Chapter Summary
Chapter Summary
Key Points
- 1.
Finite-field interference alignment delivers the DoF gain without the wireless baggage. Each of users achieves DoF in the large-signal-dimension limit — a factor of over TDMA — by jointly choosing precoders so that unwanted interferers at each receiver share a common subspace. The discrete setting avoids the CSI-precision barrier that limits wireless IA.
- 2.
Coded matrix multiplication has recovery threshold . When is partitioned into blocks and into blocks, the product has blocks and the master needs at least worker responses. Both generic random IA and deterministic polynomial codes (Chapter 5) achieve this bound.
- 3.
Coded caching delivers a global gain via XOR alignment. The Maddah-Ali / Niesen scheme encodes user demands into a single broadcast; each user's cache cancels the unintended interferers. The same algebraic pattern will reappear as the coded-shuffling gain in Chapter 7.
- 4.
Classical PIR capacity is an IA-tight expression. Sun-Jafar's is achieved by finite-field alignment of the queries across replicated databases, and matched by a cut-set converse. Chapter 13 extends this to coded storage, colluding databases, and symmetric PIR.
- 5.
IA is the tool; the rest of the book is the specializations. Chapters 5, 7, and 13 each take the IA machinery of this chapter and specialize it to one operational setting. Understanding §4.1's alignment condition now pays dividends for most of the rest of the book.
Looking Ahead
Part I is now complete. Chapter 5 uses the IA-based recovery threshold of §4.2 as the starting point: we develop the polynomial-code construction explicitly, prove its optimality, and measure its speedup on real distributed-training workloads. The finite-field IA perspective of this chapter is what makes polynomial codes feel inevitable rather than clever.