A Survey on Robust Interference Management in Wireless Networks

Recent advances in the characterization of fundamental limits on interference management in wireless networks and the discovery of new communication schemes on how to handle interference led to a better understanding towards the capacity of such networks. The benefits in terms of achievable rates of powerful schemes handling interference, such as interference alignment, are substantial. However, the main issue behind most of these results is the assumption of perfect channel state information at the transmitters (CSIT). In the absence of channel knowledge the performance of various interference networks collapses to what is achievable by time division multiple access (TDMA). Robustinterference management techniques are promising solutions to maintain high achievable rates at various levels of CSIT, ranging from delayed to imperfect CSIT. In this survey, we outline and study two main research perspectives of how to robustly handle interference for cases where CSIT is imprecise on examples for non-distributed and distributed networks, namely broadcast and X-channel. To quantify the performance of these schemes, we use the well-known (generalized) degrees of freedom (GDoF) metric as the pre-log factor of achievable rates. These perspectives maintain the capacity benefits at similar levels as for perfect channel knowledge. These two perspectives are: First, scheme-adaptation that explicitly accounts for the level of channel knowledge and, second, relay-aided infrastructure enlargement to decrease channel knowledge dependency. The relaxation on CSIT requirements through these perspectives will ultimately lead to practical realizations of robust interference management techniques. The survey concludes with a discussion of open problems.


Introduction
There is an ever increasing demand for high data rates (i.e., high spectral efficiency) as well as reliable and low-delay communication at low cost.In order to meet this demand, service providers have to use the available yet limited resources in the most efficient manner.In this context, information theory seeks to characterize the capacity, i.e., the highest possible set of rates for reliable communication, of any wireless network.Starting from capacity characterization of noise-limited networks [1], the research community has shifted its focus towards interference-limited networks.Interference is regarded as the final barrier in communications which has to be overcome [2].However, the exact capacity characterization is in general an open problem.In consequence, for interference-limited networks, the (generalized) degrees of freedom (GDoF) metric (first-order capacity approximation) [3] is predominately used by the research community.The study of the DoF led among others to the discovery of interference alignment (IA) [4][5][6][7].IA has been shown to be DoF-optimal for many channels such as X and interference channel [4,8].
Capacity results on interference-limited networks vastly rely on the fact that abundant information on the channel is available at all nodes.Channel state information (CSIT) is important to overcome the interference as limitation for reliable communication.While the assumption of perfect CSI at the receiver (CSIR) is in practice justified (i.e., retrieving CSIR can be obtained by well known estimation techniques, for example, by pilot signaling), the existence of perfect channel state information at the transmitters (CSIT) is rarely met.This is due to nature of the wireless fading channel and the limitation in the available feedback bandwidth.In contrast to the case of perfect CSIT, when CSIT is absent, the DoF performance of various interference networks collapses to what is achievable by time division multiple access (TDMA).In this context, robust interference management becomes important as it maintains high achievable rates despite the absence of perfect CSIT.Robust interference management exploits the level of CSIT, in the most efficient manner.There is only limited work in the area where channel knowledge is imperfect.Only recently, the impact of imperfections on the DoF was investigated from various perspectives.Those include cases in which some channels are perfectly known, while others are completely unknown [9,10], cases in which the CSIT is available however only in a delayed or outdated fashion [11][12][13][14].In other cases the knowledge of the channel is reduced to the channel coherence patterns [15] or the topology of the network [16,17].What all these works have in common is that they adapt the achievable schemes to the level/quality of CSIT.Insights are gained on how and when the quality of CSIT has an quantitative impact on the achievable rates.In consequence, the resources available (pilots etc.) can be better utilized to provide the quality of CSIT in cases where it is needed, while avoiding resource allocation in cases where it is not needed.Interestingly, in addition to efficient resource allocation, infrastructural measures, in particular through means of relay nodes [18], can relax the conditions on the required quality and timeliness of the channel knowledge to achieve a certain DoF [19,20].In addition, such approach can reduce the signaling complexity significantly, i.e., instead of achieving the optimal DoF asymptotically over infite symbol dimensions in X networks [8] the addition of a relay allows a finite signaling interval for attaining the optimal DoF [21].
In this paper, we seek to give an overview on promising, state-of-the-art robust interference management techniques in the form of a survey.To this end, we use the (G)DoF as a first-order metric for approximating the capacity.Through simple examples on distributed and non-distributed interference networks, namely X and broadcast channel, we explain how different levels of imperfect CSIT and/or infrastructural measures can facilitate robust interference management and as such outperform TDMA as a trivial interference avoidance strategy.
The rest of the paper is organized as follows.In Section 2, we introduce the channel model.To be self-contained, we review the first-order capacity metric, (generalized) degrees of freedom, in Section 3. In Section 4, different quality levels of CSIT are identified.We outline important robust schemes for distributed and non-distributed networks in Section 5 for different levels of CSIT.Finally, Section 6 presents open problems and concludes the paper.

Channel Model
Consider an S × J × D distributed wireless network that consists of S source nodes, J relays and D destination nodes indexed from disjoint sets {1, . . ., S}, {S + 1, . . ., S + J} and {S + J + 1, . . ., S + J + D}, respectively.Half-duplex operation is assumed at all relay nodes.The input-output system equation for such a network is given by is the collection of all channels from all sources to relays F[t], sources to all destinations H[t] as well as sources to relays G[t].Each transmitting node j (relays are included) is assumed to be subject to an average power constraint of P, i.e., E[|x j [t]| 2 ] ≤ P. Since the noise variance is of unity norm, we commonly refer to the power constraint P as the SNR.For the case of multiple antennas at any node, Equations ( 1) and (2) require matrix and vector modifications which we omit for the sake of brevity.

Metrics
The exact information theoretic capacity of wireless networks in general is unknown at large.The methodology of progressive refinement is useful for characterizing capacity limits of Gaussian channels in the interference-limited regime.The following steps involved in this approach are as follows: DoF → GDoF → Constant Gap → Capacity In this path, the degrees of freedom (DoF) serves as the starting point.The analysis of the DoF as a first-order (sum) capacity approximation C Σ in the high SNR limit [7] given by C Σ = DoF log(P) + o(log(P)) (4) has initiated, for example, the discovery of interference alignment [4,5].Intuitively, the DoF denotes the number of interference-free streams, i.e., point-to-point channels with reference SNR of P, the network can be reduced to as P → ∞.Thus, we can rewrite (4) in terms of the DoF by DoF = lim P→∞ C Σ (P) log(P) .
Hereby, log(P) approximates the capacity of a reference point-to-point Gaussian channel with an SNR of P as P → ∞.The generalized degrees of freedom (GDoF) represents the next step towards capacity.This metric refines first-order capacity approximations by maintaining the ratio of signal strengths at the high SNR limit.In contrast, the DoF metric treats all non-zero channels as equally strong and ignores signal strength variations of different channel links.To preserve the channel strength in the GDoF, we make the following two definitions.First, we define the per-link SNR ij for constant channels, i.e., hij [t] = hij , ∀t, by Second, we define the power exponents γ ij for each link according to [3] Equation ( 7) is equivalent to SNR ij = P γ ij .With these two definitions, we can rewrite (1) according to: where θ ik denotes the phase of channel hik .The power constraint at the k-th source node becomes This is due to the fact that the transmit power in the original channel model in ( 1) is incorporated in the expression √ P γ ik .We use the matrices γ and θ to denote the collection of all γ ij and θ ij , respectively.With these definitions in place, the GDoF is then defined as follows: In [22] for instance, GDoF inner and outer bounds depend only on elements of γ.A GDoF characterization may function as a step towards characterizing the capacity within a constant gap.Such a gap does neither depend on channel realizations nor on the SNR.Further refinement may lead to exact capacity descriptions.This path of progressive refinement has been applied in [3], where the authors show that the Han-Kobayashi scheme [23] achieves the entire channel capacity region within 1 bit for the case of perfect CSIT.These steps ought to be applied under the setting of imprecise CSIT.Since, research in the area of imprecise CSIT is rather unexplored, we limit the scope of this survey to the (G)DoF metric.In the next section, we will identify different levels of CSIT.

Channel State Information
Channel state information (CSI) refers to the knowledge of channel properties of a wireless network.We differentiate between channel state information at the transmitter and at the receiver (CSIT and CSIR).CSIT and CSIR specify at which nodes (source or destination) CSI is available.Particularly, in most practical applications, it is more challenging to obtain accurate CSIT than CSIR [24].Thus, in the latter we will restrict our focus on the quality of CSIT assuming the availability of perfect CSIR.Channel properties as part of CSIT may include but are not limited to channel coefficients hmj [t] in various forms (instantaneous, delayed, etc.), network topology, output feedback, etc.In the remainder of this section, we will explain various channel properties in greater depth in a specific order.That is, we aim to categorize CSIT qualitatively from high to low fidelity.Figure 1 intends to order the CSIT qualitatively.

Perfect CSIT
When transmitter node j ∈ {1, . . ., S} is aware of a set of instantaneous channel coefficients { hij [t]} prior to sending symbol x j [t] at time instant t, we say that this particular node possesses perfect CSIT.Specifically, when the aforementioned knowledge set { hmj [t]} of channel coefficients at node j is restricted to then the j-th transmitter has access to (a) local and (b) global CSIT.Through any type of instantaneous, perfect CSIT, the transmitter can adapt its transmission strategy through adjustment in rate and/or power [25].The majority of existing work on determining information theoretic capacity, or even capacity-approximating metrics for that matter, take the availability of perfect (global) CSIT as basis of establishing lower (achievability schemes) and upper bounds.Optimality results for this CSIT-setting can be considered as the benchmark/upper bound for any other relaxed form of CSIT to be described in the sub-sections to come.

Imperfect CSIT
By accounting for imperfections in channel estimation through piloting, feedback delay and quantization noise, the CSIT model of Section 4.1 moves to a more practical model of imprecise or imperfect CSIT.Depending on whether channel variation is small/large (fast vs. slow fading) relative to the incurred delay in CSI reporting, accuracy may vary.On the one extreme, CSI reports may be correlated with the actual channel realization hij [t] of the j-th transmitter such that CSI reports represent estimation sources for imperfect instantaneous CSIT.On the other extreme, when CSI reports and hij [t] are uncorrelated, channel state reports at Tx-j are outdated or delayed.The context of global and local CSIT is also applicable to the case of imperfections.

Imperfect Instantaneous CSIT
As described above, CSI reports to a transmitter may function as sources to estimate the instantaneous CSI at time instant t in an imperfect manner according to [26] where ĥij [t] and ∼ hij [t] represent estimate and estimation error, respectively.For the sake of simplicity, the stochastic processes { ĥij [t]} and { ∼ hij [t]}, ∀i, j, are assumed to be stationary and ergodic (cf.[27,28]) such that its stochastic moments do not change over time, e.g., the mean square error For any channel hij , the non-negative parameter α ij ∈ [0, 1] can be introduced as the power exponent of the estimation error in the high SNR regime [28,29] We observe that every MSE σ 2 ij scales with O(P −α ij ).Thus, for α ij = 0 and α ij = 1, the estimation error scales according to O(1) and O(P −1 ), respectively.In the first case, instantaneous CSIT estimates are error-prone and thus become obsolete whereas in the latter case, instantaneous CSIT estimates are as good as perfect in DoF sense (cf.[30]).

Delayed CSIT
As mentioned before, in fast fading channels CSI reports may only reveal the past channel observations.If this is the case, we term the type of CSI at the transmitter as outdated or delayed CSIT.One way of modeling delayed CSIT is similar to (10) by introducing power exponents β ij of delayed estimation terms (e.g., [13]).The other way, a more progressive approach, is to assume that β ij ≥ 1, ∀i, j, such that delayed CSIT is at least perfect in DoF sense (e.g., [11]).

Mixed CSIT
The class of channels where imperfect instantaneous and delayed CSI is conveyed to the transmitter is referred to as mixed CSIT model.In this regard, delayed CSI may according to Section 4.2.2 be of either perfect or imperfect quality.A mixed CSIT model with perfect or imperfect delayed CSIT is for instance applied among others in [13,31,32], respectively.

Alternating CSIT
The CSIT models of previous Sections 4.1 and 4.2 implicitly assume that CSIT does not vary over time.Relaxing this assumption, e.g., CSIT at distributed transmitters may change from perfect (P) to delayed (D) to no CSIT (N) over time in an arbitrary order, leads to the case when multiple transmitters experience distinct time intervals with symmetric or asymmetric CSIT in an alternating fashion.In general, this type of CSIT is termed alternating CSIT [9].For the special case of CSIT alternating between perfect instantaneous and delayed CSIT, the term hybrid CSIT is frequently used [33,34].

Feedback
Feedback, at least in case of frequency division duplex (FDD), is intrinsically coupled with CSIT transfer from receivers to transmitters.From this viewpoint, some existing works consider the impact of feedback, sometimes in addition to delayed CSIT, on the performance of distributed networks.In the literature, there are apart from CSIT reporting two main feedback models.The first feedback model is output feedback in which (a) channel output(s) y i [t] become available at source nodes j with a delay of one channel use via a noiseless feedback link (cf.[35]).The term Shannon feedback is widely used when transmitters have access to both delayed CSIT and output feedback [36].In analogy to local and global CSIT, we may distinguish between local, sometimes partial, and global feedback.In the latter, each transmitter is provided with the channel outputs of all receivers, whereas in the former, a single receiver exchanges its output with its paired transmitter.Thus, in the context of local feedback the assumption is typically to consider unique transmitter-receiver pairs (i, j) for j = S + J + i and S = D.

Network Topology
We recall that through access to channel properties described in Sections 4.1-4.4,the transmitters had either direct or indirect (im)perfect access to channel realizations hij [t] in local or global form.A far more restrictive assumption on CSIT is when transmitters have no knowledge about channel gains except of network topology.Having access to network topology refers to knowledge about channel connectivity, i.e., knowing all channels whose impairments cause transmission signals x j [t] to be received at destination nodes either in no outage or in outage.

Robust Schemes
In this section, we will outline the main ideas behind robust schemes applicable to relaxed CSIT assumptions through some examples.We will reference existing works for greater detail on each scheme.

MISO Broadcast Channel
In this sub-section, we will analyze the effect of CSIT on the (G)DoF through examples of the D-user multiple-input single-output (MISO) Gaussian broadcast channel (BC) that consists of S antennas, where D, S ≥ 2. This is a special case of the channel model from Section 2 for S cooperating transmitters, J = 0 relays and D destinations.For this particular channel, the DoF is known for specific instances of CSIT.In case of perfect CSIT, the DoF is min{S, D} [37,38], while for delayed CSIT the DoF of the MISO BC when D = S corresponds to D 1+ 1  2 +,...,+ 1 D [11].In case of mixed CSIT, 4+2α 3 is the optimal DoF of the two-user MISO BC (D = 2) [27,28].DoF-optimality for the alternating CSIT setting on the two-user MISO BC has been established in [9].
To allow for a concise presentation of existing results for various forms of CSIT, we restrict our focus to the MISO BC that consists of two transmit antennas and two single antenna receivers (S = D = 2) (cf. Figure 2).Throughout these sections, we let a i and b i denote symbols that are independently encoded from Gaussian codewords that are intended for receiver (Rx) 1 and 2, respectively.Furthermore, c i represent so-called common symbols which are desired by both receivers.In a naive TDMA scheme, to avoid interference, symbols a i and b i are distributed over orthogonal channel uses such that a DoF TDMA = 1 is attained.The following sections to come convey the main ideas of achievable schemes for distinct CSIT models (perfect, delayed CSIT, etc.) that outperform TDMA.

Perfect CSIT
In case of perfect CSIT, it is possible to attain the optimal DoF ZF = 2 [37][38][39], i.e., two Gaussian encoded symbols a 1 and b 1 are transferred to Rx-1 and Rx-2 in a single channel use (e.g., t = 1).This is done by zero-forcing (ZF) beamforming of unit norm precoding vectors ν [1] and λ [1] at time instant t = 1 such that the contribution of undesired symbols at both Rx-1 and Rx-2 is canceled (cf. Figure 2).E.g., the contribution of undesired symbol b 1 at Rx-1 is canceled by chosing the beamforming vector λ [1] of b 1 to be orthogonal to the channel vector h 1 [1].Similarly, ν [1] is set to be orthogonal to h 2 [1].Fixing beamformers to satisfy the orthogonality conditions requires instantaneous CSI at the transmitters.This transforms the MISO BC into two parallel Gaussian point-to-point channels with equivalent channel coefficients (h 1 [1] T ν [1]) and (h 2 [1] T λ [1]) where each channel attains a DoF of 1 [40].
) T cancel the contribution of interfering symbols a 1 and b 1 , respectively.Scalars n ν,1 and n λ,1 normalize precoders to unit norm.For the sake of simplicity, the noise dependency of the received signals is dropped.

Delayed CSIT
In [11], the authors develop an optimal scheme, commonly referred to as Maddah-Ali-Tse (MAT) scheme, applicable for MISO BC's under delayed CSIT.In their work, they show that MAT offers significant DoF gains over the setting of no CSIT.For the sake of simplicity and clarity, we restrict the focus to the two-antenna, two-user MISO BC. Figure 3 illustrates the underlying MAT scheme in two variants.The scheme assumes a time varying channel model where the channel matrix H[t] is an i.i.d.process over time and across the receivers.The channel matrix H[t − 1] is assumed to be conveyed error-free to the transmitter in a delayed fashion at time instant t. a 1 and a 2 are Gaussian symbols intended for receiver (Rx) 1 whereas b 1 and b 2 are desired by Rx-2.Through the MAT scheme these four symbols are conveyed to the receivers in three channel uses attaining the optimal DoF MAT = 4 /3.The transmission scheme consists of two phases in total and variant one for instance works as follows: 1.
In the first phase consisting of two channel uses (t = 1 and t = 2 in Figure 3a) the transmitter broadcasts symbols a 1 and a 2 in t = 1 and b 1 and b 2 in t = 2. Thus, the received signal at Rx-1 and Rx-2 are (noise-corrupted) linear combinations of a = (a 1 , a 2 ) T and the respective channels at t = 1, i.e., as well as linear combinations of b = (b 1 , b 2 ) T at t = 2 given by: Thus, channel use t = 1 is used to serve Rx-1, while channel use t = 2 is utilized to serve Rx-2.Specifically, this means that received signals y 2 [1] and y 1 [2] are overheard signals at Rx-2 and Rx-1, respectively.These two overheard signals do not provide the respective receivers with useful information on their desired symbols.However, the i.i.d.assumption in the channel matrix for arbitrary t implies that H[t] is of full rank almost surely.This suggests that the overheard signal y 2 [1] of Rx-2 is an independent observation in Rx-1's desired symbols a 1 and a 2 than the signal y 1 [1].The same relationship applies to y 1 [2] and y 2 [2].In DoF sense at which SNR is asymptotically large, it suffices to restrict the focus on overheard equations L 2 (a 1 , a 2 ) and L 3 (b 1 , b 2 ) (that are free from noise) instead of overheard signals y 2 [1] and y 1 [2].Since every receiver seeks to decode two symbols, either a or b, each receiver needs two independent observations as a function of its desired symbols.Specifically, for these two receivers this means: ) are yet unknown to receivers 1 and 2 from channel uses t = 1 and t = 2. Consequently, in phase two, the goal is to convey In phase two, delayed CSIT comes into play when locally constructing overheard equations at the transmitter.

2.
In phase two, the overheard equations L 2 (a 1 , a 2 ) and L 3 (b 1 , b 2 ) are conveyed to their desired receivers in the single channel use t = 3.At time instant t = 3, the transmitter is aware of both H[1] and H [2] since it has access to delayed CSIT.Therefore, the transmitter can generate overheard equations L 2 (a 1 , a 2 ) and L 3 (b 1 , b 2 ) at time instant t = 3.By sending the common symbol from a single antenna element allows each receiver to use its side information and obtain the overheard equation of the complementary receiver.E.g., when sending . Thus, Rx-1 now possesses two (noisy) linear independent equations in (a 1 , a 2 ) enabling Rx-1 to decode its desired symbols within bounded noise [41].
(a) MAT scheme variant one.
The MAT scheme of the MISO broadcast channel with two transmit antennas under delayed CSIT in two variants (a,b) requires three channel uses t = 1, 2, 3.The main difference between the MAT scheme and zero-forcing beamforming shown in Figure 2 is that interference cannot be canceled instantaneously due to lack of current CSIT.Instead, in the MAT scheme interferences (for instance L 2 (a 1 , a 2 )) function as side information at the receivers.When these interferences are reconstructed through means of delayed CSIT they allow one receiver to retrospectively cancel interference while providing the other receiver with useful information on its desired symbols.
With the MAT scheme, we were able to transmit two desired symbols to both Rx-1 and Rx-2 in three channel uses.This equals a DoF of 4 /3.In variant two of the MAT scheme, a linear combination (similarly to Figure 2) of all four symbols is conveyed to the receivers.Thus, this changes the transmission scheme in channel uses t = 2 and t = 3 in so far as the interferences that Rx-1 (L 3 (b 1 , b 2 )) and Rx-2 (L 2 (a 1 , a 2 )) perceive at time instant t = 1 are locally constructed at the transmitter (through access to delayed CSI H [1]) and are broadcast.These interferences have a dual purpose: (a) Either they are utilized to cancel interference observed at t = 1 in retrospect or (b) they provide the receiver with an additional observation on its desired symbols.Through this variant, each receiver obtains two independent observations as a function of its two desired symbols enabling succesful decoding almost surely.We observe when constructing interferences at the transmitter, variant two only utilized CSI H[1], whereas variant one both H [1] and H [2]. Further details on the generalized achievability scheme and converse arguments for various number of users and transmit antenna elements on the MISO BC are available in [11].

Mixed CSIT
In this section, the benefits of having transmitters with simultaneous access to delayed and imperfect instantaneous CSI, i.e., mixed CSIT, is outlined on the aforementioned MISO BC example.We will see that for this setting, synergistic benefits of instantaneous and delayed CSIT is utilized efficiently by combining zero-forcing beamforming and a modified MAT scheme.This observation becomes clear when comparing Figures 2 and 3b with the proposed scheme for mixed CSIT shown in Figure 4.
The achievability scheme of the MISO broadcast channel with two transmit antennas under mixed CSIT requires three channel uses t = 1, 2, 3.The beamforming vectors ) T partially zero-force the contribution of interfering symbols a 1 and b 1 , respectively.On the other hand, through the precoders ν ∼ L 3 denote quantized versions of residual interferences L 2 and L 3 with distortion at noise level.The scalars n ν,t and n λ,t make sure that the norm of the beamformers is set to unity.For the sake of simplicity, interference contribution of the received signals at noise power levels is dropped.
First, let us explain the ZF part of this scheme.Let us recall that transmitters have only estimates of instantaneous CSIT.At all time instants t = 1, 2 and t = 3, the transmitter conducts zero-forcing beamforming by exploiting its imperfect instantaneous CSIT similarly to (12), by exploiting its CSI estimates as follows: However, since instantaneous CSIT is of imperfect quality, zero-forcing beamforming can only partially zero-force interfering symbols at unintended receivers.The orthogonality condition in Equation (19) ensures that through ZF the (expected) power level of interfering symbols reduces by factors of Hereby, step (a) follows by assuming that the CSIT quality parameters α ij ∈ [0, 1] (cf.Equation ( 11)) are identical for all channels in H[t], ∀t.Thus, the power level of symbols that are (partially) zero-forced (b 1 , b 3 , b 4 at Rx-1 and a 1 , a 3 , a 4 at Rx-2) reduces by P −α (cf. Figure 5a vs. Figure 5b,c).For instance, symbol b 1 is transmitted in channel use t = 1 at the highest transmit power level P (see Figure 5a) and is received at the intended receiver Rx-2 without any change in power while it is partially zero-forced to a power level P 1−α at the unintended receiver Rx-1 as illustrated in Figure 5b,c for t = 1.On the other hand, when conveying symbols b 3 and b 4 in channel uses t = 2 and t = 3, a lower transmit power is allocated to each symbol, that is only P α (cf. Figure 5a for t = 2 and t = 3), such that these symbols are zero-forced at Rx-1 to the noise power level of P 0 ; thus, being completely negligible in DoF sense.Due to symmetry, the same observation holds true for symbols a 1 , a 3 and a 4 with the slight difference that the roles of the receivers swap.Symbols a 2 and b 2 , on the other hand, are not precoded which is why their power levels do not change at either receiver and remain at P 1−α .Now, we move to the MAT part of this scheme.At time instant t = 1, two precoded symbols of high power P (a 1 , b 1 ) and two symbols of lower power P 1−α (a 2 , b 2 ) are sent to the receivers.Thus, the receivers observations become: As already mentioned, out of these four symbols only the symbols of higher power (a 1 and b 1 ) are partially zero-forced to power levels of P 1−α at their unintended receiver; thus, enabling that the power level of the zero-forced symbol is in agreement with the power level of symbols a 2 and b 2 .We conclude that the power levels of residual interferences L 3 (b 1 , b 2 ) and L 2 (a 1 , a 2 ) correspond to P 1−α .Similarly to the MAT scheme illustrated in Figure 3b, both receivers can recover their desired symbols if these two residual interferences become available at both receivers.Consequently, we would like to convey them to both receivers in channel uses t = 2 and t = 3.Unlike the MAT scheme, however, where these interferences are transmitted in an analog fashion, this scheme quantizes them prior to transmission.The reason for this lies in the fact that in contrast to the original MAT scheme where ZF was infeasible (due to restriction to delayed CSIT) this scheme reduces the power level of residual interferences to P 1−α .Thus, it is possible to compress the interferences allowing for the simultaneous transmission of new symbols a 3 , b 3 in t = 2 and a 4 , b 4 in t = 4 (all of which are of power P α ).The benefits of digitizing the interferences over an analog solution becomes particularly significant when CSIT is close to perfect, i.e., close to α = 1.In this case, there is a mismatch between available transmit power being at P and residual interference power being close to noise power P 0 .Therefore, quantizing residual interferences is preferable to analog solutions.The number of quantization bits depends on the interference power and the average target distortion D [40,41,52].We quantize the residual interferences according to: ) ) Rx-1 Rx-2 According to ( [40], Chapter 10), the rate of the quantized components under above distortion measure becomes In channel use t = 2,  [22,[53][54][55][56][57].The achievable rate of TIN is identical to the rates in Equation (27).

•
After decoding of , the receivers can remove the contribution of the decoded signals and retrieve their desired symbols, i.e., a 3 , a 4 at Rx-1 and b 3 , b 4 at Rx-2.
The resulting DoF, achievable in 3 channel uses thus becomes A plot of the achievable DoF for the described scheme, ZF, TDMA, MAT and a suboptimal scheme by Kobayashi et al. [29] are shown in Figure 6.We see that the optimal scheme contains the optimality of MAT for delayed CSIT only (α = 0) and ZF for perfect CSIT (α = 1).We mention for the sake of completeness, that the DoF collapses to that of TDMA, i.e., to 1, for all CSIT settings with finite precision where probability density functions of unknown channel realizations are bounded and do not scale with P [58].
The scheme on the MISO broadcast channel for mixed CSIT has been among others extended to distributed networks including the (MIMO) Z-channel [59], two-user MIMO interference channel [60,61], and X-channel [31,32].The estimation error of instantaneous CSIT scales with P −α .Thus, with increasing α, the accuracy of instantaneous CSIT improves.Hereby, α = 1 refers to the state where the instantaneous CSIT accuracy is quasi-perfect in DoF sense, and α = 0 is when instantaneous CSIT becomes obsolete.

Alternating CSIT with Fluctuating Topology
We now consider an alternating CSIT setting for the MISO BC with unequal channel strengths for h 1 [t] and h 2 [t], ∀t.Through this model, we gain insight on how CSIT feedback policies that provide the transmitter with either perfect (P), or delayed (D) or even no CSIT (N) over time affects achievable rates from a GDoF perspective.To this end, we modify the signal model at both receivers, similarly to Equation ( 8), to: where we used in aforementioned equation.We recall that through this modified model, the power constraint at the transmitter is bounded by unity where effective channel coefficients of Rx-1 and Rx-2 now become , respectively.Importantly, the large-scale fading effect of these coefficients ( ), are time-varying; thus, making the topology of the MISO BC fluctuating in signal strength.In addition, to capture alternating CSIT, we define indicator variables (I 1,t , I 2,t ) T ∈ {P, D, N} × {P, D, N} to denote which one of the CSIT states P, D or N for time t, Rx-1 and Rx-2 feed back to the transmitter.For instance, Figure 7a illustrates the system model for state (I 1,t , I 2,t ) T = (D, N) T .When considering an entire transmission interval spanning multiple channel uses, the transmitters are interested in knowing the fraction of the transmission time (a) β I 1 ,I 2 during which the CSIT state is given by any pair (I 1 , I 2 ) T ∈ {P, D, N} × {P, D, N} [9] and (b) β A 1 ,A 2 during which the topology state is given by any pair (A 1 , A 2 ) T ∈ {γ, 1} × {γ, 1} [62,63].Thus, effectively, β I 1 ,I 2 and β A 1 ,A 2 correspond to two-dimensional probability mass functions that depend on the pair of random variables (I 1 , I 2 ) and (A 1 , A 2 ), respectively [64].In the sequel, we characterize how the achievable GDoF is affected when CSIT is available according to: illustrated in Figure 7b.
We now highlight the main aspect of the coding scheme that is applicable to examples (a) and (b).Generally, the scheme is composed of B communication blocks in a block-Markov fashion [65,66], where the length of every block is restricted to a finite, constant number of T L channel uses.In all blocks = 1, 2, . . ., B − 1, we convey the receivers with private and common information.To be more precise, in every block newly encoded information symbols a i , b i are transmitted as private information, while residual interference (observed at the receivers in the previous block − 1 are locally constructed through the transmitter's access to delayed CSIT, quantized and finally) is transmitted as common symbols c i to the receivers.In the last block, however, the transmitter sends only common symbols to Rx-1 and Rx-2.At the receivers, the decoding starts from the last block and moves backward.Specifically, common information of the -th block is used to decode both private and common symbols of the ( − 1)-th block.X 1  Let us now move to example (a).In this example, the network topology is fixed to the static (1, γ) setting, i.e., β 1,γ = 1.In (G)DoF sense, this means that the channel to Rx-1 is stronger than the channel to Rx-2 since the former channel supports a DoF of at most 1 while the latter only a DoF of at most γ.Furthermore, the CSIT state (D, N), (N, D) and (N, N) occur all at the same frequency.For instance, in a block of T L = 3 channel uses, the CSIT states may occur periodically according to: For arbitrary T L , (32) is generalized to: We proceed to describe (i) encoding, (ii) creation of common symbols and (iii) decoding for an arbitrary block , = 1, . . ., B − 1 of CSIT sequence (33).Particularly, when explaining the creation and transmission of common symbols, we will need to make adjustments on how long of a fraction we will actually make use of delayed CSIT.This will be captured by the parameter n as we shall see later.For the sake of notational simplicity when referring to the i-th channel use of block , we use the notation ( , i) to refer to this time index.In most cases, however, we are referring to a specific block, which is why we drop the block-time indexing notation ( , i) and simply write t to refer to time instant t = T L + i.
(i) Now, we start with the encoding.In the sequel, we focus on the -th block if not otherwise stated.The transmission signal (with some abuse of notation) for this block is where a and b are private information symbols intended for Rx-1 and Rx-2, respectively, where c t is a common symbol.The intuition behind the choice of Equation ( 34) is as follows: 1.
With the use of private symbol a TP t , we account for the fixed (1, γ)-topology (TP).Concretely, due to its scaling with √ P −γ , this symbol is received at power level P 1−γ at its intended receiver Rx-1, whereas it is received at noise level at its unintended receiver Rx-2.Being received at noise level at Rx-2, makes it a negligible interference term in (G)DoF sense.

2.
Depending on whether the CSIT state (D, N) or (N, D) is present, we can improve the achievable rate of the user with no CSIT feedback by utilizing the general idea of the MAT scheme.That is, we can create interference at the unintended receiver as side information which can be canceled in retrospect through the use of delayed CSIT while providing the intended receiver with additional information on its desired symbols.For instance, in state (D, N), we send among others b t and b t , which creates interference at Rx-1, but represents desired information for Rx-2.Constructing, the observation of Rx-1 in terms b t and b t locally at the transmitter and broadcasting this information, will help Rx-1 canceling interference and provide Rx-2 with extra information for decoding b t and b t .

3.
In state (N, N), it is advisable not to send any additional private information.This is simply because private information represents interference to one of the two receivers which cannot be reconstructed (and thus canceled) due to the lack of CSIT.
With above expression on x[t], the received signal at both receivers under a static (1, γ)-topology 29) and ( 30)) (ii) Identical to the scheme introduced for mixed CSIT, interference that occurs at Rx-1 in CSIT state (D, N) as well as interference at Rx-2 in CSIT state (N, D) can be quantized locally due to availability of delayed CSIT to ∼ s 1,t and ∼ s 2,t with approximately log(P) and γ log(P) quantization bits, respectively (The term "approximate" is used whenever we avoid explicitly specifying the missing o(log(P)) quantization bits.These bits, however, are negligible in (G)DoF sense since o(log(P)) /log(P) → 0 when P → ∞.).
Over each block , = 1, . . ., B − 1, spanning T L channel uses, the approximate total number of quantization bits is log(P)[# operation in state (D, N) These quantization bits of block are then mapped into common information symbols {c [ +1,i] } T L i=1 that are transmitted in the consecutive block + 1.For reliable decoding, this necessitates that the achievable rate of conveying common symbols {c [ +1,i] } T L i=1 in block + 1 is at least equal to the number of quantization bits given in Equation ( 39).
(iii) The per-block decoding of the -th block, = 1, . . ., B − 1, relies on successive decoding.Initially, the common information of block + 1 is used to reconstruct ∼ s 1,t and ∼ s 2,t at both receivers.Through ∼ s 1,t and ∼ s 2,t interferences in distorted signals for state (D, N) and (N, D) in Equations ( 35) and (36) at Rx-1 and Rx-2 are removed, respectively.The decoding order of the remaining desired symbols at the receivers are given by c t → (a t , a t ) T → a TP t at Rx-1, for any t formed by the block-time indexing notation Common symbols c t are decoded through TIN, allowing for decoding at a per-block sum rate of where step (a) enforces that the achievables rates at both receivers become identical by equating the time duration in operating in states (D, N) and (N, D).After removal of c t , Rx-1 and Rx-2 decode their remaining desired symbols as follows.Rx-1, on the one hand, applies TIN and decoding as in MIMO on its received output signals in their noiseless form to decode all (a t , a t ) T at a per-block (sum) rate of 2T L γn 2 log(P) + T L o(log(P)) = 2T L γn log(P) + T L o(log(P)) as well as all a TP t at a per-block rate of T L (1 − γ) log(P) + T L o(log(P)).
Rx-2, on the other hand, applies MIMO decoding on its received output signals in their noiseless form to decode all (b t , b t ) T at a per-block (sum) rate of = T L (1 + γ)n log(P) + T L o(log(P)).
By choosing n, i.e., the number of channel uses in (D, N) and (N, D) state operation, we ensure the decodability of common symbols {c [ +1,i] } T L i=1 for every block .Recall that for this condition to be satisfied the achievable rate of conveying common symbols {c [ +1,i] } T L i=1 in block + 1 has to be at least equal to the number of quantization bits given in Equation ( 39), i.e.,: The rate is maximized if we choose n to be as large as possible.This is achieved if n = γ /(1+2γ).Concretely, this means that for a given (1, γ)-topology with 0 ≤ γ ≤ 1, we actually only operate in the (D, N) and (N, D) states for a fraction of n ≤ β N,D = β N,D = 1 /3 of block length T L .With the achievable rates known, we can now compute the achievable GDoF to: Now we consider example (b).In this example, the network topology is symmetrically fluctuating between a (1, γ) and (γ, 1)-topology (β 1,γ = β γ,1 = 1 /2) where at every time instant both receivers provide the transmitter with delayed CSIT information.In a single block (B = 1) of T L = 6 channel uses, the topology states may occur according to: Under this particular sequence of topology states, we will focus on the first half of the block spanning T L/2 = 3 channel uses (comprising of topology states (1, γ), (γ, 1), (1, γ)) to formulate the achievability scheme.For the remaining T L/2 = 3 uses under the complementary topology state, the scheme follows along the same lines of argument requiring minor modifications.We proceed to describe details of the scheme for the first T L/2 = 3 channel uses.
The transmission signal at time instants t = 1, 2 is set identically to that of the MAT scheme variant one (cf.Figure 3a) which is: Under this transmission signal, the received signals at both receivers under a fluctuating topology given by ( 42) for t = 1, 2 correspond to: Similarly to the MAT scheme, interference that occurs at Rx-2 in TP state (1, γ) as well as interference at Rx-1 in TP state (γ, 1) in t = 2 can be locally constructed through the use of delayed CSIT.Also as in the MAT scheme, exploiting side information of the receivers, it suffices to broadcast the sum of L 2 and L 3 to the receivers (Recall that Rx-1 knows a noise-corrupted version of L 3 while Rx-2 is aware of a noise-corrupted version of L 2 .).As opposed to the MAT scheme, however, it is advisable to quantize the sum of these interferences ) requiring approximately γ log(P) quantization bits for this signal.The quantized signal functions as a common signal c 1 since it is desired by both receivers.Thus, at t = 3, where a (1, γ)-topology is present, we send c 1 in addition to a TP 3 according to The reasoning behind the transmission of a TP 3 in addition to the common symbol c 1 is identical to the justification of using it in example (a).The received signals at both receivers are given by It is straightforward to see from Equation (49), that Rx-1 can apply successive decoding to first decode c 1 at an approximate rate of γ log(P) and then decode a TP 3 at a rate of approximately (1 − γ) log(P).Rx-2, on the other hand, effectively observes a point-to-point channel in (50) for which reliable decoding of c 1 is feasible at a rate of γ log(P) + o(log(P)).By knowing c 1 , Rx-1 and Rx-2 obtain the MIMO observations respectively.In these two equations, we have neglected additive noise terms (including quantization noise).These effective MIMO channels allow for decoding of (a 1 , a 2 ) T and (b 1 , b 2 ) T at approximate sum rates of (1 + γ) log(P), respectively [67].The GDoF as a function of γ can easily be computed to A direct comparison of achievable rates for examples (a) and (b) with upper bounds on the GDoF [62] is shown in Figure 8.It can be seen from Figure 8b that only the scheme for example (b) is optimal for arbitrary γ.We conjecture that the suboptimality of scheme for example (a) is due to the suboptimal creation and transmission of common symbols c i .
Related work study among other the DoF for 2-user MISO BC's with alternating CSIT from a wireless security perspective by introducing an external eavesdropper [10,68]. .The upper bound is obtained from [62].We observe that upper and lower bounds only coincide for γ = 0 and γ = 1 in example (a).In example (b), however, we have matching upper and lower bounds for arbitrary γ.

Conclusion: MISO Broadcast Channel
In this section, we have introduced various schemes that are applicable for CSIT of distinct qualities.We used DoF and GDoF metrics as first-order approximations of sum rates.Particularly, we have seen that outdated CSIT is useful in recreating interferences and allowing for retrospective interference cancelation.When the transmitter in a MISO BC becomes also aware of imperfect instantaneous CSIT in addition to delayed CSIT, it is possible to synergestically apply optimal schemes for perfect and delayed CSIT, that is MAT and ZF scheme, in an appropriate manner.In conclusion, interference management for MISO BC's in case of imprecise CSIT is well-established but requires further research, among other finding topology-aware optimal schemes for alternating CSIT configurations.As we move to distributed interference networks (interference channel, X-Channel, etc.), interference management for imprecise CSIT is far less understood in achievability and converse sense [69,70].

Distributed Interference Networks
In distributed wireless networks, where there is no cooperation among source nodes, the paradigm of handling interference changes from removing interference to aligning interference [7].For instance, when ZF precoding that precancels interference was optimal for the MISO BC [37], interference alignment has been shown to achieve the optimal DoF for a variety of distributed wireless networks [4,6,8,71,72].The idea of interference alignment (IA) is to lessen the effect of interference by merging the communication dimensions occupied by interfering signals.In [4], Cadambe and Jafar showed, contrary to the popular belief, that interference alignment attains the optimal DoF of the D-user interference channel (IC), D /2, with single antenna nodes and a time-varying channel.Under identical assumptions, the same authors extend their results on the D-user IC channel to the S × D X-channel for which they show the optimal DoF to be DS /(D+S−1) [8].For constant channels, where conventional vector alignment [4,8] fails in attaining the full DoF, interference alignment along rationally independent dimensions, so-called real interference alignment [73,74] proves useful.In [75], Motahari et al. showed that through real interference alignment the total DoF for both D-user IC and X-channel are achievable even for real, time-invariant channels.For the majority of these networks, however, the main caveat behind these schemes is that the optimal DoF is only achieved asymptotically either through infinite channel uses in case of vector alignment or infinite transmit directions in case of real interference alignment.
Besides, implementation of interference alignment requires transmitters to have access to global CSIT.As we relax the CSIT assumption, interference management is rather poorly understood compared to broadcast channels.For instance, even for the 2 × 2 X-channel under delayed CSIT, DoF optimality is yet restricted to linear schemes [70].In addition, the DoF loss incurred for distributed wireless networks when moving away from perfect CSIT can be significant.For instance, for the best known scheme on the D-user IC under delayed CSIT [50], the DoF converges to the constant 4 /(6 ln(2)−1) ≈ 1.2663 (i.e., it does not scale with the number of users) which is in stark contrast to the optimal DoF of D /2 under perfect CSIT.On the contrary, the scaling of the DoF with the number of users D is maintained in MISO BC's where the DoF is shown in [11] to be . Ultimately, it is highly desirable to maintain a DoF close to what was achievable under perfect CSIT as CSIT requirements are relaxed.In Section 5.2.1, we illustrate through an example that under mixed CSIT and partial output feedback, robust interference management is feasible.For many multiuser networks, relaying operation is beneficial in improving achievable rates [65,[76][77][78][79][80][81].From a DoF-perspective, however, relaying has been shown in [82] to provide no additional DoF gain for the fully connected IC and X-channel with full CSI at all nodes.In this regard, the fundamental question boils down to whether relaying is capable of facilitating interference alignment at all.Existing works [83][84][85] answer this question in the affirmative by revealing strategies of how relays can be utilized to transform a static channel into an equivalent time-varying channel such that full DoF is attainable through interference alignment.In [86], Ning et al. presents a relay-aided interference alignment scheme that results in the optimal DoF of the D-user interference channel with finite channel uses.We recall that traditional IA without relays required infinite channel uses/transmit directions for the D-user IC for D ≥ 2 and the S × D X-channel for S = 2, D ≥ 2 and S > 2, D = 2 [4,8].
Interestingly, relays do not only facilitate interference alignment but can also lower CSI requirements at the transmitters.In Section 5.2.2, we will outline two examples of an 2 × 2 X-channel on how relays can effectively assist blind transmitters, i.e., transmitters that completely lack CSI, in achieving either full DoF or at least a DoF that scales with the number of users.Hereby, the 2 × 2 X-channel is a special case of the channel model from Section 2 for S = 2 transmitters and D = 2 destinations.Specifically, in this network Tx-j, j = 1, 2, has a message W ij for Rx-i, i = 1, 2. Furthermore, d ij denotes the codeword of message W ij .In brief, in example (a) depicted in Figure 9a, a single-antenna, half-duplex relay (J = 1) has perfect CSI and assists the blind transmitters Tx-1 and Tx-2 in achieving the full DoF = 4 /3 of the 2 × 2 X-channel through interference alignment.Further, in example (b) depicted in Figure 9b, on the other hand, J = 2 cooperating half-duplex relays (i.e., a single half-duplex relay with two antenna elements) have only delayed CSI and aid the blind transmitters Tx-1 and Tx-2 in achieving the optimal DoF = 4 /3 through a MAT-related scheme.
(a) Relay-aided X-channel with a single-antenna relay.The relay node possesses global perfect CSI.
(b) Relay-aided X-channel with a two-antenna relay.
The relay node possesses global delayed CSI.

X-Channel with Mixed CSIT and Feedback
We consider the 3 × 2 X-channel illustrated in Figure 10 as an example of distributed networks under mixed CSIT (and partial output feedback).Similar to Section 5.1.3,where we described a robust scheme on the MISO BC under mixed CSIT, the scheme on the 3 × 2 X-channel will, in addition to the output feedback provided to Tx-3, exploit mixed CSIT at all transmitters by facilitating partial ZF possibilities.Specifically, as shown in Figure 11, the coding scheme is composed of a multi-phase transmission strategy, where in every phase, information about delayed and current CSIT is used to form precoding scalars that diminish the effect of interfering symbols at the two receivers.Since the instantaneous CSIT is of imperfect quality, it is in general not possible to fully remove interference at a particular phase of the coding scheme.Due to the availability of delayed CSIT, the remaining residual interference of each phase is encoded as common information that is transmitted along with new private symbols in the consecutive phase.Common information is decoded by TIN (treating interference as noise), i.e., by treating private information as noise.The transmission scheme terminates if no more interference is observed at either receiver.At the end of the transmission, symbol decoding is performed through retrospective interference cancellation of interference-distorted signals.
We now highlight the main aspect of the coding scheme that consists of B phases, where the time duration of each phase is restricted to T channel uses.With the exception of phase 1, in all remaining phases = 2, 3, . . ., B, we convey the receivers with private and common information.To be more precise, in every phase newly encoded high powered information symbols a i , b i and low powered symbols āi , bi are transmitted as private information, while residual interference (observed at the receivers in the previous phase − 1 are locally constructed at Tx-3 through the transmitter's access to partial output feedback and delayed CSIT, quantized and finally) is transmitted as common symbols c i to the receivers.In the last phase B, no residual interference is observed at both Rx-1 and Rx-2.Thus, at the receivers the decoding starts from the last block B and incrementally moves backward.Specifically, common information of the -th phase is used to decode both private and common symbols of the ( − 1)-th phase.With the exception of phase B, the residual interference that is observed at a particular phase is transmitted as common information in the consecutive phase + 1 in T +1 channel uses.Due to this nature, a backward decoding strategy has to be applied.
Output feedback provides Tx-3 with 4 equations {y 1 [t]} 4 t=1 that depend on 10 symbols.As Tx-3 has access to delayed CSIT and local knowledge of 6 symbols (a 31 , b 31 , ā31 , b31 , ā32 , b32 ), it can remove the contribution of these symbols in {y 1 [t]} 4 t=1 .Thus, delayed CSIT and output feedback from Rx-1 to Tx-3, enables Tx-3 to decode symbols a 11 , b 11 available at Tx-1 and a 21 , b 21 available at Tx-2 after 4 channel uses almost surely.Hence, the third transmitter knows all symbols of phase 1 and is therefore capable to generate all 4 residual interferences given in Equations ( 56) and ( 57) locally.The residual interferences available at Rx-1 (Rx-2) are a function of symbols desired by Rx-2 (Rx-1).Hence, conveying these interference components as common information is beneficial to both Rx-1 and Rx-2 in a sense that, it provides extra equations to Rx-2 (Rx-1) to decode its desired symbols; and, in doing so, it helps Rx-1 (Rx-2) to remove the residual interferences.Recall from the previous paragraph that all residual interferences are of order P 1−α .Thus, by digitizing interferences to (1 − α) log P bits is sufficient for decodability at both receivers within bounded noise [40].Due to the availability of delayed CSIT, Tx-3 is able to construct the desired component of residual interferences digitally.As the first 4 channel uses are repeated T 1 /4 times, the total number of quantization bits in phase 1 are then given by T 1 (1 − α) log P bits.These bits will be distributed into common symbols {c i } T 2 i=1 of the second phase ( = 2).In the next paragraph, we elaborate on (iii) the decoding of the desired information symbols.
Recall that backwards decoding is applied.For phase 1, this means that the common information conveyed in phase 2 has to be available before the receivers initiate the decoding of their desired information symbols of phase 1.With knowledge in common information the receivers are aware of all residual interferences.These residual interferences are used for interference cancelation and extra information on desired symbols.As a consequence, for any sub-phase, each receiver has 5 independent observations on 5 desired information symbols.Thus, for instance, Rx-1 can decode high power information symbols a 11 , a 21 , a 31 (each at a rate of log(P) bits) and low power information symbols ā31 , ā32 (each at a rate of (1 − α) log(P) bits).Hence, the overall information content conveyed to each receiver in Phase 1 is T 1 4 (5 − 2α) log(P) bits.Combining the achievable sum rates in private information of all B phases (for large B) attained in ∑ B =1 T channel uses gives the resulting achievable DoF A plot of the resulting DoF is shown in Figure 12.The plot shows that finite quality CSIT (α th = 3 /7) and partial output feedback compensate for the absence of perfect CSIT.For the case of α th = 3 /7 and partial output feedback, the optimal DoF of 6 /4 is already attainable.For α = 0, the CSIT setting reduces to the case of delayed CSI and partial output feedback, while for α = 1 all transmitters have perfect CSI (in addition to Tx-3's access to output feedback).An existing upper bound [82] suggests that for the given X-channel, feedback does not increase the DoF in case of perfect CSIT.Thus, a finite quality CSIT of α th = 3 /7 and partial output feedback already attain the optimal DoF = 6 /4.

Relay-Aided Interference Alignment for X-Channel without CSIT
In this section, we will show that symbols (d 11 , d 12 ) T and (d 21 , d 22 ) T desired by Rx-1 and Rx-2, respectively, are conveyed reliably to their intended receivers in 3 channel uses (corresponding to the optimal DoF = 4 /3).From an individual receivers' perspective this means that 2 out of 3 available signaling dimensions ought to be reserved for desired symbols while the remaining signaling dimension is utilized to align the two remaining interfering symbols.Interestingly, for this to happen only the relay node requires either (a) full CSIT and a single antenna (cf. Figure 9a) or (b) delayed CSIT and two antennas (cf. Figure 9b) while the transmitters can be entirely blind.Generalizations of cases (a) and (b) on the M × N X-channel are available in [19,20].
For notational convenience, we stack the transmit signals x j [t] to a two-dimensional vector x[t] ∈ C 2 .In the first two channel uses, t = 1, 2, both transmitters are active and send their symbols to the two receivers, while the relay remains silent and only listens and stores the received signals y R [t].Specifically, the transmission signal for t = 1, 2 is set to: In what follows, we first describe the main ideas (a) for the case a single-antenna relay with access to full CSI (Figure 9a) and (b) the case of two-antenna relay with access to only delayed CSI (Figure 9b).We start with case (a).
In channel uses t = 1, 2, the relay receives one noise-corrupted linear combination in Rx-1's desired symbols (d 11 , d 12 ) T , i.e., and an additional noise-corrupted linear combination in Rx-2's desired symbols (d 21 , So far, the receivers attain two observations.One observation depends only on desired symbols while the other observation depends on undesired symbols.For instance, y 1 [1] (and y 1 [2]) is a function of d 11 and d 12 (d 21 and d 22 ) which are (un)desired symbols of Rx-1.At the last channel use t = 3, we exploit the knowledge of the relay gained at channel uses t = 1, 2 to provide each destination with an additional observation on its desired symbols.To this end, the transmission signals at the transmitter and the relay are chosen according to: Under the choice of transmission signals at both sources and relays, we can write the received signals at Rx-i, i = 1, 2, for t = 1, 2, 3 by: Let us first describe the decoding from the perspective of Rx-1 (i = 1).For a per-user DoF of 2 /3, Rx-1 has to decode d 11 and d 12 in three channel uses.This is achieved by aligning undesired symbols d 21 and d 22 into a one-dimensional signal space while allocating the remaining two signal dimensions for its desired symbols d 11 and d 12 .On the basis of (66) for i = 1, it is easy to see that d 21 and d 22 are aligned if we let the scalar δ satisfy the condition: Similarly, at Rx-2 alignment of undesired symbols d 11 and d 21 is feasible for i = 2 in Equation (66) if β is chosen such that h 21 [3] Since the relay node has access to perfect CSI, β and δ can be computed locally such that the conditions specified in Equations ( 67) and ( 68) are fulfilled.Through zero-forcing post-coding on y i [1 : 3], the receivers are able to isolate their desired symbols from the aligned interference.For instance, by fixing the post-coding matrix at Rx-1 to its observation after post-coding is (for notational convenience, we neglect the noise term) Analogously, at Rx-2 the post-coding matrix is such that its observation after post-coding becomes After post-coding, each receiver has two linear-independent observations of its desired symbols (cf.Equations ( 70) and ( 72)).This enables each receiver to decode its pair of desired symbol in three channel uses.Thus, a DoF of 4 /3 is attained for which we only required full CSI at the single-antenna relay.
We now move to case (b).For this case, where the relay node has two antennas, the source-relay link is a SIMO multiple-access channel [40,41] for which we can decode two symbols per channel use through ZF reliably.Thus, the relay knows all symbols d ij after the first two channel uses.By assumption, since the relay has delayed CSI from the previous two channel uses, it can apply the same transmission approach as in the MAT scheme variant one for t = 3.That is, it exploits the side information at Rx-2 (which is y 2 [1]) and at Rx-1 (which is y 1 [2]) to multicast y 1 [2] and y 2 [1].The source nodes, however, remain silent.The receivers use their side-information to retrieve a second, independent observation on its desired symbols.For instance, Rx-1 exploits its side information y 1 [2] to obtain y 2 [1].Knowing y 1 [1] and y 2 [1], Rx-1 is able to decode (d 11 , d 12 ) T .A similar observation holds for Rx-2.Overall, for case (b), again a DoF of 4 /3 is achievable requiring in comparison to (a) only delayed CSIT at a cost of an additional antenna element.

Conclusions and Open Problems
In this survey, a thorough presentation of state-of-the-art robust interference management schemes for distributed and non-distributed Gaussian networks in case of imperfect CSIT was given.
Carefully chosen examples analyzed the (G)DoF metric for various levels of imperfect CSIT including mixed (with and without feedback), alternating (with fluctuating topology), delayed and no CSIT.Gaussian codewords were utilized to show the (G)DoF optimality for these CSIT settings.In certain cases, lattice codes [87][88][89] have been shown to outperform Gaussian codewords [90].Such comparison, however, is beyond the scope of this survey.The study of the (G)DoF for these relaxations of the perfect CSIT case has already led to important theoretical insights; however, the results obtained so far rather resemble isolated islands in the sense that transmitters have only access to one form of channel knowledge.In practice, the transmitters might have knowledge of a mixture of various forms of CSIT.In this context, we believe that the research community has to deepen its knowledge in GDoF-sense, i.e., understand the interplay between channel strengths γ ij and uncertainty levels α ij .This research path is practically motivated due to evolution of heterogeneous networks where channels are typically unequal in strength and channel estimation quality across multiple transmitters (macro, small, femto basestations) differs.Such research will, in addition to other goals, clarify how the knowledge of channel strength (and as such the network topology) and imperfect instantaneous (as well as delayed) CSIT be utilized jointly in an optimized fashion.In addition, through this line of research, existing works on specific CSIT settings, e.g., delayed and perfect CSIT for fixed channel channel strengths, may be bridged.Wireless networks that shall be subject to this research thrust are particularly (i) (relay-aided) distributed networks and (ii) multi-way channels [91] and (iii) eavesdropper channels [92].In the following, we will briefly outline some challenging open problems for these three channel types.
As far as (i) distributed networks are concerned little is known about the GDoF for imperfect CSIT.Recently, the interplay between channel strength and quality on the non-distributed two-user MISO BC has been fully characterized [93].Their results show that the GDoF depends only on the weakest CSIT parameter for each receiver.Further, they develop conditions for which it is GDoF-optimal to serve only a single user.Extension of this research to distributed networks is of viable interest.Progress in this research area would enable as to how combinations of schemes, such as TIN, ZF, etc., are optimal.Even for the special case of fixed topology (γ ij = 1) and constant channel uncertainty (α ij = α), it is unknown whether interference alignment and common signaling over distinct power levels is DoF-optimal.
Furthermore, (ii) multi-way channels allow for significant improvement in the spectral efficiency of wireless networks (e.g., a two-way communication channel with two users can achieve up to twice the rate that would be achieved had each user transmitted separately) [94].For the perfect CSIT setting, the optimal DoF of various networks, among others, the MIMO two-way X relay channel [95], the K-user two-way interference channel with and without a MIMO relay [96] and the Y-channel [97][98][99] have been studied.The investigation of the DoF for the case of imperfect CSIT is almost completely unexplored with some exceptions of the achievable DoF for the Y-channel where users have either access to delayed CSI [100] or no CSI access during the MAC phase [101].Substantial amount of work is needed in order to understand the implications of imperfect CSIT on the aforementioned performance gains of multi-way channels.This requires new upper bounds which take into account various CSIT settings.
An important aspect of future communication systems is the aspect of robustness in terms of confidentiality.In contrast to previous generations a security-by-design approach should be pursued.However, only very few works investigate the influence of imperfect CSIT on the secure DoF (SDoF) for (iii) eavesdropper channels.To the best of our knowledge, so far existing work for the imperfect CSIT focus on the SDoF of the MISO BC with an external eavesdropper under alternating CSIT [10,68,102] and on the (MIMO) wiretap channel with either a single and multiple eavesdroppers for delayed CSIT [103][104][105] and output feedback [51].However, significant work is needed to understand the fundamental interplay between imperfect CSIT and security.
decoding of a and b at the respective receivers becomes feasible within bounded noise distortion.Recall that L 2 (a 1 , a 2 ) and L 3 (b 1 , b 2

Figure 5 .
Figure 5. Power levels of symbols at (a) the transmitter (Tx); (b) Rx-1 and (c) Rx-2 utilized in the achievability scheme for mixed CSIT.

∼ L 3 (b 1 , b 2 )L 2 (a 1 ,L 3 (b 1 ,L 2 (a 1 , a 2 )
along with symbols a 3 , b 3 is provided to the receivers, while in t = 3 symbols ∼ a 2 ), a 4 , b 4 are utilized.The decoding of all these symbols is conducted as follows.• ∼ b 2 ) and ∼ are decoded by treating the interference from symbols a 3 , b 3 at t = 2 and a 4 , b 4 as noise (TIN)

Figure 6 .
Figure 6.DoF as a function of α for various schemes.The transmitter possesses imperfect instantaneous and delayed CSIT.The estimation error of instantaneous CSIT scales with P −α .Thus, with increasing α, the accuracy of instantaneous CSIT improves.Hereby, α = 1 refers to the state where the instantaneous CSIT accuracy is quasi-perfect in DoF sense, and α = 0 is when instantaneous CSIT becomes obsolete.
b) Fixed CSIT setting with fluctuating topology.

Figure 7 .
Figure 7.The figure shows the MISO BC for channels with distinct strengths√P A 1,t and √ P A 2,t that either stay constant (e.g., in (a) A 1,t = A 1 = 1 and A 2,t = A 2 = γ) or vary in time (b).Furthermore, at any time instant t, the CSIT feedback from Rx-1 and Rx-2 may change and provide the transmitter with distinct CSI states I 1,t ∈ {P, D, N} and I 2,t ∈ {P, D, N}, respectively.Hereby, P, D and N are perfect, delayed and no CSIT.In the left figure (a), on the one hand, the CSIT state I 1,t = D, I 2,t = N is depicted, whereas the right figure (b), on the other hand, shows the timely static state I 1,t = I 1 = I 2,t = I 2 = D.

Figure 8 .
Figure 8. Plot of upper and lower bounds on the GDoF as a function of γ for example (a,b).The upper bound is obtained from[62].We observe that upper and lower bounds only coincide for γ = 0 and γ = 1 in example (a).In example (b), however, we have matching upper and lower bounds for arbitrary γ.

Figure 9 .
Figure 9. Relaid-aided X-channel with two single-antenna transmitters and receivers supported by a relay node.Hereby, the transmitters are completely blind, i.e., they completely lack CSI.In (a) the relay has a single antenna and perfect global CSI, whereas in (b) the relay has two antennas and delayed global CSI.

Figure 11 .
Figure11.Outline of the achievability scheme for the 3 × 2 X-channel under mixed CSIT.With the exception of phase B, the residual interference that is observed at a particular phase is transmitted as common information in the consecutive phase + 1 in T +1 channel uses.Due to this nature, a backward decoding strategy has to be applied.