A Decentralized Receiver in Gaussian Interference

Bounds are developed on the maximum communications rate between a transmitter and a fusion node aided by a cluster of distributed receivers with limited resources for cooperation, all in the presence of an additive Gaussian interferer. The receivers cannot communicate with one another and can only convey processed versions of their observations to the fusion center through a Local Array Network (LAN) with limited total throughput. The effectiveness of each bound’s approach for mitigating a strong interferer is assessed over a wide range of channels. It is seen that, if resources are shared effectively, even a simple quantize-and-forward strategy can mitigate an interferer 20 dB stronger than the signal in a diverse range of spatially Ricean channels. Monte-Carlo experiments for the bounds reveal that, while achievable rates are stable when varying the receiver’s observed scattered-path to line-of-sight signal power, the receivers must adapt how they share resources in response to this change. The bounds analyzed are proven to be achievable and are seen to be tight with capacity when LAN resources are either ample or limited.


Introduction
We are at a remarkable time for radio systems. With the significant reductions in cost and improvements in performance, there has been an explosion in the number of radio systems with a wide range of applications including personal, machine-to-machine, vehicle-to-vehicle, and Internet-of-Things (IoT) communications. In many situations, radios cluster in physically close groups. This has two effects. First, it increases the likelihood of interference between systems and necessitates that systems be designed to maintain good performance in these conditions. Second, it creates an opportunity for groups of independent radios to be used as a distributed array to improve performance. Considering this new setting, we study the problem of receiving a signal in the presence of interference with the help of a distributed array, as illustrated in Figure 1.
We develop bounds on the maximum communications rate from a single transmitter to a base node that is provided side information from a distributed receive array in the presence of interference. The nodes that provide side information to the base are identified as helpers, and we assert they do not communicate with one another, but only forward information to the base through a previously established reliable Local Array Network (LAN) link, and that this link only supports a maximum total throughput which all the helpers must share.
This receive system can mitigate a strong interferer in a wide variety of environments. We consider the effects of an overall LAN capability that is parameterized by a total number of bits that helpers can share with the base for each source channel usage. Furthermore, to investigate algorithmic needs as a function of environmental conditions, we consider a spatially Ricean channel and a parametrically defined interference. Finally, we consider both the conditions in which the base node does and does not have its own noisy observation of the source signal. Our bound development in this paper provides significant extensions to and clarifications of the results found in References [1,2], and our preliminary efforts in Reference [3].

Figure 1.
A broadcast node speaks to many helper nodes, which forward limited amounts of information to a base node. Additive interference from neighboring systems is present in the link from broadcaster to helpers.

Results
We perform an analysis of the achievable rates of the system in the presence of an interferer. The following contributions are provided: • Upper and lower bounds on the system's achievable communication rate in correlated Gaussian noise and regimes where these bounds are tight (Section 3). The strongest lower bound is given in Theorem 7.

•
Performance characteristics of these rates in the presence of an interferer (Section 4.1).

•
Behavior of the strategies in various scattering environments (Section 4.2). The scattering environment is seen to not affect average performance if LAN resource sharing adapts to the channel. • A strengthening of an existing achievability proof for the system, where the same rate is achieved using less cooperation between nodes (Remark 7).

Background
The problem of communicating with the help of an array of distributed receivers has been studied in a variety of contexts, most generally as an instance of communications over a single-input multiple-output (SIMO) channel. A variety of SIMO channels have been extensively analyzed, but most analyses are subtly different than the problem considered here. Our work is done in the context of information theory and bounds achievable communications rates, while in contrast most existing studies work towards minimizing distortion metrics or bit error rates.
Results presented here are a significant extension and generalization of the work in [3], where there is no treatment of the system's performance in the presence of an interferer. A tighter inner bound than all those in [3] is included in Theorem 7, and full proofs are provided for all the results.
Achievable communications rates for this network topology were studied in References [1,2], although their bounds do not directly apply to channels with a Gaussian interferer. The studies provide an example demonstrating the sub-optimality of a Gaussian broadcaster when no interference is present, and suggest that non-Gaussian signaling techniques are needed for this sort of network. In contrast, we demonstrate in Section 4 that an achievable rate using Gaussian signaling typically comes quite close to the system's upper bound in many practical regimes.
The helpers in the system we have described seem like relay nodes but there is an important distinction. Here, the ensemble of links from each helper to the base are like those in a graphical network, available for design within distributional and rate constraints. This is not usual in the context of relay networks, including those studied in very general setting such as Reference [4]. Studies such as References [5][6][7] detailed using a collection of receivers as beam forming relays to a destination node in a network with structure similar to the system considered here. In our situation, each helper-to-base link is orthogonal to the others, so beam forming studies are not directly applicable.
Performance of specific coding schemes for this system were studied in References [8][9][10]. In particular, [10] was able to identify a scheme that can perform to within 1.5 dB of allowing the base and receivers to communicate without constraints. Results in our study further work towards characterizing achievable rates of the system rather than designing and analyzing the performance of specific modulation schemes.
The topology we consider is similar to many-help-one problems such as the "Chief Executive Officer (CEO) problem" posed by Berger in Reference [11]. In this scenario, some node called the CEO seeks to estimate a source by listening to "agent" nodes which communicate to the CEO at fixed total rates. Many variations of this problem have been studied, for instance in Reference [12] in limit with number of agents. The focus of the CEO problem and most of its derivatives are to estimate a source to within some distortion (often mean squared error), whereas the focus here is on finding achievable rates for lossless communications.
The noisy Slepian-Wolf problem [13] may be interpreted as communications in the opposite direction of our system: distributed, cooperative helpers have a message for a base, but their cooperation ability is limited and their modulations must be sent over a noisy channel.

Problem Setup
Throughout the paper, we use the notation in Table 1. A broadcaster seeks to convey a message to a base at some rate R > 0 bits per time period. The message M is uniformly distributed along [1 : 2 TR ] over some T ∈ N time periods. Our goal is to determine the greatest rate R at which the base can recover M with low probability of error. CN (0, Σ) Complex circularly symmetric normal distribution with zero mean and Hermitian covariance matrix Σ I(·; ·), H(·), h(·) Mutual information, Shannon entropy and differential entropy A † , a † Conjugate transpose of matrix A, vector a a S ; S ⊆ T Vector with components indexed by S |A| Determinant of a matrix A [a : b] Integers from a to b, inclusive a 0 Vector a with non-negative elements A 0 Positive semidefinite matrix A 1 N N-row vector of 1 s A j,k Element on row j, column k of a matrix A diag(a) Diagonal matrix where the (i, i)th diagonal element is the ith element of vector a I n×n n × n identity matrix x Vector magnitude/2-norm R + Nonnegative real numbers Before communicating, the broadcaster and base agree on a modulation scheme φ : [1 : 2 TR ] → C T , where each possible message m ∈ [1 : 2 TR ] is mapped to a T-length signal through φ. Each of these signals is denoted x m = (x m,1 , . . . , x m,T ) = φ(m), and it is chosen within the broadcaster's power constraint: 1 T ∑ T =1 |x m, | 2 ≤ 1. To send message M, the broadcaster transmits x M , which we denote X = (X 1 , . . . , The signal is observed by N + 1 single-antenna receive nodes through a static flat fading channel and additive white Gaussian noise. Enumerating these receivers 0-N, we identify the base as the "0th" receiver, and call the rest helpers. For n ∈ [0 : N], at each time t, the nth receiver observes where • the noise (W 0,t , . . . , W N,t ) ∼ CN (0, Σ) has covariance Σ across receivers, and is independent over t.
The receiver observations are written as vectors: Helper n for n ∈ [1 : N] employs a (possibly randomly chosen) vector quantizer Q n on its received sequence Y n to produce a coarse r n -bitrate summary of its observations, U n Q n (Y n ). The vector of helper messages is denoted: and the quantizers (Q 1 , . . . , Q N ) = Q satisfy two properties: • Every node in the system is informed of each quantizer's behavior, and quantizers produce their compression using only local information. Formally, the probability distribution of (Q, X, Y, U) factors: • Quantizations are within the LAN constraint: The vector of the helper's quantization rates is denoted: Each U n is conveyed precisely to the base over a Local Array Network (LAN). We assume the LAN only supports a limited amount of communication between helpers and the base. For instance, the helpers must all share a small frequency band. We model this by asserting that feasible rate vectors r belong to a bounded set R LAN (L) with a sum-capacity L > 0: We refer to the condition that r ∈ R LAN (L) as the LAN constraint. The base reconstructs an estimateX of X using its own full-precision observation Y 0 and side information U from the helpers, then recovers an estimateM of message M fromX. A block diagram of the system is shown in Figure 2.
Channel h and noise covariance Σ are assumed to be static throughout the transmission of each message and are known to all the receive nodes. Both the transmitter and the receivers are assumed to have knowledge of the set of feasible rates, R LAN (L). The environment determines: • channel fades h, • noise covariance Σ and • maximum LAN throughput L.
Available for design are: rates each helper should send to the base r and • fusion and decoding methods at the base to produceM.
The system in consideration. A message M is broadcast as X with average power 1. The signal is received by a base and N helper nodes, occluded by correlated AWGN W. Helper n for n ∈ [1 : N] quantizes Y n through Q n to produce an r n -bit summary U n . The quantized observations U and the base's full-precision reception Y 0 are combined to produce an estimateX of X, then an estimateM of M.
We say a communication rate R is achievable if for any ε > 0 then for large enough T there is some distribution of quantizers Q satisfying 1 T H(Q k (Y k )|Q) ≤ r k for each k, encoders φ Q : [1 : 2 TR ] → X T and decoders f Q where: Theorem 1. The maximum communications rate achievable with arbitrarily low probability of error is: where S T is the collection of joint distributions with block length T that satisfy conditions in Equations (6) and (7) for some r ∈ R LAN (L).
Proof. C is achievable through the usual noisy channel coding argument [14]. For any achievable rate R, applying Fano's inequality to H(M|Q) gives R ≤ C.
In the sequel, we bound C from Theorem 1 with computable expressions.

Bounds on Communications Rates
The system's capacity C can be upper bounded by considering a stronger channel where all helpers are informed of each other's observations. Compute: where the first inequality follows since Q → X → Y 0 is a Markov chain (Equation (6)). If the LAN constraint were not imposed and the base had access to the helpers' receptions in full precision, the receive side would be equivalent to a multi-antenna Gaussian receiver. By noisy channel coding [15], the capacity of this stronger channel is max P X :E[|X| 2 ]<1 I(X; Y) (here, (X, Y) are variables at a single timepoint) which, by a derivation given in [16], simplifies to the familiar upper bound: Taking the minimum of this bound and Equation (14) yields an upper bound for the original system. This is an instance of a general cut-set upper bound from [17].

Remark 1. Any achievable rate R must satisfy
Proof. Justified by the preceding discussion.
The rest of the section is dedicated to four communication strategies for the system in order of increasing complexity and diversity utilization. The strongest bound is presented in Theorem 7. It is described using the context of the preceding two bounds.

Achievable Rate by Decoding and Forwarding
Treating each helper node as a user seeking to receive its own message, the link from the broadcaster to helpers is a scalar Gaussian broadcast channel. The capacity region of this channel was characterized in Reference [18], and in particular its sum-rate was given in Reference [19]. In the scalar case, this sum rate reduces to: where only the point-to-point channel between transmitter and the best receiver is used.

Remark 2.
The following rate is achievable The rate is achievable with the following facilities: • Helpers are informed of which helper is the best (best is derived from h, Σ, L).

•
The transmitter and best helper coordinate a codebook of appropriate rate and distribution.
Proof. By having the broadcaster send a message to the nth receiver, a rate is achievable from transmitter-to-receiver. If n = 0 (i.e., the transmitter broadcasts to the base), then Equation (19) is achievable from transmitter-to-base. Otherwise, Equation (19) is achievable from transmitter-to-base if it is less than L by forwarding the receiver's decoding over the LAN.

Remark 3.
When the base does not have its own reception (i.e., I(X; Y 0 ) = 0) and then the system's capacity is L.
Proof. By assumption, the upper bound in Equation (16) equals L. This is achievable by Remark 2.
The strategy to achieve this rate requires a strong amount of cooperation from the broadcaster, since the decoding receivers must all share codebooks with the transmitter.

Achievable Rate through Gaussian Distortion
Rate-distortion theory shows that to encode a Gaussian source Y ∼ N (0, σ 2 ) with minimum rate such that distortion does not exceed some maximum allowable mean squared error D > 0, the rate must be at least To achieve this rate, the encoding operation must emulate the following test channel (Reference [14]): where α = √ 1 − D/σ 2 and β = √ D. Dithered lattice quantization [20] is one method that can be used to realize such a quantizer in limit with block length in addition to having other nice analytic properties. Using this method, in limit with block length, the base's estimates for a helper's observation at any single timepoint can be made to approximate where W Q,n (r n ) is independent Gaussian distortion with variance some function of the helper's rate r n .
We will now derive this function. Define and the vector of Z n s corresponding to this choice of W Q,n as: The subscript Q here is a decoration to distinguish quantization distortion terms W Q , W Q,n from environment noise, W, W n .
If the nth helper is to forward information to the base at rate r n , then the amount of distortion in the helper's encoding under this strategy can be determined by setting Equation (21) equal to r n and solving for D, with σ 2 equal to the helper observation's variance, h n 2 + Σ n,n . Scaling the output of the test channel the helper emulates (Equation (22)) by 1/α causes it to equal the helper's observation plus independent Gaussian noise with variance (β/α) 2 = D/(1 − D/σ 2 ). This means that, in such a system, the distortion from the helpers is equivalent to adding independent additive Gaussian noise with variance: By Equations (1) and (26), all the noise and distortion on the signal present in the helpers' messages to the base are summarized by the vector W + W Q with covariance matrix We refer to this system as a Gaussian distortion system. A block diagram of this system is shown in Figure 3. This system is equivalent to a multi-antenna Gaussian receiver and its achievable rate has a closed form: Theorem 2. For a distributed receive system as described in Section 2 with noise covariance matrix Σ, LAN constraint L and fixed average helper quantization rates r ∈ R LAN (L), then a rate R G (r) is achievable with the following facilities: • The transmitter and base coordinate a codebook of appropriate rate and distribution. • Each n-th helper is informed of an encoding rate r n (optimal choice derived from h, Σ, L).

•
Each helper coordinates a random dither with the base.

•
The base is informed of r, h, Σ, L.
All the details of this derivation are formalized in Appendix B.
Maximizing R G over R LAN (L) gives a lower bound on the system capacity: Unfortunately, this expression cannot be simplified much in general. Maximization of R G over R LAN (·) can be performed efficiently using quasi-convex optimization algorithms: Proof. The maximum of R G follows the maximum of −h † D(r) −1 h by the matrix determinant lemma.
It suffices to show that the restriction of this functional on the intersection of any line with R N×1 + is quasi-concave (see Reference [21]). Further, a one-dimensional function is quasi-concave if anywhere its derivative is 0 and its second derivative is below 0.
Fix any a, b ∈ R N×1 , denote D t D(·)| ta+b for any t where ta If then it is also quasi-concave in any convex restriction of that domain. R LAN (L) is a simplex, which is convex. (16), in limit with LAN throughput L.

R G,max (L) is tight with the upper bound in Equation
by continuity of log 2 , sums, and the matrix determinant (in terms of matrix coordinates). The limit in Equation (32) is greater than or equal to Equation (16), establishing the remark.
This strategy has the benefit of not needing much coordination between receive nodes. The transmitter does not have to share codes with helpers because here the helpers do not perform any decoding. Each helper needs only its encoding rate and its own channel state to form its messages properly. Figure 3. Gaussian distortion System: Quantizer distortion is modeled as additive white Gaussian noise, where enough noise is added so that the capacity across quantizers is some given rate vector r.

Achievable Rate through Distributed Compression
Helper n for n ∈ [1 : N] in a realization of the Gaussian distortion system described in Section 3.2, on average and with long codes, will produce an r n -bit encoding of its observation that can be decoded to produce the helper observation with additional approximately Gaussian noise. Since all the helper's quantizations contain the same signal component (and possibly the same interference), they are correlated and can be compressed before forwarding to allow for less noise to be introduced in quantization.
The Slepian-Wolf theorem [22] shows that if the LAN is such that helpers can encode at rates ρ (ρ 1 , . . . , ρ N ), then the helpers can losslessly convey the encodings to the base at lower rates r ρ, as long as r and the encodings U satisfy the conditions that for all subsets S ⊆ [1 : N], then: Note that Y 0 is always included in the conditioning because Y 0 is available at the base node in full precision.
In the Gaussian distortion setting described right before Equation (23), The details of this are given in Lemma 2.
Maximizing over the LAN constraint in Equation (9), the following rate is achievable: (35) is defined as in Equation (25). We can then state the following: For a distributed receive system as described in Section 2 with noise covariance matrix Σ and LAN constraint L, R DC (L) is achievable with the following facilities: • The transmitter and base coordinate a codebook of appropriate rate and distribution. • Each n-th helper is informed of a quantization rate ρ n and binning rate r n , (optimal choice derived from h, Σ, L).

•
Each helper coordinates a random dither with the base.

•
The base is informed of ρ, r, h, Σ, L.
The base can unambiguously decompress the helper's compressed encodings with low probability of error if and only if ρ is chosen such that Equation (33) is satisfied. However, in analog to Corollary 1 from Reference [1], the rate in 6 can be improved by expanding R DC (r) to include some of the ρ where the base cannot perform unambiguous decompression. This helps because even if the encoding rates in ρ are chosen outside of R DC (r) so that helpers cannot convey U to the base unambiguously, some extra correlation with X is retained through this distortion.

Theorem 4.
For a distributed receive system as described in Section 2 with noise covariance matrix Σ and LAN constraint L, the following rate is achievable: The rate requires the following facilities: • The transmitter and base coordinate a codebook of appropriate rate and distribution. • Each n-th helper is informed of a quantization rate ρ n , binning rate r n and hull parameter λ (optimal choice derived from h, Σ, L).

•
Each helper coordinates a random dither with the base.
All the details of Theorems 6 and 7 are shown in Appendix B.

Remark 6.
The capacity of the system is R DC (L) under the following restrictions: The base does not have its own full-precision observation of the broadcast (h 0 = 0).

•
The broadcaster must transmit a Gaussian signal.

•
Construction of helper messages is independent of the transmitter's codebook X .
This is demonstrated in Appendix C. The last three assumptions are necessary: • Since the base has codebook knowledge, it is possible for the transmitter to send a direct message to the base, which is not accounted for in the compress-and-forward strategy used for R DC (L).
• The Gaussian broadcast assumption is needed because of a counterexample given in Reference [1].

•
Codebook independence is necessary because R DC (L) is strictly less than the upper bound in Equation (16), but, by Remark 3, this upper bound is achieved in some regimes.
Theorem 7 and Remark 7 strengthen Corollary 1 and Theorem 5 from Reference [1] since we show that the same rate can be achieved with less cooperation between transmitter and receivers. Sanderovich et al. [1] used a "nomadicity" assumption which asserts that the mapping from transmitter messages to codewords is not present at the helpers, whereas Theorem 7 shows (the same argument applying to the general discrete case) that indeed the same rate is achievable when helpers have no knowledge at all of the codewords the transmitter is using.
Similar to the Gaussian distortion achievable rate, the distributed compression technique does not require cooperation between the transmitter and helpers. It does, however, require a priori sharing of codes from the helpers to the base so that the helpers can perform distributed compression.

Ergodic Bounds
In this section, the bounds are averaged over random channels in various regimes. Each bound tested is a deterministic function of: noise covariance matrix Σ, and • channel h (assumed to be static and precisely estimated a priori per each channel use).
In all graphs, the rate from Equation (16) is called "Upper Bound", the rate from Equation (28) is "Gaussian Distortion", the rate from Theorem 7 is "Distributed Compression" and the rate from Remark 2 is "Broadcast". A discussion of the optimizations performed for the Gaussian Distortion and Distributed Compression bounds is in Appendix A.

Performance in the Presence of an Interferer
One motivation for increasing receive diversity is to better mitigate the effect of interference, so it is important to study the extent to which the strategies from Section 3 can do so.
We model interference as a zero-mean Gaussian broadcast independent of our system. Our system's nodes are informed of nothing more than the scales at which the interferer appears in our receivers' observations. This assumption prohibits using dirty paper coding [23] and other transmit-side interference mitigation strategies. With this model, the covariance matrix of noise terms associated with a particular interferer seen by the receivers is a matrix A = aa † , where a ∈ C N+1 . In all trials run, a single interferer was assumed to be present at all nodes with power α and random phase so that with a n = e j2π·θ n , θ n ∼ Unif[0, 1] where Unif is the uniform distribution. Figure 4 shows the difference in achievable rates with and without interference for different receive-side strategies. Even when a strong rank-one interferer is present at all the nodes, achievable communications rates are comparable to the case without an interferer.
Sanderovich et al. [1] provided an example of a system such as the one in the present work where a Gaussian transmitter is significantly sub-optimal. In contrast, we see in Figure 4 that, over an average of many random channels in a range of settings, achievable rates using Gaussian signaling come quite close to an upper bound on the system. Even the relatively simple Gaussian distortion bound is close in performance to the optimum in all regimes but one with strong interference and little cumulative helper-to-base information. In this regime the LAN constraint limits the helper's ability to provide the base with the diversity of observations necessary to perform good interference mitigation.

Path Diversity versus Performance
It is reasonable to expect that the best strategy for a distributed receiver to use will change depending on its environment. If the receivers observe the signal through a single line-of-sight path, all else being equal, the signal and noise at each receiver will have similar statistics. In contrast, in environments with many scatterers, the channel statistics will vary more across spatially distributed receivers.
The level of attenuation at a receiver can be modeled with a Rician distribution [24]. The Rician distribution follows the magnitude of a circularly-symmetric complex Gaussian with nonzero mean and can be parameterized by two nonzero values: a scale Ω > 0 representing the average receive SNR and a shape K > 0 (called a K-factor in other literature) denoting the ratio of signal power received from direct paths to the amount of power received from scattered paths. By construction, if K = 0, then a Rician distribution is equivalent to a Rayleigh distribution with mean Ω. In contrast, if K → ∞, then the distribution approaches a point mass at Ω (Reference [25]).
The type of scattering environment does not greatly affect the average rate achievable by any bound other than the Broadcast bound ( Figure A1). This is because the Broadcast bound's only utilization of receive diversity is in channel variances which is small when the channel is dominated by line-of-sight receptions. Despite the invariance of most bounds to K, the profile of helper-to-base bits does change. Figure 5 shows that, no matter the other parameters, in high scattering, it is most helpful for the base to draw most of its information from the highest SNR helper while mostly ignoring low-SNR helpers' observations. The imbalance is less pronounced in interference and when SNR is less varied across receivers (high K), since in these regimes, gaining diverse observations for combining is more beneficial than using the strongest helper's observation.
When the base collects its own full-precision observation, the helper rate profile is unaffected by interference and scattering, where most helper information is provided by the highest SNR helper. In practice, in this situation, the base might use its observation as an estimate of the interferer and subtract it from a compression of the strongest helper's observation.   versus K-factor (scattered-to-direct-path received signal power ratio). Four helpers with 0 dB average receive SNR and a LAN constraint of L = 5 bits per channel use of side information the helpers share to inform the base of their observations. Averaged over 1000 channels with gains ∼ CN (0, I).
Interferer present at each receiver with a uniform random phase and specified INR. As the proportion of line-of-sight path power increases, the need for receive diversity increases and the base draws information from more helpers. This does not occur when the base has its own observation, when presumably it is used as an estimate of the interferer to be mitigated from a compression of the highest-SNR helper's observation.

Conclusions
One upper bound and three lower bounds on communication rate were developed. A simple upper bound (Remark 1) was derived, achievable when the LAN constraint is stringent (small L), and achievable in limit as the LAN constraint is relaxed (L → ∞). An achievable rate (Theorem 5) considering quantizers which add Gaussian distortion was seen to provide large gains in interference over a rate that does not fully use the distributed receive array (Remark 2). The rate (Theorem 7) achieved when a distributed compression stage is added to the previous technique provides gains over Theorem 5 when interference is strong and helper-to-base communication is limited, but may be more difficult to implement.
Leaving SNR fixed, performance is mostly unchanged in high-scattering versus low-scattering environments, although the profile of helper-to-base communication changes: In high-scattering environments, some helper observations are ignored by the base, while, in line-of-sight environments, each helper informs the base equally. The presence of a strong interferer dampens this effect, since in this regime the base needs more spatial diversity to mitigate the interferer.
An immediate goal for future work is to devise practical implementations of the presented strategies. This may include refining the models of the LAN and helpers to more precisely reflect system capabilities.

Conflicts of Interest:
The authors declare no conflict of interest.

Appendix A. Optimization Method
Evaluation of the Gaussian distortion and distributed compression bounds in each environment requires optimization of a quasi-convex objective (Remark 4). In the case of distributed compression, the space of acceptable parameters is not convex: consider compressing the encodings for two highly-correlated sources. By the Slepian-Wolf theorem, if the encodings are high-bitrate, then perturbing the encodings' bitrate does not greatly affect the region of feasible compression rates, since the encodings have high redundancy. On the other hand, perturbing the bitrate of low-bitrate encodings greatly affects the region of feasible compression rates, since uncorrelated distortion from encoding dominates source redundancies. Then, a compression to an average between minimum feasible compression rates for low-bitrate encodings and ones for high-bitrate encodings is infeasible, and the distance from the feasible set becomes large as the difference between high and low bitrates is made large. This is the mechanism that governs R DC (r) ⊆ R K + , hence the domain's non-convexity. To overcome this, an iterative interior point method was used to find the maximum: each constraint f (x) < 0 is replaced with a stricter constraint, f (x) + β < 0 for some β > 0 and a minimization of the objective is performed under the new constraint. The optimal point is passed as the initial guess for the next iteration, where the objective function is minimized with updated constraints f (x) + β < 0 with 0 < β < β. The method is iterated until the constraint is practically equivalent to f (x) < 0 or the optimal point converged. Each individual minimization was performed using sequential least-squares programming (SLSQP) through SciPy [26]. The code for this is included in the Supplementary Materials.

Appendix B. Achievability of Bounds
Several lemmas are needed to prove bound achievability. The following lemma demonstrates that lattice encodings become close in joint information content to the equivalent random variables in a Gaussian distortion system from Section 3.2. Lemma 1 demonstrates the joint differential entropies between source estimates from the encodings are close to the equivalent differential entropies in the Gaussian distortion system. Lemma 2 demonstrates the encodings themselves have joint Shannon entropies that are close to mutual informations in the Gaussian distortion system. Lemma 1. Take helper observations Y and independent dithers (W Q,n ) n∈[0:N] where, for each n, the dither vector W Q,n is distributed along the base cell of a regular lattice in C t whose normalized second moment is σ 2 Q,n . For any A ⊂ [0 : N], ε > 0 and t large enough, Proof. The proof is similar to Theorem 6 from [20]. Notice that, for any additive noise channel, where Equation (A4) follows since the terms are independent, Equation (A5) follows by the worst additive noise lemma [27], and the substitution and convergence in Equation (A7) follow by Section III of [20]. In addition: where Equation (A4) follows by Lemma 1 from [28] and Equations (A10) and (A11) follow since the terms in (W Q,n ) n∈A are independent and by Section III of [20].

Lemma 2.
For length-t helper observations Y, dithered lattice encodings U of Y using dithers (W Q,n ) n∈[0:N] where each U n encodes Y n onto a regular lattice in C t whose cells have normalized second moment σ 2 Q,n . Then, for any ε > 0 and if t is large enough, any S ⊆ [0 : N] has In Equations (A13), Z(r) = Y + W, with Y = (Y 0 , . . . , Y N ) ∈ C N+1 distributed the same as helper observations at a single time point, and Proof. We prove this by induction. By Theorem 1 in Reference [29], for any n ∈ [0 : N] H(U n |W Q,n ) = I(Y n ; Y n −W Q,n ).
Theorem 6 in Reference [20] has that 1 t I Y n ; Y n −W Q,n → t↑∞ I(Y n ; Y n + W Q,n ) = I(Y n ; Z n (r n )).
Thus, the statement holds for any singleton {n}. Take any disjoint A, B ⊂ [0 : N] for which the claim holds for ε > 0. By construction, given (W Q,n ) n∈A∪B , there is a function f A∪B where f A∪B (U A∪B ) = Y A∪B − (W Q,n ) * n∈A∪B with (W Q,n ) * n∈A∪B independent of but distributed like (W Q,n ) n∈A∪B [20]. Compute: The first inequality follows by the data processing inequality. Equation (A19) follows since (W Q,n ) n∈A∪B is independent of the other variables in the term. The last inequality follows by the worst additive noise lemma [27]. For t large enough, where, again, the first line follows by the data processing inequality and the second line since the conditional is independent of the rest of the mutual information's terms. For large enough t, the second inequality follows by Lemma 1. Combining Equations (A20), (A22) and (A27), Since S ⊆ [1 : N], the inductive step will only need to be used up to N times. Letting 0 < ε < ε · 5 −N , the initial statement holds.
A small result is also needed to show that the base having its own full precision observation is approximately equivalent to receiving a high-bitrate helper message. Recall that the base is associated with helper index 0. Proof. Since all the conditional mutual information terms in the statement are continuous in r, it is enough to show the statement for r 0. In this case, with no loss of generality, we can say there is some δ > 0 where: Fix r 0 large enough so that for any S ⊆ [1 : N], There is guaranteed to be such an r 0 because the above expression is a continuous function of the covariance matrix of (Y 0 , Y, Z 0 (r 0 ), Z(r)) component-wise, and as r 0 is made large, the covariance matrices involved in the second term converge component-wise to those of the first since where Equation (A35) follows because conditioning reduces mutual information, and Equation (A36) follows from what was shown at the start.

Theorem 5.
For a distributed receive system as described in Section 2 with noise covariance matrix Σ, LAN constraint L and fixed average helper quantization rates r ∈ R LAN (L), a rate R G (r) is achievable.
Proof. If some n ∈ [0 : N] has r n = 0, the system is equivalent to the case where the nth receiver's observation is not present, so, without loss of generality, we assert that r n > ε. Fix some rate R < R G (r) and a block length T = t 2 ∈ N. Form a message M uniform on [1 : 2 tR ].

• Outline
Form a rate-R codebook with length-T codewords. At receiver n ∈ [0 : N], form a length-t regular lattice encoder with lattice chosen coarse enough that its encodings have rate r n . Combine encodings at base and find the typical codeword. Observe that probability of error is low by recognizing that each t-length encoding from a helper approximately contains the information content of the helper's observation plus Gaussian distortion. •

Helper encoder setup
For each helper n, n ∈ [1 : N], generate a dither vectorW Q,n = (W Q,n ) ∈ (C t×1 ) t , where each successive t-segment is uniform in the base region of the Voroni partition P t n of a regular, white t-dimensional lattice L t n which has the following normalized-second-moment: These terms are detailed at the beginning of Reference [20]. RevealW Q,n to the base and helper n. Similarly, at the base, generate a dither vectorW Q,0 = (W Q,0 ) ∈ (C t×1 ) t with r 0 chosen large enough for Lemma 3 to hold.

Helper encoding and forwarding
Helper n (n ∈ [0 : N]) observes a sequence of length T, For the -th length-t segment ( ∈ [1 : t]), form a quantization U n ∈ L t n by finding the point in L t n associated with the region in P t n in which that segment resides. The properties of such U n are the subject of References [20,29]. By the extension of Theorem 1 in Appendix A of Reference [29], Further, by Theorem 6 in Reference [20], where Y n has the distribution of any individual component of Y n and W Q,n ∼ CN (0, G t (L t n , P t n )) (in agreement with notation in Section 3.2). Thus, the t encoded messages produced by helper n, (U n ) , are within the LAN constraint for large enough block length T. Helper n ∈ [1 : N] forwards (U n ) to the base.

• Decoding
At the base, receive all of the lattice quantizations, Take A T ε (X, U|W Q ) to be the collection of which are jointly ε-weakly-typical with respect to the joint distribution of (X, U), conditional on all the dithers (W Q,n ) n∈[0:N] . Weak-and joint-typicality are defined in Reference [14]. At the base, find a message estimatem ∈ [1 : 2 TR ] where (φ(m), U) ∈ A T ε (X, U|W Q ). Declare error events E 0 if M is not found to be typical with U, and E 1 if there is somem = M where (φ(m), U) ∈ A T ε (X, U|W Q ). •

Error analysis
By typicality and the law of large numbers, P(E 0 ) → 0 as t → ∞. In addition, is defined as in Equation (25). Equation (A47) follows by the data processing inequality. Equation (A48) follows by combining the entropies into a mutual information, then using the worst additive noise lemma [27]. Thus, if R is chosen less than I(X; Z(r − 1 · ε)) − 4ε then P(E 0 ∪ E 1 )→0 as T → ∞. Mutual information is lower semi-continuous so I(X; Z(r − 1 · ε)) − 4ε can be made arbitrarily close to R G (r).
Theorem 6. For a distributed receive system as described in Section 2 with noise covariance matrix Σ and LAN constraint L, a rate R DC (L) is achievable.

Theorem 7.
For a distributed receive system as described in Section 2 with noise covariance matrix Σ and LAN constraint L then R DC (L) is achievable.
Proof. It is enough to show that any component in the maximization from Equation (36) is achievable. Fix λ > 0, a helper rate vector r ∈ R LAN (L), and a compression rate vector ρ ∈ R λ DC (r). If some n ∈ [0 : N] has r n = 0 or ρ n = 0, the system is equivalent to the case where the nth helper is not present, so, without loss of generality, we assert that each r n , ρ n > ε. Fix some rate R < R G (ρ − 1 · ε) − λ and a block length T = t 2 ∈ N. Form a message M uniform on [1 : 2 tR ].

• Outline
Form a rate-R codebook with length-T codewords. At receiver n ∈ [0 : N], form a length-t regular lattice encoder with lattice chosen coarse enough that its encodings have rate r n . Randomly bin the encodings down to rate ρ n . At the base find the codeword jointly typical with the binned encodings. Observe that probability of error is low by recognizing that the unbinned t-length encodings from helpers approximately contain the joint-information content of the helper's observations plus Gaussian distortion. •

Helper encoder setup
For each helper n, n ∈ [1 : N], generate a dither vectorW Q,n = (W Q,n ) ∈ (C t×1 ) t , where each successive t-segment is uniform in the base region of the Voroni partition P t n of a regular, white t−dimensional lattice L t n which has the following normalized-second-moment: These terms are detailed at the beginning of Reference [20]. RevealW Q,n to the base and helper n. Similarly at the base generate a dither vectorW Q,0 = (W Q,0 ) ∈ (C t×1 ) t with ρ 0 chosen large enough for Lemma 3 to hold.
For each receiver n ∈ [0 : N], form a random mapping Index n : L t n → [1 : 2 tr n ] which takes on iid values at each u n ∈ L t n : Index n is the binning scheme used by receiver n. Distribute each Index n to helper n and the base.

Helper encoding
Helper n (n ∈ [0 : N]) observes a sequence of length T, For the -th length-t segment, ∈ [1 : t], form a quantization U n ∈ L t n by finding the point in L t n associated with the region in P t n in which that segment resides. The properties of such U n are the subject of References [20,29]. where the right-hand inequality comes from choice of ρ. •

Helper joint-compression and forwarding
At receiver n ∈ [0 : N], form binned encodings (V n ) ∈[1:t] where for each , V n = Index n (U n ). Note that |Range(Index n )| ≤ 2 t·r n so H(V n ) ≤ t · r n and H((V n ) ) ≤ T · r n so that the LAN constraint is satisfied.
Each receiver forwards (V n ) to the base.

• Decoding
At the base, receive all all the binned helper encodings V = ((V n ) ) n . Take A T ε (X, U|W Q ) to be the set of which are jointly ε-weakly-typical with respect to the joint distribution of (X, U), conditional on all the dithers (W Q,n ) n∈[0:N] . Weak-and joint-typicality are defined in Reference [14].
For an ensemble of bin indices from all the receivers, v = ((v n ) ) n ∈ ∏ N n=0 [1 : 2 t·r n ] t , define: Each B v represents the set of helper lattice quantizations represented by the ensemble of helper bin indices v. At the base, findm for which there is someû ∈ B V where (φ(m),û) ∈ A T ε (X, U|W Q ). Declare the message associated withx to be the broadcast. •

Error analysis
We have the following error events: • E JT : X is not typical with anything in B V ,[0:N] . • Em ,S : For S ⊆ [0 : N], there is somem = M andû = (û S ,û S C ) ∈ B V where (φ(m),û) ∈ A T ε (X, U|W Q ) andû S C = U S C , but any n ∈ S hasû n = U n . Em ,S denotes the situation where the base identifies the wrong quantizations for all the receivers in S.
Equation (A62) follows by using Lemma 2 on H(U S |U S C )/t and using reasoning identical to Equations (A45)-(A48) on I(X; U|(W Q,n ) n ). Recall that R was chosen so that R ≤ R G (ρ − 1 · ε) − λ = I(X; Z(ρ − 1 · ε)) − λ. Then, Equation (A62) will approach −∞ as t → ∞ (thereby P(∪m ,S Em ,S ) approaches 0) if all S ⊆ [0 : N] satisfy: I(Y S ; Z S (ρ − 1 · ε)|Z S C (ρ − 1 · ε)) < λ + ∑ m∈S r m − 8ε. (A63) By assumption that ρ ∈ R λ DC (r) and for small enough ε, then Equation (A63) holds for each S. Since all error events approach 0, then a rate of R G (ρ − 1 · ε) − λ is achievable. For small enough ε, by lower semi-continuity of mutual information R G (ρ − 1 · ε) − λ can be made arbitrarily close to R G (ρ) − λ.  Figure A1. Achievable rates versus K. Four helpers with an observation available at the base and LAN constraint L = 5 bits shared among helpers. Averaged over 500 channel realizations with uniform independent phase and average receiver SNR fixed at 0 dB. Scattering environment has negligible impact on achievable rates for these bounds, except in the Broadcast bound where receive diversity is not well utilized. Similar results are obtained when the base does not have its own observation.