Skip to main content

Structured root-LDPC codes and PEG-based techniques for block-fading channels

Abstract

In this work, we propose structured root-low-density parity-check (LDPC) codes and design techniques for block-fading channels. In particular, quasi-cyclic root-LDPC codes, irregular repeat-accumulate root-LDPC codes and controlled doping root-LDPC codes based on progressive edge growth (PEG) techniques for block-fading channels are proposed. The proposed root-LDPC codes are both suitable for channels under F=2,3 and 4 independent fading per codeword. The performance of the proposed codes is investigated in terms of frame error rate (FER). The proposed root-LDPC codes are capable of achieving the channel diversity and outperform standard LDPC codes. For block-fading channel with F=2 our proposed PEG-based root-LDPC codes outperform PEG-based LDPC codes by 7.5 dB at a FER close to 10−3.

1 Introduction

The most recent IEEE wireless local area network (WLAN) 802.11ad standard [1] argues that to achieve high throughput the devices must operate with LDPC codes [2, 3]. As wireless systems are subject to multi-path propagation and mobility, these systems are characterized by time-varying channels with fluctuating signal strength. In applications subject to delay constraints and slowly-varying channels, only limited independent fading realizations are experienced. In such conditions also known as non-ergodic scenarios, the channel capacity is zero since there is an irreducible probability, termed outage probability [4], that the transmitted data rate is not supported by the channel. A simple and useful model that captures the essential characteristics of non-ergodic channels is the block-fading channel [5, 6]. It is especially important in wireless communications with slow time-frequency hopping (e.g. cellular networks and wireless local area networks) or multi-carrier modulation using orthogonal frequency division multiplexing (OFDM) [7]. Codes designed for block-fading channels are expected to achieve the channel diversity and to offer excellent coding gains.

1.1 Prior and related works

A family of LDPC codes called root-LDPC for block-fading channels with F=2 fading per codeword was proposed in [7]. Root-LDPC codes are able to achieve the maximum diversity of a block-fading channel and have a performance near the limit of outage when decoded using the Sum Product Algorithm (SPA). Root-LDPC codes are always designed with code rate R=1/F, since the Singleton bound determines that this is the highest code rate possible to obtain the maximum diversity order [7]. Y. Li and M. Salehi in [8] have presented the construction of structured root-LDPC codes by means of tiling circulant matrices, i.e. by designing quasi-cyclic low-density parity-check (QC-LDPC) codes [9]. It is also shown that the QC-LDPC codes can perform as well as randomly generated root-LDPC codes over block-fading channels. Uchoa et al. in [10] proposed a PEG-based algorithm to design LDPC codes with root-check properties, thus providing root-LDPC codes with larger girths. A strategy that imposes constraints on a PEG-based algorithm which are required by root-LDPC codes was devised. This approach has provided better performance in terms of FER and BER than the works in [7, 8]. Duyck et al. in [11] proposed the design of a random LDPC codes which are able to achieve full diversity in block-fading channels with F=2 fadings. Healy and de Lamare in [12] extended the work in [11] for the case of block-fading channels with F=3 and F=4 fading per block transmitted. Uchoa et al. in [13] proposed iterative detection and decoding (IDD) algorithms for multiple-input multiple-output (MIMO) systems operating in block fading and fast Rayleigh fading channels.

1.2 Contributions

We propose in this work three structures to design root-LDPC codes which are quasi-cyclic, repeat and accumulate and controlled doping. Preliminary results toward PEG-based algorithm to design QC-LDPC codes with root-check properties for block-fading channel with F=3,4 fading per codeword were reported in [14]. Here, in this work we present a more detailed analysis of quasi-cyclic root-check-based LDPC codes. Furthermore, initial results for a PEG-based algorithm to design irregular repeat-accumulate (IRA) LDPC codes with root-check properties for block-fading channels were discussed in [15]. Here, we present a more detailed analysis of irregular repeat-accumulate and accumulate IRAA root-check structure for F=2,3 independent fading.

In general, the parity check bits of root-LDPC codes are not in full diversity. Boutros in [16] proposed a controlled doping via high order root-LDPC codes, which are able to guarantee full diversity for the parity check bits. Such a design becomes really important when iterative detection and decoding (IDD) is used in spread spectrum [17, 18] and MIMO systems [1921]. In IDD systems, the detector and the decoder exchange their extrinsic information in an iterative way. Therefore, if the parity bits are not in full diversity, the overall IDD system performance will lead to a degradation in terms of bit error rate (BER) instead of improvements as stated in [17].

In this paper, we also propose a novel full diversity controlled doping root-check RA-based LDPC codes for block-fading channels of F=2,3,4 fading which includes the code rates \(R = \frac {1}{2}\), \(R = \frac {1}{3}\) and \(R = \frac {1}{4}\).

The main contributions of this work can be summarized as follows:

  • Root-LDPC codes for block-fading channels including structured, unstructured, controlled doping and RA designs are developed.

  • New PEG-based algorithms for several root-LDPC code structures are presented.

  • A comprehensive simulation study of root-LDPC codes and design algorithms is detailed.

The rest of this paper is organized as follows. In Section 2, we describe the system model. In Section 3, we discuss the prior and related works on the design of root-LDPC codes and their structure. In Section 4, the proposed PEG-based quasi-cyclic root-LDPC codes, irregular repeat-accumulate root-LDPC codes and controlled doping root-LDPC codes and their structure are presented. In Section 5, a discussion of which a root-LDPC code is more appropriate for a specific scenario is provided. In Section 6, the simulation results are shown, while Section 7 concludes the paper.

2 System model

Consider a block-fading channel, where F is the number of independent fading blocks per codeword of length N. Following [8], the tth received symbol is given by:

$$ r_{t} = h_{f}s_{t}+n_{g_{t}}, $$
((1))

where 1≤tN, 1≤fF, f and t are related by \(f=\lceil F\frac {t}{N}\rceil \), where ϕ returns the smallest integer not smaller than ϕ, h f is the real Rayleigh fading coefficient of the fth block, s t is the transmitted signal, and \(n_{g_{t}}\) is additive white Gaussian noise with zero mean and variance N 0/2. In this paper, we assume that the transmitted symbols s t are binary phase shift keying (BPSK) modulated. We assume that the receiver has perfect channel state information and that the SNR is defined as E b /N 0, where E b is the energy per information bit. The information transmission rate is R=K/N, where K is the number of information bits per codeword of length N. For the case of a block-fading channel, we consider R=1/F, since then it is possible to design a practical diversity achieving code [8]. The performance of a communication system in a non-ergodic block-fading channel can be investigated by means of the outage probability [4], which is defined as:

$$ P_{\mathit{out}} = {\mathcal{P}}({\mathcal{I}} < R), $$
((2))

where \({\mathcal {P}}(\phi)\) is the probability of event ϕ and \(\mathcal {I}\) is the mutual information. The mutual information I G , for Gaussian channel inputs is [8]:

$$ I_{G}=\frac{1}{F} \sum_{f=1}^{F} \frac{1}{2}\log_{2} \left(1 + 2R\frac{E_{b}}{N_{0}}{h_{f}^{2}}\right), $$
((3))

so that an outage occurs when the average mutual information among blocks is smaller than the attempted information transmission rate.

3 Root-LDPC codes

Root-LDPC codes are those which use the graph structure comprising special root-check nodes to ensure full diversity on the block fading channel with greatest possible code rate. These root-checks offer connection from each information node in the graph to the parity bits affected by fading coefficients distinct from that affecting the information node in question. Thus, the information node can be recovered provided at least one fading coefficient is large enough. Since for each information node there is a root-check node for all other fading coefficients, the root-checks appear as identity matrices in the parity-check matrix of the root-LDPC codes. The properties offered by the root-check node structure are full single-iteration convergence on the noise-free block binary erasure channel and thus full diversity performance on the block fading channel of (1) [7].

In this section, the parity check matrix of the most relevant root-LDPC codes are discussed. The number of fadings considered are F=2,3 and 4 which correspond to code rates \(R = \frac {1}{2}, \frac {1}{3}\) and \(\frac {1}{4}\).

3.1 Random root-LDPC codes

Here, we will introduce some definitions and the notation adopted in this work. The binary LDPC code in systematic form is specified by its parity-check matrix H:

$$ \mathbf{H} = \left[\mathbf{I}_{N-K}\; \mathbf{P}\right], $$
((4))

where I NK is the identity matrix of size (N-K) and P is an (N-K)-by-K matrix. Then the generator matrix for the code is:

$$ \mathbf{G} = \left[\mathbf{P}^{T}\; \mathbf{I}_{K}\right], $$
((5))

where (·)T refers to the transpose operation.

The variable node degree sequence D s is defined to be the set of column weights of H as designed and is prescribed by the variable node degree distribution λ(x) as described in [22]. Moreover, D s is arranged in non-decreasing order. The first proposed root-LDPC codes were devised by Boutros et al. in [7]. Therefore, the general structure of the parity-check matrix for a random root-LDPC code for F=2 can be defined as

$$ \begin{aligned} &\qquad\qquad\quad1i\quad 2i \quad1p \quad2p\\ &\mathbf{H} = \begin{array}{c} 1c\\ 2c \end{array} \left(\begin{array}{cccc} \mathbf{I} & \mathbf{H}_{2i} & \mathbf{0} & \mathbf{H}_{2p}\\ \mathbf{H}_{1i} & \mathbf{I} & \mathbf{H}_{1p} & \mathbf{0} \end{array}\right), \end{aligned} $$
((6))

where the nodes (1i and 2i) represent the information symbols that are sent over two independent fadings, the same happens to nodes (1p and 2p) which are the parity symbols; (1c and 2c) are the check nodes. In the parity-check matrix H, there are eight sub-matrices of size \(\frac {N}{4} \times \frac {N}{4}\). I is an identity sub-matrix, 0 is a null sub-matrix, H 1i and H 2i are sub-matrices of Hamming weight 2 connected to the information symbols, H 1p and H 2p are also sub-matrices of Hamming weight 3 connected to the parity symbols. In a similar fashion, it can be devised for the case of F=3 as stated in [7].

3.2 Quasi-cyclic root-LDPC codes

Following the idea of Boutros et al. in [7], Li and Salehi in [8] devised a quasi-cyclic root-LDPC codes. The parity-check matrix H of a QC-LDPC code can be defined as [23]:

$$ \begin{aligned} \mathbf{H} = \left[ \begin{array}{cccc} \mathbf{H}_{0,0} & \mathbf{H}_{0,1} & \cdots & \mathbf{H}_{0,w-1} \\ \mathbf{H}_{1,0} & \mathbf{H}_{1,1} & \cdots & \mathbf{H}_{0,w-1} \\ \vdots & \vdots & \ddots & \vdots \\ \mathbf{H}_{c-1,0} & \mathbf{H}_{c-1,1} & \cdots & \mathbf{H}_{c-1,w-1} \\ \end{array}\right], \end{aligned} $$
((7))

where H ij is an n×n circulant or all-zeros matrix, and c and w are two positive integers with c<w. The null space of H gives a QC-LDPC code over G F(2) of length N=w n. The rank of H is at most cn. Hence the code rate is at least \(\frac {w-c}{w}\).

For the case of quasi-cyclic root-LDPC codes the parity-check matrix follows the same idea as (6), although the sub-matrices become a set of quasi-cyclic matrices. Consequently, I becomes

$$ \begin{aligned} \mathbf{I}_{\mathrm{(top-left)}} = \left| \begin{array}{cccc} \mathbf{I}_{0,0} & \mathbf{0} & \mathbf{0} & \mathbf{0} \\ \mathbf{0} & \mathbf{I}_{1,1} & \mathbf{0} & \mathbf{0} \\ \mathbf{0} & \mathbf{0} & \mathbf{I}_{2,2} & \mathbf{0} \\ \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{I}_{3,3} \end{array}\right|, \end{aligned} $$
((8))

H 1i as

$$ \begin{aligned} \mathbf{H}_{1i} = \left| \begin{array}{cccc} \mathbf{I}_{4,0} & \mathbf{I}_{4,1} & \mathbf{0} & \mathbf{0} \\ \mathbf{0} & \mathbf{I}_{5,1} & \mathbf{I}_{5,2} & \mathbf{0} \\ \mathbf{0} & \mathbf{0} & \mathbf{I}_{6,2} & \mathbf{I}_{6,3} \\ \mathbf{I}_{7,0} & \mathbf{0} & \mathbf{0} & \mathbf{I}_{7,3} \end{array}\right| \end{aligned} $$
((9))

and for H 1p we define it as

$$ \begin{aligned} \mathbf{H}_{1p} = \left| \begin{array}{cccc} \mathbf{0} & \mathbf{I}_{4,5} & \mathbf{I}_{4,6} & \mathbf{I}_{4,7} \\ \mathbf{I}_{5,4} & \mathbf{0} & \mathbf{I}_{5,6} & \mathbf{I}_{5,7} \\ \mathbf{I}_{6,4} & \mathbf{I}_{6,5} & \mathbf{0} & \mathbf{I}_{6,7} \\ \mathbf{I}_{7,4} & \mathbf{I}_{7,5} & \mathbf{I}_{7,6} & \mathbf{0} \end{array}\right|, \end{aligned} $$
((10))

where each I i,j is a circulant permutation matrix, a circulant matrix with row and column weights 1. Each 0 is a null matrix. The matrix H 2i is similarly formed of tiled circulant permutation matrices with random cyclic shift and constrained random placement of the non-null matrices to achieve the required column and row weights. The matrix H 2p has the same form as (10) in order that the parity part of the matrix has full rank, but with distinct random cyclic shifts [8]. The example presented in Eqs. (8), (9) and (10) are for a regular QC-root-LDPC code C(3,6). QC-root-LDPC codes were proposed with the aim of providing fast encoding and to save memory to store the generator matrix. Li and Salehi in [8] have shown that the QC-LDPC codes can perform as well as randomly generated root-LDPC codes [7] over block-fading channels.

3.3 Unstructured full-diversity LDPC codes

Duyck et al. in [11] proposed the design of random LDPC codes which are able to achieve full diversity in block-fading channels with F=2 fading. The principle proposed in [11] is to allow a small reduction in coding rate in order to produce random codes that may achieve the diversity of the channel, i.e. the error rate achieved by the code behaves as \(\frac {1}{SNR^{2}}\). However, as these codes achieve the desired error rate performance but do not have the maximal rate allowed by the Singleton bound, they may be called full-diversity codes but not blockwise maximum-distance separable (MDS) codes [24]. Specifically, the codes of [11] place the requirements that the nodes associated with the information bits have weight d v =2 and do not participate in any stopping sets. The code rate is R0.5.

The design of such LDPC codes was achieved by requiring that the number of check nodes in the graph be greater than \(\frac {N}{2}\), i.e. that the rate be less than \(\frac {1}{2}\), and that the weight of the first \(\frac {N}{2}\) variable nodes is 2 and that the graph be constructed by the PEG algorithm [25], which maximizes cycle length at each placement, ensuring under these conditions no cycles in the sub-graph comprised of the first \(\frac {N}{2}\) variable nodes alone. The requirement of recoverability for the worst-case scenario is equivalent to the requirement that no information variable node v inf V inf , affected by α 1, is an element of any stopping set found among the variable nodes V 1{V 2V 3V F }V i . This requirement must hold for all i=2,,F for the information variable nodes to be recoverable on the block binary erasure channel and thus for the code to achieve full diversity on the block fading channel. The parity-check matrix for this general case, with variable node subset labels and the corresponding fading coefficients are given in Fig. 1.

Fig. 1
figure 1

Parity-check matrix unstructured general case. Parity-check matrix for the general case

3.3.1 Unstructured full-diversity rate \(\frac {1}{3}\)

In (11), a code graph is shown for the case of F=3 fading per codeword [12] by means of imposing null matrices on the parity-check matrix, along with restrictions on the cycles present in the sub-graphs of the code. The structured matrices \(\left [\mathbf {H}_{\alpha,1} \mathbf {H}_{\alpha _{2}}\right ]\) and \(\left [\mathbf {H}_{\alpha,2} \mathbf {H}_{\alpha _{3}}\right ]\) must be constructed by the PEG algorithm, as in [11], ensuring the extrinsic connections to V 2 and V 3, respectively. The constraints on the code sub-graphs result in the variable nodes of V 1 having weight 4. The distribution of the nodes in V 2 and V 3 is unconstrained and may be irregular. In addition to this weight constraint, each of the sub-matrices \(\left [\mathbf {H}_{\alpha,1} \mathbf {H}_{\alpha _{2}}\right ]\) and \(\left [\mathbf {H}_{\alpha,2} \mathbf {H}_{\alpha _{3}}\right ]\) are constrained to have a rate less than \(\frac {1}{2}\), and so the final graph will have a rate less than \(\frac {1}{3}\).

$$ \begin{aligned} &\qquad\qquad\quad\!\alpha_{1} \quad\,\,\alpha_{2} \quad\alpha_{3} \\ &\mathbf{H}_{BF3} = \left[ \begin{array}{ccc} \mathbf{H}_{\alpha_{1},1} & \mathbf{H}_{\alpha_{2}} & \mathbf{0} \\ \mathbf{H}_{\alpha_{1},2} & \mathbf{0} & \mathbf{H}_{\alpha_{3}} \end{array}\right] \end{aligned} $$
((11))

3.3.2 Unstructured full-diversity rate \(\frac {1}{4}\)

The code graph achieving the requirements on stopping sets among V 1,,V 4 containing information variable nodes is presented in (12) [12]. We can see that with each additional fading coefficient considered, a straightforward graph expansion is carried out, effectively nesting the F−1 diversity achieving graph in the code capable of full-diversity performance on the channel with F fading coefficients.

$$ \begin{aligned} &\qquad\qquad\quad\alpha_{1} \quad\,\,\alpha_{2} \quad\alpha_{3} \quad\,\alpha_{4} \\ &\mathbf{H}_{BF4} = \left[ \begin{array}{cccc} \mathbf{H}_{\alpha_{1},1} & \mathbf{H}_{\alpha_{2}} & \mathbf{0} & \mathbf{0} \\ \mathbf{H}_{\alpha_{1},2} & \mathbf{0} & \mathbf{H}_{\alpha_{3}} & \mathbf{0} \\ \mathbf{H}_{\alpha_{1},3} & \mathbf{0} & \mathbf{0} & \mathbf{H}_{\alpha_{4}} \end{array}\right] \end{aligned} $$
((12))

4 Proposed PEG-based root-LDPC codes

In this section, the proposed PEG-based root-LDPC codes are discussed. The number of fadings considered are F=2,3 and 4 which correspond to code rates \(R = \frac {1}{2}, \frac {1}{3}\) and \(\frac {1}{4}\).

4.1 QC PEG-based root-LDPC codes

Preliminary results on the design of a PEG-based quasi-cyclic root-LDPC codes for block-fading channel with F=3,4 fadings per codeword were presented by Uchoa et al. in [14]. The codes generated by this strategy can achieve a significant performance in terms of FER with respect to the theoretical limit. These codes can save up to 3 dB in terms of signal to noise ratio to achieve the same FER when compared to other codes.

A root-LDPC code requires a designer to divide both variable and check nodes in F equal parts. Following the root-check-based structure reported in [7], the parity-check matrix becomes:

$$ \textbf{H} = \left[\mathbf{S}_{1}\mathbf{P}_{1}, \cdots, \mathbf{S}_{F}\mathbf{P}_{F}\right], $$
((13))

where the subscripts represent the variable nodes (information and parity, respectively) under a specific fading block. The parity-check matrix of (13) can be reordered to H=[S 1,,S F P 1,,P F ], with the blocks S i associated with information nodes and the blocks P i associated with parity nodes. In order to obtain the generator matrix, the sub-matrix B formed by parity matrices P 1,,P F must be a non-singular matrix, which means it is invertible under G F(2) [8].

To design a practical code for F=3 which is able to achieve the channel diversity, the highest possible rate of such a code is \(R = \frac {1}{F}=\frac {1}{3}\). As a result, the parity-check matrix for \(R=\frac {1}{3}\) can be defined as in (14),

$${} \begin{aligned} &\qquad\quad\,\,\,1i \quad\,\,\,2i \quad\,\,3i \qquad\,\,\,1p \qquad\quad\,\,2p \qquad\quad3p \\ &\mathbf{H}\,=\, \left[ \begin{array}{ccccccccc} \mathbf{I_{0,0}} & \mathbf{H_{0,1}} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{H_{0,6}} & \mathbf{H_{0,7}} & \mathbf{H_{0,8}} \\ \mathbf{I_{1,0}} & \mathbf{0} & \mathbf{H_{1,2}} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{H_{1,7}} & \mathbf{H_{1,8}} \\ \mathbf{H_{2,0}} & \mathbf{I_{2,1}} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{H_{2,8}} \\ \mathbf{0} & \mathbf{I_{3,1}} & \mathbf{H_{3,2}} & \mathbf{H_{3,3}} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} \\ \mathbf{H_{4,0}} & \mathbf{0} & \mathbf{I_{4,2}} & \mathbf{H_{4,3}} & \mathbf{H_{4,4}} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} \\ \mathbf{0} & \mathbf{H_{5,1}} & \mathbf{I_{5,2}} & \mathbf{H_{5,3}} & \mathbf{H_{5,4}} & \mathbf{H_{5,5}} & \mathbf{0} & \mathbf{0} & \mathbf{0} \\ \end{array}\right], \end{aligned} $$
((14))

where the n×n matrices H ij are circulant matrices of column and row weight as required by the degree distribution of the code, I ij are n×n circulant permutation matrices, while 0 is an all-zeros matrix. The notation I ij was used to reinforce that such connections are the root-check connections [7]. The restrictions that should be imposed are only the I ij to be placed in the positions described in (14) and the upper and down triangular sub-matrices in the parity part, B, of H. In order to perform a PEG-based design, the only restriction imposed is that the sub-matrices I ij and the upper and down sub-matrices of (14) are kept. The other sub-matrices can be placed following a quasi-cyclic PEG-based algorithm.

The parity-check matrix for F=4 with code rate \(R=\frac {1}{4}\) is structured similarly to (14), and the same restrictions may be imposed to the design to construct a PEG-based QC-root-LDPC code for this scenario.

4.1.1 Proposed design algorithm

Here, we introduce some definitions and notations. Then, we present the pseudo-code of our proposed algorithm for PEG-based quasi-cyclic root-LDPC codes. The block-fading channels with F=3 and F=4 are considered. In extending to a greater number of fadings, F>4, the general structure presented is maintained, with the information variable nodes for each fading possessing root-check identity matrices connecting to parity variable nodes in each of the other fading blocks only, ensuring the upper and lower triangular sections of parity bits observed in (14). The placement of the remaining cyclic sub-matrices is required to maintain this relationship and provide satisfactory final code degree distribution. The LDPC code is specified by its sparse parity-check matrix H=[A | B], where A is a matrix of size M-by-K, and B is an M-by-M matrix. The generator matrix for the code is G=[(B −1 A)T | I K ], I K is an identity matrix of size K.

The variable node degree sequence D s is defined as the set of column weights of the designed H and is prescribed by the variable node degree distribution λ(x) as described in [22]. Moreover, D s is arranged in a non-decreasing order. The proposed algorithm, called QC-PEG root-LDPC, constructs H by operating progressively on variable nodes to place the edges required by D s . The variable node of interest is labelled v j and the candidate check nodes are individually referred to as c i . The PEG root-LDPC algorithm chooses a check node c i to connect to the variable node of interest v j by expanding a constrained sub-graph from v j up to maximum depth l. The set of check nodes found in this sub-graph are denoted \(N_{v_{j}}^{l}\) while the set of check nodes of interest, those not currently found in the sub-graph, are denoted \(\overline {N_{v_{j}}^{l}}\). For the QC-PEG root-LDPC algorithm, a check node is chosen at random from the minimum weight check nodes of this set.

To impose the root-LDPC structure, it is necessary simply to initialize the graph with root-check connections, which appear as the identity matrices in the parity-check matrix of the code, and to ensure no additional edge placement is made either in the identity matrices or the null matrices specified by the root-LDPC structure. This is achieved in the PEG algorithm by modification of the indicator vector presented in [10]. Zeros in the indicator vectors, as presented in the following section, exclude check nodes from the expanded tree of the PEG algorithms and this exclude edge placement connecting to those check nodes.

4.1.2 Pseudo-code for the QC-PEG-root-LDPC algorithm

Initialization: A matrix of size M×N is created with the circulant permutation matrices I i,j in the positions shown in (14) and zeros in all other positions. We define the indicator vectors \({\mathbf {z}}_{1}, \cdots, {\mathbf {z}}_{F^{2}}\phantom {\dot {i}\!}\) for the \(R = \frac {1}{3}\) case as:

$$\begin{array}{@{}rcl@{}} {\mathbf{z}}_{1} & = & \left[\mathbf{0}_{1 \times \frac{2N}{9}}, \mathbf{1}_{1 \times \frac{N}{9}}, \mathbf{0}_{1 \times \frac{N}{9}}, \mathbf{1}_{1 \times \frac{N}{9}}, \mathbf{0}_{1 \times \frac{N}{9}}\right]^{T},\\ {\mathbf{z}}_{2} & = & \left[\mathbf{1}_{1 \times \frac{N}{9}}, \mathbf{0}_{1 \times \frac{4N}{9}}, \mathbf{1}_{1 \times \frac{N}{9}}\right]^{T},\\ {\mathbf{z}}_{3} & = & \left[\mathbf{0}_{1 \times \frac{N}{9}}, \mathbf{1}_{1 \times \frac{N}{9}}, \mathbf{0}_{1 \times \frac{N}{9}}, \mathbf{1}_{1 \times \frac{N}{9}}, \mathbf{0}_{1 \times \frac{2N}{9}}\right]^{T},\\ {\mathbf{z}}_{\chi} & = & \left[\mathbf{0}_{1 \times \frac{(i-1) \cdot N}{9}}, \mathbf{1}_{1 \times \frac{(7-i)N}{9}}\right]^{T}~~ \text{for} ~ \chi = 4,5,6, \\ {\mathbf{z}}_{\gamma} & = & \left[\mathbf{1}_{1 \times \frac{(i-6) \cdot N}{9}}, \mathbf{0}_{1 \times \frac{(12-i)N}{9}}\right]^{T}~~ \text{for} ~ \gamma = 7,8,9, \\ \end{array} $$
((15))

The indicator vectors for the construction of the QC-PEG-root-LDPC code with \(R = \frac {1}{4}\) designed similarly to (14) but for the channel with F=4 are:

$$\begin{array}{@{}rcl@{}} {\mathbf{z}}_{1} & = & \left[\mathbf{0}_{1 \times \frac{3N}{16}}, \mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}}, \mathbf{1}_{1 \times \frac{2N}{16}}, \mathbf{0}_{1 \times \frac{2N}{16}},\right. \\ & &\left. ~~~ \mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}}, \mathbf{1}_{1 \times \frac{N}{16}}\right]^{T},\\ {\mathbf{z}}_{2} & = & \left[\mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}}, \mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{4N}{16}}, \mathbf{1}_{1 \times \frac{N}{16}},\right. \\ & &\left. ~~~ \mathbf{0}_{1 \times \frac{2N}{16}}, \mathbf{1}_{1 \times \frac{2N}{16}},\right]^{T},\\ {\mathbf{z}}_{3} & = & \left[\mathbf{0}_{1 \times \frac{N}{16}}, \mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}}, \mathbf{1}_{1 \times \frac{2N}{16}}, \mathbf{0}_{1 \times \frac{4N}{16}},\right. \\ & &\left. ~~~ \mathbf{1}_{1 \times \frac{2N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}}\right]^{T},\\ {\mathbf{z}}_{4} & = & \left[\mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}}, \mathbf{1}_{1 \times \frac{2N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}}, \mathbf{1}_{1 \times \frac{N}{16}},\right. \\ & &\left. ~~~ \mathbf{0}_{1 \times \frac{2N}{16}}, \mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{3N}{16}},\right]^{T},\\ {\mathbf{z}}_{\chi} & = & \left[\mathbf{0}_{1 \times \frac{(i+1)N}{16}}, \mathbf{v}_{ALT}{\scriptstyle(0:\frac{(11-i)N}{16} - 1)}\right]^{T}\\ & & ~~~ \text{for} ~ \chi = 5,\cdots,10,\\ {\mathbf{z}}_{\gamma} & = & \left[\mathbf{v}_{ALT}{\scriptstyle(\frac{(17-i)N}{16}:\frac{7N}{16}-1)}, \mathbf{0}_{1 \times \frac{(22-i)N}{16}}\right]^{T}\\ & & ~~~ \text{for} ~ \gamma = 11,\cdots,16,\\ \end{array} $$
((16))
$${} {\mathbf{v}}_{ALT} = \left[\mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}},\mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}},\mathbf{1}_{1 \times \frac{N}{16}}, \mathbf{0}_{1 \times \frac{N}{16}},\mathbf{1}_{1 \times \frac{N}{16}}\right] $$
((17))

These indicator vectors are modelled on that of the original PEG algorithm [25], indicating submatrices for which placement is permitted, thus imposing the required form. The degree sequence as defined for LDPC codes must be altered to take into account the structure imposed by root-LDPC codes, namely the circulant permutation matrices, I i,j , of (14) and similarly the structure defined by (16). The pseudo-code for our proposed QC-PEG root-LDPC algorithm is detailed in Algorithm 1, where the indicator vector, z i , is taken from (15), (16) for constructing codes of rate \(R=\frac {1}{3}\), \(R=\frac {1}{4}\), respectively.

4.2 RA-based root-LDPC codes

Preliminary results on the PEG-based design of irregular repeat-accumulate (IRA) LDPC codes [26] with root-check properties were reported in [15]. We considered a block-fading channel with F=2 and F=3. Here, in this section, we synthesize the most relevant information on the design of IRA root-LDPC codes.

A repeat-accumulate (RA) code consists of a serial concatenation, through an interleaver, of a single rate 1/q repetition code with an accumulator having transfer function \(\frac {1}{1+D}\), where q is the number of repetitions for each group of K information bits. Figure 2 shows a typical repeat-accumulate code block diagram. The implementation of the transfer function \(\frac {1}{1+D}\) is identical to an accumulator, although the accumulator value can be only 0 or 1 since the operations are over the binary field ([27] pp. 267–279). As discussed in ([27] pp. 267–279), to ensure a large minimum Hamming distance, the interleaver should be designed so that consecutive 1s at its input are widely separated at its output. The RA-based codes proposed in [15] were systematic. The main limitation of RA codes on Gaussian channels is the code rate, which cannot be higher than \(\frac {1}{2}\). This limitation is not relevant for block-fading channels as the rate is constrained to be \(R \leq \frac {1}{2}\) in order to achieve a diversity order greater than or equal to 2.

Fig. 2
figure 2

RA code block diagram. A systematic repeat-accumulate code block diagram, where K is the number of information bits and p denotes the parity bits

Irregular repeat-accumulate (IRA) codes generalize the concept of RA codes by changing the repetition rate for each group of K information bits and performing a linear combination of the repeated bits which are sent through the accumulator. Furthermore, IRA codes are typically systematic. IRA codes allow flexibility in the choice of the repetition rate for each information bit so that high-rate codes may be designed. Their irregularity allows operation closer to the capacity limit ([27] pp. 267–279).

The parity-check matrix for a systematic RA and IRA codes has the form H=[H u H p ], where H p is a square dual-diagonal matrix given by

$$ \begin{aligned} \mathbf{H}_{p} = \left[ \begin{array}{ccccc} 1 & & & & \\ 1 & 1 & & & \\ & \ddots & \ddots & &\\ & & 1 & 1 & \\ & & & 1 & 1\\ \end{array}\right]. \end{aligned} $$
((18))

For RA codes, H u is a regular matrix having column weight q and row weight 1. For IRA codes, H u has irregular columns and rows weights. The generator matrix (GM) can be obtained as \(\mathbf {G} = \left [\mathbf {I}_{K}~\mathbf {H}_{u}^{T}\mathbf {H}_{p}^{-T}\right ]\), where I K is an identity matrix of dimension K×K, and the matrix \(\mathbf {H}_{p}^{-T}\) is the well-known inverse transpose of (18).

4.2.1 IRA root-LDPC rate \(\frac {1}{2}\)

The design of a root-LDPC code with an IRA structure imposes some constraints in terms of parity-check matrix to guarantee the root-check properties. Following the notation adopted in [28], for the case of a systematic rate \(\frac {1}{2}\) with F=2, the parity-check matrix must be like

$$ \begin{aligned} \mathbf{H}= \left[ \begin{array}{cccc} \mathbf{I}_{\frac{N}{4}} & \mathbf{H}_{2} & \mathbf{0}_{\frac{N}{4}} & \mathbf{H}_{3}\\ \mathbf{H}_{2} & \mathbf{I}_{\frac{N}{4}} & \mathbf{H}_{3} & \mathbf{0}_{\frac{N}{4}}\\ \end{array}\right], \end{aligned} $$
((19))

where H 2 and H 3 are \(\frac {N}{4}\times \frac {N}{4}\) sub-matrices with Hamming weight two and three, respectively, while \(\mathbf {0}_{\frac {N}{4}}\) is a null sub-matrix with dimension \(\frac {N}{4}\times \frac {N}{4}\). Therefore, to impose the RA structure and root-check properties the parity-check matrix of an IRA root-LDPC is

$$ \begin{aligned} \mathbf{H}= \left[ \begin{array}{cccc} \mathbf{I}_{\frac{N}{4}} & \mathbf{H}_{2} & \mathbf{0}_{\frac{N}{4}} & \mathbf{H}_{p}\\ \mathbf{H}_{2} & \mathbf{I}_{\frac{N}{4}} & \mathbf{H}_{p} & \mathbf{0}_{\frac{N}{4}}\\ \end{array}\right], \end{aligned} $$
((20))

where H p is a dual diagonal matrix with dimension \(\frac {N}{4}\times \frac {N}{4}\).

4.2.2 IRA root-LDPC rate \(\frac {1}{3}\)

For the case of rate \(\frac {1}{3}\) with F=3, we followed a similar structure to the one adopted in [7, 14]. The accumulator used is a transfer function given by \(\frac {1}{1+D+D^{\frac {N}{9}}}\) as suggested by [29] for the Gaussian channel, and used here to improve coding gain by allowing a more complete connection between the parity bits and the root-check identity matrix through H p . As a result of the root-check structure of the graph where each root-check identity matrix must connect through a matrix of size \(\frac {N}{9}\times \frac {2N}{9}\) to a set of parity bits affected by some other fading coefficient, H p must be redefined as

$$ \begin{aligned} \mathbf{H}_{p} = \left[ \begin{array}{c} \mathbf{H}_{p1} \\ \mathbf{H}_{p2} \end{array}\right], \end{aligned} $$
((21))
$$ \begin{aligned} \mathbf{H}_{p1} = \left[ \begin{array}{cccccccc} 1 & 0 & \cdots & \cdots & \cdots & \cdots & \cdots & 0\\ 1 & 1 & 0 & \ddots & \ddots & \ddots & \ddots & 0\\ \vdots & \ddots & \ddots & 0 & \ddots & \ddots & \ddots & 0\\ 0 & 0 & 1 & 1 & 0 & 0 & 0 & 0 \end{array}\right], \end{aligned} $$
((22))
$$ \begin{aligned} \mathbf{H}_{p2} = \left[ \begin{array}{cccccccc} 1 & 0 & \cdots & 0 & 1 & 0 & \cdots & 0\\ 0 & \ddots & 0 & 0 & 1 & 1 & 0 & 0\\ \vdots & 0 & \ddots & 0 & 0 & \ddots & \ddots & 0\\ 0 & 0 & 0 & 1 & 0 & 0 & 1 & 1 \end{array}\right], \end{aligned} $$
((23))

where H p1 and H p2 are sub-matrices with dimensions \(\frac {N}{9}\times \frac {2N}{9}\). Therefore, the parity-check matrix H=[H u |H p ] for this particular case of an IRA root-LDPC rate \(\frac {1}{3}\) as

$$ \begin{aligned} \mathbf{H}= \left[ \begin{array}{ccccccc} \mathbf{I}_{\frac{N}{9}} & \mathbf{H}_{1} & \mathbf{0}_{\frac{N}{9}} & \vert & \mathbf{0} & \mathbf{H}_{p2} & \mathbf{0}\\ \mathbf{I}_{\frac{N}{9}} & \mathbf{0}_{\frac{N}{9}} & \mathbf{H}_{1} & \vert & \mathbf{0} & \mathbf{0} & \mathbf{H}_{p1}\\ \mathbf{H}_{1} & \mathbf{I}_{\frac{N}{9}} & \mathbf{0}_{\frac{N}{9}} & \vert & \mathbf{H}_{p1} & \mathbf{0} & \mathbf{0}\\ \mathbf{0}_{\frac{N}{9}} & \mathbf{I}_{\frac{N}{9}} & \mathbf{H}_{1} & \vert & \mathbf{0} & \mathbf{0} & \mathbf{H}_{p2}\\ \mathbf{H}_{1} & \mathbf{0}_{\frac{N}{9}} & \mathbf{I}_{\frac{N}{9}} & \vert & \mathbf{H}_{p2} & \mathbf{0} & \mathbf{0}\\ \mathbf{0}_{\frac{N}{9}} & \mathbf{H}_{1} & \mathbf{I}_{\frac{N}{9}} & \vert & \mathbf{0} & \mathbf{H}_{p1} & \mathbf{0}\\ \end{array}\right], \end{aligned} $$
((24))

where H 1 and \(\mathbf {I}_{\frac {N}{9}}\) are sub-matrices with dimensions \(\frac {N}{9}\times \frac {N}{9}\) and H 1 is a sub-matrix with Hamming weight equal to 1. The null sub-matrices 0 on the right-hand side of (24) have dimensions \(\frac {N}{9}\times \frac {2N}{9}\) while on the left-hand side the dimensions are \(\frac {N}{9}\times \frac {N}{9}\).

4.3 IRAA root-LDPC design

The general structure of an irregular repeat-accumulate and accumulate (IRAA) encoder can be seen in Fig. 3. In this figure, some b extra parity bits are indicated in addition to the normal p parity bits. The b parity bits can be punctured to obtain a higher code rate. For instance, in general an IRAA code has rate 1/3 without puncturing, while by puncturing b parity-checks a code with rate 1/2 can be obtained.

Fig. 3
figure 3

IRAA code block diagram. A systematic irregular repeat-accumulate and accumulate code block diagram. Where K are the information bits, b and p are the parity bits

The parity-check matrix of an IRAA LDPC code can be represented by

$$ \begin{aligned} \mathbf{H} = \left[ \begin{array}{ccc} \mathbf{H}_{u} & \mathbf{H}_{p} & \mathbf{0}\\ \mathbf{0} & \prod_{1} & \mathbf{H}_{p}\\ \end{array}\right], \end{aligned} $$
((25))

where \(\prod _{1}\) must be a sub-matrix with rows and columns with Hamming weight one.

In order to obtain IRAA root-LDPC codes some constraints must be imposed on the standard IRAA design. We have noticed that the IRAA root-LDPC codes led to a more flexible rate compatible code. For further details refer to [15].

4.3.1 IRAA root-LDPC rate \(\frac {1}{2}\)

We applied the root-check structure from (20) in (25) to obtain the following parity-check matrix for rate 1/2

$$ \begin{aligned} \mathbf{H} = \left[ \begin{array}{cccccc} \mathbf{I}_{\frac{N}{9}} & \mathbf{H}_{2} & \mathbf{0}_{\frac{N}{9}} & \mathbf{H}_{p} & \mathbf{0} & \mathbf{0}_{\frac{N}{9}}\\ \mathbf{H}_{2} & \mathbf{I}_{\frac{N}{9}} & \mathbf{H}_{p} & \mathbf{0}_{\frac{N}{9}} & \mathbf{0}_{\frac{N}{9}} & \mathbf{0}_{\frac{N}{9}}\\ \mathbf{0}_{\frac{N}{9}} & \mathbf{0}_{\frac{N}{9}} &&& \mathbf{0}_{\frac{N}{9}} & \mathbf{H}_{p}\\[-5.9pt] & &&\!\!\!\!\!\!\!\!\!\!\! {\prod_{1}} & &\\[-5.9pt] \mathbf{0}_{\frac{N}{9}} & \mathbf{0}_{\frac{N}{9}} & & & \mathbf{H}_{p} & \mathbf{0}_{\frac{N}{9}}\\ \end{array} \right], \end{aligned} $$
((26))

where \(\mathbf {I}_{\frac {N}{9}}\), H 2, H p and \(\mathbf {0}_{\frac {N}{9}}\) are all \(\frac {N}{9}\times \frac {N}{9}\) in dimension, while \(\prod _{1}\) is \(\frac {N}{3}\times \frac {N}{3}\). The key point to guarantee the full-diversity property is the puncturing procedure. Instead of puncturing b parity bits, we have punctured p. The reason why puncturing p instead of b guarantees the full diversity is due to the fact that the root-check structure of the code is kept unchanged.

4.3.2 IRAA root-LDPC rate \(\frac {1}{3}\)

For the case of rate 1/3, we considered the design done in (24) and we apply the constraints in (25) to obtain the following parity-check matrix

$$ \mathbf{H} = \left[ \begin{array}{cccc} \mathbf{H}_{u} & \vert & \mathbf{H}_{p} & \mathbf{0}\\ \mathbf{0} & \vert & \prod_{1} & \mathbf{H}_{p}\\ \end{array}\right]. $$
((27))

It must be noted that without puncturing the code rate is 1/5.

4.3.3 Pseudo-code for the IRA-PEG root-LDPC algorithm

Initialization: A matrix of size M×N is created with the identity matrices I K and parity matrices H p in the positions shown in (20), (24), (26), (27) and zeros in all other positions. We define the indicator vectors z 1,,z F for the cases \(R = \frac {1}{2}\), \(R = \frac {1}{3}\) respectively as:

$${\kern19pt} \begin{aligned} {\mathbf{z}}_{1} & = \left[\mathbf{0}_{1 \times \gamma}, \mathbf{1}_{1 \times \gamma}\right]^{T},\\ {\mathbf{z}}_{2} & = \left[\mathbf{1}_{1 \times \gamma}, \mathbf{0}_{1 \times \gamma}\right]^{T}, \end{aligned} $$
((28))
$$\begin{array}{@{}rcl@{}} {\mathbf{z}}_{1} & = & \left[\mathbf{0}_{1 \times 2\chi}, \mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times \chi}, \mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times \chi}\right]^{T},\\ {\mathbf{z}}_{2} & = & \left[\mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times 4\chi}, \mathbf{1}_{1 \times \chi}\right]^{T},\\ {\mathbf{z}}_{3} & = & \left[\mathbf{0}_{1 \times \chi}, \mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times \chi}, \mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times 2\chi}\right]^{T}, \end{array} $$
((29))

where \(\gamma = \frac {N}{2}\) for the case of IRA, while for IRAA design \(\gamma = \frac {N}{4}\). We have \(\chi = \frac {N}{9}\) for the case of IRA, while for IRAA design \(\chi = \frac {N}{15}\). In addition, for rate \(R = \frac {1}{2}\) under IRAA design z i =[z i ,0 γ ], while for rate \(R = \frac {1}{3}\) under IRAA design z i =[z i ,0 χ ].

These indicator vectors are modelled on that of the original PEG algorithm [25], indicating sub-matrices for which placement is permitted, thus imposing the form of (20), (24), (26), (27). The degree sequence as defined for LDPC codes must be altered to take into account the structure imposed by root-LDPC codes, namely, the identity matrices I K and the parity matrices H p , of (20), (24), (26) and (27). The pseudo-code for our proposed IRA-PEG root-LDPC algorithm is detailed in Algorithm 2, where the indicator vector z i is taken from (28) and (29) for constructing codes of rate \(R=\frac {1}{2}\), \(R=\frac {1}{3}\) respectively.

4.4 Controlled doping root-LDPC codes design

Boutros in [16] proposed a controlled doping via high order root-LDPC codes. Such root-LDPC codes are able to guarantee full diversity for the parity check bits. First of all, we have made some modifications in the original doped root-LDPC code parity-check matrix described in [16].

4.4.1 Controlled doping root-LDPC codes \(R = \frac {1}{2}\)

The modifications we have made was to take the advantages of easy encodability of IRA-based LDPC codes. Furthermore, a PEG-based design to improve the local girth of the generated LDPC codes was considered. Doping refers to the diversity achieved in the parity bits of the root-LDPC graph, and when incidental is called uncontrolled. Controlled doping is used to intentionally improve the energy coefficient of information bits after solving parity bits. The energy coefficients relate the error rate achieved with the messages passed in decoding, in terms of the fading coefficients to which the code word is subjected [30]. Then, the parity bit should transmit a high-confidence message to a new information bit. Diversity population evolution (DPE) is an analytic method for studying the propagation of diversity in the graph during iterative decoding of a root-LDPC code [30]. Uncontrolled doping corresponds to a DPE steady-state parameter p =7.82 % for a C(3,6) regular root-LDPC code [16]. Controlled doping can achieve a fraction p as high as 100 %. The sub-matrix (18) is modified as for the root-LDPC-III code of [16] by introducing a smaller identity matrix for the parity bits. Therefore, the root-LDPC code with 50 % of controlled doping, H p is redefined, to ensure a lower-triangular form and thus efficient encoding, as

$$ \begin{aligned} \mathbf{H}_{p} = \left[ \begin{array}{cc} \mathbf{I}_{\frac{N}{8}} & \mathbf{0}_{\frac{N}{8}} \\ \mathbf{P}_{\frac{N}{8}} & \mathbf{DD}_{\frac{N}{8}} \end{array}\right], \end{aligned} $$
((30))

where I is an identity matrix, 0 is a null matrix, P is a permutation matrix with Hamming weight 1, D D is a dual diagonal matrix and all sub-matrices of H p are \(\frac {N}{8} \times \frac {N}{8}\) in dimension. Accordingly, the final parity-check matrix becomes

((31))

where subscripts in P 1 and P 2 means that are distinct permutation sub-matrices with hamming weight 1. The sub-matrices H 1i and H 2i are in dimension \(\frac {N}{4} \times \frac {N}{4}\). P 1 and P 2 are in dimension \(\frac {N}{8} \times \frac {N}{8}\). The PEG algorithm will work through the sub-matrices H 1i and H 2i .

4.4.2 Controlled doping root-LDPC codes \(R = \frac {1}{3}\)

The parity-check matrix for the case of code rate \(R = \frac {1}{3}\) has followed a similar design as for an IRA root-LDPC code rate \(R = \frac {1}{3}\) in (24). Therefore, the parity-check matrix for the proposed PEG controlled doping root-LDPC code (PEG-CDRC LDPC) has the structure as presented in (32),

$${} \begin{aligned} \mathbf{H} = \left[ \begin{array}{cccccccccc} \mathbf{H}_{2} & \mathbf{I} & \mathbf{0} & \vert & \mathbf{I} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0}\\ \mathbf{H}_{2} & \mathbf{0} & \mathbf{I} & \vert & \mathbf{P}_{1} & \mathbf{DD} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0}\\ \mathbf{I} & \mathbf{H}_{2} & \mathbf{0} & \vert & \mathbf{0} & \mathbf{0} & \mathbf{I} & \mathbf{0} & \mathbf{0} & \mathbf{0}\\ \mathbf{0} & \mathbf{H}_{2} & \mathbf{I} & \vert & \mathbf{0} & \mathbf{0} & \mathbf{P}_{2} & \mathbf{DD} & \mathbf{0} & \mathbf{0}\\ \mathbf{I} & \mathbf{0} & \mathbf{H}_{2} & \vert & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{I} & \mathbf{0}\\ \mathbf{0} & \mathbf{I} & \mathbf{H}_{2} & \vert & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{0} & \mathbf{P}_{3} & \mathbf{DD} \end{array}\right], \end{aligned} $$
((32))

where the subscripts of P i in (32) means that are distinct permutation sub-matrices. The sub-matrices of Eq. (32) are all \(\frac {N}{9} \times \frac {N}{9}\) in dimension. In addition, the left-hand side of (32) are connected to the information symbols while the right-hand side are connected to the parity check bits.

4.4.3 Controlled doping root-LDPC codes \(R = \frac {1}{4}\)

For the case of rate \(\frac {1}{4}\) with F=4, the root-LDPC code structure with controlled doping is produced by a similar expansion of the parity-check matrix as from the graph for F=2 to the graph for F=3 described above. However, in addition, we have adjusted the part of the matrix associated with the parity bits to account for the dimension requirements of the root-LDPC structure at this rate, where each of the four H p matrices have dimension \(\frac {3N}{16} \times \frac {3N}{16}\) and as such have been adjusted to take the structure of (33).

$$ \begin{aligned} \mathbf{H}_{p} = \left[ \begin{array}{ccc} \mathbf{I}_{\frac{N}{16}} & \mathbf{0}_{\frac{N}{16}} & \mathbf{0}_{\frac{N}{16}} \\ \mathbf{P}_{\frac{N}{16}} & \mathbf{I}_{\frac{N}{16}} & \mathbf{0}_{\frac{N}{16}} \\ \mathbf{P}_{\frac{N}{16}} & \mathbf{P}_{\frac{N}{16}} & \mathbf{DD}_{\frac{N}{8}} \end{array}\right], \end{aligned} $$
((33))

and the matrices I, P and D D are as defined previously for the cases of F = 2 and F = 3. Note in particular that the permutation matrices P each have distinct cyclic shifts.

4.5 Proposed design algorithm

Here, we introduce some definitions and a specific notation. Then, the construction for the proposed codes is carried out by the pseudo-code previously introduced in Algorithm 2, along with appropriate initialization and using the indicator vectors defined in the following. In this work, the scenarios of a block-fading channel with F=2, F=3 and F=4 are considered. In extending to a greater number of fadings, F>4, the general structure presented is maintained.

4.5.1 Pseudo-code for the PEG-CDRC LDPC algorithm

Initialization: A matrix of size M×N is created with the identity matrices I, dual diagonal matrices D D and parity matrices P i in the correct positions and zeros in all other positions, as shown in (31) and (32), and similarly for the code for the F=3 channel, using instead H p of (33). We define the indicator vectors z 1,,z F for the cases \(R = \frac {1}{2}\), \(R = \frac {1}{3}\) and \(R = \frac {1}{4}\) respectively as:

$${\kern15pt} \begin{aligned} {\mathbf{z}}_{1} & = \left[\mathbf{0}_{1 \times \gamma}, \mathbf{1}_{1 \times \gamma}\right]^{T},\\ {\mathbf{z}}_{2} & = \left[\mathbf{1}_{1 \times \gamma}, \mathbf{0}_{1 \times \gamma}\right]^{T}, \end{aligned} $$
((34))
$$\begin{array}{@{}rcl@{}} {}{\mathbf{z}}_{1} & = & \left[\mathbf{0}_{1 \times 2\chi}, \mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times \chi}, \mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times \chi}\right]^{T},\\ {}{\mathbf{z}}_{2} & = & \left[\mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times 4\chi}, \mathbf{1}_{1 \times \chi}\right]^{T},\\ {}{\mathbf{z}}_{3} & = & \left[\mathbf{0}_{1 \times \chi}, \mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times \chi}, \mathbf{1}_{1 \times \chi}, \mathbf{0}_{1 \times 2\chi}\right]^{T},\\ \end{array} $$
((35))
$$\begin{array}{@{}rcl@{}} {\mathbf{z}}_{1} & = & \left[\mathbf{1}_{1 \times 3\zeta}, \mathbf{0}_{1 \times 5\zeta}, \mathbf{1}_{1 \times \zeta}, \mathbf{0}_{1 \times \zeta}, \mathbf{1}_{1 \times \zeta}, \mathbf{0}_{1 \times \zeta}\right]^{T},\\ {\mathbf{z}}_{2} & = & \left[\mathbf{0}_{1 \times 3\zeta}, \mathbf{1}_{1 \times 3\zeta}, \mathbf{0}_{1 \times 2\zeta}, \mathbf{1}_{1 \times 2\zeta}, \mathbf{0}_{1 \times 2\zeta}\right]^{T},\\ {\mathbf{z}}_{3} & = & \left[\mathbf{1}_{1 \times \zeta}, \mathbf{0}_{1 \times \zeta}, \mathbf{1}_{1 \times \zeta}, \mathbf{0}_{1 \times 2\zeta}, \mathbf{1}_{1 \times 3\zeta}, \mathbf{0}_{1 \times 4\zeta}\right]^{T},\\ {\mathbf{z}}_{4} & = & \left[\mathbf{1}_{1 \times \zeta}, \mathbf{0}_{1 \times 2\zeta}, \mathbf{1}_{1 \times \zeta}, \mathbf{0}_{1 \times 5\zeta}, \mathbf{1}_{1 \times 3\zeta}\right]^{T},\\ \end{array} $$
((36))

where \(\gamma = \frac {N}{4}\), \(\chi = \frac {N}{9}\) and \(\zeta = \frac {N}{16}\).

These indicator vectors are modelled on the basis of the original PEG algorithm [25], indicating sub-matrices for which placement is permitted, thus imposing the controlled doping root-LDPC form. The degree sequence as defined for LDPC codes must be altered to take into account the structure imposed by Root-LDPC codes, namely, the identity matrices I, the permutation matrices P i , the dual diagonal matrices D D and the parity matrices H i , of (31), (32) and the multiple uses of (33). The proposed CDRC-LDPC construction algorithm is then implemented using Algorithm 2, with the parity-check matrix suitably initialised with matrices I, D D and distinct random permutation matrices P i in the appropriate positions. The indicator vectors z i are taken from (34), (35) and (36) for constructing codes of rate \(R=\frac {1}{2}\), \(R=\frac {1}{3}\) and \(R=\frac {1}{4}\) respectively.

5 Discussion

In this section, we analyse the advantages and disadvantages of different types of PEG-based root-LDPC codes discussed in the previous sections.

In terms of performance, the PEG-based root-LDPC codes are able to get closer to the outage curve than their counterpart root-LDPC codes. However, the complexity of encoding standard PEG-based root-LDPC codes can be prohibitive for some hardware implementations.

The quasi-cyclic PEG-based root-LDPC codes have the advantage of performing better than quasi-cyclic root-LDPC codes and both codes require low memory to store the parity-check matrix. Moreover, quasi-cyclic-based LDPC codes can be encoded by using simple shift registers.

RA PEG-based root-LDPC codes have the advantage of being simple to encode and also simple to design the parity-check matrix. Furthermore, the parity part of an RA-based parity-check matrix is a dual diagonal which is straightforward to obtain the generator matrix ([27] pp. 267–279). Such codes perform very close to the channel capacity which is usually upper-bounded by the outage curve. In addition, RA-based LDPC codes can provide: low complexity to encode, simplicity on the design of the parity-check matrix and low memory is required to store them. On the other hand, the main limitation of RA-based codes is the code rate, which cannot be higher than \(\frac {1}{2}\).

In the case of unstructured full-diversity LDPC codes, they draw an important path in terms of designing the parity-check matrix which avoids the constraints that must be imposed to produce root-check-based LDPC codes. Nonetheless, they require a more complex encoding process which is the same complexity as the case of random LDPC codes.

As discussed previously, the PEG-controlled doping root-LDPC codes are able to guarantee full diversity for the parity check bits. These LDPC codes are relevant for the case of IDD in MIMO systems. The results presented in [31] demonstrate how useful are PEG-CDRC LDPC codes for MIMO systems in a block-fading channel. In addition, our proposed PEG-CDRC LDPC codes have the advantage of being RA-based encodable which are simple to encode and the parity-check matrix is easily designed.

6 Simulations

The performance of the proposed PEG-based root-LDPC codes for block-fading channels with F=2, F=3 and F=4 independent fading blocks is analysed. The block length of the codes for rates \(R = \frac {1}{2}\) and \(R = \frac {1}{4}\) is N=1024 while for rate \(R = \frac {1}{3}\) the block length is N=900. Iterative message passing is employed at the decoder with a maximum of 5 iterations for rate \(R = \frac {1}{2}\) and for rates \(R = \frac {1}{3}\) and \(R = \frac {1}{4}\) a maximum of 20 iterations were used. The Gaussian outage limit in (3) is drawn in dashed line in each figure for reference.

In Fig. 4, we compare the FER performance among the proposed PEG-CDRC LDPC codes, IRA PEG root-LDPC code, IRAA PEG root-LDPC codes, QC-PEG-root-LDPC and PEG-root-LDPC, random root-LDPC and PEG-based LDPC [25] codes, all for \(R=\frac {1}{2}\). From the results, it can be noted that the proposed PEG-CDRC LDPC code, IRAA-PEG root-LDPC code and PEG-root-LDPC code achieve the same FER performance. Moreover, note that all root-check-based codes are able to achieve the full diversity order of the channel, while (non root-check based) PEG LDPC codes fail to achieve full diversity. The PEG-based root-LDPC codes outperform the PEG LDPC code by 7.5 dB at a FER between 10−2 and 10−3.

Fig. 4
figure 4

FER performance F=2. FER performance for the PEG-CDRC LDPC, IRA-PEG root-LDPC, IRAA-PEG root-LDPC, PEG-root-LDPC, random root-LDPC and PEG LDPC codes over a block-fading channel with F=2 and N=1024 bits. The maximum number of iterations is 5

In Fig. 5, we compare the FER performance between the proposed PEG-CDRC LDPC, QC-PEG-root-LDPC, IRA PEG root-LDPC code, IRAA PEG root-LDPC codes, QC-PEG LDPC codes and PEG-root-LDPC code, all for \(R=\frac {1}{3}\). From the results, it can be seen that the best performance is achieved by the proposed quasi-cyclic PEG root-LDPC code. IRA-PEG root-LDPC and IRAA-PEG root-LDPC have in average the same performance in terms of FER. The PEG-CDRC LDPC code is performing marginally worse than IRA and IRAA PEG root-check based LDPC codes. It was required to sacrifice the FER performance of the proposed PEG-CDRC LDPC codes to guarantee the full diversity of the parity check bits. Moreover, note that the proposed CDRC-LDPC code outperforms the QC-PEG LDPC code consistently across the range of FER considered, with an improvement of 2 dB below a FER of 10−3. The proposed QC-PEG-root-LDPC code outperforms the QC-PEG LDPC code by about 3.5 dB, also between a FER of 10−3 and 10−4.

Fig. 5
figure 5

FER performance F=3. FER performance for the CDRC-LDPC, QC-PEG-root-LDPC, IRA-PEG root-LDPC, IRAA-PEG root-LDPC and QC-PEG LDPC codes over a block-fading channel with F=3 and N=900 bits. The maximum number of iterations is 20

In Fig. 6, we compared the FER performance between the proposed PEG-CDRC LDPC, QC-PEG-root-LDPC codes, IRA-PEG-root-LDPC and QC-PEG LDPC codes all for \(R=\frac {1}{4}\). The codeword length is N=1024 bits. From the results, it can be noted that the proposed PEG-CDRC LDPC code outperforms the QC-PEG LDPC code by about 1.5 dB while the proposed QC-PEG-root-LDPC code outperforms the QC-PEG LDPC code by about 2.5 dB. In addition, note that only the PEG-based root-LDPC codes are able to achieve the full-diversity order of the channel. For the PEG-CDRC LDPC code, the FER of the whole code word is also included at both 20 and 100 maximum decoder iterations. Note that the whole code word error rate at 20 maximum decoder iterations is dominated by the unsatisfactory performance of the parity bits, but at the higher maximum number of decoder iterations the whole code word FER has converged to that of the information bits, demonstrating that the controlled doping has had the desired effect. Recall that the doping used leads to p =100 %, which is the percentage of variable nodes corrected after an arbitrarily large number of decoder iterations, and so this behaviour is expected from the PEG-CDRC code. Finally note that both IRA-PEG-root-LDPC and PEG-CDRC codes exhibit a loss in performance with respect to the QC-PEG-root-LDPC code. This results from the combined repeat-accumulate and root-LDPC structures found in the graphs of those codes, which offer a reduction in encoding complexity and diversity-achieving performance at the expense of reduced coding gain.

Fig. 6
figure 6

FER performance F=4. FER performance for the PEG-CDRC LDPC, QC-PEG-root-LDPC and QC-PEG LDPC codes over a block-fading channel with F=4 and N=1024 bits. The maximum number of iterations is 20

Figure 7 shows the average number of iterations required by the proposed PEG-CDRC LDPC codes, IRA PEG root-LDPC code, IRAA PEG root-LDPC codes, PEG-root-LDPC, random root-LDPC and PEG-based LDPC [25] codes, all for \(R=\frac {1}{2}\). The decoder was operated to a maximum of 5 iterations and with the zero syndrome stopping criterion in place. For the entire SNR region, in average, we can observe that the proposed PEG root-check-based LDPC codes require less decoding iterations than standard PEG LDPC code. It must be mentioned that for medium to high SNR the average required number of iterations is less than 2 iterations. The average number of iterations, less than 2 at medium to high SNR, corroborates with hardware friendly capabilities of structured LDPC codes [8].

Fig. 7
figure 7

Iterations performance comparison for F=2. Average number of required iterations for the proposed PEG-CDRC LDPC codes, IRA PEG root-LDPC code, IRAA PEG root-LDPC codes, PEG-root-LDPC, random root-LDPC and PEG-based LDPC codes with codeword length N=1024 bits over a block-fading channel with F=2. Maximum number of iterations 5

7 Conclusion

Novel PEG-based algorithms have been proposed to design controlled doping root-LDPC codes, IRA root-LDPC codes, IRAA root-LDPC codes and quasi-cyclic root-LDPC codes for F≥2 fading blocks. Based on simulations, the proposed methods were compared to non-root-LDPC codes. The results demonstrate that the root-check-based LDPC codes generated by our proposed algorithm outperform standard LDPC codes. Furthermore, for the case of rate \(R = \frac {1}{2}\) the PEG-based root-LDPC codes outperform the PEG LDPC code by about 7.5 dB. As mentioned before, the proposed PEG-CDRC LDPC codes are RA-based LDPC codes which are simple to encode and the parity-check matrix can be easily designed.

References

  1. IEEE-WLAN 802.11ad, Very high throughput 60 GHz (IEEE, New York, 2012). http://standards.ieee.org/getieee802/download/802.11ad-2012.pdf. Accessed 15 Sept 2015.

    Google Scholar 

  2. RG Gallager, Low-density parity-check codes. IRE Trans. Inform. Theory. 20, 21–28 (1962).

    Article  MathSciNet  Google Scholar 

  3. M Luby, M Mitzenmacher, A Shokrollahi, D Spielman, V Stemann, in Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing. Practical loss-resilient codes (El Paso, TX, USA, 4–6 May 1997).

  4. E Biglieri, J Proakis, S Shamai, Fading channels: information-theoretic and communications aspects. IEEE Trans. Inform. Theory. 44(6), 2619–92 (1998).

    Article  MATH  MathSciNet  Google Scholar 

  5. TS Rappaport, Wireless Communications Principles and Practice, 1st edn (Prentice-Hall, New Jersey, 1999).

    Google Scholar 

  6. LH Ozarow, S Shamai, AD Wyner, Information theoretic considerations for cellular mobile radio. IEEE Trans. Veh. Technol. 43(2), 359–78 (1994).

    Article  Google Scholar 

  7. JJ Boutros, A Guillen i Fabregas, E Biglieri, G Zemor, Low-density parity-check codes for nonergodic block-fading channels. IEEE Trans. Inform. Theory. 56(9), 4286–300 (2010).

    Article  MathSciNet  Google Scholar 

  8. Y Li, M Salehi, in Proceedings of the 44th Annual Conference on Information Sciences and Systems (CISS). Quasi-cyclic LDPC code design for block-fading channels (Princeton UniversityUSA, 17–19 March 2010).

    Google Scholar 

  9. MP Fossorier, Quasi-cyclic low-density parity-check codes from circulant permutation matrices. IEEE Trans. Inform. Theory. 50(8), 1788–93 (2004).

    Article  MATH  MathSciNet  Google Scholar 

  10. AGD Uchôa, C Healy, RC de Lamare, RD Souza, Design of LDPC codes based on progressive edge growth techniques for block fading channels. IEEE Comms. Lett. 15, 1221–3 (2011).

    Article  Google Scholar 

  11. D Duyck, JJ Boutros, M Moeneclaey, in Proceedings of the 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux. Full diversity random LDPC codes (Ghent, Belgium, 22–23 November 2011).

  12. CT Healy, RC de Lamare, in Proceedings of the Tenth International Symposium On Wireless Communication Systems. Full diversity LDPC codes with a reduced structure for general block fading channels (Ilmenau, Germany, 27–30 August 2013).

  13. AGD Uchoa, CT Healy, RC de Lamare, Iterative detection and decoding algorithms for MIMO systems in block-fading channels using LDPC codes. IEEE Trans. Veh. Technol (2015). doi:10.1109/TVT.2015.2432099.

  14. AGD Uchôa, C Healy, RC de Lamare, RD Souza, in Proceedings of the 9th IEEE International Symposium on Wireless Communication Systems. Generalised Quasi-Cyclic LDPC codes based on progressive edge growth techniques for block fading channels (Paris, France, 28–31 August 2012).

  15. Uchôa, AGD, C Healy, RC de Lamare, in Proceedings of the Tenth International Symposium On Wireless Communication Systems. Repeat accumulate based constructions for LDPC codes on fading channels (Ilmenau, Germany, 27–30 August 2013).

  16. JJ Boutros, Controlled doping via high-order rootchecks in graph codes (Paper presented at IEEE Communication Theory Workshop, Sitges, Catalonia, Spain, 2011). Available online from http://www.josephboutros.org/coding/rootLDPCdoping.pdf.

    Google Scholar 

  17. X Wang, HV Poor, Iterative (turbo) soft interference cancellation and decoding for coded CDMA. IEEE Trans. Commun. 47(7), 1046–61 (1999).

    Article  Google Scholar 

  18. RC de Lamare, R Sampaio-Neto, Minimum mean-squared error iterative successive parallel arbitrated decision feedback detectors for DS-CDMA systems. IEEE Trans. Commun. 56(5), 778–89 (2008).

    Article  MathSciNet  Google Scholar 

  19. GD Golden, CJ Foschini, RA Valenzuela, PW Wolniansky, Detection algorithm and initial laboratory results using v-blast space-time communication architecture. Electron. Lett. 35, 14–16 (1999).

    Article  Google Scholar 

  20. R Fa, RC de Lamare, Multi-branch successive interference cancellation for MIMO spatial multiplexing systems: design, analysis and adaptive implementation. IET Commun. 5, 484–94 (2011).

    Article  Google Scholar 

  21. RC de Lamare, Adaptive and iterative multi-branch MMSE decision feedback detection algorithms for multi-antenna systems. IEEE Trans. Wireless Commun. 12(10), 5294–308 (2013).

    Article  Google Scholar 

  22. T Richardson, R Urbanke, The capacity of low density parity check codes under message passing decoding. IEEE Trans. Inform. Theory. 47, 599–618 (2001).

    Article  MATH  MathSciNet  Google Scholar 

  23. Z Li, BVKV Kumar, in IEEE ASILOMARSSC’04. A class of good quasi-cyclic low-density parity check codes based on progressive edge growth graph, (2004), pp. 1990–1994.

  24. A Guillen i Fabregas, G Caire, Coded modulation in the block-fading channel: coding theorems and code construction. IEEE Trans. Inform. Theory. 52(1), 91–114 (2006).

    Article  MATH  MathSciNet  Google Scholar 

  25. X-Y Hu, E Eleftheriou, DM Arnold, Regular and irregular progressive edge-growth tanner graphs. IEEE Trans. Inform. Theory. 51(1), 386–98 (2005).

    Article  MATH  MathSciNet  Google Scholar 

  26. AKH Jin, R McEliece, in Proceedings of the 2nd International Symposium on Turbo Codes and Related Topics. Irregular repeat-accumulate codes (Brest, France, September 2000).

  27. WE Ryan, S Lin, Channel Codes Classical and Modern (Cambridge University Press, Cambridge, UK, 2009).

    Book  MATH  Google Scholar 

  28. AGD Uchôa, C Healy, RC de Lamare, RD Souza, in Proceedings of the Eighth International Symposium On Wireless Communication Systems. LDPC codes based on progressive edge growth techniques for block fading channels (Aachen, Germany, 6–9 November 2011).

  29. S Johnson, S Weller, in Proceedings of the 6th Australian Communications Theory Workshop. Interleaver and Accumulator Design for Systematic Repeat-Accumulate Codes (Brisbane, Australia, 2–4 Feb 2005).

  30. JJ Boutros, in Information Theory and Applications Workshop, 2009. Diversity and coding gain evolution in graph codes, (2009), pp. 34–43.

  31. AGD Uchôa, C Healy, RC de Lamare, P Li, in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC). Iterative detection and decoding algorithms for block-fading channels using LDPC codes (Istanbul, Turkey, 6–9 April 2014).

Download references

Acknowledgements

This work was partially supported by PNPD/CAPES and CNPq (Brazil), under grant 237676/2012-5.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cornelius T. Healy.

Additional information

Competing interests

The authors declare that they have no competing interests.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Uchoa, A.G., Healy, C.T. & de Lamare, R.C. Structured root-LDPC codes and PEG-based techniques for block-fading channels. J Wireless Com Network 2015, 213 (2015). https://doi.org/10.1186/s13638-015-0439-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-015-0439-6

Keywords