenna, as depicted in Fig. 1. The transmitter sends private message to the receiver . The received signals at two receivers and time slot can be written as
(1a) | |||
(1b) |
where denotes the transmitted signal from transmitter at time slot , denotes the received signal at receiver and time slot , denotes the channel matrix from transmitter to receiver , denotes the additive White Gaussian noise (AWGN) at receiver , the channel gains of desired links and interfering links are denoted by and with and , respectively. Without loss of generality, we assume that . The transmit signals follow an average power constraint, given by . All entries of channel matrices are independent and identical distributed (i.i.d.) across space and time slot. The signal-to-noise ratio (SNR) at each receiver is , and interference-to-noise ratio (INR) at receivers and are and , respectively. We define the following assembly of channel matrices: , and .
Due to feedback delay, the transmitter has delayed channel state information. Specifically, at time slot , the transmitters know , namely all the channel matrices up to time slot . Two receivers have instantaneous knowledge of channel matrices. The encoding function at transmitter and time slot is denoted by . The decoding function at receiver after time slots is denoted by .
The rate tuple is written as , where rate is the cardinality of message set . The rate is achievable, if there are a sequence of codebook pairs and decoding functions such that the error probability goes to zero when goes to infinity. The sum-capacity is defined as the supremum of sum of achievable rates, i.e., . Then, the sum-GDoF is defined as the pre-log factor of sum-capacity, i.e.,
III Main Results and Discussion
Theorem 1: For the considered asymmetric interference channel with delayed CSIT, defined in Section-II, the sum-GDoF is given as follows:
(2) |
Proof:
Please refer to Section-IV for the converse proof and Section-V for the achievability proof. ∎
IV Converse Proof of Theorem 1
The key steps of this proof follows the that in [11]. To begin with, we define the following virtual received signals, which are obtained from removing the impact of in the received signals at each receiver:
(3a) | |||
(3b) |
Before the next step, we define the following assembly of channel matrices: , , and , . Since the error probability goes to zero as goes to infinity, we denote so that . According to [11], the rate of receiver 1 can be bounded as
(4) |
where . Next, according to [11], the rate of receiver 2 can be bounded as
(5) |
Henceforth, we define , , , , where the transmit covariance matrix is independent of , and . Applying the extremal inequality in [12] for the physically degraded channel , we have the following inequality:
(6) |
To proceed, we can approximate the first term of (6) as
(7) |
where (a) is from SVD of , i.e., with unitary matrix and diagonal matrix , and , where denotes the number of zero singular values; (b) is from ; (c) is from [11, Lemma 1]. The second term of (6) can be approximated as
(8) |
where (a) is from SVD of and [11, Lemma 1]. Next, we can approximate the first term of (4) as
(9) |
where (a) is from Gaussian input maximizing the entropy with covariance constraints; (b) is from for and the SVD of ; and (c) is from [11, Lemma 1].
As such, the upper bound of weighted sum of achievable rates from (4) and (5) is given in (10), shown on the top of next page,
(10) |
where (a) is from (4), (5) and (9); (b) is from (7) and (8); (c) is from maximizer is by exhausting . Then, we rewrite (10) into GDoF expression,
(11) |
Due to the symmetry, we have another GDoF inequality, i.e.,
(12) |
Moreover, considering single-user GDoF bound for MIMO point-to-point channel, we have
(13) |
V Achievability Proof of Theorem 1
V-A Proposed Transmission Scheme for and Cases
The proposed transmission scheme is with block-Markov structure, and has blocks with time slot each block. Without loss of generality, we assume .
In the block, the transmitter encodes the message desired by receiver using the vector , such that with . The common message is encoded using the vector , which is transmitted at transmitter with power . The transmit signal at block and transmitter can be written as follows:
(14) |
where . The received signal at block and receiver is given as follows:
(15) |
where , and denotes the interference at receiver , which can be reconstructed at block . From the rate distortion theorem [13], this interference can be quantized using a source codebook with size , such that the average distortion does not exceed the noise power level and can be ignored in GDoF analysis. The quantization index of interference is denoted by , which is transmitted as from transmitter in block .
In the block, the transmitter sends common messages only, namely
(16) |
where . The received signal at block and receiver is given as follows:
(17) |
where . The decoding procedure is backward and begins with block , where the common messages are firstly decoded. After that, at the block, the interference from transmitter can be canceled and extra information about can be provided. Generally, the equivalent channel for decoding can be written as follows:
(18) |
where and . Note that (18) is equivalent to the three-user multiple-access channel (MAC). Applying capacity region of three-user MAC, we have the following general condition for achievable GDoF tuple to our problem:
Proposition 1: For the GDoF tuple , which denote the GDoF carried in , , , and , respectively, we have (19)-(29), where and are defined in [11, Lemmas 1 & 2].
(19) | |||
(20) | |||
(21) | |||
(22) | |||
(23) | |||
(24) | |||
(25) | |||
(26) | |||
(27) | |||
(28) | |||
(29) |
Proof:
The proof is similar to that in [11]. Thus, it is omitted for simplicity. ∎
For the block-Markov transmission, the achievable GDoF of receiver is calculated as . Moreover, is allocated as , since the common message from transmitter need to be decoded at receiver . In the following, we analyze the achievable sum-GDoF case by case, by means of Proposition 1.
V-A1 Case
According to Proposition 1, we present the achievable GDoF condition in this case as follows:
(30) | |||
(31) | |||
(32) | |||
(33) | |||
(34) | |||
(35) | |||
(36) | |||
(37) | |||
(38) | |||
(39) |
Therefore, we are able to formulate the following sum-GDoF lower bound maximization problem:
(40) |
where the maximizer is . This leads to the sum-GDoF lower bound achievable.
V-A2 Case
According to Proposition 1, we present the achievable GDoF condition in this case as follows:
(41) | |||
(42) | |||
(43) | |||
(44) | |||
(45) | |||
(46) | |||
(47) | |||
(48) | |||
(49) | |||
(50) |
Therefore, due to , we are able to formulate the following sum-GDoF lower bound maximization problem:
(51) |
where the maximizer is . This leads to the sum-GDoF lower bound achievable.
V-B Proposed Transmission Scheme for Case
In the time slot, the transmitter sends three symbols for receiver and transmitter sends one symbol for receiver . Let us denote the symbols desired by receiver transmitted in time slot by , and denote the symbol desired by receiver transmitted in time slot by . The transmit signal at transmitter is designed as
(52) |
The transmit signal at transmitter is designed as
(53) |
As such, the received signals at each receiver are expressed as
(54a) | |||
(54b) |
It can be seen that a part of interference fall into noise level. Moreover, each receiver can retrieve the profile of part and decode the information of part immediately.
In the time slot, the transmitter sends three symbols for receiver and transmitter sends three symbols for receiver . Let us denote the symbols desired by receiver transmitted in time slot by , and denote the symbol desired by receiver transmitted in time slot by . The transmit signal at transmitter is designed as
(55) |
The transmit signal at transmitter is designed as
(56) |
As such, the received signals at each receiver are expressed as
(57a) | |||
(57b) |
It can be seen that a part of interference fall into noise level. Moreover, each receiver can retrieve the profile of part and decode the information of part immediately.
In the time slot, each transmitter has delayed CSI of past two time slots. Thus, the transmitter re-constructs the interfering signals and treat it as a common symbol, i.e., where is a valid codeword if are selected from lattice. The transmitter re-constructs the interfering signals and treat it as a common symbol, i.e., where is a valid codeword if are selected from lattice. The transmit signals at each transmitter are designed as
(58a) | |||
(58b) |
where are symbols desired by receivers and , respectively. As such, the received signals at each receiver are expressed as
(59a) | |||
(59b) |
where the impact of can be subtracted from and the can be subtracted from . It can be seen that a part of interference fall into noise level. Moreover, receiver can retrieve the profile of part and decode the information of part immediately.
The achievable sum-GDoF is calculated as follows: Receiver acquires , , and immediately in time slot and , respectively. Additionally, receiver has via delayed CSIT. Thus, is achievable. Likewise, is achievable. To sum up, is achievable.
VI Conclusion
The sum-GDoF was characterized in the asymmetry interference channel with delayed CSIT, where each transmitter has 2 antennas and each receiver has 1 antenna. In the future, it is interesting to design a better transmission scheme in Case.
References
- [1] C. S. Vaze and M. K. Varanasi, “The degrees of freedom region and interference alignment for the MIMO interference channel with delayed CSIT,” IEEE Trans. Inf Theory, vol. 58, no. 7, pp. 4396–4417, 2012.
- [2] M. J. Abdoli, A. Ghasemi, and A. K. Khandani, “On the degrees of freedom of three-user MIMO broadcast channel with delayed CSIT,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), St. Petersburg, Russia, 2011, pp. 209–213.
- [3] T. Zhang, X. W. Wu, Y. F. Xu, Y. Ge, and P. C. Ching, “Three-user MIMO broadcast channel with delayed CSIT: A higher achievable DoF,” in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process. (ICASSP), 2018, pp. 3709–3713.
- [4] M. J. Abdoli, “Feedback and cooperation in wireless networks,” in PhD Dissertation, University of Waterloo, 2012.
- [5] T. Zhang and R. Wang, “Achievable DoF regions of three-user MIMO broadcast channel with delayed CSIT,” IEEE Trans. Commun., vol. 69, no. 4, pp. 2240–2253, 2021.
- [6] D. T. H. Kao and A. S. Avestimehr, “Linear degrees of freedom of the MIMO X-channel with delayed CSIT,” IEEE Trans. Inf Theory, vol. 63, no. 1, pp. 297–319, 2017.
- [7] R. H. Etkin, D. N. C. Tse, and H. Wang, “Gaussian interference channel capacity to within one bit,” IEEE Trans. Inf. Theory, vol. 54, no. 12, pp. 5534–5562, 2008.
- [8] J. Chen, P. Elia, and S. A. Jafar, “On the two-user MISO broadcast channel with alternating CSIT: A topological perspective,” IEEE Trans. Inf Theory, vol. 61, no. 8, pp. 4345–4366, 2015.
- [9] Z. H. Awan and A. Sezgin, “Secure MISO broadcast channel: An interplay between CSIT and network topology,” IEEE J. Sel. Areas Inf. Theory, vol. 2, no. 1, pp. 121–138, 2021.
- [10] K. Mohanty and M. K. Varanasi, “The generalized degrees of freedom region of the MIMO Z-interference channel with delayed CSIT,” IEEE Trans. Inf. Theory, vol. 64, no. 1, pp. 531–546, 2018.
- [11] ——, “On the generalized degrees of freedom of the MIMO interference channel with delayed CSIT,” IEEE Trans. Inf. Theory, vol. 65, no. 5, pp. 3261–3277, 2019.
- [12] T. Liu and P. Viswanath, “An extremal inequality motivated by multiterminal information-theoretic problems,” IEEE Trans. Inf Theory, vol. 53, no. 5, pp. 1839–1851, 2007.
- [13] T. M. Cover, Elements of information theory. John Wiley & Sons, 1999.