Disclosure of Invention
Various embodiments of the present invention relate to bit mapping schemes in 32APSK modulation systems. The techniques of these embodiments are particularly well suited for use with LDPC codes.
Gallager first described LDPC codes in the 60 s. The performance of LDPC codes is very close to the shannon limit. An (N, K) binary LDPC code having a code length N and a dimension K is defined by a parity check matrix H of (N-K) rows and N columns. Most elements of the matrix H are zeros and only a few elements are ones, so the matrix H is sparse. Each row of the matrix H represents a checksum and each column represents a variable, e.g., a bit or symbol. The LDPC code described by Gallager is regular, that is, the parity check matrix H has a constant row weight and column weight.
Regular LDPC codes can be extended to form irregular LDPC codes where the row and column weights vary. The irregular LDPC code is specified by degree distribution polynomials (x) and c (x) that define degree distributions of variables and check nodes, respectively. More specifically, the irregular LDPC code may be defined as follows:
and
wherein the variable d vmax And d cmax Respectively, a maximum variable node degree and a check node degree, and v j (c j ) Represents the fraction (fraction) of an edge (edge) emanating from a variable (check) node of degree j. Although irregular LDPC codes are more complex to represent and/or implement than regular LDPC codes, both theoretically and empirically it has been shown that irregular LDPC codes with appropriately chosen degree distributions are superior to regular LDPC codes. FIG. 1 illustrates a parity check matrix representation of an exemplary irregular LDPC code having a codeword length of six.
LDPC codes can also be represented by bipartite graphs or Tanner graphs. In the Tanner graph, one set of nodes, called variable nodes (or bit nodes), corresponds to the bits of the codeword, while another set of nodes, called constraint nodes (or check nodes), corresponds to a set of parity check constraints defining the LDPC code. The bit nodes and check nodes are connected by edges and are considered to be adjacent or neighboring if they are connected by edges. In general, assume that a pair of nodes is connected by at most one edge.
FIG. 2 illustrates a bipartite graph representation of an irregular LDPC code as shown in FIG. 1.
LDPC codes can be decoded in a variety of ways, such as majority logic decoding and iterative decoding. LDPC codes are mostly logically decodable because of the structure of their parity check matrix. While most logical decoding requires minimal complexity and achieves reasonably good error performance for some types of LDPC codes with relatively high column weights in the parity check matrix (e.g., euclidean geometry LDPC and projection geometry LDPC codes), iterative decoding methods gain more attention because of their better performance versus complexity trade-off. Unlike most logical decoding, iterative decoding improves the reliability of each symbol by backtracking the received symbol based on constraints that define the pattern. In the first iteration, the iterative decoder uses only the channel output as input and produces a reliability output for each symbol.
Next, the reliability metric result output for the decoded symbol at the end of each decoding iteration process is used as input for the next iteration. The decoding process ends until a stop condition is met, after which a final decision is made based on the reliability metric of the decoded symbol output from the last iteration. Iterative decoding algorithms can be further divided into hard-decision, soft-decision, and hybrid-decision algorithms, based on the different characteristics of the reliability metrics used during each iteration. The corresponding common algorithms are iterative Bit Flipping (BF), belief Propagation (BP) and Weighted Bit Flipping (WBF) decoding algorithms, respectively. It has been demonstrated that the BP algorithm is capable of maximum likelihood decoding when the corresponding Tanner graph is acyclic, and thus it is the most popular decoding method.
BP of the LDPC code is a kind of message passing decoding (message passing decoding). The information sent along the edges of the graph is the log-likelihood ratios (LLRs) associated with the variable nodes corresponding to the codeword bits
In this expression, p
0 And p
1 Respectively representing the value of the relevant bitA probability of 0 or 1. BP decoding typically comprises two steps, a horizontal step and a vertical step. In the horizontal step, each check node c
m Will be based on the exception from bit b
n All but entry check c
m Is sent to the adjacent node b
n . In the vertical step, each bit node b
n Will be based on other than from check node c
m All but the incoming bit b
n The 'bit-to-check' information calculated by the 'check-to-bit' information of (1) is sent to the adjacent check node c
m . These two steps are repeated until an available codeword is found or the maximum number of iterations is reached.
Because of its remarkable performance in BP decoding, irregular LDPC codes are one of the best choices for many applications. Various irregular LDPC codes have been adopted or are being considered for various communication and storage standards such as DVB-S2/DAB, wireline ADSL, IEEE802.11n and IEEE802.16, etc.
The threshold of the LDPC code is defined as a minimum SNR value at which the bit error probability can be made arbitrarily small as the codeword length tends to infinity. The value of the LDPC code threshold can be determined by an analysis tool known as density evolution.
The concept of density evolution can also be traced back to Gallager's results. To determine the performance of BF decoding, gallager derives a calculation formula for the output BER at each iteration as a function of the input BER at the start of the iteration, and may iteratively calculate the BER at a given number of iterations. For continuous character tables (alphabet), the calculation is more complex. A probability density function (pdf) of the confidence messages exchanged between the bits and the check nodes needs to be computed one after another and the average BER for each iteration is derived based on these pdfs. In both check node processing and bit node processing, each outgoing confidence information is a function of the incoming confidence information. Degree of convergence d c Each outgoing information U can be represented by d c -1 function of incoming informationThe number indicates that the number of the optical fiber,
wherein, F c Representing the check node processing function determined from BP decoding. Similarly, pairAt degree d v Each outgoing information V can be represented by d v -1 incoming messages and channel configuration messages U ch Is indicative of the function of (a) to (b),
wherein, F v Representing the bit node processing function. Although for checksum bit node processing, for a given decoding algorithm, the pdf of the incoming information may be derived based on the pdf of the incoming information, there are a large number of possible forms of incoming information at the exponential level. Therefore, the density evolution process seems difficult. Fortunately, it has been demonstrated that for a given information transfer algorithm and noisy channel, the decoded BER is independent of the transmitted sequence x if some symmetry condition is met. That is, based on the assumption of symmetry, the decoded BER of the all-zero transmission sequence x =1 is the same as that of an arbitrarily randomly selected sequence, and thus the derivation of the density evolution can be significantly simplified. The symmetry conditions required for efficient density evolution are channel symmetry, check node symmetry and bit node symmetry. Another assumption of density evolution is that the Tanner graph is acyclic (cyclic free).
According to these assumptions, the incoming information to the bits and check nodes is independent, and thus the derivation of the pdf of the information can be significantly simplified. For many LDPC codes that have practical roles, the corresponding Tanner graph includes a cycle. When the minimum length of the cycle (or girth) in the Tanner graph of an LDPC code is equal to 4 × l, then the independence assumption does not hold after the l-th decoding iteration when using standard BP decoding. However, for a given number of iterations, as the code length increases, independent conditions can be satisfied for the increased number of iterations. Thus, density evolution can predict the asymptotic performance of a set of LDPC codes, and the so-called "asymptotic" property needs to be in terms of the meaning of code length.
A bit mapping scheme for Low Density Parity Check (LDPC) encoded bits in a 32APSK modulation system is provided. The disclosed bit mapping scheme provides a good threshold for LDPC codes. In addition, the bit mapping scheme can facilitate the design of the interleaving arrangement in the 32APSK modulation system.
A bit mapping method for a 32APSK system for LDPC coding is proposed. The disclosed bit mapping provides good performance for LDPC coded 32APSK systems and simplifies the interleaving setup in 32APSK systems.
Drawings
The present invention is illustrated by way of example, and not by way of limitation, in the accompanying drawings. In the drawings wherein like reference numerals represent similar parts throughout the several views:
FIG. 1 is a parity check matrix representation of an exemplary irregular LDPC code of codeword length six;
FIG. 2 illustrates a bipartite graph representation of an irregular LDPC code as shown in FIG. 1;
FIG. 3 illustrates a bit mapping function in 32APSK modulation, according to various embodiments of the invention; and
FIG. 4 illustrates bit mapping for a 32APSK symbol, in accordance with various embodiments of the invention;
FIG. 5 illustrates an exemplary communication system employing LDPC codes and 32APSK modulation in accordance with various embodiments of the present invention;
FIG. 6 illustrates an exemplary transmitter employing the 32APSK modulation of FIG. 5, in accordance with various embodiments of the present invention; and
fig. 7 illustrates an exemplary receiver employing the 32APSK modulation of fig. 5, in accordance with various embodiments of the invention.
Detailed Description
A detailed description is given of an exemplary encoding bit mapping method using an LDPC code according to various embodiments of the present invention, with reference to the accompanying drawings.
Although the present invention is described in terms of LDPC codes, it should be appreciated that the bit mapping method may be used in other codes as well. Additionally, it should be understood that the method may be implemented in a non-coded system.
Fig. 5 is an exemplary diagram of a communication system employing LDPC codes with 32APSK modulation in accordance with various embodiments of the present invention. The communication system includes a transmitter 501 that generates a signal waveform to a receiver 503 via a communication channel 502. The transmitter 501 includes an information source for generating a discrete set of possible information. The information corresponds to a signal waveform. The waveform enters the channel 502 and is corrupted by noise. LDPC codes are employed to reduce interference introduced by channel 502 and a 32APSK modulation scheme is employed to convert LDPC coded bits into a signal waveform.
Fig. 6 depicts an exemplary transmitter in the communication system of fig. 5 employing LDPC codes and 32APSK modulation. LDPC encoder 602 encodes the information bits from source 601 into LDPC codewords. The mapping from each information block to each LDPC codeword is determined by the parity check matrix (or equivalent generator matrix) of the LDPC code. The LDPC codeword is interleaved and modulated into a signal waveform based on a 32APSK bit mapping scheme by the interleaver/modulator 603. These signal waveforms are sent to the transmit antenna 604 and propagated to the receiver as shown in fig. 7.
Fig. 7 depicts the exemplary receiver of fig. 5 employing an LDPC code and a 32APSK demodulator. The signal waveform is received by a receiving antenna 701 and distributed to a demodulator/deinterleaver 702. The signal waveform is demodulated by a demodulator and deinterleaved by a deinterleaver, and then distributed to an LDPC decoder 703 that iteratively decodes the received message, and outputs an estimate of the transmitted codeword. The 32APSK demodulation rules employed by the demodulator/deinterleaver 702 should match the 32APSK modulation rules employed by the interleaver/modulator 603.
According to various embodiments of the present invention, as shown in fig. 3, the 32APSK bit-to-symbol mapping circuit may use five bits (b 5I, b5I +1, b5I +2, b5I +3, b5I + 4) per operation and map them to an I value and a Q value, where I =0,1,2. The bit mapping logic is shown in fig. 4. The bit map according to various embodiments of the present invention is defined as follows:
the bit mapping scheme of fig. 4 may use gray mapping, which means that the binary representations of neighboring points differ by only one bit, according to various embodiments of the present invention. Density evolution analysis shows that given an LDPC coded 32APSK system, the gray mapping scheme can provide the best threshold. The bit mapping scheme of fig. 4 also arranges the bits in an order based on the values of the log-likelihood ratios from the communication channels. This process simplifies the design of the interleaving scheme for the 32APSK system.
Although the present invention has been described by way of exemplary embodiments, it should be understood that numerous other variations and modifications could be made within the spirit and scope of the invention. Therefore, it is the object of the appended claims to cover all such modifications and variations as come within the true spirit and scope of the invention.