The present invention relates to telecommunications, in particular to wireless telecommunications.
There is a drive towards greater capacity beyond what is available in 3G and 4G systems. As shown in
Fifth generation (5G) wireless networks are now under development with the aim of better quality of service, higher data throughput and lower latency. To this end, Third Generation Partnership Project (3GPP) telecommunications standards bodies are targeting unprecedentedly high capacity densities, for example of up to 25 Gbits/second/square kilometre. In 3GPP there are discussions about 5G radio access technology, in the context of which a radio access technology and physical layer waveform for uplink communications is proposed based on sparse code multiple access (SCMA), see H. Nikopour and H. Baligh, “Sparse code multiple access,” in Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on, 2013, pp. 332-336. The known SCMA encoder is shown in
In this SCMA approach, each user's binary data is mapped onto an n-dimensional real or complex-valued codeword that is then transmitted by using multiple physical resources (for example n symbol periods, n OFDM subcarriers or n antennas). Also, each user uses a distinct codebook (a set of codewords that can be understood as a multidimensional constellation which is derived from a lattice based on a sparse code. Furthermore, joint multiuser detection is used to distinguish individual codewords of different users.
The lattice codebook of this known SCMA scheme is generated from the Cartesian product of several independent QAM constellations.
The reader is referred to the appended independent claims. Some preferred features are laid out in the dependent claims.
An example of the present invention is a method of receiving user data from multiple transmitters, the user data from each transmitter having been encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at a receiver, the method of receiving comprising the steps of:
(i) receiving the signal,
(ii) calculating coefficients of linear combinations of the codewords from the multiple transmitters,
(iii) calculating a scaling factor to be applied to the signal based on the coefficients,
(iv) applying the scaling factor to the signal to provide a linear combination of the codewords,
(v) decoding the linear combination of the codewords based on channel state information to obtain an optimal independent linear combination of user data,
(vi) repeating steps (ii), (iii) (iv) and (v) to obtain at least as many optimal independent linear combinations as the number of transmitters, and
recovering the user data from the optimal independent linear combinations.
Preferred embodiments provide a multi-user medium access based on low density lattice coding. An approach to multi-user medium access is proposed based on multi-dimensional low density lattice codes, which we call low density lattice multiple access (LDLMA).
Preferred embodiments use a low-density lattice code (LDLC) as a basis for data encoding and medium access, in which a multi-dimensional constellation (referred to as a lattice) derived from the LDLC allows network users to asymptotically approach Shannon capacity.
Preferred embodiments use the same LDLC lattice codebook for encoding the binary data of all network users. Accordingly, the receiver receives a combination of all transmitted codewords. Since all users use the same lattice, the received linear combination of multiple codewords is also an element of the lattice codebook employed. Thus, the receiver only needs to decode linear combinations of users' LDLC codewords rather than separating them as would be required in known joint detection schemes.
In preferred embodiments, a single-input-single-output (SISO) LDLC decoder may perform such decoding by exploiting the posterior probability of linearly combined codewords in an iterative manner, which results in a linear decoding complexity even when the number of users is large.
In preferred embodiments, the individual codewords of distinct network users are detected by estimating the best combination coefficients subject to the knowledge of channel state information and the received signal.
Preferred embodiments provide a 5G access technology which we refer to as LDLMA, in which a multi-dimensional lattice constellation is used for encoding user data. The lattice constellation is constructed from the low-density lattice code (LDLC).
In preferred embodiments LDLMA may be implemented in either or both of uplink and downlink. Especially in the downlink, a SISO decoder with linear complexity is usable which reduces the hardware required in a mobile handset and saves battery energy of the handset.
Some preferred embodiments have the advantages that users use the same lattice codebook to encode their data, the low-density lattice has a superior shaping gain and there is less decoding complexity. For example, as mentioned above the lattice codebook of the known SCMA scheme is generated from the Cartesian product of several independent QAM constellations. In contrast to this the Low-Density Lattice is a natural lattice which does not require any transformation from an existing 2-dimensional lattice such as PSK or QAM. Hence it has a superior shaping gain as compared to the multidimensional lattice constellation employed in the known SCMA approach.
Preferred embodiments have linear decoding complexity. In contrast to the known SCMA scheme, preferred embodiments do not require a base station to distinguish each user's codeword by using joint multiuser detection. Instead, the base station estimates the best linear combination of users' codewords and retrieves individual user data by solving a set of linear equations for the estimated best coefficients. The base station does not need to separate each user's codeword, hence a single-in-single-out (SISO) decoder is sufficient. This significantly reduces the decoding complexity compared with the joint multiuser detection used in the known SCMA approach.
Preferably, the calculation of the scaling factor comprises applying a minimum mean square error (MMSE) criterion to minimise variance of effective noise.
Preferably, the calculation of the coefficients comprises maximising a virtual rate of the linear combination (t) of codewords.
Preferably, the decoding the linear combinations comprises iterative cycles, each cycle comprising calculating a variable node message and calculating a check node message. Preferably, obtaining each optimal independent linear combination of user data comprises, after the final iteration, estimating probability density functions of codeword elements.
Preferably, the linear combination of codewords is itself a valid codeword of the Low Density Lattice.
Preferably the recovering user data from the optimal independent linear combinations comprises taking a pseudo-inverse of a matrix of coefficients of the optimal independent linear combinations.
Preferably the transmitters are user terminals for cellular wireless telecommunications.
Examples of the present invention also relates to corresponding receiver.
An example of the present invention relates to a receiver configured to receive user data from multiple transmitters, the user data from each transmitter having being encoded as a Low Density Lattice codeword, and the multiple Low Density Lattice codewords having been transmitted so as to be received as a combined signal at the receiver, the receiver comprising:
a receiving stage configured to receive the signal;
an iterative processing stage configured to provide at least as many optimal independent linear combinations as the number of transmitters, the iterative processing stage comprising:
a processor configured to calculate coefficients of linear combinations of the codewords from the multiple transmitters,
a processor configured to calculate a scaling factor to be applied to the signal based on the coefficients,
a processor configured to apply the scaling factor to the signal to provide a linear combination of the codewords, and
a decoder configured to estimate an optimal linear combination of user data based on channel state information and the linear combination of the codewords;
and the receiver also comprises a recovery stage configured to recover the user data from the optimal independent linear combinations.
Preferably the receiver is a base station for cellular wireless communications.
Preferably the decoder is a Single-Input Single-Output (SISO) decoder.
Examples of the present invention also relates to a method of transmitting. An example of the present invention relates to a method of transmitting user data as codewords of a Low Density Lattice, wherein each transmitter encodes its user data into a respective codeword for transmission and transmits the codeword on a carrier signal over air; wherein a plurality of the transmitters use a shared Low Density Lattice codebook for the encoding.
Preferably, the transmitters are user terminals for wireless cellular telecommunications.
Preferably the codewords are adapted by hypercube shaping for power control.
Examples of the present invention also relates to a plurality of transmitters. An example of the present invention relates to a plurality of transmitters configured to transmit towards a receiver respective data as codewords of a Low Density Lattice, wherein each transmitter encodes its respective data into a respective codeword for transmission and transmits the codeword via a carrier signal over air; wherein the plurality of the transmitters use a shared Low Density Lattice codebook for the encoding.
An embodiment of the present invention will now be described by way of example and with reference to the drawings, in which:
When considering the known media access method of the SCMA system mentioned above with reference to the Nikopour paper and
Low Density Lattice Multiple Access (LDLMA)
The inventors realised that it is possible to provide multi-user medium access, based on multi-dimensional low density lattice codes (LDLC). We refer to this as the low density lattice multiple access (LDLMA)
Low density lattice codes as such are known from the paper by N. Sommer, M. Feder, and O. Shalvi, “Low-density lattice codes,” Information Theory, IEEE Transactions on, vol. 54, no. 4, pp. 1561-1585, April 2008.
As shown in
As shown in
In this approach, the individual codewords of distinct network users are detected by estimating the best combination coefficients 14 subject to the knowledge of channel state information and the received combined codeword.
This approach does not require the receiver 6, for example a base station (BS) 7, to distinguish each user's codeword by using joint-multiuser detection. Instead the receiver 6 estimates the best linear combination of users' codewords then retrieves the individual user's data 16 by solving a set of linear equations for the estimated best coefficients. The base station does not need to separate each user's codeword so a Single-Input Single-Output (SISO) decoder 12 is sufficient.
The encoding and decoding scheme may, of course, be implemented in either or both of uplink and downlink. Especially in the downlink (i.e. towards the user terminal), a SISO decoder may be used (having linear complexity), which reduces the hardware complexity of the mobile handset and saves user terminal battery energy.
The above is an outline. More detail is provided below.
Low Density Lattice Code
An n-dimensional lattice, denoted by Λ, is a set of points in Rn such that if x, y∈Λ, then x+y∈Λ, and if x∈Λ, then −x∈Λ. A lattice can always be written in terms of a lattice generator matrix G∈Rn×n
Λ={x=Gv:v∈Zn}.
A low-density lattice code (LDLC) is constructed by extending the well-known low-density parity check codes (LDPC); this is done by extending the parity check matrix and syndrome of LDPC from operating over finite field to a real or complex field. An n dimensional LDLC is an n-dimensional lattice code with a non-singular generator matrix G satisfying det|G|=1, for which the parity check matrix H=G−1 is sparse.
The row or column degree of H is defined as the number of nonzero elements in row or column, respectively. An n-dimensional LDLC is regular if all the row degrees and column degrees of the parity check matrix are equal to a common degree d. An n-dimensional regular LDLC with degree d is called “Latin square LDLC” if every row and column of the parity check matrix has the same nonzero values, except for a possible change of order and random signs. The sorted sequence of these d values is referred to as the generating sequence of the Latin square LDLC.
For example, a parity check matrix of a real LDLC with dimension n=6, row degree 4, column degree 3 and generating sequence {1, 0.8, 0.5} is as follows:
Encoding
The encoding scheme is shown in more detail in
As shown in
Power Control
In practice, we adopt a power control (i.e. shaping) algorithm so that LDLC codewords meet transmission power constraints. Accordingly, each user terminal 2 uses hypercube shaping, based on a lower triangular parity-check matrix H, to transfer the integer information vector vl to another integer vector v′l such that xl′=Gv′l satisfies the power constraint.
The hypercube shaping operation is given by
v′l,k=vl,k−Mrl,k,
where rl,k is calculated as
Due to the linearity of LDLC, x′l=xl mod Λ from v′l=vl mod M, where M is constellation size.
User Data Encoding
During user data transmission, binary user data are grouped to represent integers, and then mapped onto n-dimensional codewords of the LDLC lattice.
Transmission
Each codeword can be mapped onto distinct OFDM subcarriers or single antenna element of MIMO system.
Reception and Decoding
The reception and decoding stages are shown in
As shown in
Reception of Superimposed Codeword (Step a)
Suppose the base station (BS) 7 serves L users such that the received signal at the base station is given by
where xl is the transmitted lattice codeword with dimension n; hl is the channel coefficient; and z□CN(0,σ2In) is the noise.
Signal Processing (Step b, Step c)
In order to form the linear combination of LDLC codewords, the base station 7 scales the received signal by a factor α and expands the scaled signal as
where t is the linear combination of users' codewords and zeff is the effective noise.
Since the noise depends on the codeword, the optimal scaling factor α is obtained for this purpose by applying a minimum mean square error (MMSE) criterion such that the variance of the effective noise is minimized, as given by
where P is the power of transmitted codeword; and the coefficient vector a=[a1, . . . , aL] is determined by maximizing the virtual rate of t, given by
Substituting αopt into the above equation results in:
where
Formally, let M=LLH be the Cholesky decomposition of M, where L is some lower triangular matrix. (The existence of L follows from the fact that M is Hermitian and positive-definite). This gives aMaH=∥aL∥2. Hence, the above rate optimization is equivalent to solving the following shortest vector problem:
Obtaining Linear Combinations of Users' Messages (Step d)
After obtaining aopt, the base station 7 decodes the desired linear combination t. In order to successfully recover L user's messages, the base station has to decode the K optimal and independent linear combinations, where K≥L.
To decode the desired t, the proposed LDLMA scheme has to form the following distribution:
where tj is the j-th component of t; l is the lattice codeword and lj is the j-th component of it; d(l,αy) denotes the Euclidean distance between αy and l; and σ2 (α,a) is the variance of effective noise, given by
σ2(α,a)=∥αh−a∥2P+ασ2.
One expands t as follows
where t itself is a valid codeword of LDLC such that r, which is the linear combination of users' messages, is extracted by passing t through the SISO LDLC decoder 12, given by {circumflex over (r)}=LDLCDecoder(αy), where {circumflex over (r)} is the estimated signal. This is described in more detail as follows.
The decoder 12 iteratively estimates fT
Let t1, . . . , tj, . . . , tn and c1, . . . , cj, . . . , cn denote the variable nodes and check nodes respectively. The SISO decoder 12 for the LDLC lattice combination t essentially operates by applying the following method:
Initialization: the variable node t1 sends the message
to all neighbouring check nodes.
Basic iteration of check node message: each check node shares a different message with the neighbouring variable nodes. Suppose there are m (equals the row degree of H) variable nodes connected to the check node cj. Those variable nodes are denoted by tj,ν,ν∈{1, . . . ,m} and we have an appropriate check equation
where Z is the integer set and ητ is the entry of H. The message that was sent from tj,ν to the check node in the previous half-iteration is denoted as fν(t),ν∈{1, . . . ,m}. The calculation of the message that the check node cj sends back to the variable node tj,τ follows the three basic steps:
1) Convolution step: all messages excluding j, (t) are convolved, where
will be substituted into fν(t), ν∈{1, . . . ,m}/{τ}:
2) Stretching step: {tilde over (p)}τ (t) is stretched by −ητ to pτ(t)={tilde over (p)}τ(−ητt).
3) Periodic extension step: pτ(t) is extended to a periodic function with period
given by
where Pτ(t) is the final message that is sent to the variable node tj,τ.
Basic iteration of variable node message: each variable node sends a message to the neighbouring check node.
Suppose there are e (equals to the column degree of H) check nodes connected to the variable node tj, which are denoted by cj,λ, λ∈{1, . . . ,e}. The message that the check node cj,λ sends back to the variable node tj in the previous half-iteration is denoted by Pλ(t). The calculation of the message that is sent from the variable node tj to the check node cj,τ follows the two basic steps:
1) The product step:
2) the normalization step:
Repetition: The basic iteration is repeated until the iteration threshold is achieved.
Final Decision: To extract the desired linear combination of users' message, r, the final PDF of the codeword elements t1, . . . , tj, . . . , tn should be estimated in the final iteration without excluding any check node message in the product step, given by
Then, the estimated codeword element can be obtained from {circumflex over (t)}=arg maxt{tilde over (f)}j,final(t). At last, the desired r is calculated as {circumflex over (r)}=└H·t┐.
Message Recovery (Step e)
Given the channel state information, the base station 7 obtains the best K linear combination {circumflex over (r)}'s, indexed as [{circumflex over (r)}1, . . . , {circumflex over (r)}K], namely, at least as many optimal independent linear combinations are obtained as the number of transmitters. The coefficients of these linear combinations form a matrix
In order to successfully recover the users' messages [v1, . . . , vL], the rank of A should be no less than L. As such, the base station takes the pseudo inverse to recover [v1, . . . , vL], given by
Here is a simple example to illustrate the decoding procedure of LDLMA: there are 2 user terminals with access to the base stations. Both user terminals employ the same LDLC codebook Λ, where the codewords are x1=Gv1 and x2=Gv2, respectively. Assume that the channel coefficient vector is h=[h1 h2]T=[1 2.2]T such that the received signal is y=1x1+2.2x2+z. Assuming after the rate optimization, the base station selects, say, α1=5 and α2=4 as the best two scale factors such that we have
where
as t1,t2 ∈Λ, the SISO lattice decoder over A iteratively estimates the distributions fT
The present invention may be embodied in other specific forms without departing from its essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.
A person skilled in the art would readily recognize that steps of various above-described methods can be performed by programmed computers. Some embodiments relate to program storage devices, e.g., digital data storage media, which are machine or computer readable and encode machine-executable or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of said above-described methods. The program storage devices may be, e.g., digital memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. Some embodiments involve computers programmed to perform said steps of the above-described methods.
Number | Date | Country | Kind |
---|---|---|---|
15306315 | Aug 2015 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2016/069324 | 8/15/2016 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2017/032625 | 3/2/2017 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
7016440 | Singer | Mar 2006 | B1 |
10128983 | Robert Safavi | Nov 2018 | B2 |
20080253478 | Kim | Oct 2008 | A1 |
20100027408 | Green | Feb 2010 | A1 |
20110274198 | Cheng | Nov 2011 | A1 |
20130064320 | Nissani (Nissensohn) | Mar 2013 | A1 |
Number | Date | Country |
---|---|---|
101164269 | Apr 2008 | CN |
102916763 | Feb 2013 | CN |
104780022 | Jul 2015 | CN |
Entry |
---|
Low Density Lattice Codes, Naftali Sommer, Senior Member, IEEE, Meir Feder, Fellow, IEEE, and Ofir Shalvi, Member, IEEE (Year: 2007). |
Shaping Methods for Low-Density Lattice Codes, Naftali Sommer, Meir Feder and Ofir Shalvi; IEEE (Year: 2009). |
H. Nikopour et al., “Sparse code multiple access,” 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications: Fundamentals and PHY Track, pp. 332-336, XP0552271113, 2013. |
N Sommer et al., “Low-density lattice codes,” IEEE Transactions on Information Theory, vol. 54, No. 4, pp. 1561-1585, XP080280916, 2008. |
International Search Report for PCT/EP2016/069324 dated Oct. 19, 2016. |
Wang, et al.; “Complex Low Density Lattice Codes to Physical Layer Network Coding”, IEEE International Conferenc on Communications (ICC) 2015, Jun. 2015, p. 2060-2065. |
Number | Date | Country | |
---|---|---|---|
20180248739 A1 | Aug 2018 | US |