Chapter Summary

Chapter Summary

Key Points

  • 1.

    The Nazer-Gastpar framework: decode functions, not messages. On a KK-user Gaussian MAC-relay channel y=khkxk+w\mathbf{y} = \sum_k h_k \mathbf{x}_k + \mathbf{w}, the relay can decode the modulo-lattice linear combination kakukmodΛs\sum_k a_k \mathbf{u}_k \bmod \Lambda_s for any integer vector aZK\mathbf{a} \in \mathbb{Z}^K, without ever decoding individual messages. Lattices are the natural primitive because they are closed under integer linear combinations: if u1,u2Λc\mathbf{u}_1, \mathbf{u}_2 \in \Lambda_c then a1u1+a2u2Λca_1 \mathbf{u}_1 + a_2 \mathbf{u}_2 \in \Lambda_c automatically. The framework unifies physical-layer network coding, integer-forcing, and distributed source coding under a single coding principle.

  • 2.

    The Nazer-Gastpar computation rate. The central theorem (Thm. TNazer-Gastpar Computation Rate) gives R(h,a)=12log2+(1/(a2SNR(hTa)2/(1+SNRh2)))R(\mathbf{h}, \mathbf{a}) = \tfrac{1}{2} \log_2^+ \big( 1 / (\|\mathbf{a}\|^2 - \text{SNR}(\mathbf{h}^T \mathbf{a})^2 / (1 + \text{SNR}\|\mathbf{h}\|^2)) \big), achieved by a shared nested Erez-Zamir codebook ΛcΛs\Lambda_c \supset \Lambda_s, MMSE scaling α=SNR(hTa)/(1+SNRh2)\alpha^* = \text{SNR} (\mathbf{h}^T \mathbf{a})/(1 + \text{SNR}\|\mathbf{h}\|^2) at the relay, and modulo-Λs\Lambda_s decoding to the nearest Λc\Lambda_c point. The rate is high when a\mathbf{a} is a close integer approximation to h\mathbf{h} (Diophantine alignment); it degenerates to the single-user AWGN capacity in the K=1K = 1 case.

  • 3.

    Two-way relay: within 1/2 bit of capacity. On the symmetric Gaussian TWRC, Nam-Chung-Lee (Thm. TNam-Chung-Lee: CF Is Within 1/2 Bit of TWRC Capacity) proved that compute-and-forward with integer coefficient a=(1,1)T\mathbf{a} = (1, 1)^T achieves a per-user rate of 12log2+(1/2+SNR)\tfrac{1} {2} \log_2^+ (1/2 + \text{SNR}), which is within 12\tfrac{1}{2} bit of the cut-set upper bound for all SNR. This doubles the throughput of the classical four-slot routing protocol (two slots for MA + BC instead of four for sequential uplink- downlink) and strictly outperforms amplify-and-forward and decode-and-forward at moderate-to-high SNR. The key move: the relay decodes uA+uBmodΛs\mathbf{u}_A + \mathbf{u}_B \bmod \Lambda_s in one slot, then broadcasts it, and each user subtracts its own message to recover the other's.

  • 4.

    Physical-layer network coding is CF with mathbfa=(1,1)\\mathbf{a} = (1,1) and BPSK. Zhang-Liew-Lam's 2006 MobiCom PNC protocol — relay extracts the XOR uAuBu_A \oplus u_B directly from the analog BPSK superposition — is the Λs=2Z\Lambda_s = 2\mathbb{Z} / binary special case of the Nazer-Gastpar framework (Thm. a=(1,1)T\mathbf{a} = (1, 1)^T Special Case of CF" data-ref-type="theorem">TPNC Is the a=(1,1)T\mathbf{a} = (1, 1)^T Special Case of CF). PNC is rate-capped at 11 bit per channel use per user by its BPSK codebook; lattice- CF with higher-dimensional nested lattices breaks this cap and approaches Gaussian capacity. PNC was the conceptual breakthrough — "the wireless medium is a computational resource" — and lattice-CF is its rigorous generalisation.

  • 5.

    Integer-forcing: CF as a MIMO receiver. Ordentlich-Erez- Nazer (2014) showed that CF applied row-by-row to a K×KK \times K MIMO channel — decode KK linearly independent integer combinations and invert the integer matrix AZK×K\mathbf{A} \in \mathbb{Z}^{K \times K} — achieves the MIMO sum-capacity within a constant gap (Thm. TInteger-Forcing Achieves a Constant Gap to MIMO Sum-Capacity). Integer-forcing strictly dominates zero-forcing on ill- conditioned channels because the integer inverse A1\mathbf{A}^ {-1} is exact (no noise enhancement), unlike H1\mathbf{H}^{-1}. The main cost is the integer-coefficient search, which is an SVP instance.

  • 6.

    The integer-coefficient search is NP-hard. Finding a(h)=argmaxaZKR(h,a)\mathbf{a}^*(\mathbf{h}) = \arg\max_{\mathbf{a} \in \mathbb{Z}^K} R(\mathbf{h}, \mathbf{a}) reduces to the shortest-vector problem (SVP) on an integer lattice with Gram matrix Gch(h)=ISNRhhT/(1+SNRh2)\mathbf{G}_ {\rm ch}(\mathbf{h}) = \mathbf{I} - \text{SNR}\, \mathbf{h} \mathbf{h}^T/(1 + \text{SNR}\|\mathbf{h}\|^2). SVP is NP-hard in general (Ajtai 1996), but LLL reduction (Lenstra-Lenstra- Lovász 1982) gives a polynomial-time approximation good enough for K20K \le 20. Beyond that, heuristic SVP solvers or reduced-search CF (restrict aAmax\|\mathbf{a}\|_\infty \le A_{\max}) are used. Practical CF deployment has stayed at small KK as a result.

  • 7.

    CF requires quasi-static channels and sample-level sync. The integer vector a\mathbf{a} is channel-dependent, so h\mathbf{h} must be constant over the coding block (coherence time nTs\ge n T_s — roughly 1010 ms at 30 kmh, 33 GHz). Transmitters must be sample-aligned to within Ts/10T_s/10 (roughly 3μ3\,\mus for 5G NR 30-kHz SCS) for the analog superposition to land on a lattice point; frequency offsets must be below 1/(nTs)1/(nT_s). These requirements are stringent enough that no major commercial standard (LTE, 5G NR, Wi-Fi 7) implements CF. Research prototypes (satellite relay, IAB test-beds) rely on GPS-disciplined clocks. 5G NR's integrated access and backhaul (Release 16) is a structural fit for CF but uses orthogonal multiplexing instead.

  • 8.

    CF extends to interference, source coding, and beyond. Nazer-Gastpar's main application was the KK-user Gaussian interference channel: each receiver treats the KK transmitters as a MAC and applies CF with a receiver-specific integer vector, achieving within-constant-gap of the Etkin-Tse-Wang sum-capacity bound — a lattice alternative to Cadambe-Jafar interference alignment. The Körner-Marton distributed source coding problem admits a lattice-CF interpretation with sensor-network applications. Integer-forcing on massive MIMO (Ch. 20) inherits the framework for high-dimensional receive beamforming. The compute-and-forward viewpoint — treat the wireless medium as a computational resource, not an interference source — is Nazer-Gastpar's most lasting legacy.

Looking Ahead

Chapter 19 turns to probabilistic shaping for BICM — the finite-length complement to the lattice-code asymptotics of Chapters 15-18. Probabilistic amplitude shaping (Böcherer- Steiner-Schulte 2015) achieves shaping gains of up to 1.531.53 dB for BICM systems using standard LDPC/Polar codes, without the infinite-dimensional nested-lattice construction. It is the practical bridge between the "capacity-approaching lattice code" of Chapter 16 and the "production LDPC in 5G NR" of Chapter 19.

Chapter 20 applies the integer-forcing linear receiver of this chapter to massive MIMO with M=64M = 64-128128 antennas at the base station. The channel hardening regime (MM \to \infty) makes the effective K×KK \times K channel well-conditioned, so the integer-coefficient search stays tractable and the CF framework scales. Pilot-contamination and coded-modulation strategies for massive MIMO form the bulk of Chapter 20.

Chapter 21 integrates BICM-OFDM — the practical coded-modulation layer of every modern wireless standard — with frequency-selective fading. It revisits the BICM structure of Chapter 8 and the diversity arguments of Chapter 12 in the OFDM-subcarrier domain. The chapter closes Part IV and pivots toward the application- layer concerns of Part V.

The unified theme of Part IV is that lattices are the natural coding primitive for Gaussian networks, just as linear block codes are the natural primitive for binary-symmetric channels. Chapters 15 through 18 built this lattice foundation — from definitions (Ch. 15) through AWGN capacity (Ch. 16), nested- lattice dirty-paper coding (Ch. 17 — not covered here in detail), and compute-and-forward (this chapter) — and Chapter 19 onwards will pull the lattice thread through probabilistic shaping, massive MIMO, and BICM-OFDM.