Prerequisites & Notation
Before You Begin
Interference alignment over finite fields is the last "tool" chapter of Part I before Part II's coded-computing constructions. The prerequisites are linear algebra over , comfort with the language of degrees-of-freedom, and the secret-sharing background of Chapter 3. Readers who have skipped the IA literature in the wireless ITA book will find the discrete setting both cleaner and more directly applicable to the algebraic problems of distributed computing.
- Linear algebra over finite fields (Review ch03)
Self-check: For , what is the relationship between , , and ?
- Vector subspaces, intersections, and direct sums
Self-check: For subspaces , when is ?
- Degrees-of-freedom (DoF) intuition for multi-user channels(Review ch17)
Self-check: In the -user interference channel, how many DoF can each user achieve in the high-SNR limit?
- Discrete memoryless channels and capacity(Review ch09)
Self-check: Can you state the capacity of a noiseless -ary symmetric channel?
- Chapter 2's distributed-computing framework(Review ch02)
Self-check: Can you state the optimal tradeoff?
Notation for This Chapter
IA-specific notation. We work over a fixed prime power and use for the number of interfering users (matching the interference-channel literature). When later refers to the recovery threshold of coded matrix multiplication (Chapter 5), we will use to disambiguate. The same caveat applies to — here it is the per-user signal dimension.
| Symbol | Meaning | Introduced |
|---|---|---|
| Finite field over which IA is performed (typically prime power) | s01 | |
| Number of interfering transmitter–receiver pairs | s01 | |
| Beamforming (precoding) matrix used by transmitter | s01 | |
| Receive-side projection (interference-cancelling) matrix at receiver | s01 | |
| Number of degrees of freedom (DoF) achieved by user | s01 | |
| Cross-channel matrix from transmitter to receiver | s01 | |
| Per-user cache size (in number of files), Section 4.3 | s03 | |
| Number of files in the library (coded caching) or files in PIR | s03 | |
| PIR collusion threshold (Section 4.4) | s04 |