Lattice-Code based Multiple Access for the Uplink: Algorithms and Optimization
Abstract
This paper studies a lattice-code based multiple-access (LCMA) system. In the uplink, users encode their messages with the same -ary ring code mapped to -PAM, belonging to the ensemble of lattice codes. Each user’s signal is spread with its designated signature sequence, and all users transmit simultaneously. The receiver attempts to compute independent streams of integer-combinations (ICBs) of the users’ messages. For this, 1) we establish and solve a new “bounded independent vectors problem” (BIVP) which identifies a near-optimal set of coefficient vectors w.r.t. the ICBs, outperforming existing LLL and HKZ lattice reduction methods; 2) we put forth new non-linear and linear LCMA soft detection algorithms, which calculate the a posteriori probability w.r.t. the ICB over the lattice. The per-user complexity is of order no greater than , suitable for massive access of being large. The soft detection outputs are forwarded to ring-code decoders to recover the messages. With our developed techniques, LCMA is shown to support a significantly higher load of users and exhibits an improved frame error rate over state-of-the-art interleave-division multiple-access (IDMA) and sparse-code multiple-access (SCMA) schemes. Such advances are achieved with just parallel processing and single-user decoding operations, avoiding the implementation issues of successive interference cancelation and iterative detection.
Index Terms:
Multiple access, multi-user detection, multi-user MIMO, massive access, coded modulation, lattice-codes, compute-forward, physical-layer network coding, iterative decoding, soft detectionI Introduction
The multiple access (MA) problem is about how to support users’ reliable communication within resource blocks in time, frequency and spatial domains. For being very large, it becomes a massive access problem that is essential to “ubiquitous massive connectivity” envisaged for 6G [6GTextbookTongWen].
From 1G to 5G, the MA design was based on orthogonal transmission, where the users are allocated with non-overlap** frequency bands, separated time-slots, orthogonal spreading codes, orthogonal sub-carriers and independent beams, respectively [DTSETextbook]. Orthogonal transmission is fundamentally limited by the following: First, the number of supported users is capped by the number of resource blocks . Second, dynamic resource allocation is required to maintain the orthogonality, where the signaling cost skyrockets as becomes large. This becomes a bottleneck for massive access. Third, despite the orthogonalization at the transmitters, the wireless channel induces signal distortion that can easily destroy the orthogonality. This invokes an orthogonality-restoring process that may subject to an unaffordable cost [Dai18, ding2017application].
Non-orthogonal MA (NOMA) allows collision of multiple users’ packets. As such, the number of users can go beyond the number of resource blocks [CoverTextbook]. Further, one can trade-in a higher by reducing the peak rates of individual users, providing a high flexibility that are very much desired for ubiquitous MA [6GTextbookTongWen]. Moreover, NOMA enables grant-free (GF) transmission, with which the signalling overhead incurred by dynamic resource allocation can be slashed, making it possible to realize massive access in 6G.
A pivotal issue of MA is how to deal with multi-user interference (MUI). Most existing NOMA schemes are based on interference suppression and cancelation that “reject” the MUI, as in power-domain NOMA with successive interference cancelation (SIC) and code-domain NOMA with iterative detection and decoding (IDD) [ten2003design]. In theory, the mechanism of rejecting MUI generally leads to a reduced system load . In practice, such schemes are subject to issues that have prevented them from being implemented in 5G: 1) The power-domain NOMA with SIC is subject to a fundamental loss in achievable rate, while the processing delay and accumulation of error propagation become drastic as increases. 2) Existing code-domain NOMA schemes require IDD, i.e., iterations between the multi-user detector and a bank of channel-code decoders. In particular, IDD requires a strict matching between the multi-user detector and the decoders, following the principle of extrinsic information transfer (EXIT) [ten2001convergence]. As the system load increases, the EXIT function of the multi-user detector varies, which would break the matching. This leads to a failure of convergence that destroys the functionality of IDD receiver. Moreover, typically to 10 IDD iterations are required, which amounts to multi-user detection operations implemented in serial, as well as channel-code decoding operations. This may result in a high processing delay and a complexity that may not be affordable.
I-A Contributions
In this paper, we study a lattice-code based MA (LCMA) system, which is regarded as a practical embodiment of the notion of compute-forward MA [zhu2016gaussian]. In contrast to conventional NOMA schemes that reject MUI, LCMA embraces MUI by exploiting the map** between the structure of users’ superimposed signal and the lattice space. This paper contributes to this subject by develo** a package of techniques involving: 1) efficient nonlinear and linear soft detection algorithms, 2) optimization methods and 3) practical lattice coding for LCMA.
In the uplink, users encode their messages with the same lattice-code. We put forth a simple yet powerful practical lattice coding technique, referred to as -ary ring-coded modulation (RCM), suitable for the mainstream -PAM or -QAM signaling. Each user’s code-modulated sequence undergoes a spreading process with its signature sequence. The resultant signals of users are transmitted simultaneously.
For the receiver, we propose to identify the optimized map** between the superposition of the users’ signals and the lattice-code space by solving a new bounded independent vector problem (BIVP). The solution to BIVP is optimal in the sense of mean square error (MSE), and outperforms existing Lenstra-Lenstra-Lovász (LLL) and Hermite Korkine-Zolotarev (HKZ) methods. A solution to the optimized spreading sequences is also presented.
We devise efficient LCMA soft detection algorithms to calculate the a posteriori probability (APP) w.r.t. the integer-combination (ICB) of users’ messages. Both non-linear and linear soft LCMA detectors are explicitely studied. The non-linear soft detector goes beyond existing regularized integer-forcing method for the latticed-coded based system. The linear soft detector is carefully devised such that its per-user complexity is of order no greater than . The resultant APP streams are forwarded to ring-code decoders which make decisions on the ICBs in parallel, leading to the recovery of all users’ messages.
We demonstrate that, without using SIC or IDD, LCMA can support a remarkably higher load of users, relative to existing state-of-the-art NOMA schemes. For example, with a 5G NR LDPC code of rate 1/2, LCMA achieves a system load of up to in a fading MA channel, which dramatically outperforms baseline NOMA schemes such as IDMA and SCMA. Such advanced functionality and performance are achieved with low-latency parallel processing, low detection complexity of order less than per-user, and exactly channel-code decoding operations. These features would be desirable for MA and massive access in 6G systems. Beyond the uplink MA setting, our developed techniques of LCMA can also be utilized for the downlink broadcast channel and distributed MIMO systems. Also, considerable performance improvement with the new non-linear soft detector over existing regularized integer-forcing is demonstrated.
I-B Literature Review
I-B1 Multiple-access
MA schemes that are based on interference cancelation and suppression have been extensively studied in the past two decades [islam2016power, ding2017application]. Not long after the discovery of turbo codes in 1993, the “turbo principle” was introduced for the multi-user decoding, first by Wang&Poor [wang1999iterative]. Since 2000, turbo-like IDD has been extensively researched. In “turbo-CDMA” [wang1999iterative], the inner code is a multi-user detector with soft interference cancelation and linear minimum MSE (MMSE) suppression, while the outer code is a bank of convolutional code decoders. Soft probabilities are exchanged among these components iteratively. In 2006, Li et al. introduced a chip-level interleaved CDMA, named after interleave-division multiple-access (IDMA) [LiTWC06]. The chip interleaver enables uncorrelated chip interference, and thus a simple matched filter optimally combines the chip-level signal to yield the symbol-level soft information.
Low-density spreading CDMA and sparse-code MA (SCMA) differ from IDMA in that each symbol-level signal is spread only to a small number of chips, which forms a sparse matrix in the representation of the multi-user signal that can be depicted using a bi-partite factor graph [nikopour2013sparse]. SCMA also supports grant-free (GF) MA mode for the massive-connectivity scenario. Spatially coupled codes were also studied for dealing with the MA problem, yielding improved performance for fading MA channels thanks to the universality [KudekarISIT11]. For IDMA and SCMA, spreading/sparse codes with irregular degree profiles were investigated including the work of ourselves [YangTWC09, nikopour2013sparse], which yielded improved convergence behavior of the multi-user decoding.
Rate-splitting MA (RSMA) was studied for closed-loop systems [RimoldiIT96, MaoTcom19]. The idea is to superimpose a common message on the private messages, which may enlarge the rate-region. Other code-domain NOMA techniques are proposed such as pattern division MA (PDMA), multi-user shared access (MUSA) and etc. [chen2016pattern], which exhibits merits for implementation. For grant-free MA, active user identification based on compressive sensing and coded slotted Aloha protocols are studied [ChengJSAC21, SunTcom17, PaoliniIT15], which enables slashed signaling overhead that is essential to massive access. Here we are not able to list all existing results in the area of MA, and readers are encourage to refer to the excellent survey in [Dai18]. Note that most existing MA schemes rely on the notion of “rejecting MUI”, where the MUI structure is not or insufficiently exploited.
I-B2 Literatures of Lattice-codes and Compute-forward
For general multi-user networks, it has been proved that “structured codes” based on lattices can achieve a larger capacity region compared to conventional “random-like coding” [nazer2007computation]. The proof was based on the idea of “algebraic binning” of codewords, where each bin collects a certain subset of all codewords. The structure of lattice-codes enables efficient generation of the bin-indices as in the source coding with side information (SI) problem, and efficient decoding of the bin-indices as in the channel coding with SI problem[ZamirTIT02]. For the physical-layer network coding (PNC) or compute-forward (CF) problem, by adopting lattice-codes at source nodes, the receiver can directly compute the bin-indices in the form of integer-combinations of all users’ messages[NazerIT11], leading to remarkable coding gain or even multiplexing gain[NamIT10, YuanYangIT13]. The work in [LimTIT20] extended the computation of single integer-combination in the original CF framework to simultaneous computation of more than one integer-combinations. The results on using lattice-codes for tackling MIMO detection and downlink MIMO precoding problems were reported in [ZhanIT14] and [SilvaTWC17] under the name of integer-forcing (IF). The latter borrowed the notion of reverse CF which exploited the uplink-downlink duality [HongIT13, YangTWC17]. Various lattice reductions methods for identifying a “good” coefficient matrix for the integer-combinations have been reported in many works such as [SakzadTWC13]. Recently, CF and IF have been extended to time-varying or frequency-selective fading channels using multi-mode IF and ring CF [YangTWC20, LyuTIT19]. The IF notion was also applied to solve the inter-symbol-interference equalization problem with the help of cyclic linear codes [OrdentlichTIT12]. Here we are not able to list all existing results on lattice-codes, CF and IF, and highly motivated readers are encouraged to refer to [ZamirTIT02] and [LimTIT20].
I-B3 Lattice-codes and MA
From an information theoretic perspective, Zhu and Gastpar showed that any rate-tuple of the entire Gaussian MA capacity region can be achieved using a lattice-code based approach, and the scheme was named compute-forward MA (CFMA) [zhu2016gaussian]. In contrast to random-like coding approaches exploited in existing NOMA schemes, lattice-code based MA exhibits greater capacity region achieved with low-cost single-user decoding. The design of CFMA for the Gaussian MA channel with binary codes was studied in [sula2018compute]. Recently, we extend the result of [zhu2016gaussian] and [sula2018compute] to fading MA channel with practical -ary codes[ChenISIT22, ChenTWC22].
To date, most of the related works on lattice-codes for MA have been focusing on achievable rates by proving the existence of “good” nested lattice-codes, whereas the practical aspects are not yet sufficiently researched. The works in [sula2018compute] and [ChenTWC22] do not apply to practical -QAM signaling and MIMO. The impacts of lattice-codes on the key performance indicators such as the system load, FER, latency, complexity and etc., remain not reported in the literature. In addition, for a large , there lacks efficient algorithms for both the soft detection and the identification of the coefficient matrix with realistic implementation costs. This motivates us to develop a package of practical coding, efficient signal processing algorithms and optimization methods for lattice-code based MA.
II Preliminaries of Lattice-codes with Ring-coded Modulation
This section presents the coding and modulation upon which LCMA is built. We suggest a simple yet powerful lattice code, namely -ary ring-coded modulation (RCM) with -PAM signaling, as the underlying coded-modulation for LCMA. RCM is much simpler than existing low-density lattice-codes [SommerTIT08], which does not apply to mainstream modulation schemes.
Let denote a -ary message sequence111The conversion from a binary message sequence to a -ary message sequence is straightforward.. Each entry of belongs to an integer ring . For a prime , becomes a Galois field GF. For a non-prime , e.g., , the addition and multiplication rules of are different from those of GF. This paper is primarily interested in which matches with the mainstream -QAM signaling.
A -ary ring-code with generator matrix of size -by- is employed to encode , given by
(1) |
where “” represents the operation of matrix multiplication modulo- and . Let denote the codebook collecting all codewords w.r.t. (1). A random vector may be generated and added on for random permutation. For conciseness, the details are omitted, see [ChiuIT10, QiuTcom18].
Each entry of is one-to-one mapped to a symbol that belongs to a constellation of points. For -PAM constellation (with identical spacing), the map** is
(2) |
Here normalizes the average symbol energy. The rate of RCM is bits/symbol. For a complex-valued model, two independent -level RCM, one for the inphase part and the other for the quadrature part, form a RCM with -QAM signaling. That is,
(3) |
Gaussian and Einstein integers for complex-valued model are beyond the scope of this paper [SunTcom13].
Remark 1
[“Good” generator matrices ] For , RCM reduces to binary channel coding with BPSK (or QPSK) signaling. Any state-of-the-art binary channel codes, such as LDPC codes and polar codes in 5G NR standards, can be utilized to execute (1) and the associated decoding. For , repeat-accumulate ring-codes are studied in a separate work of ours [YuTcom22]. By introducing a doubly irregular structure w.r.t. the zero-divisors of the integer ring, our developed -ary ring-codes approach the near-capacity of the -PAM input AWGN channels. Such codes are ready to be used in a LCMA system.