Properties of a channel affect the amount of data that can be handled by the channel. The so-called “Shannon limit” defines the theoretical limit of the amount of data that a channel can carry.
Different techniques have been used to increase the data rate that can be handled by a channel. “Near Shannon Limit Error-Correcting Coding and Decoding: Turbo Codes,” by Berrou et al. ICC, pp 1064-1070, (1993), described a new “turbo code” technique that has revolutionized the field of error correcting codes. Turbo codes have sufficient randomness to allow reliable communication over the channel at a high data rate near capacity. However, they still retain sufficient structure to allow practical encoding and decoding algorithms. Still, the technique for encoding and decoding turbo codes can be relatively complex.
A standard turbo coder 100 is shown in
Three different items are sent over the channel 150: the original k bits, first encoded bits 110, and second encoded bits 112. At the decoding end, two decoders are used: a first constituent decoder 160 and a second constituent decoder 162. Each receives both the original k bits, and one of the encoded portions 110, 112. Each decoder sends likelihood estimates of the decoded bits to the other decoders. The estimates are used to decode the uncoded information bits as corrupted by the noisy channel.
A coding system according to an embodiment is configured to receive a portion of a signal to be encoded, for example, a data block including a fixed number of bits. The coding system includes an outer coder, which repeats and scrambles bits in the data block. The data block is apportioned into two or more sub-blocks, and bits in different sub-blocks are repeated a different number of times according to a selected degree profile. The outer coder may include a repeater with a variable rate and an interleaver. Alternatively, the outer coder may be a low-density generator matrix (LDGM) coder.
The repeated and scrambled bits are input to an inner coder that has a rate substantially close to one. The inner coder may include one or more accumulators that perform recursive modulo two addition operations on the input bit stream.
The encoded data output from the inner coder may be transmitted on a channel and decoded in linear time at a destination using iterative decoding techniques. The decoding techniques may be based on a Tanner graph representation of the code.
The outer coder 202 receives the uncoded data. The data may be partitioned into blocks of fixed size, say k bits. The outer coder may be an (n,k) binary linear block coder, where n>k. The coder accepts as input a block u of k data bits and produces an output block v of n data bits. The mathematical relationship between u and v is v=T0u, where T0 is an n×k matrix, and the rate of the coder is k/n.
The rate of the coder may be irregular, that is, the value of T0 is not constant, and may differ for sub-blocks of bits in the data block. In an embodiment, the outer coder 202 is a repeater that repeats the k bits in a block a number of times q to produce a block with n bits, where n=qk. Since the repeater has an irregular output, different bits in the block may be repeated a different number of times. For example, a fraction of the bits in the block may be repeated two times, a fraction of bits may be repeated three times, and the remainder of bits may be repeated four times. These fractions define a degree sequence, or degree profile, of the code.
The inner coder 206 may be a linear rate-1 coder, which means that the n-bit output block x can be written as x=TIw, where TI is a nonsingular n×n matrix. The inner coder 210 can have a rate that is close to 1, e.g., within 50%, more preferably 10% and perhaps even more preferably within 1% of 1.
In an embodiment, the inner coder 206 is an accumulator, which produces outputs that are the modulo two (mod-2) partial sums of its inputs. The accumulator may be a truncated rate-1 recursive convolutional coder with the transfer function 1/(1+D). Such an accumulator may be considered a block coder whose input block [x1, . . . , xn] and output block [y1, . . . , yn] are related by the formula
y1=x1
y2=x1⊕x2
y3=x1⊕x2⊕x3
.
.
.
yn=x1⊕x2⊕x3⊕ . . . ⊕xn
where “⊕” denotes mod-2, or exclusive-OR (XOR), addition. An advantage of this system is that only mod-2 addition is necessary for the accumulator. The accumulator may be embodied using only XOR gates, which may simplify the design.
The bits output from the outer coder 202 are scrambled before they are input to the inner coder 206. This scrambling may be performed by the interleaver 204, which performs a pseudo-random permutation of an input block v, yielding an output block w having the same length as v.
The serial concatenation of the interleaved irregular repeat code and the accumulate code produces an irregular repeat and accumulate (IRA) code. An IRA code is a linear code, and as such, may be represented as a set of parity checks. The set of parity checks may be represented in a bipartite graph, called the Tanner graph, of the code.
Each check node 304 is connected to exactly “a” information nodes 302. In
In an alternate embodiment, the outer coder 202 may be a low-density generator matrix (LDGM) coder that performs an irregular repeat of the k bits in the block, as shown in
If the permutation performed in permutation block 310 is fixed, the Tanner graph represents a binary linear block code with k information bits (u1, . . . , uk) and r parity bits (x1, . . . , xr), as follows. Each of the information bits is associated with one of the information nodes 302, and each of the parity bits is associated with one of the parity nodes 306. The value of a parity bit is determined uniquely by the condition that the mod-2 sum of the values of the variable nodes connected to each of the check nodes 304 is zero. To see this, set x0=0. Then if the values of the bits on the ra edges coming out the permutation box are
(V1, . . . , vra), then we have the recursive formula for j=1, 2, . . . , r. This is in effect the encoding algorithm.
Two types of IRA codes are represented in
The rate of the nonsystematic code is
The rate of the systematic code is
For example, regular repeat and accumulate (RA) codes can be considered nonsystematic IRA codes with a=1 and exactly one fi equal to 1, say fq=1, and the rest zero, in which case Rnsys simplifies to R=1/q.
The IRA code may be represented using an alternate notation. Let λi be the fraction of edges between the information nodes 302 and the check nodes 304 that are adjacent to an information node of degree i, and let ρi be the fraction of such edges that are adjacent to a check node of degree i+2 (i.e., one that is adjacent to i information nodes). These edge fractions may be used to represent the IRA code rather than the corresponding node fractions. Define λ(x)=Σiλixi−1 and ρ(x)=Σiρixi−1 to be
the generating functions of these sequences. The pair (λ, ρ) is called a degree distribution. For L(x)=Σifixi,
The rate of the systematic IRA code given by the
degree distribution is given by
“Belief propagation” on the Tanner Graph realization may be used to decode IRA codes. Roughly speaking, the belief propagation decoding technique allows the messages passed on an edge to represent posterior densities on the bit associated with the variable node. A probability density on a bit is a pair of non-negative real numbers p(0), p(1) satisfying p(0)+p(1)=1, where p(0) denotes the probability of the bit being 0, p(1) the probability of it being 1. Such a pair can be represented by its log likelihood ratio, m=log(p(0)/p(1)). The outgoing message from a variable node u to a check node v represents information about u, and a message from a check node u to a variable node v represents information about u, as shown in
The outgoing message from a node u to a node v depends on the incoming messages from all neighbors w of u except v. If u is a variable message node, this outgoing message is
where m0(u) is the log-likelihood message associated with u. If u is a check node, the corresponding formula is
Before decoding, the messages m(w→u) and m(u→v) are initialized to be zero, and m0(u) is initialized to be the log-likelihood ratio based on the channel received information. If the channel is memoryless, i.e., each channel output only relies on its input, and y is the output of the channel code bit u, then m0(u)=log(p(u=0|y)/p(u=1|y)). After this initialization, the decoding process may run in a fully parallel and local manner. In each iteration, every variable/check node receives messages from its neighbors, and sends back updated messages. Decoding is terminated after a fixed number of iterations or detecting that all the constraints are satisfied. Upon termination, the decoder outputs a decoded sequence based on the messages
Thus, on various channels, iterative decoding only differs in the initial messages m0(u). For example, consider three memoryless channel models: a binary erasure channel (BEC); a binary symmetric channel (BSC); and an additive white Gaussian noise (AGWN) channel.
In the BEC, there are two inputs and three outputs. When 0 is transmitted, the receiver can receive either 0 or an erasure E. An erasure E output means that the receiver does not know how to demodulate the output. Similarly, when 1 is transmitted, the receiver can receive either 1 or E. Thus, for the BEC, yε{0, E, 1}, and
In the BSC, there are two possible inputs (0,1) and two possible outputs (0, 1). The BSC is characterized by a set of conditional probabilities relating all possible outputs to possible inputs. Thus, for the BSC yε{0, 1},
In the AWGN, the discrete-time input symbols X take their values in a finite alphabet while channel output symbols Y can take any values along the real line. There is assumed to be no distortion or other effects other than the addition of white Gaussian noise. In an AWGN with a Binary Phase Shift Keying (BPSK) signaling which maps 0 to the symbol with amplitude √{square root over (Es)} and 1 to the symbol with amplitude −√{square root over (Es)}, output yεR, then
m0(u)=4y√{square root over (Es)}/N0
where N0/2 is the noise power spectral density.
The selection of a degree profile for use in a particular transmission channel is a design parameter, which may be affected by various attributes of the channel. The criteria for selecting a particular degree profile may include, for example, the type of channel and the data rate on the channel. For example, Table 1 shows degree profiles that have been found to produce good results for an AWGN channel model.
Table 1 shows degree profiles yielding codes of rate approximately 1/3 for the AWGN channel and with a=2, 3, 4. For each sequence, the Gaussian approximation noise threshold, the actual sum-product decoding threshold and the corresponding energy per bit (Eb)-noise power (N0) ratio in dB are given. Also listed is the Shannon limit (S.L.).
As the parameter “a” is increased, the performance improves. For example, for a=4, the best code found has an iterative decoding threshold of Eb/N0=−0.371 dB, which is only 0.12 dB above the Shannon limit.
The accumulator component of the coder may be replaced by a “double accumulator” 600 as shown in
Alternatively, a pair of accumulators may be the added, as shown in
IRA codes may be implemented in a variety of channels, including memoryless channels, such as the BEC, BSC, and AWGN, as well as channels having non-binary input, non-symmetric and fading channels, and/or channels with memory.
A number of embodiments have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention. Accordingly, other embodiments are within the scope of the following claims.
This application is a continuation of U.S. application Ser. No. 11/542,950, filed Oct. 3, 2006 now U.S. Pat. No. 7,421,032, which is a continuation of U.S. application Ser. No. 09/861,102, filed May 18, 2001, now U.S. Pat. No. 7,116,710, which claims the priority of U.S. Provisional Application Ser. No. 60/205,095, filed May 18, 2000, and is a continuation-in-part of U.S. application Ser. No. 09/922,852, filed Aug. 18, 2000, now U.S. Pat. No. 7,089,477. The disclosure of the prior applications are considered part of (and are incorporated by reference in) the disclosure of this application.
The U.S. Government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of Grant No. CCR-9804793 awarded by the National Science Foundation.
Number | Name | Date | Kind |
---|---|---|---|
5181207 | Chapman | Jan 1993 | A |
5392299 | Rhines et al. | Feb 1995 | A |
5530707 | Lin | Jun 1996 | A |
5751739 | Seshadri et al. | May 1998 | A |
5802115 | Meyer | Sep 1998 | A |
5881093 | Wang et al. | Mar 1999 | A |
6014411 | Wang | Jan 2000 | A |
6023783 | Divsalar et al. | Feb 2000 | A |
6031874 | Chennakeshu et al. | Feb 2000 | A |
6032284 | Bliss | Feb 2000 | A |
6044116 | Wang | Mar 2000 | A |
6094739 | Miller et al. | Jul 2000 | A |
6195396 | Fang et al. | Feb 2001 | B1 |
6396423 | Laumen et al. | May 2002 | B1 |
6437714 | Kim et al. | Aug 2002 | B1 |
6732328 | McEwen et al. | May 2004 | B1 |
6859906 | Hammons et al. | Feb 2005 | B2 |
7089477 | Divsalar et al. | Aug 2006 | B1 |
20010025358 | Eidson et al. | Sep 2001 | A1 |
Number | Date | Country | |
---|---|---|---|
20080294964 A1 | Nov 2008 | US |
Number | Date | Country | |
---|---|---|---|
60205095 | May 2000 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11542950 | Oct 2006 | US |
Child | 12165606 | US | |
Parent | 09861102 | May 2001 | US |
Child | 11542950 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09922852 | Aug 2000 | US |
Child | 09861102 | US |