The present invention relates to parity-check codes for encoding and decoding transmissions that may be at one of several transmission rates. The invention is particularly valuable when used with low-density parity-check (LDPC) codes, though it may be used with any block coding scheme. The present invention has application to wired and wireless communication systems.
Low-density parity-check (LDPC) codes have recently been the subject of increased research interest for their enhanced performance on additive white Gaussian noise (AWGN) channels. As described by Shannon's Channel Coding Theorem, the best performance is achieved when using a code consisting off very long codewords. In practice, codeword size is limited in the interest of reducing complexity, buffering, and delays. LDPC codes are block codes, as opposed to trellis codes that are built on convolutional codes. LDPC codes constitute a large family of codes including turbo codes. Block codewords are generated by multiplying (modulo 2) binary information words with a binary matrix generator. LDPC codes uses a check parity matrix H, which is used for decoding. The term low density derives from the characteristic that the check parity matrix has a very low density of non-zero values, making it a relatively low complexity decoder while retaining good error protection properties.
The parity check matrix H measures (N−K)×N, wherein N is number of elements in a codeword and K is the number of information elements in the codeword. The matrix H is also termed the LDPC mother code. For the specific example of a binary alphabet, N is the number of bits in the codeword and K is the number of information bits contained in the codeword for transmission over a wireless or a wired communication network or system. The number of information elements is therefore less than the number of codeword elements, so K<N.
Irregular LDPC codes have been shown to significantly outperform regular LDPC codes, which has generated renewed interest in this coding system since its inception decades ago. The bipartite graph of
Irregular codes can be designed for many different symmetric channels via density evolution and genetic hill-climbing algorithms (i.e., Differential Evolution) by adjusting variable edge polynomial λ(x) and check edge polynomial ρ(x), defined as:
where {λ2, λ3, . . . λd
The two prior art LDPC coding systems known to the inventor require significant non-volatile memory for each coding rate for a single mother code. In a first prior art approach, a different LDPC code is designated for each coding rate and channel (i.e., different code realizations from different λ(x) and ρ(x) corresponding to the desired code rates). This approach uses one LDPC code for each coding rate, and may increase substantially when the set of code rates is large and/or when code words are long. The storage requirements can render this approach prohibitive for adaptive coding and modulation schemes operating in slowly varying channels.
The second known prior art approach is to take a single LDPC code and puncture codeword elements using multiple puncturing sequences chosen at random using puncturing probabilities. This approach requires storage of multiple puncturing sequences, one for each code rate, which may become prohibitive for a large set of coding rates and/or long codeword lengths.
uncompressed memory elements.
Besides substantial amounts of memory required to store prior art puncturing sequences for various coding rates, the determination of the puncturing sequences is itself computationally intensive. Like the coding systems themselves, the prior art reveals at least two distinct methods for designing a puncture sequence. The first method is based on linear programming to determine puncturing probabilities that maximize the puncturing fraction:
for a given signal to noise ratio (SNR, or bit/symbol energy to noise power spectral density Eb/N0) threshold, wherein λ′j represents the fraction of variable nodes 26 of degree j. The other prior art approach to puncture sequence design is based on differential evaluation based on Density Evolution, which is somewhat more complex than the linear programming method described immediately above with near identical results. Each of these approaches for designing the puncture sequences are very computationally expensive, and their resulting sequences themselves require so much storage as to be potentially prohibitive for an adaptive coding system.
Thus, each of the known prior art approaches require substantial amounts of storage to implement a wide variety of code rates. It is anticipated that neither of the prior art approaches are suitable for future communication systems that employ adaptive coding and implement a wide range of coding rates. Additionally, each of the two noted prior art approaches in designing puncture sequences are computationally intensive. What is needed in the art is a more elegant set of puncture codes that will not require so much storage as to make their use prohibitive in the adaptive coding rate communications systems that represent what may be a large portion of future communications. Ideally, such an elegant set of puncture codes would also submit to a more straightforward method of determining them, so that more sets of such codes could be developed and optimized for different applications to close further on the theoretical Shannon capacity limit.
The present invention is directed to a coding/decoding system that is more compatible with adaptive coding communication systems, especially by requiring less memory. The present invention may be embodied in a communication unit such as a transmitter, in a receiver, or in a transceiver that may puncture codewords at any of several code rates, puncture meaning to remove or to add an element to the codeword in accordance with known practice. In accordance with one aspect of the present invention, the communication unit for a multiple code rate communication system includes a codeword. The codeword defines N codeword elements, K information elements, and P punctured elements. The particular code rate is R=K/(N−P). The transmitter or receiver further includes a first storage location for storing an error reduction code mother code definition. Preferably, this is an LDPC mother code definition such as a parity check matrix of dimensions of (N−K) rows and N columns.
The communication unit further includes a second storage location for storing a maximum puncture sequence Smax . Smax is the puncture sequence for a maximum code rate Rmax, and preferably Smax=SN−K. Smax itself includes at least one subset S1 that is a puncture sequence for a minimum code rate R1. S1, and preferably all other puncture sequences corresponding to code rates less than Rmax, are each a subset of Smax. This reduces the memory requirements as compared to prior art puncture sequencing. Preferably, S1⊂S2⊂ . . . ⊂Smax−1⊂Smax. Preferably, Smax is a plurality of memory elements, each of which is a variable degree. Alternatively, the memory elements may be variable node locations, check node locations, or check degrees.
Another aspect of the present invention is a computer program embodied on a computer readable medium for determining a puncture sequence for a codeword. The computer program includes a first storage location for storing a LDPC mother code definition. It also includes a second storage location for storing a plurality of memory elements Mall that in combination comprise a maximum rate puncture sequence Smax that corresponds to a maximum code rate Rmax. The computer program further includes a first set of computer instructions for reading a first subset of memory elements Mset1. The number of the first subset of memory elements is less than the number of the plurality of memory elements that comprise the maximum rate puncture sequence. The specific memory elements Mset1 comprises a puncturing sequence S1 that corresponds to a code rate R1 that is less than Rmax.
Another aspect of the present invention is a method for determining a puncture sequence S for an ensemble of low-density parity-check (LDPC) codes. The method includes selecting at least one design criteria for an ensemble of LDPC codes and a stop criteria. A mean input LLR values, mu
The present invention enables an LDPC encoder or decoder to use significantly less memory than prior art approaches by using a single puncture sequence SN−K for the maximum rate Rmax, and forcing all puncture sequences Sx for lesser rates Rx to be a subset of the maximum rate puncture sequence SN−K. Consider the communication system 36B of
At the receive end of the communication, the demodulation block 46 receives the distorted codeword without the P punctured bits that were never sent. Before decoding the codeword, the decoder 48B reconstructs the entire codeword by inserting values that do not bias the decoding (i.e. neutral with respect of decoding a zero or a one) of punctured bits back into the P punctured locations (e.g. zero if log-likelihood-ratio values are used as inputs into the sum-product decoder). The decoder 48B accesses memory that stores the same LDPC mother code 37B and the same maximum code rate puncture sequence Smax 35B as the transmitter 39B. Then, the decoder 48B decodes the reconstructed codeword attempting to correct any errors due to the communication channel 44 along with the punctured bits. Both the transmitter and the receiver store the LDPC mother code 37B and a puncturing sequence 35B that can be used, in whole or in part, for any of the different code rates.
Two embodiments are shown graphically at
The puncture sequence Smax may or may not be the entire matrix H [of dimensions (N−K)×N] because the maximum practical puncture sequence SN−K, may not be available. For example, assume a codeword length N=3000, K=1000 information elements, and P=number of punctured elements. Without puncturing, the rate is K/N=1000/3000=0.33. With puncturing, the code rate varies by R=K/(N−P), and depends upon how many elements are punctured. For P=500, the rate is increased only to R=1000/2500=0.4. For P=1000, the rate is R=0.5. For P=(N−K)=2000, the rate is K/K=1. Further puncturing beyond P=2000 is not desirable because P=(N−K) already results in the maximum possible coding rate. A transmitter or receiver may artificially bound the maximum coding rate to less than R=1 to ensure that some repetitive transmission always occurs to ensure accuracy.
As in
For each code rate supported by the system 36B, both the encoder 40B in the transmitter and the decoder 48B in the receiver must know the puncture locations within the codeword beforehand. In this invention, the locations of these P punctures are preferably contiguous subsets selected from a single puncture sequence SN−K of length (N−K). Either variable degrees 32 or variable node locations 26 in the codeword compose the individual elements of the puncture sequence SN−K. Indeed, the sequence's length may be shorter than (N−K) if the communication system 36 strictly bounds the maximum code rate Rmax below one.
For a given variable degree sequence, all node 26 permutations within each individual degree 32 are just different node realizations of that degree sequence. In implementation, a communication system 36 would preferably use a single sequence of variable nodes 26 and not variable degrees 32. However, determining variable node 26 permutations within each variable degree 32 is just one embodiment of the degree sequence.
memory elements to store the uncompressed puncturing sequences Sx. Embodiments of the present invention detailed above require only (N−K) memory elements 54. Using state of the art codeword lengths ranging from 1×103 to 1×106, this memory difference between the two can be several magnitudes of order for long code words.
The present invention is not limited to those examples above wherein the subsets Sx are contiguous. For example, non-contiguous subsets Sx may be chosen and an additional identifier of starting point and either subset length or subset ending point may be stored in addition to the mother code and the maximum rate puncture sequence SN−K, perhaps as a lookup table, algorithm, or combination of the two. However, continuous subsets are preferred.
The above description is made more practical in light of the following discussion on the design of specific puncture sequence for use with a given mother code that allows for implementation of all possible effective coding rates. An initial assumption is that the needed Eb/N0 to achieve a particular performance measure is relatively well behaved (i.e., non-random) from one puncture to the next. Using this assumption and a given LDPC mother code, the invention constructs element-by-element the puncture sequence by determining the next variable degree 32 to puncture that requires the least amount of Eb/N0 for the code ensemble, defined by (λ(x), ρ(x), π(0) (x)), to achieve a target bit error rate (BER) where
Thus, this invention is greedy in Eb/N0 when determining the next variable degree 32 to puncture, and the punctured nodes 26 are restricted to conform to this degree sequence.
The present invention may be employed for any discrete communication system employing multiple coding rates using LDPC codes for the error control system. The wide range of code rates allows for more flexibility in the communication system. Some applications that would use this flexibility are future adaptive coding techniques based on LDPC codes that attempt to adjust the code rate according to channel realizations or statistics.
An alternate approach that is within the scope of this invention fixes the Eb/N0 to insure convergence (i.e. Eb/N0 threshold has been met for the ensemble) for a wide range of code rates by determining the next puncture degree 32 using the smallest number of iterations to achieve the target BER. Unlike the first approach that was greedy in Eb/N0, this alternate approach is greedy with respect to complexity (i.e. number of decoder iterations). A second alternative embodiment is based on the asymptotic thresholds of the code ensemble, which is determined by the edge distributions λ(x) and ρx).
A more detailed description of the “greedy in Eb/N0” approach to designing puncture codes follows. It is based upon a Gaussian Approximation of a BER expression to search for the Eb/N0 that meets the target BER using a finite number of decoding iterations given a punctured code ensemble, defined by the set (λ(x), ρ(x), π(0) (x)). Those skilled in the art could readily extrapolate the algorithm to include the alternate approaches based on the asymptotic Eb/N0 thresholds and the approaches greedy in decoding complexity that were suggested above.
Considering again the general discrete communication system 36B of
The following algorithm determines a single variable degree 32 puncturing sequence for an LDPC code. This approach is different than the approaches using Linear Programming (LP) and differential evolution techniques of the prior art. Variable degree subsets from a single puncture sequence, where the subset of the next higher rate contains the subset of the previous lower rate and so forth as described above, are used. For the highest supported code rate Rmax=RN−K, the entire puncture sequence SN−K is then used. This is fundamentally different approach from the prior art and results in a significant reduction of required implementation memory for a large set of code rates derived from a single mother code.
For the AWGN channel, the Gaussian Approximation (GA) technique models the messages sent to the check nodes 28 from the variable nodes 26 as a linear combination of Gaussian random variables. Through empirical study, it has been found that this approximation is fairly accurate for the variable messages sent to the check nodes 28 using an iterative sum-product decoding algorithm, also known as belief propagation. By only tracking the message means, this approximation simplifies the performance analysis over the prior art Density Evolution (DE) previously used to design LDPC code ensembles.
GA BER Expression Based On Message Mean Evolution: The mean value update equation for the kth iteration of a punctured LDPC code ensemble is
where φ(x) and its inverse φ−1 (y) is defined by Sae-Young Chun, “On the Construction of Some Capacity-Approaching Coding Schemes”, PhD dissertation, MIT, 2000, herein incorporated by reference. Further parameter descriptions are as described by Jeongseok Ha and Steven W. McLaughlin, “Optimal Puncturing of Irregular Low-Density parity-Check Codes” and “Optimal Puncturing Distributions for Rate-Compatible Low-Density Parity-Check Codes”, preprints submitted to IEEE ICC 2003, March 2003; and to IEEE Transactions of Information Theory, 2003, respectively, and each incorporated by reference herein. Using the above GA mean update equation, the BER expression after the kth decoding iteration is:
The “greedy Eb/N0” approach for determining the puncture degree sequence may be summarized as follows. For each available variable degree puncture, calculate the required mean input LLR values, mu
Next, select the variable degree, j, within the design criteria for puncturing that required the smallest mean input LLR value (or smallest in decoding complexity) and append the degree to the puncturing sequence. Taking into account a specific code length and the finite number of variable nodes of each degree, adjust the puncturing probability for the punctured variable degree, πj(0). Finally, return to the first iterative step (calculate the required mean input LLR values) and repeat until the puncturing sequence length corresponds to the Binary Erasure Channel (BEC) threshold for random errors (or alternatively until the code rate equals 1.0). Stop the iteration if the fraction of punctured variable nodes 26 reaches or is beyond the BEC threshold. Note that the above algorithm could use a different stopping criterion other than the BEC threshold. Stopping at the BEC threshold corresponds to a transmitted punctured code through a noiseless channel (i.e. very large Eb/N0).
Following are examples of various puncturing probabilities for various length LDPC codes realized randomly from the following code ensemble described by the distributions of the variable edges 30 and the check edges 31:
λ2=0.25105ρ7=0.63676
λ3=0.30938ρ8=0.36324
λ4=0.00104
λ10=0.43853
These edge distributions 30, 31 correspond to a 0.5 code rate where {λ2, λ3, λ4, λ10} correspond to the fraction of total variable edges 30 connected to variable nodes 26 of degrees {2,3,4,10} respectively and {ρ7, ρ8} correspond to the fraction of total check edges 31 connected to check nodes 28 of degrees {7,8} respectively.
Because for each code realization, the beginning subset of a single puncturing degree sequence is used (thus encapsulating the previous subsets of the lower rate codes), the puncturing probabilities are monotonically increasing. Note that the degree sequence is specified by these graphs and not the actual node sequence. The actual variable node 26 puncture sequence has many permutations within a specified degree 32 sequence, so it still may be possible to optimize (for some desired design criterion) the node 26 sequence further within the degree 32 sequence. For the work herein described, the node 26 sequence was chosen as the first available in the subset of nodes 26 corresponding to the punctured degree 32.
Present in both N=1082 and N=3255 examples are large jumps in discontinuities for the puncturing probability of variable nodes 26 of degree 4. Such discontinuities are similar to those present in the prior art. They exist because λ4 is relatively small with respect to {λ2, λ3, λ10}, resulting in very few variable nodes 26 of degree 4. For codeword length N=1082, there is only one variable node 26 of degree 4, and for N =3255, there are only three variable nodes 26 of degree 4. Furthermore, these large steps in the puncture probability highlight the discrete nature of the problem for LDPC code realizations of practical codeword lengths not addressed by prior art approaches.
Results:
While there has been illustrated and described what is at present considered to be a preferred embodiment of the claimed invention, it will be appreciated that numerous changes and modifications are likely to occur to those skilled in the art. It is intended in the appended claims to cover all those changes and modifications that fall within the spirit and scope of the claimed invention.
Number | Name | Date | Kind |
---|---|---|---|
6633856 | Richardson et al. | Oct 2003 | B2 |
20020101915 | Zhang et al. | Aug 2002 | A1 |
20030126551 | Mantha et al. | Jul 2003 | A1 |
20040098659 | Bjerke et al. | May 2004 | A1 |
Number | Date | Country | |
---|---|---|---|
20040268205 A1 | Dec 2004 | US |