Irregular 8PSK mapping for variable length codes with small blocks in a BICM-ID system
- Jing Dai^{1}Email author,
- Can Zhang^{1},
- Shaoshuai Gao^{1} and
- Lei Hou^{1}
https://doi.org/10.1186/s13638-015-0351-0
© Dai et al.; licensee Springer. 2015
Received: 15 October 2014
Accepted: 6 April 2015
Published: 30 April 2015
Abstract
Iterative decoding is an effective technique to approach the channel capacity for very large block sizes with enough iterations. However, due to the limitation of bandwidth and delay, small blocks of data are much more commonly applied in practical communications, and low iteration counts are usually preferred for both decoding complexity and delay consideration. In such cases, the design rules of near capacity decoding—which is generally asymptotic with respect to the block size—may cause inferior performance. To overcome this problem for 8-phase shift keying (8PSK) modulated variable length codes (VLCs), an irregular mapping scheme for the transmission system of bit-interleaved coded modulation with iterative decoding (BICM-ID) is studied in this paper. A submapping searching algorithm and an irregular mapping optimization algorithm are proposed aiming at maximizing the extrinsic mutual information after a target number of iterations. Simulation results show that for small data block size with a low iteration count, our scheme has advantages with respect to the existing near capacity systems optimized by the asymptotic tools.
Keywords
1 Introduction
Variable length codes (VLCs) were originally proposed for entropy coding, and have been widely applied in a variety of audio and video compression standards. While providing higher data rates than fixed length codes (FLCs), they are sensitive to error propagations due to channel noises. Even a single bit mistake can cause a loss of synchronization, resulting in an invalid packet. Especially when bandwidth-efficient modulations, e.g., 8-phase shift keying (8PSK) or M-ary quadrature amplitude modulation (QAM), are used for communication, the noise-susceptible characteristic of these high-order modulations will be adverse to correct decoding of variable length data.
To improve the robustness of VLCs, reversible variable length codes (RVLCs) [1-3] were proposed and studied to mitigate the impact of synchronization loss by bidirectional decoding. Another class of robust VLCs focus on the free distance of the codewords, just like the channel codes do, and that is why they are called variable length error-correcting codes (VLECs) [2,4,5]. In addition, soft VLC decoding, e.g., BCJR decoding [6] based on the bit-level [7] or symbol-level [8] VLC trellis, was introduced to achieve a better performance than hard instant decoding, especially when involving iterative decoding [8,9].
Besides, from the perspective of high-order modulation, bit-interleaved coded modulation with iterative decoding (BICM-ID) [10] is an effective technique to approach the channel capacity. With the aid of extrinsic information transfer (EXIT) charts [11,12], near capacity iterative decoding could be achieved through EXIT curve matching, under the assumption of large block size. The EXIT curves can be optimized by adjusting the mapping of bits to symbol constellation [13,14]. Yet another important series of EXIT optimization techniques are irregular codes, such as irregular convolutional codes (IrCCs) [15], irregular VLCs (IrVLCs) [9], and irregular mappings/modulations [16-18].
The iterative decoding behaviors analyzed in [9,14-18] are all asymptotic with respect to block size, where large interleavers together with enough iterations are assumed. However, the asymptotically good performance cannot be guaranteed with small blocks.
In this paper, we derive an irregular mapping scheme for 8PSK modulated VLC in a small block BICM-ID system, and show its coding gain over the existing near capacity systems optimized by standard asymptotic tools. Our design criterion is to maximize the extrinsic mutual information at a target E _{ b }/N _{0} after a fixed and low number of iterations, which is modified from the algorithm in [19]. Besides, a simplified sub mapping searching algorithm is proposed, based on the work of [20].
The remainder of this paper is organized as follows. Section 2 gives an overview of the transmission system. After a short introduction about the classification of 8PSK mappings in Section 3, our scheme of irregular mapping optimization is illustrated in Section 4. Simulation results are shown in Section 5, and Section 6 concludes this paper.
2 System overview
where ℓ _{max} is the longest word length. The proof of Equation 2 is in Appendix A. Here, we suppose bit-level VLC trellis [7] is applied in the VLC soft decoding, which implies the decoder does not necessarily have to know K.
A random interleaver with size P·N _{packet} (P=1,2,…) permutes the bit stream u _{:} to u:′. The interleaved u:′ is then encoded by a rate-1 recursive systematic convolutional (RSC) code, producing bit stream v _{:}. This rate-1 RSC coding is also called ‘doping’ [21] since the output bits are doped with both info-bits and parity-bits. Then after the mapping of bits v _{:} to 8PSK constellation, the signal is transmitted over the additive white Gaussian noise (AWGN) channel. Dependencies between the modulated symbols are introduced by the inner RSC code, for the purpose of reaching EXIT point (1,1) [21], which corresponds to error-floor removed iterative decoding.
In this paper, the rate-1 RSC code in Figure 1, we choose is a simple repeat-accumulate (RA) code with transfer function 1/(1+D) and memory length 1. The ‘doping’ rate is set to be 1/60, i.e., 59 info-bits and 1 parity-bit within a doping period [21]. The packetization rule is set as N _{packet}=600.
At the receiver side, bit-level extrinsic information is exchanged between the inner a posteriori probability (APP) demapper/decoder and the outer VLC APP decoder. It can be categorized into a sub field of iterative source–channel decoding (ISCD). The inner decoder APP _{in} consists of a soft demapper and the concatenated rate-1 RSC decoder. The a priori information L _{ A }(u n′) of the RSC decoder is also input to the soft demapper as L _{ A }(v _{ n }) only if n is the info-bit index of the RSC code. Finally, after a fixed number of iterations, the original source symbols are recovered using a soft-input VLC Viterbi decoder.
3 Backgrounds on the classification of mappings for 8PSK
where \(\bar {v}_{m}^{i}\) denotes the bit complement of \({v_{m}^{i}}\). And is the indicator function that returns 1 when the event is true, otherwise 0 is returned.
It is observed that only pairwise constellation symbols with a single different bit need to be taken into consideration when calculating the entries of W _{1} in Equation 6 since only one bit is not known yet under full prior information assumption. On the contrary, with no prior information, the calculation the entries of W _{0} in Equation 4 involves every pair of symbols.
The 5040 mappings of 8PSK are divided into 86 classes with unique [W _{0},W _{1}], and listed in Table IV of [20]. Thanks to this systematic classification work, the mapping optimization of 8PSK is much more simplified.
4 Irregular mapping optimization
The procedure of irregular mapping optimization for the 8PSK modulated small block VLC is illustrated in this section. First of all, Section 4.1 sets the optimization target. In Section 4.2, a sub mapping searching algorithm is proposed, for the purpose of selecting a group of sub demappers with diverse-shaped EXIT curves. At last, the corresponding percentages of the selected mappings are optimized in Section 4.3.
4.1 Optimization target setting
Our goal is to maximize , which is the expected extrinsic mutual information after a target number of F iterations. Figure 3b shows the symbol error rates (SERs) of mapper 50 for different iterations, under small block condition (P·N _{packet}=600). From the SER chart, decoding with around 5 iterations is attractive for a good tradeoff between performance and complexity. The ‘waterfall’ region of 5-iteration SER curve starts at about E _{ b }/N _{0}=3.5 dB. At this signal to noise ratio (SNR), the decoding trajectory of average mutual information for 30 iterations is depicted in Figure 3a. All the extrinsic mutual information measurements of the EXIT curves and the tracepoints were obtained using the histogram-based approximation of the L _{ A } or L _{ E } probability density functions (PDFs) [11].
It is observed in Figure 3a that the trajectory deviates from the EXIT curves as the iteration count increases, which is due to the increase of correlations between the decoded soft bits, especially under the circumstances of small block size. Since our optimization is based on EXIT analysis, to avoid excessive inaccuracy, F should better be low, here no more than 5 is a necessary limit. Then our optimization target is set as maximizing at E _{ b }/N _{0}=3.5 dB.
Moreover, the detailed simulation parameters here in this sub section can be found in Section 5.1.
4.2 Sub mapping searching
The process of searching for 8PSK sub (de)mappings with diverse EXIT features is summarized in Algorithm 1. Assume the target sub mapping number \(J_{0}=2^{l}+1\left (l\in \mathbb {N}_{+}\right)\). The measurements {C _{ j }} are sorted in ascending order before the beginning of the algorithm, thus we have \(C_{1}=\min \limits _{j}{C_{j}}\) and \(C_{86}=\max \limits _{j}{C_{j}}\). These two mappings with the minimum and the maximum measurement are selected as the initial sub mappings. By the way, the two mappings corresponds to Gray and anti-Gray mapping, respectively.
After initialization, the main idea of Algorithm 1 can be can be summarized as finding the rest sub mappings with diverse measurements between C _{1} and C _{86}, which is done in a way like binary search. In the algorithm, the mapping with measurement closest to \(\left (C_{j_{1}}+C_{j_{2}}\right)/2\) is treated as the one with ‘middle feature’ of two already-selected mappings j _{1} and j _{2}. This procedure is repeated by l= log2(J _{0}−1) times. After the algorithm, a set of J (J≤J _{0}) mappings are selected from the 86 classes as sub mappings for the irregular inner code.
Figure 4 shows the example curves for J=3,5,9 and 16 (J _{0}=3,5,9, and 17, respectively), at signal to noise ratio (SNR) of 5.0 dB. Generally speaking, a larger J provides a more flexible weighted sum of sub code EXIT functions, i.e., more possible shapes for the EXIT function of the irregular code, and which means more accurately matched for the optimization purpose. However, a larger J also means more memory requirement for the mapping table of course, and also more complicated optimization for the irregular code (see Section 4.3), thus we do not want it to be too big. Later in our simulation, we choose an empirical value J=9, since a higher one brings barely any improvements to the optimization results.
4.3 Maximization of the extrinsic mutual information
For iterative decoding, the correlations between the decoded bits increase with the number of iterations. With small block sizes, there would be a rapid degradation for the effectiveness of iteration after only the first few ones. In [19], the design criteria aims at maximizing the extrinsic information after a fixed number of iterations, and its advantages are shown with small blocks. With some modifications, the optimization algorithm of [19] can also be applied to our scheme.
with an initial value \(\frac {\partial {\mu _{1}}}{\partial {\alpha _{j}}}=T_{\text {out}}'\left (T_{\text {in}}(0)\right)\cdot T_{\text {in},j}(0)\) for all j=1,2,⋯,J. Equation 12 is the main difference between our irregular inner code situation and the irregular outer code situation. By substituting Equation 12 into 10, a steepest gradient algorithm similar as that in [19] can be applied to irregular inner codes, e.g., irregular mapping (with RA doping) in this paper. Other than this, the rest of the optimization algorithm is like that in Appendix A of [19].
5 Simulation
In this section, the effectiveness of our method is discussed with two kinds of sources. The source used in Section 5.1 is so-called ‘English Alphabet’ [4], which is a common subject for comparing VLC/VLEC/RVLC schemes [1-5]. In Section 5.2, we employ a source of 16-level Lloyd-Max quantized [22] Gaussian independent identical distributed (i.i.d.) samples. In both cases, the performance of our method is compared with the asymptotic near capacity design.
5.1 Simulation with ‘English Alphabet’ source symbol
8PSK sub mappings of the irregularly mapped BICM-ISCD system with ‘English Alphabet’ source symbols
Index | Constellation mapping | Index in [ 20 ] | Weight factor α _{ j } |
---|---|---|---|
1 | 0,1,3,2,6,7,5,4 | 72 (Gray) | 0.145 |
2 | 0,1,3,2,5,7,6,4 | 71 | 0.065 |
3 | 0,1,3,2,4,5,7,6 | 69 | 0.035 |
4 | 0,1,2,3,4,5,7,6 | 2 | 0.015 |
5 | 0,1,2,3,4,5,6,7 | 1 | 0.355 |
6 | 0,1,2,7,4,5,6,3 | 66 | 0 |
7 | 0,1,6,3,5,4,2,7 | 81 | 0 |
8 | 0,1,6,3,5,2,4,7 | 80 | 0.385 |
9 | 0,3,4,1,6,5,2,7 | 84 (anti-Gray) | 0 |
Compare the EXIT curves in Figure 5 with that of the basic benchmark mapper 50 in Figure 3a. At E _{ b }/N _{0}=3.5 dB, the optimized irregular mapper obtains a larger , i.e., the extrinsic mutual information after 5 iterations. The cost is a higher convergence threshold: 2.8 dB, and 0.4 dB lost in E _{ b }/N _{0} is observed compared with that of mapper 50. However, this threshold only represents the asymptotic iterative decoding behavior, and has no direct connection with the performance under the circumstances of small blocks.
Another reference system is a classic separated system concatenated by Huffman VLC, IrCC and anti-Gray mapping (with 1/60 RA doping too). Its overall coding rate is adjusted to the same as other JSC systems. This separated system obtains the ‘waterfall’ region at the lowest SNR (at about E _{ b }/N _{0}=2.2 dB) with a large interleaver and enough iterations in Figure 6b, but shows the worst performance when the block size is diminished as in Figure 6a. This is an example to show that the design rules of asymptotically near capacity decoding can sometimes cause really inferior performance with small blocks and low iteration counts. Besides, in Figure 6b, the proposed irregular mapping scheme shows its ‘waterfall’ at E _{ b }/N _{0}=2.8 dB, consistent with the EXIT convergence analysis in Figure 5.
5.2 Simulation with Gaussian i.i.d. source sample
In order to verify the robustness of our method over source statistics, an additional simulation with 16-level Lloyd-Max quantized Gaussian i.i.d source samples is presented in this sub section. Gaussian distribution has widespread applications owning to the wide applicability of the central limit theorem, which makes it a practical source.
8PSK sub mappings of the irregularly mapped BICM-ISCD system with 16-level Lloyd-Max quantized i.i.d. Gaussian source samples
Index | Constellation mapping | Index in [ 20] | Weight factor α _{ j } |
---|---|---|---|
1 | 0,1,3,2,6,7,5,4 | 72 (Gray) | 0.100 |
2 | 0,1,2,3,7,6,5,4 | 15 | 0.075 |
3 | 0,1,2,6,7,3,5,4 | 62 | 0.030 |
4 | 0,1,2,5,4,6,7,3 | 44 | 0 |
5 | 0,1,2,3,4,6,5,7 | 3 | 0.540 |
6 | 0,1,2,4,7,6,5,3 | 35 | 0.025 |
7 | 0,1,2,4,3,5,6,7 | 16 | 0 |
8 | 0,1,2,5,6,3,4,7 | 46 | 0.220 |
9 | 0,3,4,7,1,2,5,6 | 86 (MSEW) | 0.010 |
Sub VLCs of the asymptotic near capacity IrVLC system [9]
Index | Average word length | Rate | Weight factor |
---|---|---|---|
1 | 3.912 | 0.96 | 0 |
2 | 4.271 | 0.88 | 0 |
3 | 6.193 | 0.61 | 0.490 |
4 | 8.271 | 0.45 | 0.004 |
5 | 10.21 | 0.37 | 0 |
6 | 12.26 | 0.31 | 0.506 |
Entropy | 3.747 |
6 Conclusions
An irregularly mapped BICM-ID scheme for VLCs modulated with 8PSK is proposed in this paper. The complexity of the encoding part is very low. Other than a simple RA code, only lookup operations are needed (for VLC encoding, interleaving, and mapping). It can be applied to circumstances where the energy of the transmitter is a critical resource. The encoding complexity is in a way shifted to the receiver, since the decoding of the less compressed VLC with greater average word length requires more computations.
The scheme in this paper concentrates on the iterative decoding performance for small block sizes with low iterations, which is more practical in bandwidth and delay sensitive communications. By setting an optimization target, selecting a set of sub mappings with diverse-shaped EXIT curves and then optimizing their percentages, irregular mapping with maximum extrinsic mutual information after a target number of iterations is derived. For small interleaving depths, our scheme exhibits better performance with respect to the existing asymptotic capacity-approaching system.
7 A Appendix: Proof of Equation 2
is derived, which is exactly Equation 2.
Declarations
Acknowledgements
The authors would like to thank the anonymous reviewers and the editor for their valuable comments. This research work was supported by the State Key Program of National Natural Science Foundation of China (Grant No. 61032006) and the National Science Foundation of China (Grant No. 61271282 and 60172045).
Authors’ Affiliations
References
- Y Takishima, M Wada, H Murakami, Reversible variable length codes. IEEE Trans. Commun. 43(234), 158–162 (1995).View ArticleMATHGoogle Scholar
- J Wang, L-L Yang, L Hanzo, Iterative construction of reversible variable-length codes and variable-length error-correcting codes. IEEE Commun. Lett. 8(11), 671–673 (2004).View ArticleGoogle Scholar
- Y-M Huang, T-Y Wu, YS Han, An A*-based algorithm for constructing reversible variable length codes with minimum average codeword length. IEEE Trans. Commun. 58(11), 3175–3185 (2010).View ArticleGoogle Scholar
- V Buttigieg, PG Farrell, Variable-length error-correcting codes. IEE Proc. Commun. 147(4), 211–215 (2000).View ArticleGoogle Scholar
- A Diallo, C Weidmann, M Kieffer, New free distance bounds and design techniques for joint source-channel variable-length codes. IEEE Trans. Commun. 60(10), 3080–3090 (2012).View ArticleGoogle Scholar
- L Bahl, J Cocke, F Jelinek, J Raviv, Optimal decoding of linear codes for minimizing symbol error rate (corresp.)IEEE Trans. Inform. Theory. 20(2), 284–287 (1974).View ArticleMATHMathSciNetGoogle Scholar
- VB Balakirsky, in Proceedings of IEEE International Symposium on Information Theory (ISIT ’97): June-July 1997. Joint source-channel coding with variable length codes (Ulm, Germany, 1997), p. 419.Google Scholar
- R Bauer, J Hagenauer, in Proceedings of the 3rd ITG Conference on Source and Channel Coding (CSCC ’00): January 2000. Symbol-by-symbol MAP decoding of variable length codes (Munich, Germany, 2000), pp. 111–116.Google Scholar
- RG Maunder, J Wang, SX Ng, L-L Yang, L Hanzo, On the performance and complexity of irregular variable length codes for near-capacity joint source and channel coding. IEEE Trans. Wireless Commun. 7(4), 1338–1347 (2008).View ArticleGoogle Scholar
- X Li, JA Ritcey, Bit-interleaved coded modulation with iterative decoding. IEEE Commun. Lett. 1(6), 169–171 (1997).View ArticleGoogle Scholar
- S ten Brink, Convergence behavior of iteratively decoded parallel concatenated codes. IEEE Trans. Commun. 49(10), 1727–1737 (2001).View ArticleMATHGoogle Scholar
- A Ashikhmin, G Kramer, S ten Brink, Extrinsic information transfer functions: model and erasure channel properties. IEEE Trans. Inform. Theory. 50(11), 2657–2673 (2004).View ArticleMATHMathSciNetGoogle Scholar
- F Schreckenbach, N Görtz, J Hagenauer, G Bauch, in Proc. IEEE GLOBECOM 2003. Optimized symbol mappings for bit-interleaved coded modulation with iterative decoding (San Francisco, CA, 2003), pp. 3316–3320.Google Scholar
- Z Yang, Q Xie, K Peng, J Song, Labeling optimization for BICM-ID systems. IEEE Commun. Lett. 14(11), 1047–1049 (2010).View ArticleGoogle Scholar
- M Tüchler, J Hagenauer, in Proc. 2002 Conf. Information Sciences and Systems. EXIT charts of irregular codes (Princeton, NJ, 2002), pp. 748–753.Google Scholar
- F Schreckenbach, G Bauch, Bit-interleaved coded irregular modulation. European Trans. Telecommun. 17(2), 269–282 (2006).View ArticleGoogle Scholar
- R Tee, RG Maunder, L Hanzo, EXIT-chart aided near-capacity irregular bit-interleaved coded modulation design. IEEE Trans. Wireless Commun. 8(1), 32–37 (2009).View ArticleGoogle Scholar
- C Cheng, G Tu, C Zhang, J Dai, Optimization of irregular mapping for error floor removed bit-interleaved coded modulation with iterative decoding and 8psk. EURASIP J. Wireless Commun. Netw. 2014(1), 31–45 (2014).View ArticleGoogle Scholar
- M Tüchler, Design of serially concatenated systems depending on the block length. IEEE Trans. Commun. 52(2), 209–218 (2004).View ArticleGoogle Scholar
- F Brännström, LK Rasmussen, Classification of unique mappings for 8PSK based on bit-wise distance spectra. IEEE Trans. Inform. Theory. 55(3), 1131–1145 (2009).View ArticleMathSciNetGoogle Scholar
- S Pfletschinger, F Sanzi, Error floor removal for bit-interleaved coded modulation with iterative detection. IEEE Trans. Wireless Commun. 5(11), 3174–3181 (2006).View ArticleGoogle Scholar
- S Lloyd, Least squares quantization in PCM. IEEE Trans. Info. Theory. 28(2), 129–137 (1982).View ArticleMATHMathSciNetGoogle Scholar
- VI Levenshtein, Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady. 10, 707 (1966).MathSciNetGoogle Scholar
- J Tan, G Stüber, Analysis and design of symbol mappers for iteratively decoded BICM. IEEE Trans. Wireless Commun. 4(2), 662–672 (2005).View ArticleGoogle Scholar
Copyright
This is an Open Access article distributed under the terms of the Creative Commons Attribution License(http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.