The present invention generally relates to communication systems and more specifically to communication systems that enable transmission by one or more transmitters using nested Low Density Parity Check codes.
Random access techniques have a pivotal role in modern communication systems, as the set of transmitters may be unknown or time-varying in many applications like Internet of Things (IoT) and sensor networks. In addition, network information theory, which aims to establish the fundamental limits of information flow and corresponding coding schemes in networks, has been attracting increasing interest in the past decades. However, the majority of network information theory studies assume the set of transmitters is fixed and known.
Most widely adopted random access techniques focus on collision avoidance or orthogonalization, which facilitate many users to share the network medium without interference. Slotted-ALOHA (S-ALOHA) introduces discrete time slots to coordinate the start of transmission. A transmission is acknowledged to be successful if only one transmitter is active for that slot; otherwise a collision is declared. Packets that collide are transmitted again after a random delay to avoid repeated collision. Under a set of assumptions, S-ALOHA is shown to achieve 36.8% of the single-transmitter capacity. Past improvements on S-ALOHA include adaptive S-ALOHA, which addresses the instability issue of S-ALOHA, and fast adaptive S-ALOHA, which seeks to accelerate the algorithm and decrease the access delay. Orthogonalization methods partition available resources, such as time and frequency, and allocate a fixed fraction to each user. Typical orthogonalization protocols include time-division multiple access (TDMA), frequency-division multiple access (FDMA), and code-division multiple access (CDMA). The cost associated with simplifying coding using orthogonalization protocols is significant, as the best sum-rate (throughput) achievable is equal to the single-transmitter capacity of the channel, which could be considerably smaller than the maximum multi-transmitter sum-rate of the channel.
Systems and methods in accordance with various embodiments of the invention enable communicating using nested Low Density Parity Check (LDPC) codes. A nested LDPC code is an LDPC code having a full blocklength, where shorter blocklengths of the nested LDPC code can be utilized as shorter blocklength LDPC codes. In effect, the shorter blocklength LDPC codes are nested within the LPDC code having the full blocklength.
In certain embodiments, a transmitter utilizes a nested LDPC code to communicate via a point-to-point connection. In various embodiments, the nested LDPC code acts as a rateless code and the transmitter transmits until a feedback message is provided by a receiver indicating that the transmitted message has been decoded. In several embodiments, multiple transmitters utilize nested LDPC codes to communicate simultaneously via a Random Access Channel (RACs), where none of the transmitters nor the receiver know which and how many transmitters are active. In several embodiments, the transmitters can utilize the same nested LDPC code. In a number of embodiments, different transmitters can utilize different nested LDPC codes.
One embodiment of the communication system includes at least one transmitter, where each transmitter comprises an encoder configured to: receive a start of epoch message; encode message data as symbols using a rateless code determined using a nested Low Density Parity Check (LDPC) code by mapping a codeword to a symbol; and receive feedback messages at a predetermined set of potential decoding times. In addition, the transmitter is configured to transmit symbols until a received feedback message is an end of epoch message. The communication system also includes a receiver comprising a decoder, where the decoder is configured to: cause a broadcast transmitter to transmit at least one start of epoch message; receive observed symbols; at each of a predetermined set of decode times, determine whether a decoding rule is satisfied; and when the decoding rule is satisfied decode at least one message based upon the received observed symbols based upon the nested LDPC code, and cause the broadcast transmitter to transmit an end of epoch message.
In a further embodiment, the nested LDPC code is an LDPC code having a full blocklength that corresponds to a longest decode time from the set of predetermined decode times; the nested LDPC code is further characterized in that at least one shorter blocklength of the LDPC code having the full blocklength forms at least one shorter blocklength LDPC code; and each of the at least one shorter blocklength LDPC codes corresponds to a decode time from the set of predetermined decode times that is shorter than the longest decode time from the set of predetermined decode times.
In another embodiment, the at least one shorter blocklength LDPC code comprises a first shorter blocklength LDPC code and a second shorter blocklength LDPC code. The first shorter blocklength LDPC code includes a first set of variable nodes, and a first set of check nodes. The second shorter blocklength LDPC code includes: a second set of variable nodes including the first set of variable nodes and an incremental set of variable nodes; and a second set of check nodes including the first set of check nodes and an incremental set of check nodes.
In a still further embodiment, the first set of check nodes are connected to one or more variable nodes from the first set of variable nodes, and the incremental set of check nodes are connected to one or more variable nodes from the second set of variable nodes.
In still another embodiment, the ratio of the first set of variable nodes to the first set of check nodes is different to the ratio of the second set of variable nodes to the second set of check nodes.
In a yet further embodiment, the determination of whether a decoding rule is satisfied is based upon the received observed symbols.
In yet another embodiment, the at least one transmitter is configured to select a specific nested LDPC code based upon the start of epoch message.
In a further embodiment again, multiple transmitters in the plurality of transmitters are configured to select the same nested LDPC code to use in the encoding of message data as symbols using a rateless code.
In another embodiment again, at least two of the plurality of transmitters are configured to select different nested LDPC codes to use in the encoding of message data as symbols using a rateless code.
In a further additional embodiment, at least two of the different nested LDPC codes have different code rates.
A transmitter in accordance with another additional embodiment includes: a receiver configured to receive a start of epoch message; an encoder configured to encode message data as symbols using a rateless code determined using a nested Low Density Parity Check (LDPC) code by mapping a codeword to a symbol; and a modulator configured to transmit symbols encoded by the encoder. In addition, the receiver is further configured to receive an end of epoch message at one of a predetermined set of times, and the modulator is configured to transmit symbols encoded by the encoder until an end of epoch message is received by the receiver.
In a still yet further embodiment, the nested LDPC code is an LDPC code having a full blocklength that corresponds to a longest decode time from the set of predetermined decode times; the nested LDPC code is further characterized in that at least one shorter blocklength of the LDPC code having the full blocklength forms at least one shorter blocklength LDPC code; and each of the at least one shorter blocklength LDPC code corresponds to a decode time from the set of predetermined decode times that is shorter than the longest decode time from the set of predetermined decode times.
In still yet another embodiment, the at least one shorter blocklength LDPC code comprises a first shorter blocklength LDPC code and a second shorter blocklength LDPC code. The first shorter blocklength LDPC code includes a first set of variable nodes, and a first set of check nodes. The second shorter blocklength LDPC code includes: a second set of variable nodes including the first set of variable nodes and an incremental set of variable nodes; and a second set of check nodes including the first set of check nodes and an incremental set of check nodes.
In a still further embodiment again, the first set of check nodes are connected to one or more variable nodes from the first set of variable nodes, and the incremental set of check nodes are connected to one or more variable nodes from the second set of variable nodes.
In still another embodiment again, the ratio of the first set of variable nodes to the first set of check nodes is different to the ratio of the second set of variable nodes to the second set of check nodes.
A receiver in accordance with a still further additional embodiment includes: a transmitter configured to transmit at least one start of epoch message, and a receiver configured to receive observed symbols. In addition, the decoder is further configured to: determine whether a decoding rule is satisfied at each of a predetermined set of decode times; and when the decoding rule is satisfied, decode at least one message based upon the received observed symbols based upon a rateless code determined using a nested LDPC code, and cause the transmitter to transmit an end of epoch message.
In still another additional embodiment, the nested LDPC code is an LDPC code having a full blocklength that corresponds to a longest decode time from the set of predetermined decode times; the nested LDPC code is further characterized in that at least one shorter blocklength of the LDPC code having the full blocklength forms at least one shorter blocklength LDPC code; and each of the at least one shorter blocklength LDPC code corresponds to a decode time from the set of predetermined decode times that is shorter than the longest decode time from the set of predetermined decode times.
In a yet further embodiment again, the at least one shorter blocklength LDPC code comprises a first shorter blocklength LDPC code and a second shorter blocklength LDPC code. The first shorter blocklength LDPC code comprises a first set of variable nodes, and a first set of check nodes. The second shorter blocklength LDPC code includes: a second set of variable nodes including the first set of variable nodes and an incremental set of variable nodes; and a second set of check nodes including the first set of check nodes, and an incremental set of check nodes.
In yet another embodiment again, the first set of check nodes are connected to one or more variable nodes from the first set of variable nodes; and the incremental set of check nodes are connected to one or more variable nodes from the second set of variable nodes.
In a yet further additional embodiment, the ratio of the first set of variable nodes to the first set of check nodes is different to the ratio of the second set of variable nodes to the second set of check nodes.
In yet another additional embodiment, the decoder is selected from the group consisting of a maximum likelihood decoder and a belief propagation decoder.
Turning now to the drawings, systems and methods for communicating using nested Low Density Parity Check (LDPC) codes in accordance with various embodiments of the invention are illustrated. A nested LDPC code is an LDPC code having a full blocklength, where shorter blocklengths of the nested LDPC code can be utilized as shorter blocklength LDPC codes. In effect, the shorter blocklength LDPC codes are nested within the LPDC code having the full blocklength. In many embodiments, the shorter blocklength LDPC codes have higher rates than the rate of the LDPC code having the full blocklength. As a result, nested LDPC codes can be utilized as rateless codes and/or in systems that support adaptive coding and modulation. In many embodiments, a nested LDPC code can be defined programmatically. Accordingly, codewords of increasingly larger blocklength can be generated by the transmitter(s) and receiver as required to enable decoding of one or more transmitted messages at a decode time that can also be programmatically determined with each increase in the full blocklength of the nested LDPC code.
Nested LDPC codes can be contrasted with the technique of puncturing a low rate LDPC code to achieve higher code rates. Puncturing typically relies upon a single blocklength LDPC code and only transmitting certain symbols corresponding to a fraction of the codeword symbols of the LDPC code to achieve a higher code rate. Puncturing essentially treats the non-transmitted symbols as erasures and relies upon the low rate LDPC code that was punctured to recover the user data. By contrast, each shorter blocklength LDPC code nested within a nested LDPC code represents a distinct LDPC code that is utilized by a decoder to recover the transmitted user data. When a nested LDPC code is utilized, the decoder does not decode the user data utilizing a lower rate LDPC code having a longer blocklength than the blocklength of the transmitted symbols.
In certain embodiments, a transmitter utilizes a nested LDPC code to communicate via a point-to-point connection. In various embodiments, the nested LDPC code acts as a rateless code and the transmitter transmits until a feedback message is provided by a receiver indicating that the transmitted message has been decoded. In a number of embodiments, the nested LDPC code is utilized to achieve adaptive coding and modulation. The transmitter can transmit an agreed upon blocklength of the nested LDPC code (potentially encoding user data using a shorter blocklength LDPC code nested within the nested LDPC code) to achieve a desired code rate.
In several embodiments, multiple transmitters utilize nested LDPC codes to communicate via Discrete Memoryless Random Access Channels (DM-RACs). In a number of embodiments, the DM-RAC is considered as a family of discrete memoryless multiple access channels (DM-MACs) depending on the transmitter activities. However, none of the transmitters nor the receiver know which and how many transmitters are active. In several embodiments, the transmitters can utilize the same nested LDPC code. In a number of embodiments, different transmitters can utilize different nested LDPC codes. A benefit of using different nested LDPC codes is that a receiver can utilize knowledge of the different nested LDPC codes utilized by different transmitters to determine which transmitter transmitted a specific message.
In a number of embodiments, a transmitter can select between different nested LDPC codes having different code rates. In the context of a nested LDPC code, a different code rate can be determined for each shorter blocklength LDPC code nested within the nested LDPC code. The code rate need not be the same for all shorter blocklength LDPC codes nested within a particular nested LDPC code. For example, the LDPC code having the full blocklength can be rate 1/2 and a shorter blocklength LDPC code nested within the LDPC code having the full blocklength can have a code rate greater than 1/2 (e.g., 3/5). By selecting between nested LDPC codes having different code rates at a given blocklength, a transmitter can determine its code rate during a particular epoch. In the context of transmitters communicating via a RAC, transmitters can balance and/or prioritize utilization of the RAC through their choice of code rate. In many embodiments, a transmitter (such as a transmitter utilizing a RAC) can select between different LDPC codes to adjust code rate from one time epoch to the next.
Systems and methods in accordance with many embodiments of the invention utilize nested LDPC codes designed using K≥1 stages, where the codewords for each blocklength ni, i∈[K] are nested in the codewords for each blocklength distinct nj, j∈[K], provided that. nj≥ni. As discussed above, nested LDPC codes can be utilized as rateless codes. Rateless codes are codes that enable various decoding times. Traditionally, one or more transmitters in a rateless code listen for feedback (often a single bit) from the receiver that indicates whether to continue or stop their transmissions at every time step. Feedback can dramatically improve the maximum achievable rate in the finite-blocklength regime. Instead of allowing arbitrary decoding times and thus requiring feedback at every time step, a limited set of decoding times can be employed. In a number of embodiments, the transmissions happen in epochs and the set of decoding times {n1, n2, . . . , nK} is finite and predetermined, where nk, k∈{1, . . . , K} refers to the decoding time. The decoding times can be determined based upon factors including (but not limited to) different channel conditions and/or different code rates. In the context of communication via a RAC, the decoding times can correspond to different times at which a decoder believes there are k active transmitters and it is able to decode. In a number of embodiments, a decoder receiving transmitted symbols via a RAC first estimates the number of active transmitters and then performs ML decoding at some pre-determined time nk if the decoder believes the number of active transmitters is k. In addition, the decoder examines the channel output at n0 to detect whether any transmitter is active in the current epoch. This is particularly useful as n0 can be chosen to be very small compared to other decoding times nk, k∈[K], allowing a new epoch to begin quickly. In some embodiments, nk refers to the decoding time when a particular k⊆{1, . . . , K} of transmitters is active. In other embodiments, nk refers to the stopping time when any of some collection of transmitter subsets (k=(k, 1, . . . , k, f(k))) is active, here f(k) is the number of subsets in k. In many embodiments, the stopping times are ordered so that n1≤n2≤ . . . ≤nk.
In several embodiments, a communication system capable of communicating via a RAC can achieve additional efficiency gains by detecting early within a time epoch that an unusally large number of transmitters have commenced simultaneously transmitting. Instead of requiring all transmitters to continue to transmit with a long blocklength, the receiver can transmit a feedback message ending the epoch and indicating to one or more of the transmitters that they should wait a period of time before attempting to retransmit. In several embodiments, the period of time that a transmitter waits before attempting to retry transmitting its message can be a number of time epochs specified by the transmitter. In certain embodiments, the period of time can be a random number of time epochs determined by the transmitter. In a number of embodiments, a receiver can terminate an epoch without decoding transmitted messages by utilizing an LDPC code in which nk is comparatively small for some large value number of transmitters, allowing a decoder to abort transmission and declare an outage rather than suffer a long period of low per-user transmission rates when the number of active transmitters is unusually high.
While i.i.d. random rateless codes enjoy the property of independence between symbols within and across codewords, making them theoretically simple to analyze, the mutual independence also induces difficulties in practical implementations. In contrast, linear codes, such as LDPC codes, are more structured and thus more realistic to implement. LDPC codes are equipped with sparse parity-check matrices for the purpose of enabling low complexity decoding strategies. LDPC codes are now in widespread use, playing a role in commercial standards like 10 Gb/s Ethernet (IEEE 803.3an), WiFi (IEEE 802.11n), WiMAX (IEEE 802.16e), and the 5G standard. However, LDPC codes are typically not amendable to construction through the processes of concatinating sub-codewords that enable construction of nested random rateless codes. Accordingly, new processes were developed for the construction of the various nested LDPC codes described herein in order to enable their utilization within communication systems including (but not limited to) point-to-point and DM-RAC communication systems. Furthermore, the use of nested LDPC codes (or similar LDPC codes) as described herein should be understood as in no way limited to memoryless channel or symmetrical channels, but can be utilized in any of a variety of different communication applications including any of a variety of different communication channels.
Finite-blocklength achievability bounds can be developed, using both error-exponent analysis and dispersion-style analysis, for LDPC codes for the RAC, in which neither the encoders nor the decoder know in advance which or even how many of the total K transmitters are active. As noted above, the nested LDPC codes utilized in accordance with various embodiments of the invention can be designed in K stages, corresponding to each of the K potential decoding times nk, k∈[K]. The achievability bounds indicate that the nested LDPC codes described herein are not only capacity-achieving (first-order optimal), but also achieve second-order performance that is comparable to the best-prior results for the corresponding MAC.
For the dispersion-style approach, a third-order achievability result can be derived for the proposed nested LDPC codes. The result demonstrates that the performance of the proposed nested LDPC codes achieve the first-order optimal performance (capacity) and match the second-order (dispersion) performance of the best-performing codes used in the Multiple Access Channel (MAC), where the set of active transmitters is known to all users and no feedback is employed.
Systems and methods that communicate using nested LDPC codes in accordance with various embodiments of the invention are discussed further below.
Systems and Methods for Communicating Using Nested LDPC Codes
Communication systems in accordance with various embodiments of the invention can impose restrictions on an active transmitter. Specifically, the receiver can use feedback messages to define epochs. During each epoch, a transmitter can decide whether or not it wishes to be active. In some embodiments, an active transmitter transmits symbols for the duration of the epoch, where each symbol is generated based upon a set of message data bits using a nested LPDC code. A receiver configured to control the transmission of at least one transmitter during epochs defined by the receiver in accordance with an embodiment of the invention is conceptually illustrated in
The communication system 100 includes at least one transmitter, and each transmitter includes an encoder 102. Each transmitter that has message data to transmit can choose to become active during any given epoch. Where only one transmitter is present, the communication system is a point-to-point communication system. When multiple transmitters are present, the communication system can act as a RAC communication system in which multiple transmitters can simultaneously transmit on a shared communication channel. When a transmitter is active, the transmitter can provide a sequence of message bits to a rateless encoder 102, which generates a sequence of output symbols based upon a nested LDPC code; output symbols are then transmitted over a channel 104. When multiple transmitters are active, the active transmitters simultaneously transmit over the RAC channel 104 to a receiver. As discussed above, the use of nested LDPC codes as rateless codes enables the receiver to continue to receive symbols (i.e., extend the duration of a particular epoch) until the receiver's decoder 106 has observed enough symbols to decode the transmitted messages with high probability or to trigger any other stopping rule. In many embodiments, the decoder employs a decoding rule that is applied at a predetermined set of potential decoding times. In several embodiments, each potential decoding time in the set of potential decoding times corresponds to a number of symbols determined to be required for the decoder to be able to decode messages from a specific number of transmitters. In certain embodiments, application of the decoding rule essentially involves attempting to decode a number of messages at each potential decoding time, which indirectly provides an estimate of the number of transmitters that are active during an epoch. Based upon the decoding rule, the decoder tries decoding at each subsequent decoding time in the set of potential decoding times. It chooses the first decoding time from that set for which it finds a collection of messages consistent with its received symbols and with the activity set or sets corresponding to that decoding time. As noted above, the receiver can also utilize a criterion to detect that an unusually large number of transmitters are transmitting. In which case, the receiver can send a feedback message ending the epoch and directing that transmitters to wait a period of time (e.g., a random number of epochs) before attempting to retry transmitting a message.
As noted above, the receiver need not continuously transmit its decoding state to the transmitters. In a number of embodiments, the transmitters and the receiver establish a set of potential decoding times and the receiver sends a positive or negative feedback message at each potential decoding time indicating whether the receiver requires more symbols to be able to decode the messages with a high probability (here called a negative feedback message) or whether the receiver has received enough symbols and has decided to decode the messages and start a new epoch (i.e., a positive feedback message).
In many embodiments, the set of potential decoding times is determined based upon channel conditions. As the channel deteriorates, the receiver can adapt and choose a set of potential decoding times where the number of symbols required to be received during an epoch for a given estimated number of transmitters increases. When the channel improves the receiver can adapt to a set of potential decoding times in which the number of symbols required to be received for a given estimated number of transmitters decreases. In a number of embodiments, the receiver adapts the set of potential decoding times utilized during a particular epoch based upon a measurement of channel conditions including (but not limited to) fading and channel noise. In several embodiments, the receiver periodically signals a guard interval in which transmitters are required to cease activity. During this guard interval, the receiver can measure channel noise and determine an appropriate set of potential decoding times. In some embodiments, the receiver periodically signals a test interval in which active transmitters are required to send pilot signals. During these test intervals, the receiver can estimate fading conditions and determine an appropriate set of potential decoding times. The receiver can then broadcast the set of potential decoding times and/or an identifier of the set of potential decoding times to the transmitters and can initiate the next epoch via a transmission of a positive feedback message. The transmitters can then monitor the feedback channel for positive and negative feedback messages based upon the set of potential decoding times communicated by the receiver. In a number of embodiments, instead of and/or in addition to utilizing alternative decoding times in response to changes in channel conditions, transmitters can also select between different nested LDPC codes having different code rates at a given decoding time. Although specific methods are described for adapting between different sets of potential decoding times, it can readily be appreciated that any of a variety of techniques can be utilized for determining an appropriate set of decode times for a given set of channel conditions and coordinating the adoption of such a set of decode times by the receiver and transmitters in accordance with various embodiments of the invention.
While many advantages can be obtained through the use of nested LDPC codes in accordance with embodiments of the invention, communication systems in accordance with a number of embodiments of the invention communicate via a RAC using punctured LDPC codes. When punctured LDPC codes are utilized, a single blocklength LDPC code can be utilized by each transmitter in which codeword symbols are transmitted until a decoder is capable of decoding the one or more simultaneously transmitted messages. The decoding process can assume that all transmitted messages have the blocklength of the LDPC code(s) and the codeword symbols that have not yet been transmitted (i.e., the punctures) can simply be treated as erasures. Accordingly, utilizing a punctured LDPC code does not result in a reduction in the computational complexity required to decode the transmitted symbols. By contrast, the decoding process of a nested LDPC code can take advantage of the fact that each shorter blocklength code nested within the LDPC code of full blocklength has a reduced number of check nodes. While much of the discussion that follows focuses on the use of nested LDPC codes, because of the benefits that nested LDPC codes have in many applications, it should be appreciated that punctured LDPC codes and/or other varieties of LDPC codes can be utilized in communication systems in which the blocklengths of individual messages are unknown prior to commencement of transmission as appropriate to the requirements of specific applications in accordance with various embodiments of the invention.
In a number of embodiments, multiple transmitters use the same encoder 102 and the receiver broadcasts an indication of a particular nested LDPC code to use in a given epoch. In several embodiments, multiple transmitters are able to use different nested LDPC codes. Using different nested LDPC codes can enable the decoder to identify the transmitter that transmitted a specific message decoded by the decoder 106. Using different nested LDPC codes can also enable the encoders to transmit different numbers of messages and attain different rates. When transmitters encode using different encoders, the receiver can transmit information indicating the specific nested LDPC code to be used by a particular encoder at the start of a particular epoch. The receiver can then utilize knowledge of the different nested LDPC codes that were potentially utilized in the decoding of the transmitted messages from the observed symbols.
Although specific communication systems are described above with reference to
Processes for Encoding Data
Transmitters in accordance with various embodiments of the invention are configured to wait to transmit data until the start of an epoch and then transmit data throughout the epoch. In many embodiments, the end of the epoch can be agreed upon from one epoch to the next by the transmitter and a receiver. In several embodiments, the transmitter determines the end of the epoch by listening periodically for a positive feedback message that indicates the end of the epoch. As discussed above, the codebook selected for the rateless code can be coordinated with the receiver. Therefore, in many embodiments the transmitter also monitors a feedback channel for a transmission from a receiver containing a codebook and/or an identifier for a codebook to be utilized within a specified (e.g., the next) epoch.
A process for transmitting data using a nested LDPC code on a RAC during epochs defined by a receiver in accordance with an embodiment of the invention is illustrated in
The transmitter selects 208 a block of message data to transmit and a codebook to use to encode the message data using a rateless code. In many embodiments, encoders are employed within transmitters to encode the data using nested LDPC codes. As noted above, other embodiments may rely on other variations of LDPC codes. In many embodiments, the codebook utilized is a codebook indicated by a receiver and constitutes a common randomness between the transmitter and the receiver. In other embodiments, there is only one codebook, and that same codebook is always used to encode the message data using a rateless code. In certain embodiments, the codebook is the same for every transmitter. In many embodiments, the codebook is specific to the transmitter. In several embodiments, the transmitter can choose between a predetermined set of nested LDPC codes and the receiver determines the specific nested LDPC codes utilized by the transmitter(s) as part of the decoding process.
In order to encode the message data, the transmitter also resets a clock n that is used to count the number of transmitted symbols and a counter t that is used to index into the set of potential decoding times. As noted above, in some embodiments, the counter t can be considered to correspond to a number of active transmitters. In many embodiments, counter t can correspond to factors including (but not limited to) different channel conditions. When a receiver determines that t equals the estimated number of active transmitters and n equals the time nt for decoding when t transmitters are active, the receiver will transmit a positive feedback message indicating the end of the epoch. In other embodiments, the counter t can be considered an index identifying a specific subset of distinct encoders. When a receiver determines that t specifies the estimated set of active transmitters and n equals the time nt for decoding when subset t of the transmitters is active, the receiver will transmit a positive feedback message indicating the end of the epoch.
The transmitter transmits 210 the symbols generated by the rateless code based upon the block of message bits and with each transmitted symbols checks 212 to see whether the number of transmitted symbols corresponds to one of the potential decoding times in the set of potential decoding times. If not, then the transmitter increments 214 the clock n=n+1. When the number of transmitted symbols corresponds to a potential decoding time (nt) from the set of potential decoding times, the transmitter listens 216 for a feedback message from the receiver. When a determination 218 is made that the feedback message is a negative feedback message, then the transmitter increments the clock n=n+1 and the counter t=t+1. The transmitter continues to transmit symbols generated by the rateless code (e.g., the nested LDPC code) until a determination 218 is made that a positive feedback message is received. At that point, the epoch is over and the transmitter determines 222 whether additional message data is available for transmission and whether 202 the transmitter wishes to be active during the next epoch. When no more message data is available for transmission, the process can complete. The process may begin again in the future if more messages become available for transmission.
Although specific processes for transmitting data are described above with reference to
Processes for Decoding Data Transmitted by an Unknown Number of Transmitters Via a RAC
Receivers in accordance with various embodiments of the invention are configured to receive data transmitted by an unknown number of transmitters on the same channel at the same time and encoded by rateless codes implemented using LDPC codes such as (but not limited to) nested LDPC codes. In some embodiments, these rateless codes are based upon a common codebook shared by one or more transmitters and the receiver. In other embodiments, these rateless codes are fixed. In order to be effective, the receiver can permit at least one transmitter to transmit symbols for a period of time that is sufficiently long to enable decoding of the transmitted message(s) with high probability. However, permitting the at least one transmitter to transmit more symbols beyond this required blocklength decreases the rate of the transmitters below capacity of the channel. Accordingly, receivers in accordance with many embodiments of the invention employ decoding rules to determine when a sufficient number of symbols are received to decode the transmitted message(s) with high probability. In a number of embodiments, a separate potential decoding time is determined for each possible number of active transmitters, and the receiver applies a decoding rule at each of the potential decoding times to determine whether the transmitted messages can be decoded. In this way, the decoding rule effectively constitutes an attempt to estimate the number of active transmitters. In several embodiments, the decoding times can also correspond to different channel conditions. Therefore, the decoding rule can constitute an attempt to estimate one or more of a variety of characteristics of the communication system including (but not limited to) the number of active transmitters and/or the characteristics of the communication channel.
The implementation of receivers in accordance with various embodiments of the invention can be influenced by the manner in which the receiver manages the case in which no transmitters are transmitting. The sooner the receiver ends an epoch in which no transmitters are transmitting, the higher the rate achieved across the channel. In a number of embodiments, receivers employ a separate process to determine whether transmitters are active and the receiver simply commences decoding when the receiver knows that transmitters are active. In other embodiments, the receiver incorporates a decoding rule that determines whether any transmitters are active prior to the first potential decoding time period.
A process for detecting whether one or more transmitters are active and/or decoding data transmitted by the one or more active transmitters via a RAC in accordance with an embodiment of the invention is illustrated in
As part of a process of receiving and decoding symbols, the receiver initializes a clock n that is used to count the number of received symbols and a counter t that is used to index into the set of potential decoding times (nt). As noted above, in some embodiments, the counter t can be considered to correspond to a number of active transmitters. When a receiver determines that t equals the estimated number of active transmitters and n=nt, the receiver will transmit a positive feedback message indicating the end of the epoch. In other embodiments, the counter t can be considered an index identifying a specific subset of distinct encoders. When a receiver determines that t specifies the estimated set of active transmitters and n equals the time nt for decoding when subset t of the encoders are active, the receiver will transmit a positive feedback message indicating the end of the epoch.
After the receiver commences receiving observed symbols, the receiver determines 302 whether the number of received symbols corresponds to the potential decoding time (nt) indicated by the counter (t). When the clock indicates that the current time is not one of the potential decoding times, the receiver increments 308 the clock n=n+1 and continues to receive observed symbols. When the clock corresponds to one of the potential decoding times (nt) from the set of potential decoding times indicated by the counter (t), the transmitter determines 310 whether a decoding rule is satisfied. In many embodiments, the first potential decoding time (n0) corresponds to a period of time during which the receiver can determine that there are no active transmitters. In some embodiments, the first decoding time n0 corresponds to a period of time during which the receiver can determine that current conditions fall into some preset collection of types of conditions unfavorable to successful decoding, and for which the code is design to end the epoch and declare an outage rather than trying to decode. As is discussed further below, a variety of different decoding rules can be applied at (n0) to determine that there are no active transmitters and at subsequent potential decoding times to estimate the number of active transmitters. In many embodiments, the decoding rule that is utilized to estimate the number of active transmitters during the epoch can be a simple threshold rule that is applied at each potential decoding time after a determination is made that one or more transmitters are active. As is discussed further below, the specific decoding rule applied in a given receiver in accordance with an embodiment of the invention is largely dependent upon the requirements of a given application.
When the decoding rule is not satisfied, the receiver concludes that the subset of transmitters indexed by t is not the estimated active transmitter subset that is currently active and sends a negative feedback message to the transmitters. The receiver also increments the counter t=t+1 and the clock n=n+1 and continues to receive observed symbols. When the decoding rule is satisfied, the receiver decodes 314 the messages transmitted by the estimated active transmitter set t and broadcasts a positive feedback message to the transmitters. In some embodiments, the receiver can determine 316 whether it is prepared to initiate another epoch. In the event that the receiver wishes to commence another epoch, the receiver selects 318 one or more codebooks to be utilized by the transmitters during the next epoch and broadcasts 302 a positive feedback message to the transmitters indicating the commencement of the next epoch and specifying the chosen codebook ID(s). In the event that the receiver completes an epoch and does not want to initiate a new epoch, the process completes. In many embodiments, the receiver transmits a positive feedback message indicating the end of the epoch (so the transmitters can cease transmission) followed by a message indicating that a new epoch has not commenced.
While a number of specific processes are described above for decoding data transmitted by an unknown number of transmitters via a RAC using rateless codes with reference to
While a variety of communication systems, transmitters, and receivers are described above with reference to
Notations
For non-negative integers a and b, let [a]Δ{1, 2, . . . , a}, and [a:b]Δ{a, a+1, . . . , b}, where [a:b]=∅ when a>b. Uppercase letters (e.g., X and Y) are employed to denote random variables, lowercase letters to denote their realizations (e.g., x and y), and calligraphic uppercase letters (e.g., and ) to indicate their sample spaces. Superscripts (e.g., Xn) are utilized to represent vectors and bold fonts (e.g., X, 1 and 0) when the length of the vector is clear in the context. The subscript i in Xi and bracket notation X(i) both indicate the ith element of the vector X. The inequality symbols (e.g., > and ≤) operate element-wise when used for comparing vectors (e.g., Xn>Yn if Xi>Yi for all i∈[n]). Likewise, applying a scalar function f(·) to a vector X∈n gives the vector of function values f(X)Δ(f(Xi), i∈[n]). For a finite set ∈[k], || represents the cardinality of and 2Δ{:⊆} denotes the power set of . Given a scalar a∈, a vector ν∈n, and a set ⊆n, the set a+ν is defined as a+νΔ{as+ν, s∈}.
Throughout the discussion that follows, unless otherwise indicated, all logarithms and exponentials are evaluated with base q, where the prime power q specifies the alphabet size of our proposed LDPC code. Standard asymptotic notations O(·) and o(·) are applied to describe the limiting behavior of functions, writing f(n)=O(g(n)) if there exist constants a and n′ such that |f(n)|≤a|g(n)| for all n>n′ and f(n)=o(g(n)) if
For a joint distribution PXY on discrete alphabet × and any x∈ and y∈, information density is denoted by
Given a set of alphabets i, i∈[k], a joint distribution PX
for any x∈, x∈, and y∈.
The corresponding mutual informations, dispersions, conditional dispersions, third centered moments, conditional third centered moments of the information density (2) and conditional information density (3) are
The (probability density function) PDF and cumulative distribution function (CDF) for standard Gaussian distribution (0, 1) are denoted by
respectively. The function Q(·) denotes the standard Gaussian complementary CDF
and Q−1(·) is the inverse function of Q(·).
The generalization of inverse Gaussian complementary CDF Q−1(·) to higher dimension is denoted by Qinv(·, ·). Let Z be a Gaussian random vector in d with mean zero and covariance matrix K, the set Qinv(K, ϵ) is given by
Qinv(K, ϵ)Δ{z∈d:Pr[Z≤z]≥1−ϵ}. (17)
Given a positive integer n, a prime power q, and a PDF θ=(θ0, θ1, . . . , θq-1) such that nθi∈, ∀i∈[0,q−1], the multinomial coefficient B(n, nθ) is defined as
A summary of many of the notations utilized herein is provided in Table 1 shown in
System Model and Design
When considering the RAC, the maximum number of transmitters K can be assumed finite, i.e., K<∞. A K-user DM-MAC can then be denoted by DM-K-MAC. A DM-K-MAC can be defined by
where i, i∈[K], and are the discrete channel input and output alphabets, respectively, and PY|X=PY|X
A DM-K-MAC is called symmetric if all transmitters share the same input alphabet (i= for all i∈[K]) and
PY|X(y|x)=PY|X(y|π(x))
for all y∈, x∈K, and permutations π on [K].
The nth order extension (Πi=1Kin, PY
Pr[yn|xn, yn−1]=Pr[yn|xn], (19)
for all k∈[n].
The RAC can be considered to be part of a family of all possible MACs resulting from different transmitter patterns. A DM-RAC can be described by a collection of symmetric DM-MACs
{(k, PY
where k, PY
RAC Communication Protocol
When the RAC communication protocol described above is utilized, transmissions happen in epochs, where each new epoch starts after a positive feedback message is sent from the decoder at one of a predetermined set of times ni, i∈[0, K] during the previous epoch. At the beginning of each new epoch, each transmitter independently decides whether to be silent or active until the end of this epoch. As a result, except in cases where a transmitter has to end its transmission prematurely (due, for example, to a battery dying or a transmitter moving out of range from the receiver), the set of transmitters remains unchanged for each epoch. The variation between epochs is simply a function of the specific transmitters within the set of transmitters that are active during a given epoch.
The decoder can send feedback (e.g., a single bit feedback) at each of the predetermined decoding times ni, i∈[0, K] to signal the transmitters to continue the transmission (a negative feedback bit), or stop the transmission and start a new epoch (a positive feedback bit). In many embodiments, the set of decoding times ni, i∈[0, K] are chosen such that the decoder is able to detect, using a hypothesis test h0(·), whether any transmitter is active at time n0, and it is capable of decoding the messages at time nk if it concludes from a testing function hk(·) that the number of active transmitters is k in that epoch. Potential hypothesis testing functions hk(·) that can be utilized in accordance with various embodiments of the invention are discussed further below. In many embodiments, n0<n1<n2< . . . <nK, as a larger number of active transmitters makes it more difficult to decode the messages. However, n0<n1<n2< . . . <nK does not hold in all embodiments.
Quantized Coset Random Access LDPC (RA-LDPC) Code Design
For any prime power q and finite Galois Field GF(q), a quantized coset Random Access GF(q)-LDPC (RA-LDPC) code can be constructed in the manner illustrated in
For a K-user RAC, a RA GF(g)-LDPC code can be defined on a bipartite Tanner graph =(, ε) with nK variable nodes, rk check nodes, and edge set ε⊆[nK]×[rK] using a K-stage design.
For each stage i∈[K], the code can be constructed as follows:
For each (i, j)∈ε, (i, j) represents an undirected edge connecting the ith variable node and the jth check node; each edge value gi, j is chosen uniformly at random from GF(q)\{0}. The notation
(j)Δ{i:(i, j)∈ε},
captures the neighborhood of check node j∈[rK] resulting from edge set ε.
The nK variable nodes hold a length-nK vector u from GF(q)n
the linear equation operates in GF(q). The set of all M=|c| codewords constitute the codebook
c={c1, . . . , cM}⊆GF(q)n
for the given Tanner graph =(, ε). In some embodiments, all the K transmitters employ the same RA-LDPC codebook.
It is important to stress that while the rΔk check nodes, added in stage-k design, can potentially connect to any of the nk variable nodes, the additional nΔk variable nodes can only connect to the rΔk incremental check nodes. Therefore, from the perspective of the rΔk incremental check nodes, the length-nk LDPC code is a regular LDPC code with left degree λk and right degree ρk. It should be appreciated, however, that systems and methods in accordance with various embodiments of the invention are not limited to the use of regular LDPC codes and nested LDPC codes can be employed that utilize irregular LDPC codes.
A random ensemble of RAC GF(q)-LDPC codes can be utilized in accordance with many embodiments of the invention, where each code in the ensemble is chosen uniformly at random from all possible permutations of connecting the λini, i∈[K] sockets, and all possible edge values from GF(q)\{0} for each socket during the stage-i design. It should be appreciated, however, that systems and methods in accordance with various embodiments of the invention are not limited to the use of LDPC codes generated using uniform random design.
A design for K=2 is illustrated in
Based on the RAC code design outlined above, the following relationships can exist for the design parameters:
Note that choosing parameters nk, λk, ρk will automatically fix the corresponding number of check nodes rk. For example,
and in general
Therefore, the design rates, in q-ary symbols per channel use, for each blocklength nk, k∈[K] is
The fact that Ri, i∈[K] are named “design rates” is deliberate, as each of the first ri, i∈[K] check node equations in (21) might be linearly dependent, making the actual rate larger. A significant proportion of LDPC literature assumes that the operational rate is equal to the design rate, which may not be precise for short blocklengths.
To fix the operational rate to the design rate, a random codeword selector can be utilized. Given the ensemble of RAC GF(q)-LDPC codes with design rates vector R=(R1, . . . , RK) from the RA-LDPC encoder, the random codeword selector can generate an ensemble by dividing the probability of each code in the original ensemble equally among all code(s) corresponding to a distinct combination of MkΔqn
With some abuse of notations, the codebook at blocklength nk, k∈[K] can be denoted by
c(k)Δ{c(k),1, . . . , c(k),M
Since the performance of an ensemble of LDPC codes is negatively affected by a small number of codes with small minimum distance, removing (expurgating) these codes can produce an ensemble with improved properties. Therefore an expurgator can be employed to remove codes with small minimum distances in the ensemble from the random codeword selector.
An expurgator utilized in accordance with many embodiments of the invention can be defined as follows. Let PL(C) denote the probability of a randomly chosen code from the ensemble resulting from the random codeword selector. The expurgator can generate an ensemble, by placing probability zero on all codes whose minimum distances for the first ni, i∈[K] symbols (denoted by dminn
Quantized coset coding can be applied before transmitting the codewords over the channel. Given the Tanner graph =(, ε) of a RA-LDPC encoder and the corresponding LDPC codebook c from the expurgator, the coset LDPC code can be constructed by adding a constant vector ν chosen uniformly at random from GF(q)n
ci+ν, i∈[M]
is performed component-wise in GF(g). The set {ci+ν, i∈[M]} is the codebook for the coset GF(g)-LDPC code. Each of the K transmitters can be given an independently generated coset vector νi, i∈[K]. It should be appreciated, however, that systems and methods in accordance with various embodiments of the invention are not limited to the use of LDPC codes developed using uniform coset random design and that any of a variety of LDPC codes including (but not limited to) codes built using nested LDPC codes can be employed as appropriate to the requirements of specific applications.
The random coset vectors can play an important role in the LDPC codes utilized in accordance with many embodiments of the invention, by effectively enlarging the support of the random LDPC code ensemble. Given a coset LDPC codebook {ci+ν, i∈[M]}, each symbol from each codeword ci+ν is mapped to a symbol from the channel input alphabet using a quantizer δ:
δ:GF(q)→. (29)
Mapping δ is applied component-wise; therefore the following notation can be employed
δ(ci+ν)Δ[δ((ci+ν)j)]j∈[n]
for coset codeword ci+ν.
The set {δ(ci+ν), i∈[M]} is the codebook for the quantized coset GF(g)-LDPC code. All the K transmitters can adopt the same quantizer δ(·). In many embodiments, the design is not limited to the use of a similar quantizer.
An example quantizer is illustrated in
In some embodiments, even though all the k-MAC, k∈[K], in the RAC model described above are assumed to be symmetric, the capacity-achieving distribution PX* might vary with the number of active transmitters, the design allows the quantizers to vary in different incremental sub-blocks.
The random ensemble resulting from the application of random RA-LDPC encoder, random codeword selector, and expurgator can be labelled as LDPC−{(λi, ρi; ni)}i=1K. Before transmission starts, the chosen RA-LDPC codebook, coset vector, and quantizer can be disclosed to all transmitters and the receiver within the communication system.
Decoder Design
In many embodiments, the decoder is tasked with two goals: first estimating the number of active transmitters and then decoding the messages based on the estimated number of active transmitters (if any). Recall that the transmissions happen in epochs, and the decoder sends positive feedback (e.g., a positive feedback bit) at the end of each epoch to signify the start of a new epoch. The decoding protocol can be described by a two-stage process:
The ML decoder gk(·) for k∈[K] active transmitters can be formally defined as
where
xmn
is the length-nk quantized coset-shifted codewords for messages m, and hk(·) and γk are the hypothesis test function and threshold.
A decoding is declared to be successful if both the number of active transmitters and the corresponding messages are correctly determined.
Hypothesis Tests
By way of an example of an hypothesis test that can be utilized in accordance with an embodiment of the invention, given the DM-RAC model {(k, PY
Pr[h(Y0n
for some chosen target error probability ϵ0′, and constant Ek>0, provided n0≥c0 log n1+o(log n1) for some known constant c0>0. Here Yi, i∈[0, K] is the output distribution with i number of active transmitters and capacity-achieving input distribution PX*.
In addition, when PY
Error Analyses
Systems and methods in accordance with various embodiments of the invention that utilize Quantized Coset RA-LDPC codes can be analyzed using error-exponent analysis and dispersion-style analysis. A comparison of both approaches can reveal that the error-exponent analysis achieves a sub-optimal bound at small blocklength n but a superior performance when target error probability ϵ is small.
Before presenting the analyses, the quanity ensemble-average number of codewords is defined. Denote the type of a vector u∈GF(q)n as
N(u)Δ(N(g|u), g∈), (33)
where N(g|u) is the number of occurrence for element g in the vector u. The set of all possible types of a length-ni vector from GF(q)n
n
For a given codebook c from the LDPC−{(λi, ρi; ni) }i=1K ensemble, the number of type-niθi, niθi∈n
The ensemble-average spectrum of the LDPC−{(λi, ρi; ni)}i=1K ensemble at, each blocklength ni (for which the total number of check nodes is ri) is
Error-Exponent Analysis
Given a RAC model {(k, PY
Consider any DM-RAC {(k, PY
and the probability of failing to detect that no transmitter is active at time n0 is
ϵ0≤Pr[h0(Y0n
where hi(·) and γi, i∈[0, K] are hypothesis test functions and corresponding thresholds, EP
αk is a penalty of the LDPC encoder, defined using
and Mk=qn
When there is no active transmitter, the probability of failing to detect that no transmitter is active using hypothesis test function h0(·) (38) is bounded. When the number of active transmitters is k for some k∈[K], the probability of incorrect decoding using Gallager's error exponents (36) and hypothesis test functions (37) is also bounded.
On one hand, the performances of hypothesis tests can be determined. The probability of incorrectly estimating the true number of active transmitters decay as O(1/√{square root over (nk)}). On the other hand, Gallager's error exponent EP(R) is strictly positive EP(R)>0 for any R<C (assuming using capacity achieving distribution PX*) for any discrete memoryless point-to-point (DM-PPC) with capacity C>0. Similarly, Ep(kRk)>0 for all kRk<kCk in the DM-k-MAC (where kRk is the symmetrical sum-rate and kCk is the maximum symmetrical sum-rate).
If the performance of i.i.d. random codes drawn from PX* is bounded, then the only difference between i.i.d. codes and the codes described herein will be the error exponent in (36). For i.i.d. random codes, the error exponent will be
Therefore,
in (36) can be referred to as the per-transmitter rate offset for using a low-density encoder.
Evaluation of Rate Offsets
Given any RA-LDPC code ensemble LDPC−{(λi, ρi; ni)}i=1K, the rate offsets
behave as
where
provided that the density
decays no more quickly than
where bi<1 is some known constant that depends on q and the expurgator threshold σi, for all i∈[k].
The densities of the LDPC code
represent a trade-off between the performance and the complexity. A higher κ yields better LDPC code performance at the cost of higher decoding complexity, and a lower κ reduces the decoding complexity with worse performance.
Recall that when nkθk is a type,
For simplicity of notations, the following derivation assumes that the number of active transmitters is k=2. Similar arguments hold for any k>2.
When k=2, the LDPC code includes two categories of check nodes, where the first r1 check nodes only connect to the first n1 symbols (variable nodes), and the second incremental rΔ2 check nodes connect to all the n2 symbols. Hence, given a type n2θ2, all possible “sub-types” of the first n1 variable nodes can be separated. That is, the compatible set of types can be defined as
comp(θ1|θ2)Δ{θ1:n1θ1∈n
For a given θ2 and some compatible θ1, the incremental type can be defined as the type of the incremental nΔ2 symbols. That is,
The process of evaluating
where B(n1, n1θ1)B(nΔ2, nΔ2θΔ2) is the size of the set (n1θ1, nΔ2θΔ2) (the number of ways to permute a length-n2 vector of type sub-type pair (n1θ1, nΔ2θΔ2)), cn
To calculate the probability that a codeword of length n2 and sub-type (n1θ1, nΔ2θΔ2) is in the random codebook C(2), it should be noted that there are B(n1λ1, n1λ1θ1)B(n2λ2, n2λ2, n2λ2θ2) equally likely assignments of variable node values to sockets that are consistent with PDF (θ1, θΔ2). Combining this number with the q−1 possible values for each edge, we find that there are
t((θ1,θΔ2), n2)Δ(q−1)n
equally likely outcomes for the choice of socket connections and edge values under a fixed type (n1θ1, nΔ2θΔ2).
A generating function A<2>(x) can be built for each of the r2 check nodes. The combined generating function for all r2 check nodes A<2>(x)r
Since the first r1 check nodes are different from the incremental rΔ2 check nodes in the sense that they have different numbers of sockets and can connect to different variable nodes, the generating function A<2>(x)r
A<2>(x)r
and their coefficients satisfy
└A<2>(x)r
where A1(x1)r
Whilst A1(x1)r
To overcome this difficulty, the joint generating function
└A1(x1)r
can be broken into two independent generating functions as
└A1(x1)r
The intuition behind breaking apart the generating function in this way is that the sockets for the first group of rΔ1 check nodes can be independently drawn compared to the the sockets for the second group of rΔ2 check nodes. In other words, for any given sockets configuration that are satisfied with the first group of check nodes, it is possible to choose └A2(x2,1, x2,2)r
Furthermore, given a type n2θ2 and some compatible sub-type pair (n1θ1, nΔ2θΔ2), that is, θ1∈comp(θ1|θ2) and
then
where A2(x2) is the generating function for one check node in a regular LDPC code with parameter (λ2, ρ2), and the coefficient of the term x2n
The intuition behind this approach is that for any given fixed sequence of n2 symbols of type θ2n2, the number of socket connections and edge values that satisfy the rΔ2 check nodes are the same. However, it is only necessary to count the sequences such that the first n1 symbols are of type n1θ1 and the second incremental nΔ2 symbols are of type nΔ2θΔ2. The total number of different length-n2 sequences of type-n2θ2 is the multinomial coefficient (n
Applying the above approaches to └A<2>(x)r
Substituting (52) into (45) and combining with the 1/B(n2, n2θ2) factor from (41) gives
To bound each of the terms in (53), it is possible to take the log and divide by n2 to find the “exponent”. To do that, the following results are utilized:
where b0<1 is some constant that depends q and the expurgation threshold σ. In particular, choosing
can ensure that
Recall that A1(x1)r
decays no faster than
for i∈[2], the following bounds can be found for each of the terms in (53).
and
Note that the number of terms in the set comp(θ1|θ2) can grow polynomially in blocklength. while the number of codewords grows exponentially in blocklength, to obtain that
Combining the results from (57) to (63), for large-enough blocklength n1 provides
where (67) follows from the fact that
for all θ1∈comp(θ1|θ2) and
Here (70) follows from the fact θ1 can always be chosen to be more uniform than θ2, as it can use all the elements from n2θ2, and it only needs to construct a shorter sequence of length n1.
Finally, substituting (67) back into the expression of
in (41), the following is obtained for large enough blocklength n1
where (72) follows from the Taylor series expansion of log(1−1/qn
The above arguments can be generalized to arbitrary k∈[K] using the same approach. The rate-offset
goes to 0 as n1 goes to infinity. Furthermore, the rate offset behaves as
for large enough n1 provided the densities
decays no faster than
for all i∈[k].
The term O(biκ
biκ
κini log bi=log f(ni) (78)
For example, if it is desired that
(the third-order term in (92)), then
Similarly, if the design objective only requires
(dispersion, or the second-order term in (92)), then a smaller
is needed (recall that bi<1, hence log bi<0).
Therefore, systems and methods in accordance with various embodiments of the invention can utilize the best κi that suits a particular performance objective O(f(ni)) using equation (79). Conversely, the effect of a given density κi can be determined using the expression O(biκ
A combined generating function can be expressed as follows
└A1(x1)r
and can be broken into k independent generating functions as
Given a type θknk and a compatible sub-type pair (n1θ1, nΔ2θΔ2, . . . , nΔkθΔk), then
where Ak(xk) is the generating function for one check node in a regular LDPC code with parameter (λk, ρk), and the coefficient of the term xkn
Due to the nature of the quantizer δ:GF(q)→, the resulting distribution PXq(x) is an integer multiple of 1/q for each x∈. When the capacity-achieving distribution PX* is not an integer multiple of 1/q for some small q (e.g., some PX*(x) are irrational), then a large q may be necessary to make the approximation of PXq to PX* accurate.
For any DM-PPC (, PY|X, ) with capacity-achieving distribution PX*∈, where
the set of distributions achievable with the use of a quantizer can be denoted as δ:GF(q)→ by q, where
and mx∈[0:q] for all x∈, then
Furthermore, given any DM-PPC (, PY|X, ) with capacity-achieving distribution PX*∈and a quantizer δ:GF(q)→, with and q be defined in the same manner as above, ||=a and └||/2┘=b can be denoted to obtain
When P1 and P2 be two distributions on such that
then
where H(PX)Δ−Σx∈PX(x) log P(x) is the entropy of PX.
Dispersion-Style Analysis
The dispersion-style approach bounds the fundamental limits (both achievability and converse) of the maximum rate in the finite-blocklength regime succinctly using the mutual information I(PX) and the channel dispersion V(PX) defined in (4) and (6).
Notably, the random coding union bound (RCU) bound, can be generalized to analyze random codes with statistically dependent codewords for the PPC and for the 2-transmitter MAC. Application of the generalized RCU bound yields new achievability results for the LDPC codes, matching the optimal codes for the first- and second-order performance in the DM-PPC and identical to the most performant prior results in the DM-MAC. A generalized RCU bound for a k-transmitter MAC can be utilized to obtain an achievability result for the use of RA-LDPC codes in a symmetric DM-k-MAC.
Consider an ensemble of k-transmitter MAC codes with (Mk)k codewords drawn according to Πi=1kPX
PX
The ensemble-average error probability ϵk under ML decoding can satisfy
where c=[k]\, and
PX
The RCU bound described above assumes that each transmitter has exactly the same number of codewords Mk. That is, the k-MAC is operating at the symmetrical rate points. The reasoning behind this assumption is to avoid confusions with using M1, . . . , Mk to denote the size of the RAC codebooks at each blocklength n1, . . . , nk.
Given a DM-RAC {(k, PY
for each possible number of active transmitters k∈[K], where I(PX
provided the following moment assumptions are satisfied
I(PX
VY(PX
T(PX
TY(PX
Compared to i.i.d. random codes, the additional penalty for the proposed LDPC codes
behaves as
under minimum sparsity condition, i.e.,
decays no more quickly than
for all i∈[k]. Accordingly, the proposed LDPC code achieves the same first- and second-order performance as i.i.d. random codes.
Although the present invention has been described in certain specific aspects, many additional modifications and variations would be apparent to those skilled in the art. It is therefore to be understood that the present invention can be practiced otherwise than specifically described including using different varieties of LDPC codes, using additional outer codes in combination with an LDPC code such as (but not limited to) a nested LDPC code without departing from the scope and spirit of the present invention. Thus, embodiments of the present invention should be considered in all respects as illustrative and not restrictive. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents.
The present invention claims priority to U.S. Provisional Patent Application Ser. No. 62/959,678 entitled “Finite-Blocklength and Error Exponent Analyses for LDPC Codes in Point-to-Point and Multiple Access Communication” to Michelle Effros and Yuxin Liu, filed Jan. 10, 2020, the disclosures of which is herein incorporated by reference in its entirety.
This invention was made with government support under Grant No. CCF1817241 awarded by the National Science Foundation. The government has certain rights in the invention.
Number | Name | Date | Kind |
---|---|---|---|
20090150743 | Agarwal | Jun 2009 | A1 |
20170141798 | Kudekar | May 2017 | A1 |
20170237530 | Wesel | Aug 2017 | A1 |
20170331494 | Richardson | Nov 2017 | A1 |
20180226992 | Panteleev | Aug 2018 | A1 |
20180262303 | Jia | Sep 2018 | A1 |
20190199475 | Richardson | Jun 2019 | A1 |
20190379484 | Li | Dec 2019 | A1 |
20210013901 | Li | Jan 2021 | A1 |
20210336719 | Xin | Oct 2021 | A1 |
Entry |
---|
Amraoui et al., “Finite-Length Scaling for Iteratively Decoded LDPC Ensembles”, IEEE Transactions on Information Theory, vol. 55, Issue 2, Feb. 2009, pp. 473-498, DOI: 10.1109/TIT.2008.2009580. |
Amraoui et al., “Finite-length scaling of irregular LDPC code ensembles”, IEEE Information Theory Workshop, Aug. 29-Sep. 1, 2005, pp. 6-10, DOI: 10.1109/ITW.2005.1531845. |
Bennatan et al., “Design and analysis of nonbinary LDPC codes for arbitrary discrete-memoryless channels”, IEEE Transactions on Information Theory, vol. 52, Issue 2, Feb. 2006, pp. 549-583, DOI: 10.1109/TIT.2005.862080. |
Bennatan et al., “On the application of LDPC codes to arbitrary discrete-memoryless channels”, IEEE Transactions on Information Theory, vol. 50, Issue 3, Mar. 2004, pp. 417-438, DOI: 10.1109/TIT.2004.824917. |
Berrou et al., “Near Shannon limit error-correcting coding and decoding: Turbo-codes. 1”, Proceedings of ICC '93—IEEE International Conference on Communications, May 23-26, 1993, OI: 10.1109/ICC.1993.397441. |
Burnashev, “Data Transmission over a Discrete Channel with Feedback. Random Transmission Time”, Problems of Information Transmission, vol. 12, No. 4, 1976, pp. 250-265. |
Burshtein et al., “Asymptotic enumeration methods for analyzing LDPC codes”, IEEE Transactions on Information Theory, vol. 50, Issue 6, Jun. 1, 2004, pp. 1115-1131, DOI: 10.1109/TIT.2004.828064. |
Chen et al., “Lossless Source Coding in the Point-to-Point, Multiple Access, and Random Access Scenarios”, 2019 IEEE International Symposium on Information Theory (ISIT), Jul. 2019, pp. 1692-1696, DOI: 10.1109/ISIT.2019.8849742. |
Chen et al., “Lossless Source Coding in the Point-to-Point, Multiple Access, and Random Access Scenarios”, IEEE Transactions on Information Theory, vol. 66, Issue 11, Nov. 1, 2020, pp. 6688 to 6722, DOI: 10.1109/TIT.2020.3005155. |
Davey et al., “Low-Density Parity Check Codes over GF(q)”, IEEE Communications Letters, vol. 2, No. 6, Jun. 1998, pp. 165-167. |
Di et al., “Finite-length analysis of low-density parity-check codes on the binary erasure channel”, IEEE Transactions on Information Theory, vol. 48, No. 6, Jun. 2002, pp. 1570-1579, DOI: 10.1109/TIT.2002.1003839. |
Draper et al., “Efficient variable length channel coding for unknown DMCs”, Proceedings of the International Symposium on Information Theory, Chicago, Illinois, Jun. 27-Jul. 2, 2004, p. 379. |
Effros et al., “Random Access Channel Coding in the Finite Blocklength Regime”, IEEE Transactions on Information Theory, Jun. 2018, arXiv:1801.09018 [cs.IT] Jan. 27, 2018, 9 pgs., DOI:10.1109/TIT.2020.3047630. |
Elias, “Coding for Noisy Channels”, in IRE Conv. Rec., vol. 3, Mar. 1955, pp. 37-46. |
Erez et al., “The ML decoding performance of LDPC ensembles over Z/subq/”, IEEE Transactions on Information Theory, vol. 51, Issue 5, May 2005, pp. 1871-1879, DOI: 10.1109/TIT.2005.846431. |
Gallager, “Information Theory and Reliable Communication”, Courses and Lectures, No. 30, 1st Edition, Springer, vol. 2, Jul. 1970, 116 pgs. |
Gallager, “Low-density parity-check codes”, IRE Transactions on Information Theory, vol. 8, Issue 1, Jan. 1962, pp. 21-28, DOI: 10.1109/TIT.1962.1057683. |
Hajek et al., “Decentralized dynamic control of a multiaccess broadcast channel”, IEEE Transactions on Automatic Control, vol. 27, Issue 3, Jun. 1982, pp. 559-569, DOI: 10.1109/TAC.1982.1102978. |
Han et al., “A new achievable rate region for the interference channel”, IEEE Transactions on Information Theory, vol. IT-27, Issue 1, Jan. 1981, pp. 49-60, https://doi.org/10.1109/TIT.1981.1056307. |
Huang et al., “Finite Blocklength Coding for Multiple Access Channels”, Proceedings of the IEEE International Symposium on Information Theory Proceedings, Cambridge, Massachusetts, Jul. 1-6, 2012, 5 pgs. |
Liu et al., “A new universal random coding bound for the multiple-access channel”, Proceedings of 1995 IEEE International Symposium on Information Theory, Sep. 17-22, 1995, p. 442, DOI: 10.1109/ISIT.1995.550429. |
Liu et al., “Finite-Blocklength and Error-Exponent Analyses for LDPC Codes in Point-to-Point and Multiple Access Communication”, 2020 IEEE International Symposium on Information Theory (ISIT), Jun. 1-26, 2020, pp. 361-366, DOI: 10.1109/ISIT44484.2020.9173963. |
Measson et al., “Maxwell Construction: The Hidden Bridge Between Iterative and Maximum a Posteriori Decoding”, IEEE Transactions on Information Theory, vol. 54, Issue 12, Dec. 2008, first published Nov. 25, 2008, pp. 5277-5307, DOI: 10.1109/TIT.2008.2006466. |
Mei et al., “Performance Analysis of Finite-Length LDPC Codes Over Asymmetric Memoryless Channels”, IEEE Transactions on Vehicular Technology, vol. 68, Issue 11, Nov. 2019, first published Sep. 27, 2019, pp. 11338-11342, DOI: 10.1109/TVT.2019.2944139. |
Miller et al., “Bounds on the maximum-likelihood decoding error probability of low-density parity-check codes”, IEEE Transactions on Information Theory, vol. 47, Issue 7, Nov. 2001, pp. 2696-2710, DOI: 10.1109/18.959254. |
Polyanskiy, “Information theoretic methods in statistics and computer science”, [online] Available: http://people.lids.mit.edu/yp/homepage/data/LN_fdiv.pdv. |
Polyanskiy et al., “Channel Coding Rate in the Finite Blocklength Regime”, IEEE Transactions on Information Theory, vol. 56, No. 5, May 2010, pp. 2307-2359, DOI 10.1109/TIT.2010.2043769. |
Polyanskiy et al., “Feedback in the Non-Asymptotic Regime”, IEEE Transactions on Information Theory, vol. 57, No. 8, Aug. 2011, pp. 4903-4925. |
Reznik, “An Algorithm for Quantization of Discrete Probability Distributions”, in Proc. Data Compression Conference, 2011, pp. 333-342. |
Richardson et al., “Finite-length analysis of various low-density parity-check ensembles for the binary erasure channel”, Proceedings IEEE International Symposium on Information Theory, Jun. 30, 2002-Jul. 5, 2002, DOI: 10.1109/ISIT.2002.1023273. |
Roberts, “ALOHA packet system with and without slots and capture”, ACM SIGCOMM Computer Communication Review, vol. 5, No. 2, Apr. 1975, pp. 28-42. |
Roumy et al., “Characterization and Optimization of LDPC Codes for the 2-User Gaussian Multiple Access Channel”, EURASIP Journal on Wireless Communications and Networking, vol. 2007, Article 74894, Jun. 2007, 10 pgs., DOI: 10.1155/2007/74890. |
Shabah et al., “Grant-free Non-orthogonal Multiple Access for IoT: A Survey”, IEEE Communications Surveys & Tutorials, vol. 22, No. 3, Third Quarter 2020, pp. 1805-1838, DOI:10.1109/COMST.2020.2996032. |
Sharifi et al., “LDPC Code Design for the Two-User Gaussian Multiple Access Channel”, IEEE Transactions on Wireless Communications, vol. 15, Issue 4, Apr. 2016, first published Dec. 23, 2015, pp. 2833-2844, DOI: 10.1109/TWC.2015.2511749. |
Shevtsova, “On the absolute constants in the Berry-Esseen-type inequalities”, Doklady Mathematics, vol. 89, May 2014, pp. 378-381, https://doi.org/10.1134/S1064562414030338. |
Tan et al., “On the Dispersions of Three Network Information Theory Problems”, IEEE Transactions on Information Theory, vol. 60, No. 2, Feb. 2014, pp. 881-903, arXiv:1201.3901. |
Tchamkerten et al., “A Feedback Strategy for Binary Symmetric Channels”, Proceedings of the IEEE International Symposium on Information Theory, Lausanne, Switzerland, Jun. 30-Jul. 5, 2002, pp. 362. |
Tehamkerten et al., “A feedback strategy for binary symmetric channels”, Proceedings IEEE International Symposium on Information Theory, Jun. 30-Jul. 5, 2002, DOI: 10.1109/ISIT.2002.1023634. |
Tsitsiklis, “Analysis of a multiaccess control scheme”, IEEE Transactions on Automatic Control, vol. AC-32, No. 11, Nov. 1, 1987, pp. 1017-1020, DOI:10.1109/TAC.1987.1104494. |
Wu et al., “FASA: accelerated S-ALOHA using access history for event-driven M2M communications”, IEEE/ACM Transactions on Networking, vol. 21, No. 6, Dec. 2013, pp. 1904-1917, DOI: 10.1109/TNET.2013.2241076. |
Yagi et al., “Coset codes for compound multiple access channels with common information”, 2009 IEEE International Symposium on Information Theory, ISIT 2009, Nov. 19, 2009, pp. 1854-1858, DOI:10.1109/ISIT.2009.5205439. |
Yang et al., “New Nonasymptotic Channel Coding Theorems for Structured Codes”, IEEE Transactions on Information Theory, vol. 61, No. 9, Sep. 2015, pp. 4534-4553, DOI: 10.1109/TIT.2015.2449852. |
Yavas et al., “Gaussian Multiple and Random Access in the Finite Blocklength Regime”, 2020 IEEE International Symposium on Information Theory (ISIT), 2020, pp. 3013-3018, doi: 10.1109/ISIT44484.2020.9174026. |
Yazdani et al., “Waterfall Performance Analysis of Finite-Length LDPC Codes on Symmetric Channels”, IEEE Transactions on Communications, vol. 57, Issue 11, Nov. 2009, pp. 3183-3187, DOI: 10.1109/TCOMM.2009.11.070210. |
Number | Date | Country | |
---|---|---|---|
20210218498 A1 | Jul 2021 | US |
Number | Date | Country | |
---|---|---|---|
62959678 | Jan 2020 | US |