ebook img

Theta Series Approximation with Applications to Compute-and-Forward Relaying PDF

0.72 MB·
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Theta Series Approximation with Applications to Compute-and-Forward Relaying

1 Decoding in Compute-and-Forward Relaying: Real Lattices and the Flatness of Lattice Sums Amaro Barreal, David A. Karpuk, Member, IEEE, and Camilla Hollanti 6 1 0 Abstract 2 n In a distributed communications scenario, a relay applying the compute-and-forward strategy for a J the real-valued channel model aims to decode an integer linear combination of transmitted messages, 1 a task of very complex nature for which general efficient algorithms for dimension n > 1 have not 2 yet been developed. Nonetheless, the maximum-likelihood decoding metric related to solving for the ] T desired lattice point exhibits interesting properties which lead to partial design criteria for lattice codes I . in compute-and-forward. s c [ This article generalizes maximum-likelihood decoding at the relay to allow for arbitrary real lattice 1 codes at the transmitters, and studies the behavior of the resulting decoding metric using an approx- v 6 imation of the theta series of a lattice, which is itself derived in this article. For the first time, the 9 resulting random sums of lattices over whose points the relay needs to perform a sum are analyzed and 5 5 furthermore, previous related work is extended to the case of K > 2 transmitters. The specific cases 0 . K =2 and K =3 are studied empirically. 1 0 6 1 Index Terms : v i PhysicalLayerNetworkCoding,Compute-and-Forward,Relaying,Lattice,ThetaSeries,Maximum X r Likelihood Decoding. a I. INTRODUCTION Physical layer network coding generated much interest and excitement, especially during the past few years where research towards a fifth generation of wireless systems has been the The authors are with the Department of Mathematics and Systems Analysis, Aalto University, Finland (e-mail: first- name.lastname@aalto.fi). Their work is supported by the Academy of Finland under Grants #268364, #276031, #282938 and #283262, as well as a grant from the Finnish Foundation for Technology Promotion. 2 center of well deserved attention. A particularly promising protocol, known as compute-and- forward, and proposed by Nazer and Gastpar in their award-winning paper [1], exploits the natural effects of interference by decoding linear combinations of the transmitted messages at the intermediate relays to achieve high computation rates. While the information theoretic aspects of this protocol have been extensively studied, not much work exists related to code design and decoding methods. Originally, a relay operating under the compute-and-forward protocol would first scale the received signal before applying a minimum-distance decoder to obtain an estimate of the desired linear combination of the codewords. The decoding error probability in this scenario was studied in [2], where lattice network coding is further introduced as an extension of compute-and-forward to modules over principal ideal domains. It was later in [3] where Maximum-Likelihood (ML) decoding at the relay was first studied. An approach to lattice code design for compute-and-forward was simultaneously derived therein, as well as in [4]. The fundamental work carried out in these two articles is essential for the present manuscript, as it introduces the notion of the flatness factor (cf. Defintion 7) of a lattice and utilizes it to derive an implicit lattice code design criterion. This criterion is indirect in the sense that it relates to a sum of random lattices over which the relay sums various Gaussian measures, and not to the lattice codes themselves. The relay cannot control this random sum, and the criterion has hence not been further investigated until now. It is also noteworthy that following the work [3], the common belief has been that the structure over which the relay needs to sum is a lattice for any number K of transmitters. This is, as shown later (cf. Remark 5) not the case if K > 2. Connecting the flatness factor to the ML decoding metric in compute-and-forward involves a careful manipulation of the latter, and has been carried out in [3]; yet a major restriction needed to be imposed, and only integer lattices are allowed at the transmitters. It is this manipulation that allowed for the derivation of the first efficient decoding algorithms assuming a fading channel model, which were developed first in [3], [4] and, more recently, in [5]. To date, however, the algorithms only work in dimension n = 1 and for integer lattices. While the ML decoding framework has only been scarcely studied and, as mentioned above, only integer lattices can be employed in the present state of research, other interesting lattices have been proposed for codebook design in the general context of compute-and-forward. The 3 authors in [6] construct lattice codes over the Eisenstein integers and prove the existence of nested lattices which are simultaneously good for quantization and additive white Gaussian noise channel coding. They further show that their proposed scheme can achieve higher rates than in the original work [1]. More recently, an adaptive scheme was introduced in [7] which, depending on the channel, selects the quadratic number field extension F which achieves the highest rate for that specific channel realization. The lattices used at the transmitters are carved out from a lattice associated to the ring of integers O of the chosen number field, and the F decoded lattice point is hence an algebraic integer linear combination with coefficients in O . F Although the proposed scheme exhibits a high complexity, it it still shown that codes from algebraic lattices often provide an improvement in performance, and the the result from [6] that the Eisenstein integers on average achieve the highest rate are reproduced. It is thus of interest to extend the ML decoding framework to allow for further families of lattices other than integer lattices, such as algebraic lattices. Our main interest lies in analyzing the flatness behavior of the ML decoding metric in compute-and-forward when varying the lattices at the transmitters. The main contributions are: • Proposition 1 approximates the theta series of a real lattice given its generator matrix. This approximation is the main tool that allows us to analyze the behavior of the ML decoding metric in the latter sections of the article. • An extension of the ML decoding framework from integer lattices to any real lattice in arbitrary dimension. • For K = 2 transmitters, after a simplification of the ML decoding metric, we analyze the flatness behavior of the resulting function employing various real lattices at the transmitters. In particular, we employ algebraic lattices from quadratic and biquadratic number fields. This is, to the best of the authors’ knowledge, the first analysis of the actual resulting decoding metric that has been carried out to date. • We show that, for K > 2, the sum of Gaussian measures involved in the decoding process is not, as stated in related literature and commonly believed, performed over a lattice, but rather over a sum of K−1 random lattices. This prevents a straightforward generalization of the flatness factor of the decoding metric. We propose a generalization to K > 2 transmitters and, for the case K = 3, we prove in Proposition 3 an equivalent statement to the basic case and provide numerical results. 4 The article is organized as follows: We give an introduction to the essential aspects of lattice theory in Section II, and review the original compute-and-forward strategy in Section III. The ML decoding metric related to compute-and-forward is introduced in Section IV, where it is then further manipulated and simplified to ease its analysis, which is carried out in the subsequent Section V. Therein, we differentiate the cases of K = 2 and K > 2 transmitters and discuss the obtained results. Section VI concludes the paper. II. LATTICES AND THETA FUNCTIONS This section is dedicated to acquainting the reader with basic concepts in lattice theory. In addition to presenting basic properties of lattices, we derive an approximation of the theta series of a real lattice (cf. Definition 5) in Proposition 1, a result that will allow us to carry out an extensive analysis of the behavior of the decoding metric in the subsequent sections. In this article, a vector is labeled in bold, v, and is always represented as a column vector. A. Preliminaries on Lattices Definition 1. A lattice Λ ⊂ Rn is a discrete1 subgroup of Rn with the property that there exists a basis (b ,...,b ) of Rn such that 1 t t (cid:77) Λ = b Z. (1) i i=1 We say that (b ,...,b ) is a Z-basis of Λ, thus Λ ∼= Zn as abelian groups. We call t = 1 t rank(Λ) ≤ n the rank, and n the dimension of Λ. A lattice Λ(cid:48) ⊂ Rn such that Λ(cid:48) ⊂ Λ is called a sublattice2 of Λ. (cid:104) (cid:105) More conveniently, we can define a generator matrix M := b ··· b for a lattice Λ, Λ 1 t so that every point λ ∈ Λ can be expressed as λ = Mz (2) for some coefficient vector z ∈ Zn. Henceforth we will only consider full lattices, that is where t = n. 1By discrete we mean that the metric on Rn defines the discrete topology on Λ. 2Note that if dim(Λ)=dim(Λ(cid:48)), then the index |Λ/Λ(cid:48)| is finite. 5 For two vectors x,y ∈ Rn, let (cid:104)x,y(cid:105) denote the Euclidean scalar product, which is a non- degenerate, positive definite, symmetric bilinear form. We can identify the space Rn with its dual vector space Hom(Rn,R) via the map Rn → Hom(Rn,R) (3) x (cid:55)→ f , (4) x where f (y) = (cid:104)x,y(cid:105). Given a lattice Λ ⊂ Rn, we equivalently have the notion of its dual x lattice. Definition 2. Let Λ ⊂ Rn be a lattice. The dual lattice Λ∗ of Λ is the lattice Λ∗ = Hom(Λ,Z) = {x ∈ Rn|(cid:104)x,y(cid:105) ∈ Z for all y ∈ Λ}. (5) Let us briefly go back and consider a lattice Λ with generator matrix M = [b ] . The Λ i 1≤i≤n compact quotient Rn/Λ is an n-dimensional torus, and is obtained by identifying the faces of the fundamental parallelotope of Λ, defined as (cid:40) (cid:12) (cid:41) (cid:88)n (cid:12) P := b z (cid:12)0 ≤ z < 1 . (6) Λ i i(cid:12) i (cid:12) i=1 Definition 3. The volume of a lattice Λ is ν := vol(Rn/Λ) = vol(P ) = |det(M )|, (7) Λ Λ Λ and it is independent of the choice of the generator matrix M . Λ With the above expression, we can easily compute the volume of a sublattice Λ(cid:48) ⊂ Λ and of the dual lattice Λ∗ as ν = ν |Λ/Λ(cid:48)|, (8) Λ(cid:48) Λ ν = 1/ν . (9) Λ∗ Λ A further useful function related to a lattice Λ is a lattice quantizer Q , a function that maps Λ every point in x ∈ Rn to its closest point in the lattice. This function allows for a modulo-lattice operation x (mod Λ) := x−Q (x), as well as for the following definition. Λ 6 Definition 4. Let Λ be a lattice and Q a lattice quantizer. The Voronoi cell associated with a Λ lattice point λ ∈ Λ is the set V (λ) := {x ∈ Rn|Q (x) = λ}. (10) Λ Λ The basic Voronoi cell of Λ is V (0). Λ B. Poisson Summation Formula and Theta Series Let Λ ⊂ Rn be a lattice, and f : Rn → Cn an arbitrary function for which its Fourier transform fˆexists3, defined by the formula (cid:90) fˆ(y) := f(x)e−2πı(cid:104)x,y(cid:105)dx. (11) Rn Lemma 1 (Poisson Summation Formula). [8, Thm. 2.3] Let f : Rn → Cn be a function as above. Then (cid:88) (cid:88) ˆ f(x) = ν f(y). (12) Λ∗ x∈Λ y∈Λ∗ We finally introduce the most important object, here, related to a lattice: its theta series. Definition 5. Let Λ ⊂ Rn be a full lattice. For each r ∈ R, define Nm (r) := (cid:12)(cid:12)(cid:8)x ∈ Λ | ||x||2 = r(cid:9)(cid:12)(cid:12). (13) Λ The theta series of Λ is the generating function Θ (q) := 1+(cid:88)Nm (2r)qr = (cid:88)q||x||2. (14) Λ Λ r>0 x∈Λ Remark 1. The theta series converges absolutely if 0 ≤ q < 1. Although of great importance, the theta series is unfortunately only known in closed form for a handful of lattices, and is usually given in terms of the Jacobi Theta Functions ∞ ∞ ∞ θ2(q) = (cid:88) q(i+21)2, θ3(q) = (cid:88) qi2, θ4(q) = (cid:88) (−q)i2. (15) i=−∞ i=−∞ i=−∞ For our purposes in the subsequent parts of this article, the lattices that we will need to analyze are by no means given in any nice way, but rather arise from random sums. In order to be able 3Necessary conditions for the existence can be found in [8, p. 37]. 7 to deal with such lattices we propose the following result, which allows to approximate the theta series of a lattice given only its generator matrix. Before stating the proposition, we need the following technical definition. Definition 6. Let S ⊂ Rn be a bounded convex set. We define the set Lip(n,T,L) to be the collection of such sets S for which there are T maps φ ,...,φ : [0,1]n−1 → Rn satisfying for 1 T all 1 ≤ i ≤ T a Lipschitz condition |φ (x)−φ (y)| ≤ L|x−y|. (16) i i For a lattice Λ, we henceforth denote by λ := min ||x||2 the minimum norm of Λ, which min x∈Λ\{0} exists since Λ is discrete. Proposition 1. Let Λ ⊂ Rn be a full lattice with fundamental volume ν , and write for Λ convenienceλ = λ .ThethetaseriesΘ (e−πτ),interpretedasafunctionofτ,canbeexpressed min Λ as ∞ (πλ)n+1τ (cid:90) Θ (cid:0)e−πτ(cid:1) = 1+ 2 tne−πτλtdt+Ξ (τ,Λ,L), Λ Γ(cid:0)n +1(cid:1)ν 2 n 2 Λ 1 where the error term is given by ∞ (cid:90) Ξ (τ,Λ,L) = πτλC(n,Λ,L) tn−1e−πτλtdt. n 2 1 The involved constant C(n,Λ,L) depends on n, Λ, and the Liptschitz constant L, but is inde- pendent of the variable of interest, τ. Proof. Let α := (cid:80)r Nm (i) = (cid:12)(cid:12)(cid:8)x ∈ Λ | ||x||2 ≤ r(cid:9)(cid:12)(cid:12). We can express Θ (e−πτ) as r Λ Λ i=0 ∞ (cid:90) Θ (cid:0)e−πτ(cid:1) = (cid:88)e−πτ||x||2 = (cid:88) πτe−πτtdt Λ x∈Λ x∈Λ ||x||2 ∞ ∞ (cid:90) (cid:90) (cid:8) (cid:9) = # x ∈ Λ|||x||2 ≤ t πτe−πτtdt = α πτe−πτtdt. t 0 0 The substitution t (cid:55)→ λt yields ∞ (cid:90) (cid:0) (cid:1) Θ e−πτ = 1+ α πτλe−πτλtdt. Λ λt 1 8 √ √ Let B ( r) be an n-dimensional sphere around the origin with radius r, r ∈ R . Then it 0 >0 is well known that α ν lim r Λ√ = 1, r→∞ vol(B0( r)) √ n and vol(B ( r)) = π2rn . 0 Γ(n+1) 2 Further, let S ⊂ Rn be such that ∂S ∈ Lip(n,T,L). Then, if σ(r) := |x ∈ Λ∩rS|, we have vol(S) (cid:0) (cid:1) σ(r) = tn +O tn−1 , ν Λ where the constant in O(tn−1) depends on the lattice Λ, n, and the Liptschitz constant L. For √ √ our situation, let S = B ( λ) so that α = σ( t). Then, ∂S ∈ Lip(n,1,L) and 0 λt (λπt)n √ 2 n−1 α = +C(n,Λ,L) t . λt Γ(cid:0)n +1(cid:1) 2 We can thus write ∞ (cid:90) (cid:0) (cid:1) Θ e−πτ = 1+ α πτλe−πτλtdt Λ λt 1 ∞(cid:32) (cid:33) (cid:90) (λπt)n √ = 1+ 2 +C(n,Λ,L) tn−1 πτλe−πτλtdt (cid:0) (cid:1) Γ n +1 ν 2 Λ 1 ∞ (πλ)n+1τ (cid:90) = 1+ 2 tne−πτλtdt+Ξ (τ,Λ,L). Γ(cid:0)n +1(cid:1)ν 2 n 2 Λ 1 Remark 2. Although the approximation of Θ (q) given in Proposition 1 involves an integral, Λ the expression can be explicitly computed for a fixed dimension n, without the need of further approximations.Forthecasestreatedlaterinthepaper,thatiswheren = 2,4,theapproximation is explicitly given by  1+ e−λπτ(1+λπτ) if n = 2, Θ (cid:0)e−πτ(cid:1) ∼ νΛτ (17) Λ 1+ e−λπτ(2+λπτ(2+λπτ)) if n = 4. 2νΛτ2 C. Examples of Famous Lattices We conclude this section by introducing various lattices that will be used in latter parts of the paper. Most of the following examples can be found in more detail in [9], and as a reference for the basic notions in algebraic number theory, we refer to [10]. 9 1) TheLatticeZn: Westartwiththemoststandardexampleofalattice,namelyΛ = Zn ⊂ Rn. The identity matrix M = I serves as a generator matrix for Zn, and consequently ν = 1. Zn n Zn It is clear that λ = 1, and we have Θ (q) = θn(q). min Zn 3 2) The Checkerboard Lattice D : For n ≥ 3, we define the lattice n (cid:40) (cid:12) (cid:41) (cid:12) (cid:88)n D := x ∈ Zn(cid:12) x ≡ 0 (mod 2) , (18) n (cid:12) i (cid:12) i=1 for which a generator matrix can be given as   −1 1 0 ··· 0   −1 −1 1 ··· 0      M =  0 0 −1 ··· 0 . (19) Dn    ... ... ... ... ...    0 0 0 ··· −1 We have ν = λ = 2, and Θ (q) = 1 (θn(q)+θn(q)). Dn min Dn 2 3 4 3) The Lattice A : The n-dimensional lattice A , n ≥ 1, is defined as n n (cid:40) (cid:12) (cid:41) (cid:12) (cid:88)n+1 A = x ∈ Zn+1(cid:12) x = 0 . (20) n (cid:12) i (cid:12) i=1 If n = 2, the lattice A is known as the hexagonal lattice, and gets its name from the shape 2 of its Voronoi cells, which are hexagons. A generator matrix can be taken to be   1 −1 MA2 = 0 √32, (21) 2 (cid:113) so that ν = 3. We have λ = 1, and further Θ (q) = θ (q)θ (q3)+θ (q)θ (q3). A2 4 min A2 2 2 3 3 In dimension n = 4, besides D , one of the most interesting lattices is the lattice dual to A , 4 4 which can be represented by the generator matrix   1 1 1 −4 5   −1 0 0 1   5    MA∗ =  0 −1 0 1 . (22) 4  5     0 0 −1 1   5  0 0 0 1 5 We can compute νA∗4 = √15 and λmin = 45. 10 4) Algebraic Lattices: Let F be a number field of degree n and signature (r,s), corresponding to the number of real and pairs of complex monomorphisms σ : F → C, respectively. Let further i {b ,...,b } be a Z-basis4 of the ring of integers O of F. We can construct a lattice from O 1 n F F via the following Q-linear injective map, known as the canonical embedding: Ψ : F → Rn (23) x (cid:55)→ Ψ(x)t = (σ (x),...,σ (x),(cid:60)(σ (x)),(cid:61)(σ (x)),...,(cid:61)(σ (x))). 1 r r+1 r+1 r+s We have that Ψ(O ) is a lattice in Rn, and refer to it as an algebraic lattice. A generator F matrix for an algebraic lattice is given as   Ψ(b )t 1  .  M =  .. . (24) Ψ(OF)     Ψ(b )t n In this article, we will restrict to real quadratic and biquadratic number fields F, having √ signature (n,0) for n = 2,4. It is well-known that these fields are of the form F = Q( a) in √ √ the former, and F = Q( a, b) in the latter case, where a (cid:54)= b are square-free, positive integers. We will shortly denote an algebraic lattice constructed from F by Λ = Ψ(O ). F F We refer to [10, Cor. 2] and [10, Ex. 42 (pp. 51)] for obtaining an explicit Z-basis for the ring of integers O for n = 2 and n = 4, respectively. F III. THE COMPUTE AND FORWARD RELAYING STRATEGY We briefly review the original compute-and-forward framework. Assume that K > 1 trans- mitters want to communicate to a single destination, aided by M intermediate relays which, operating under the original compute-and-forward strategy and assuming a real-valued channel model, attempt to decode an integer linear combination of the transmitted messages. The model is depicted in Figure 1. The first hop from the transmitters to the relays is modeled as a Gaussian fading channel, while it is usually assumed that the relays are connected to a destination with error-free bit pipes with unlimited capacities. The destination can, upon reception of enough linearly independent equations, attempt to solve for the original codewords. In this article, we are solely interested in the decoding procedure applied by the relays, and hence our focus will be on the first hop. 4O is a free Z-module of rank n and, as such, has a Z-basis. F

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.