 Research
 Open Access
A novel physical layer scheme based on superposition codes
 Pietro Savazzi^{1}Email authorView ORCID ID profile and
 Anna Vizziello^{1}
https://doi.org/10.1186/s136380170927y
© The Author(s) 2017
 Received: 27 January 2017
 Accepted: 10 August 2017
 Published: 29 August 2017
Abstract
The recently proposed superposition codes (SCs) have been mathematically proved to be decoded at any rate below the capacity, for additive white Gaussian noise (AWGN) channels. The main objective of this paper is to study the feasibility of a novel SC approach as an alternative to the traditional way of designing modern physical (PHY) layer schemes. Indeed, currently, PHY solutions are based on the decomposition into two separate problems of modulation shaping and coding over finite alphabets. Since superposition codes are defined over real numbers, modulation and coding can be jointly realized. Moreover, a fast decoding method is developed and tested by comparing the obtained results with both the uncoded system performance and two approximate message passing (AMP) algorithms. Finally, possible perspective to fifth generation (5G) applications exploiting SC solutions are outlined in the paper, and some interesting relations with sparse signal recovery are analyzed for further future research lines.
Keywords
 Superposition code
 Physical layer
1 Introduction
Some recent works have proven that sparse superposition codes (SCs), defined over real numbers, can be decodable at any rate less than the Shannon capacity with an exponentially small probability of error [1, 2]. In more details, a maximum likelihood decoding allows reliable communications for all rates up to the Shannon capacity [1], while a fast decoding algorithm and its soft decoding version are proposed in [2] and [3] respectively.
where P is the codeword power and \(\sigma ^{2}=\frac {N_{0}}{2}\) is the Gaussian noise variance.
After the fundamental work of Shannon, the communication model for standard physical (PHY) layer design is usually split into two separate blocks: the channel coder and the modulation shaping [5]. Further, the best channel codes that may be found in the literature are based on elements defined over binary or qary Galois finite fields [6].
Although the original Shannon proof of the noisy channel coding theorem is based on considering large and random codes defined over the real numbers set [7], the numerical instability and the power constraints of real number errorcorrecting codes have limited their use in practical communication schemes. On the other hand, they have been mainly studied for tackling fault tolerance problems in digital computers operation [8].
Moreover, some important and interesting research lines have been outlined [9, 10] by approaching the channel coding problem with codeword elements defined over the real or complex field. In the last decade, complexfield coding has been mainly used for counteracting multipath fading in wireless channels [11].
In [12], a low complexity coding scheme for RFID transmissions has been proposed, considering a simple implementation of a similar superposition coding idea. Despite its simple implementation, the codec scheme can provide a significant coding gain.
Sparse superposition codes can be thought as a joint modulationcoding scheme, since the main idea is to add redundancy directly to a spread spectrum signal, by assigning different orthogonal spreading sequences to the same link.
This aspect could be exploited for the fifth generation (5G) technologies [13], especially from the point of view related to the interference rejection potential embedded in the SC scheme, which may be used for both fullduplex communications and nonorthogonal multiaccess protocols that are considered in 5G systems.

The investigation—from an applicationoriented point of view—of the novel SC concept, in order to test its feasibility and possible performance, gains with respect to the stateoftheart PHY design. While [1–3] analyze SC from a theoretical perspective, we develop a simulation study case, which is still missing, useful to understand the benefits of SC application.

A fast and simple decoding algorithm, which is less parameterdependent compared to [2] and with a less computational burden with respect to the technique presented in [14].

An overview about some interesting perspectives for future 5G research and development exploiting SC concept.
The proposed decoding scheme represents the most relevant novelty of this work, and it may be interpreted as an orthogonal matching pursuit (OMP) sparse reconstruction algorithm, while its limited number of iterations may be thought as a simple stopping rule [15].
This algorithm is similar to those shown in [2], although the two approaches differ for the following point: at each iteration, we look for the maximum values of the vector Z ^{(i)}, see Eq. 7 and step 4 of the proposed algorithm in Section 3, while in [2], the elements of the same vector are compared to a specific threshold parameter τ, see sections I.B and II of the cited reference.
Moreover, in Section II of [2], a combined statistics of the residuals Y ^{(i)}, see Eq. 11, and a set of pacing parameters are used to theoretically compute the performance limit of the decoder. On the contrary, we have considered performance results obtained by simulations of the complete concatenated scheme.
Differently, in [1], the authors consider the performance limits of the optimal maximum likelihood detector, while in [3] a softdecision decoder is taken under consideration with Bayes optimal statistics at each iteration. Finally, the works [14, 16–18] take into account approximate message passing decoding algorithms.
The paper is organized as follows: Section 2 is devoted to defining the superposition code and describing the system model. Section 3 details the proposed decoding scheme. Section 4 shows some interesting simulation results. Section 5 outlines relevant future 5G developments exploiting SCs and their relations with other approaches. Finally, some concluding remarks wrap up and close the paper in Section 6.
2 Sparse superposition codes
2.1 The coding algorithm
We here briefly outline the main concepts of SCs. The main insight of [1, 2] is to use superposition codes as a forward error correction (FEC) technique. In particular, we limit our analysis to binary transmission over an AWGN channel, although an extension to a nonbinarysigned finite alphabet is possible to develop more spectral efficient schemes.
Specifically, let u=(u _{1},u _{2},…,u _{ k }) be a string of k bits to be coded. The main idea is to map u to a vector c of length N, whose elements are real numbers. Thus, let us define the dictionary matrix \(X=\left [X_{1},X_{2},{\ldots },X_{N}\right ] \in \mathbb {R}^{n\times N}\), whose entries are \(X_{i,j} \sim \mathcal {N}(0,1)\), where \(\mathcal {N}(0,1)\) represents a normal process with unit variance and zero mean. The codeword length equals n, so the code rate is R=k/n.
Although [2] shows that rates closer to capacity at higher SNRs need an exponential power allocation profile, we use a constant power allocation. Indeed, in this way, we achieve even error probability along the codeword and a decoder with less parameters to be set than the scheme in [2], as explained in Section 3.

An input bit string u of length k=L log2(M) is split into L substrings of size log2(M)

Each substring of u is to be intended as the position index of the nonzero element of β in each of the L subsections

The rate of the superposition code, i.e., the number of input bits per channel use, can be then computed as:$$ R=\frac{L\log_{2} M}{n} $$(3)
2.2 System model
where η is the noise vector whose elements belong to \(\mathcal {N}(0,\sigma ^{2})\).
3 The decoding algorithm
We here propose a novel fast and simple decoding scheme for superposition codes. Similarly to the algorithm in [2], we propose an iterative decoding algorithm with a maximum number of iterations equal to L. However, the proposed solution is able to decode anyway the received codeword, without considering the possibility to mark erasures at the channel output as in [2]. In this way, the decoder always tries to output the more reliable decoded codeword.
 1.Initialize: X ^{(1)}=X, Y ^{(1)}=Y, \(\hat {\beta }=0_{N}\),where J _{ t }=[(t−1)M+1,(t−1)M+2,…,t M] are the indexes of each of the L sections of length M$$ J^{(1)}=\left[J_{1},J_{2},{\ldots},J_{L}\right], $$
 2.
For i=1to L
 3.Compute the vector Z ^{(i)} as in the following:$$ Z^{(i)}=\frac{X^{(i)T}Y^{(i)}}{Y^{(i)}} $$(7)
 4.
Find the index p of the maximum positive value of the vector Z ^{(i)}. Since we only look for the maximum value of the vector Z ^{(i)}, the normalization by Y ^{(i)} may be neglected and Eq. (7) may replaced by the simpler Z ^{(i)}=X ^{(i)T } Y ^{(i)}
 5.Identify the section \(J^{(i)}_{t_{p}}\) containing the position p and update the partially decoded word:$$ \hat{\beta}(p)=\sqrt{(P/L)} $$(8)
 6.if i<L, update:$$ X^{(i+1)}=\left\{X^{(i)}_{l\in J_{i} \setminus J^{(i)}_{t_{p}}}\right\} $$(9)$$ J_{i+1}=J_{i} \setminus J^{(i)}_{t_{p}} $$(10)$$ Y^{(i+1)}=Y^{(i)}X^{(i)}\beta^{T} $$(11)
 7.
Return to step (2).
After step (7), the vector β contains the sparse representation of the decoded word.
Since at each iteration step we choose one of the L groups corresponding to log2M decoded bits, according to the position of the maximum of Z ^{(i)}, after L iterations the algorithm outputs the complete decoded word.
Once the decoding procedure of the joint demodulationdecoding scheme is completed, a further concatenated code can be used to correct any remaining residual errors, such as a Reed Solomon (RS) code [6] defined over G F(M) [1, 2], in order to improve the error correction performance. The use of inner and outer codes is a common practice in modern communication standards, since they allow different levels of error protection depending on transmitted data requirements or channel conditions.
Matching the Galois field size with the section dimension M allows viewing each integer number belonging to the interval [1,M] as a symbol in G F(M).
This way of matching the Galois field size with a particular dimension of the inner concatenated scheme is similar in nature with the approach proposed in [19, 20].
where n _{ RS }−k _{ RS }=2t is even.
4 Simulation results

The number of bits log2M in each of the L subsections has been set equal to 8, corresponding to M=256, in order to match the symbol dimension of the outer Reed Solomon code, as explained at the end of the previous section.Table 1
Simulation parameter setting
Simulation parameters
L
128
M
256
Code rate SC code
1/3,1/2
(n _{ RS },k _{ RS })
(255,239)
RS t
8
Code rate of the concatenated scheme
0.29167, 0.4375
Message length k
1024
Codeword length n
3072, 2048

Since k=L log2M, we have chosen the number of subsections L=128 in order to have a moderate codeword length equal to 2048 for a rate of R=0.5.

This value of L also satisfies the restricted isometry property (RIP) for random sensing, see Eq. (13) of [21], for which \(L\le \frac {n}{C\log M}\). For instance, that corresponds to L<369 for n=2048, and the constant C=1.

The constant power allocation is determined by \(P=\frac {E_{b}}{L T}\), where E _{ b } is the average signal energy per bit and T is the bit duration.
Computational complexity comparison
Number of operations per each iteration  Proposed decoder  AMP, Rush et al. [14] 

Sum  2M L(n−1)+n  2M L(n+1)−n−L 
Multiplication  n(2M L+1)  n(2M L+1)+3M L 
Division  –  2M L+n+1 
Exponential  –  ML 
For the computational comparison analysis, we have only considered the AMP algorithm of [14] since it is more similar to the presented scheme, considering both implementation and performance. Anyway, it is possible to note that the actual complexity of the proposed algorithm is comparable to a simple correlation receiver for code division multiple access (CDMA) signals; nevertheless, the obtained coding gain is comparable to those attainable by more complex techniques.
5 Overview on 5G applications
The main drivers of the current research for 5G are Internet of Things (IoT), Gigabit wireless connectivity, and Tactile Internet among others [22], which call for several communication requirements. The underlying design principles, i.e., synchronism and orthogonality, of the PHY layer of the current LongTerm Evolution Advanced (LTEA) radio access network constitute the major drawbacks for the conceived service architecture. On this purpose, as stated in [22], new waveforms are envisioned as possible solutions. In this section, we outline possible applications of this work on SCs to different aspects of wireless communications, with particular emphasis to 5G applications.
5.1 Compressed sensing
Sporadic trafficgenerating devices (e.g., machinetype communication (MTC) devices in 5G IoT) awake now and then, thus they should transmit their data immediately and only coarsely synchronized, conversely to the fine synchronization procedure of LTEA PHY layer random access [22]. On this purpose, sparse signal processing and new waveforms can be combined to efficiently deal with the sporadic traffic and control signaling in the uplink random access channel (RACH) [22]. The sparse representation of superposition codes, and sparse signal processing methodology in general, are effective for this application. Indeed, the detection and demodulation of MTC traffic in the PHY layer RACH benefits from the “bursty” nature of signals (“sparse” in mathematical sense) and they can be described by a small set of parameters within a larger set of observables [22–24]. A possible solution is to make sparse signal processing usable for 5G RACH, exploiting joint sparsity of messages, mobile channels, and user activity [22].
5.2 Extension to more spectrally efficient schemes
Given the increasing amount of traffic data for 5G services, spectrally efficient solutions become mandatory. Although we will limit our analysis on SC to a preliminary binary case, it would be possible to increase the SC spectral efficiency by extending the presented results to the nonbinary case. For instance, in [25] and [26], a signed superposition coding scheme is proposed, and in [27], an algorithm is developed to determine both the locations and amplitudes of the nonzero elements in the sparse vector.
5.3 Multiple access scheme
Superposition codes have been firstly introduced in [28] for multiuser channels, in order to compute the capacity region of the Gaussian broadcast channel [1]. In this sense, a similar scheme applies where the multiple user information is both superimposed and coded simultaneously for downlink multiple access channels.
Furthermore, this novel PHY technique could be suitable for nonorthogonal multiple access schemes [29, 30], since SC schemes can be interpreted as signal despreading with error correction capabilities, which could make nonorthogonal multiple access receivers more robust to user interferences. This would be useful also for 5G solutions, in particular for fullduplex links where the selfinterference level is very severe.
5.4 Synchronization
Synchronism is the underlying design principles of the PHY layer of today’s LTEA radio access network [22]; thus, novel synchronization solutions for the future 5G service architecture will be really useful. On this purpose, thinking about SC codes as a novel method for both modulation and coding, at least for the inner code, an interesting perspective is to develop joint algorithm for decoding and channel parameter synchronization to be applied to schemes like the ones in [31, 32].
In more details, the code structure, i.e., the sensing matrix X which is known at the receiver, may be used for both frame synchronization and fine clock recovery, instead of using pilot symbols. In this way, the spectral efficiency may be improved by decreasing the number of required pilots.
6 Conclusions
In this work, we have highlighted the feasibility of real number superposition coding. This field, closely related to compressed sensing algorithms, seems to be very promising because the simple decoding algorithm could be efficiently applied to very high datarate signals, by using a mixed digitalanalog system. This can relax the analogtodigital conversion requirements since the algorithm acts on real numbers. On this purpose, further deep investigations will be essential.
Ongoing research works are devoted to extend the proposed scheme to nonbinary signaling techniques in order to improve the final spectral efficiency. Furthermore, a real implementation in a softwaredefinedradio (SDR) platform will enable a more precise characterization of the true system performance, by carefully considering the synchronization related issues.
An important objective will be to look for performance as close as possible to channel capacity with dictionaries of moderately small sizes, allowing small signal spaces. From a communication theory point of view, starting from [3], new probabilistic algorithms capable of achieving performances closer to channel capacity may be sought. We believe that concatenation with a robust outer code, including Reed Solomon and qary LDPC, shall be necessary in order to obtain good performance.
Declarations
Authors’ contributions
Both the authors have conceived the proposed algorithm and developed the MATLAB code used for producing the presented results. The final manuscript has been written and revised by the two authors. Both authors read and approved the final manuscript.
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
 A Joseph, AR Barron, Least squares superposition codes of moderate dictionary size are reliable at rates up to capacity. IEEE Trans. Inf. Theory. 58(5), 2541–2557 (2012).MathSciNetView ArticleMATHGoogle Scholar
 A Joseph, AR Barron, Fast sparse superposition codes have near exponential error probability for R < C. IEEE Trans. Inf. Theory. 60(2), 919–942 (2014).MathSciNetView ArticleMATHGoogle Scholar
 AR Barron, S Cho, in Proc. IEEE Int. Symp. on Information Theory (ISIT). Highrate sparse superposition codes with Iteratively Optimal Estimates (IEEECambridge, 2012).Google Scholar
 CE Shannon, A mathematical theory of communication. Bell Syst. Tech. J.27(5), 379–423623656 (1948).MathSciNetView ArticleMATHGoogle Scholar
 GD Forney Jr., G Ungerboeck, Modulation and coding for linear Gaussian channels. IEEE Trans. Inf. Theory. 44(6), 2384–2415 (1998).MathSciNetView ArticleMATHGoogle Scholar
 S Lin, DJ Costello, Error Control Coding, Second Edition (PrenticeHall, Inc, Upper Saddle River, 2004).Google Scholar
 CE Shannon, Communication in the presence of noise. Proc. IRE. 37(1), 10–21 (1949).MathSciNetView ArticleGoogle Scholar
 Z Chen, in Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis. SC ’09. Optimal real number codes for fault tolerant matrix operations (ACMNew York, 2009), pp. 29–12910.Google Scholar
 TG Marshall Jr., Coding of realnumber sequences for error correction: a digital signal processing problem. IEEE J Sel. Areas Commun. 2(2), 381–392 (1984).View ArticleGoogle Scholar
 TH Liew, LL Yang, L Hanzo, Systematic redundant residue number system codes: analytical upper bound and iterative decoding performance over AWGN and Rayleigh channels. IEEE Trans. Commun. 54(6), 1006–1016 (2006).View ArticleGoogle Scholar
 Z Wang, GB Giannakis, Complexfield coding for OFDM over fading wireless channels. IEEE Trans. Inf. Theory. 49(3), 707–720 (2003).MathSciNetView ArticleMATHGoogle Scholar
 E Goldoni, P Savazzi, A Vizziello, A novel channel coding scheme for rfid generation2 systems. Electronics. 6(1), 1–9 (2017). http://www.mdpi.com/20799292/6/1/4. doi:10.3390/electronics6010004.Google Scholar
 IF Akyildiz, S Nie, SC Lin, M Chandrasekaran, 5g roadmap: 10 key enabling technologies. Comput. Netw.106:, 17–48 (2016).View ArticleGoogle Scholar
 C Rush, A Greig, R Venkataramanan, Capacityachieving sparse superposition codes via approximate message passing decoding. IEEE Trans. Inf. Theory. 63(3), 1476–1500 (2017).MathSciNetView ArticleMATHGoogle Scholar
 TT Cai, L Wang, Orthogonal matching pursuit for sparse signal recovery with noise. IEEE Trans. Inf. Theory. 57(7), 4680–4688 (2011).MathSciNetView ArticleMATHGoogle Scholar
 C Condo, WJ Gross, in 2015 IEEE Workshop on Signal Processing Systems (SiPS). Sparse superposition codes: a practical approach (IEEEHangzhou, 2015), pp. 1–6.Google Scholar
 C Condo, WJ Gross, Implementation of sparse superposition codes. IEEE Trans. Signal Proc.65(9), 2421–2427 (2017).MathSciNetView ArticleGoogle Scholar
 J Barbier, F Krzakala, in 2014 IEEE International Symposium on Information Theory. Replica analysis and approximate message passing decoder for superposition codes (IEEEHonolulu, 2014), pp. 1494–1498.View ArticleGoogle Scholar
 A Marinoni, P Savazzi, P Gamba, Efficient detection and decoding of qary ldpc coded signals over partial response channels. EURASIP J. Wirel. Commun. Netw.2013(1), 18 (2013).View ArticleGoogle Scholar
 A Marinoni, P Savazzi, in Proc. IEEE International Conference on Communications (ICC). Ecient receivers for qary LDPC coded signals over partial response channels (IEEECape Town, 2010).Google Scholar
 EJ Candes, MB Wakin, An introduction to compressive sampling. IEEE Signal Proc. Mag.25(2), 21–30 (2008).View ArticleGoogle Scholar
 G Wunder, P Jung, M Kasparick, T Wild, F Schaich, Y Chen, ST Brink, I Gaspar, N Michailow, A Festag, L Mendes, N Cassiau, D Ktenas, M Dryjanski, S Pietrzyk, B Eged, P Vago, F Wiedmann, 5GNOW: nonorthogonal, asynchronous waveforms for future mobile applications. IEEE Commun. Mag.52(2), 97–105 (2014).View ArticleGoogle Scholar
 HF Schepker, C Bockelmann, A Dekorsy, in 2013 IEEE 77th Vehicular Technology Conference (VTC Spring). Coping with cdma asynchronicity in compressive sensing multiuser detection (IEEEDresden, 2013), pp. 1–5.Google Scholar
 H Zhu, GB Giannakis, Exploiting sparse user activity in multiuser detection. IEEE Trans. Commun. 59(2), 454–465 (2011).View ArticleGoogle Scholar
 AC Gilbert, JA Tropp, in Proc. IEEE International Symposium on Information Theory (ISIT). Applications of sparse approximation in communications (IEEEAdelaide, 2005).Google Scholar
 JA Tropp, Just relax: convex programming methods for identifying sparse signals in noise. IEEE Trans. Inf. Theory. 52(3), 1030–1051 (2006).MathSciNetView ArticleMATHGoogle Scholar
 DL Donoho, A Maleki, A Montanari, Messagepassing algorithms for compressed sensing. Proc. Natl. Acad. Sci.106(45), 18914–18919 (2009).View ArticleGoogle Scholar
 TM Cover, Broadcast channels. IEEE Trans. Inf. Theory. 18(1), 2–14 (1972).MathSciNetView ArticleMATHGoogle Scholar
 P Wang, J Xiao, L Ping, Comparison of orthogonal and nonorthogonal approaches to future wireless cellular systems. IEEE Veh. Technol. Mag.1(3), 4–11 (2006).MathSciNetView ArticleGoogle Scholar
 P Wang, J Xiao, L Ping, Correction to “Comparison of Orthogonal and NonOrthogonal Approaches to Future Wireless Cellular Systems”. EEE Veh. Technol. Mag.1(4), 42 (2006).View ArticleGoogle Scholar
 P Savazzi, P Gamba, L Favalli, An iterative algorithm for joint symbol timing recovery and equalization of short bursts. J. Commun.3(4), 34–40 (2008).View ArticleGoogle Scholar
 P Savazzi, P Gamba, Iterative symbol timing recovery for short burst transmission schemes. IEEE Trans. Commun. 56(10), 1729–1736 (2008).View ArticleGoogle Scholar