This application relates to application Ser. No. 12/717,815, titled “A Bit Mapping Scheme for an LDPC Coded 16APSK System” filed on Mar. 4, 2010, and application Ser. No. 12/710,276 titled “An Interleaving Scheme for an LDPC Coded 32APSK System” filed on Feb. 22, 2010.
The invention relates to digital communications and in particular to a bit mapping scheme for an LDPC coded 32APSK System.
Forward Error Control (FEC) coding is used by communications systems to ensure reliable transmission of data across noisy communication channels. Based on Shannon's theory, these communication channels exhibit a fixed capacity that can be expressed in terms of bits per symbol at a given Signal to Noise Ratio (SNR), which is defined as the Shannon limit. One of the research areas in communication and coding theory involves devising coding schemes offering performance approaching the Shannon limit while maintaining a reasonable complexity. It has been shown that LDPC codes using Belief Propagation (BP) decoding provide performance close to the Shannon limit with tractable encoding and decoding complexity.
In a recent paper Yan Li and William Ryan, “Bit-Reliability Mapping in LDPC-Codes Modulation systems”, IEEE Communications Letters, vol. 9, no. 1, January 2005, the authors studied the performance of LDPC-coded modulation systems with 8PSK. With the authors' proposed bit reliability mapping strategy, about 0.15 dB performance improvement over the non-interleaving scheme is achieved. Also the authors show that gray mapping is more suitable for high order modulation than other mapping scheme such as natural mapping.
Various embodiments of the present invention are directed to a bit mapping scheme in a 32APSK modulation system. The techniques of these embodiments are particularly well suited for use with LDPC codes.
LDPC codes were first described by Gallager in the 1960s. LDPC codes perform remarkably close to the Shannon limit. A binary (N, K) LDPC code, with a code length N and dimension K, is defined by a parity check matrix H of (N-K) rows and N columns. Most entries of the matrix H are zeros and only a small number the entries are ones, hence the matrix H is sparse. Each row of the matrix H represents a check sum, and each column represents a variable, e.g., a bit or symbol. The LDPC codes described by Gallager are regular, i.e., the parity check matrix H has constant-weight rows and columns.
Regular LDPC codes can be extended to form irregular LDPC codes, in which the weight of rows and columns vary. An irregular LDPC code is specified by degree distribution polynomials v(x) and c(x), which define the variable and check node degree distributions, respectively. More specifically, the irregular LDPC codes may be defined as follows:
where the variables dv max and dc max are a maximum variable node degree and a check node degree, respectively, and vj(cj) represents the fraction of edges emanating from variable (check) nodes of degree j. While irregular LDPC codes can be more complicated to represent and/or implement than regular LDPC codes, it has been shown, both theoretically and empirically, that irregular LDPC codes with properly selected degree distributions outperform regular LDPC codes.
LDPC codes can also be represented by bipartite graphs, or Tanner graphs. In Tanner graph, one set of nodes called variable nodes (or bit nodes) corresponds to the bits of the codeword and the other set of nodes called constraints nodes (or check nodes) corresponds the set of parity check constrains which define the LDPC code. Bit nodes and check nodes are connected by edges, and a bit node and a check node are said to be neighbors or adjacent if they are connected by an edge. Generally, it is assumed that a pair of nodes is connected by at most one edge.
LDPC codes can be decoded in various ways such as majority-logic decoding and iterative decoding. Because of the structures of their parity check matrices, LDPC codes are majority-logic decodable. Although majority-logic decoding requires the least complexity and achieves reasonably good error performance for decoding some types of LDPC codes with relatively high column weights in their parity check matrices (e.g., Euclidean geometry LDPC and projective geometry LDPC codes), iterative decoding methods have received more attention due to their better performance versus complexity tradeoffs. Unlike majority-logic decoding, iterative decoding processes the received symbols recursively to improve the reliability of each symbol based on constraints that specify the code. In a first iteration, an iterative decoder only uses a channel output as input, and generates reliability output for each symbol.
Subsequently, the output reliability measures of the decoded symbols at the end of each decoding iteration are used as inputs for the next iteration. The decoding process continues until a stopping condition is satisfied, after which final decisions are made based on the output reliability measures of the decoded symbols from the last iteration. According to the different properties of reliability measures used during each iteration, iterative decoding algorithms can be further divided into hard decision, soft decision and hybrid decision algorithms. The corresponding popular algorithms are iterative bit-flipping (BF), belief propagation (BP), and weighted bit-flipping (WBF) decoding, respectively. Since BP algorithms have been proven to provide maximum likelihood decoding when the underlying Tanner graph is acyclic, they have become the most popular decoding methods.
BP for LDPC codes is a type of message passing decoding. Messages transmitted along the edges of a graph are log-likelihood ratio
associated with variable nodes corresponding to codeword bits. In this expression p0 and p1 denote the probability that the associated bit value becomes either a 0 or a 1, respectively. BP decoding generally includes two steps, a horizontal step and a vertical step. In the horizontal step, each check node cm sends to each adjacent bit bn a check-to-bit message which is calculated based on all bit-to-check messages incoming to the check cm except one from bit bn. In the vertical step, each bit node bn sends to each adjacent check node cm a bit-to-check message which is calculated based on all check-to-bit messages incoming to the bit bn except one from check node cm. These two steps are repeated until a valid codeword is found or the maximum number of iterations is reached.
Because of its remarkable performance with BP decoding, irregular LDPC codes are among the best for many applications. Various irregular LDPC codes have been accepted or being considered for various communication and storage standards, such as DVB-S2/DAB, wireline ADSL, IEEE 802.11n, and IEEE 802.16.
The threshold of an LDPC code is defined as the smallest SNR value at which, as the codeword length tends to infinity, the bit error probability can be made arbitrarily small. The value of threshold of an LDPC code can be determined by analytical tool called density evolution.
The concept of density evolution can also be traced back to Gallager's results. To determine the performance of BF decoding, Gallager derived formulas to calculate the output BER for each iteration as a function of the input BER at the beginning of the iteration, and then iteratively calculated the BER at a given iteration. For a continuous alphabet, the calculation is more complex. The probability density functions (pdf's) of the belief messages exchanged between bit and check nodes need to be calculated from one iteration to the next, and the average BER for each iteration can be derived based on these pdf's. In both check node processing and bit node processing, each outgoing belief message is a function of incoming belief messages. For a check node of degree dc, each outgoing message U can be expressed by a function of dc−1 incoming messages,
U=Fc(V1, V2, . . . , Vd
where Fc denotes the check node processing function which is determined from BP decoding. Similarly, for bit node of degree dv, each outgoing message V can be expressed by a function of dv−1 incoming messages and the channel belief message Uch,
V=FV(Uch, U1, U2, . . . , Ud
where Fv denotes the bit node processing function. Although for both check and bit node processing, the pdf of an outgoing message can be derived based on the pdf's of incoming messages for a given decoding algorithm, there may exist an exponentially large number of possible formats of incoming messages. Therefore the process of density evolution seems intractable. Fortunately, it has been proven in that for a given message-passing algorithm and noisy channel, if some symmetry conditions are satisfied, then the decoding BER is independent of the transmitted sequence x. That is to say, with the symmetry assumptions, the decoding BER of all-zero transmitted sequence x=1 is equal to that of any randomly chosen sequence, thus the derivation of density evolution can be considerably simplified. The symmetry conditions required by efficient density evolution are channel symmetry, check node symmetry, and bit node symmetry. Another assumption for the density evolution is that the Tanner graph is cyclic free.
According to these assumptions, the incoming messages to bit and check nodes are independent, and thus the derivation for the pdf of the outgoing messages can be considerably simplified. For many LDPC codes with practical interests, the corresponding Tanner graph contains cycles. When the minimum length of a cycle (or girth) in a Tanner graph of an LDPC code is equal to 4×l, then the independence assumption does not hold after the l-th decoding iteration with the standard BP decoding. However, for a given iteration number, as the code length increases, the independence condition is satisfied for an increasing iteration number. Therefore, the density evolution predicts the asymptotic performance of an ensemble of LDPC codes and the “asymptotic” nature is in the sense of code length.
A bit mapping scheme is provided for low density parity check (LDPC) encoded bits in 32APSK modulation systems. The disclosed bit mapping scheme provides good threshold of LDPC codes. Furthermore the bit mapping scheme can facilitate design of interleaving arrangement in 32APSK modulation system.
To propose a bit mapping approach for LDPC coded 32APSK systems. The disclosed bit mapping offers good performance of LDPC coded 32APSK system and simplifies interleaving arrangement in 32APSK systems.
The present invention is illustrated by way of example, and not by way of limitation, in the figures of the corresponding drawings and in which like reference numerals refer to similar elements and in which:
Referring to the accompanying drawings, a detailed description will be given of exemplary encoded bit mapping methods using LDPC codes according to various embodiments of the invention.
Although the invention is described with respect to LDPC codes, it is recognized that the bit mapping approach can be utilized with other codes. Furthermore, it is recognized that this approach can be implemented with uncoded systems.
According to various embodiments of the invention, as shown in
According to various embodiments of the invention, the bit mapping scheme of
Although the invention has been described by the way of examples of preferred embodiments, it is to be understood that various other adaptations and modifications may be made within the spirit and scope of the invention. Therefore, it is the object of the appended claims to cover all such variations and modifications as come within the true spirit and scope of the invention.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CN2006/002424 | 9/18/2006 | WO | 00 | 5/28/2010 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2008/034289 | 3/27/2008 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5946047 | Levan | Aug 1999 | A |
6154871 | Claydon et al. | Nov 2000 | A |
6320917 | Stott et al. | Nov 2001 | B1 |
6421387 | Rhee | Jul 2002 | B1 |
6522635 | Bedwell | Feb 2003 | B1 |
6757122 | Kuznetsov et al. | Jun 2004 | B1 |
6963622 | Eroz et al. | Nov 2005 | B2 |
6973140 | Hoffman et al. | Dec 2005 | B2 |
7065703 | Krieger | Jun 2006 | B2 |
7237173 | Morita et al. | Jun 2007 | B2 |
7281192 | Shen et al. | Oct 2007 | B2 |
7343539 | Divsalar et al. | Mar 2008 | B2 |
7584400 | Gray et al. | Sep 2009 | B2 |
7936707 | Kota et al. | May 2011 | B2 |
20030039322 | Murakami et al. | Feb 2003 | A1 |
20030223507 | De Gaudenzi et al. | Dec 2003 | A1 |
20040086059 | Eroz et al. | May 2004 | A1 |
20044221223 | Yu et al. | Nov 2004 | |
20050058229 | Alagha | Mar 2005 | A1 |
20050066262 | Eroz et al. | Mar 2005 | A1 |
20050089068 | Sun et al. | Apr 2005 | A1 |
20050123073 | Ginesi et al. | Jun 2005 | A1 |
20050138519 | Boutillon et al. | Jun 2005 | A1 |
20050180534 | Brotje et al. | Aug 2005 | A1 |
20050229090 | Shen et al. | Oct 2005 | A1 |
20050271160 | Eroz et al. | Dec 2005 | A1 |
20060013333 | Chen | Jan 2006 | A1 |
20060015791 | Kikuchi et al. | Jan 2006 | A1 |
20060072684 | Feher | Apr 2006 | A1 |
20060085720 | Tran et al. | Apr 2006 | A1 |
20060115027 | Srebranig | Jun 2006 | A1 |
20060156169 | Cameron et al. | Jul 2006 | A1 |
20060156199 | Palanki et al. | Jul 2006 | A1 |
20060206779 | Wehn et al. | Sep 2006 | A1 |
20060276125 | Dibiaso et al. | Dec 2006 | A1 |
20060282742 | Zhang et al. | Dec 2006 | A1 |
20070022362 | Yue et al. | Jan 2007 | A1 |
20070113147 | Hong et al. | May 2007 | A1 |
20070118787 | Schmidt | May 2007 | A1 |
20070162815 | El-Khamy et al. | Jul 2007 | A1 |
20070186138 | Yang et al. | Aug 2007 | A1 |
20080104474 | Gao et al. | May 2008 | A1 |
Number | Date | Country |
---|---|---|
10134764 | Jan 2003 | DE |
2000078116 | Mar 2000 | JP |
60206284 | Oct 2005 | JP |
2002001039 | Jan 2002 | KR |
Entry |
---|
European Telecommunications Standards Institute, “Digital Video Broadcasting (DVB); Second generation framing structure, channel coding and modulation systems for Broadcasting, Interactive Services, News Gathering and other broadband satellite applications,” European Broadcasting Union, ETSI EN 302 307 v1.1.2, , Sophia-Antipo Cedex, Fr, Jun. 2006. |
Morello A. and Mignone V, “DVB-S2—ready for lift off,” EBU Technical Review, No. 300, pp. 1-10, Oct. 2004. |
Eroz M et al, “DVB-S2 Low Density Parity Check Codes With Near Shannon Limit Performance,” International Journal of Satellite Communications and Networking, vol. 22, pp. 269-279, Jun. 2004. |
De Gaudenzi R, et al., “Performance Analysis of Turbo-Coded APSK Modulations Over Nonlinear Satellite Channels,” IEEE Transactions of Wireless Communications, vol. 5, No. 9, Sep. 2006. |
Benedetto S. et al., “MHOMS: High-Speed ACM Modem for Satellite Applications,” IEEE Wireless Communications, Apr. 2005. |
“Near optimum universal belief propagation based decoding of low-density parity check codes”, source(s): Jinghu Chen; Fossorier, M.P.C.; Communications, IEEE Transactions on vol. 50, Issue 3, Mar. 2002 pp. 406-414 Digital Object Identifier 10.1109/26.990903. |
“A variable-rate QPSK demodulator for digital satellite TV reception”, source(s): Karam, G. (Soc. Anonyme de Telecommun., France); Paxal, C.; Sari, H. Source: IBC 94. International Broadcasting Convention (Conf. Publ. No. 397), 1994, p. 646-50. |
“DVB-S2, the second generation standard for satellite broadcasting and unicasting”, source(s): Morello, A. (Development Centre RAI, Italy); Reimers, U. Source: International Journal of Satellite Communications and Networking, v 22, n 3, May-Jun. 2004, p. 249-68. |
“COMETS 21-GHz advanced satellite broadcasting experiments-evaluation of trellis-coded 8-PSK performance”, source(s): Ohkawa, M.; Takahashi, T.; Huan-Bang Li; ligusa, K.; Wakana, H.; Broadcasting, IEEE Transactions on vol. 46, Issue 2, Jun. 2000 pp. 144-151 Digital Object Identifier 10.1109/11.868930. |
“Encapsulation and framing efficiency of DVB-S2 satellite systems”, source(s): Castro, M.A.V.; Cardoso, A.; Rinaldo, R.; Vehicular Technology Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th vol. 5, May 17-19, 2004 pp. 2896-2900 vol. 5 Digital Object Identifier 10.1109NETEC S .2004.1391454. |
“COMETS 21-GHz advanced satellite broadcasting experiments-evaluation of trellis-coded 8-PSK performance”, source(s): Ohkawa, M.; Takahashi, T.; Huan-Bang Li; Iigusa, K.; Wakana, H.; Broadcasting, IEEE Transactions on vol. 46, Issue 2, Jun. 2000 pp. 144-151 Digital Object Identifier 10.1109/11.868930. |
“Encapsulation and framing efficiency of DVB-S2 satellite systems”, source(s): Castro, M.A.V.; Cardoso, A.; Rinaldo, R.; Vehicular Technology Conference, 2004. VTC 2004-Spring. 2004 IEEE 59th vol. 5, May 17-19, 2004 p. 2896-2900 vol. 5 Digital Object Identifier 10.1109NETEC S.2004.1391454. |
“Transmission system for satellite ISDB”, source(s): Saito, T.; Hashimoto, A.; Minematsu, F.; Katoh, H.; Matsumura, H.; Global Telecommunications Conference, 1998. GLOBECOM 98. The Bridge to Global Integration. IEEE vol. 5, Nov. 8-12, 1998 pp. 2942-2947 vol. 5 Digital Object Identifier 10.1109/GLOCOM.1998.776613. |
International Search Report and the Written Opinion, mailed Jun. 14, 2007, cited in related International Patent Application No. PCT/CN2006/002423, filed Sep. 18, 2006. |
Yan Li et al., “Bit-Reliability Mapping in LDPC-Coded Modulation Systems”, IEEE Communications Letters 9(1):13 , Jan. 2005. |
Morello A. et al., “DVB-S2: The Second Generation Standard for Satellite Broad-band Services ”, Proceedings of the IEEE, 94(1), Jan. 2006, pp. 210-227. |
Number | Date | Country | |
---|---|---|---|
20110164705 A1 | Jul 2011 | US |