Next Article in Journal
Comparison of Deep Learning and Conventional Demosaicing Algorithms for Mastcam Images
Previous Article in Journal
Recursive Rewarding Modified Adaptive Cell Decomposition (RR-MACD): A Dynamic Path Planning Algorithm for UAVs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Mapping Matrix Design and Improved Belief Propagation Decoding Algorithm for Rate-Compatible Modulation

Department of Cognitive Communication; National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(3), 307; https://doi.org/10.3390/electronics8030307
Submission received: 26 January 2019 / Revised: 28 February 2019 / Accepted: 4 March 2019 / Published: 11 March 2019
(This article belongs to the Section Microwave and Wireless Communications)

Abstract

:
Rate-compatible modulation (RCM) can achieve adaptive transmission in a variable channel environment. However, there are two problems with conventional RCM. Firstly, there is a large number of four rings in the mapping matrix of the conventional RCM, which blocks the delivery of messages in the decoding. Secondly, in the conventional decoding of RCM, the soft information of the last decoding will be discarded when cyclic redundancy check (CRC) is failed, which decreases the performance significantly. In order to address these two problems, in this paper, we propose a new method to construct a mapping matrix without four rings (MMwoFR) and an improved belief propagation (IBP) algorithm for RCM decoding. On the one hand, by using MMwoFR, the constructed matrix is able to prevent the existence of four rings which have much side influence of reliability performance. On the other hand, the IBP is able to make the most use of the soft information in RCM decoding. Simulation results show that using MMwoFR and IBP can bring at least 12% goodput gain for RCM at the high signal-to-noise ratio (SNR) region while maintaining the same performance in the low and moderate SNR regions. Moreover, complexity analysis shows that the new scheme has comparable complexity compared with a conventional RCM.

1. Introduction

High transmission rate is an important parameter in wireless communications over time-varying channels. Adaptive coding and modulation (ACM) is an effective way to achieve high transmission rate, which has been adopted in 802.11a [1,2]. However, there are two disadvantages in ACM. Firstly, the sender selects best combination scheme of modulation and coding according to the estimation of the channel conditions, which can be a really tough work for accurate estimation in time-varying channels. Secondly, since ACM only has limited choices of rate combination schemes, the adaptive rate is a stair-case. Superposition coded modulation (SCM) [3] is another coding and modulation scheme. It provides a flexible rate adaptive approach. However, adjusting the rate in SCM still depends on the channel condition.
In order to achieve seamless transmission and overcome the problem of channel estimation at the same time, several rateless codes [4,5,6,7] have been proposed. Luby Transform (LT) codes [4] which are originally designed for binary erasure channel (BEC) have unfavorable performance in the Gaussian channel. Raptor codes [6] which are an extension of an LT code simply consist of the concatenation of an LT code with an outer code, called precode, which is usually a high rate error correcting code. The overhead of LT code is large in the Gaussian channel. Due to the overhead and the outer code rate, the performance of Raptor codes is also unfavorable [8]. Spinal codes [6] is also one of rateless codes which has good performance. However, the complexity of polynomial decoding is a big problem in practical communication systems. Analog fountain codes (AFC) [7], which uses low-density parity-check (LDPC) codes as a precoder, is able to achieve significant performance improvements. However, the design of AFCs is complicated and the complexity of decoding is high.
Rate compatible modulation (RCM) is one of the promising adaptation technologies, which is proposed in [8]. RCM which can achieve seamless adaptation is insensitive to estimation error of channel information and has high spectrum utilization at medium to high SNR. In RCM, the transmitter transfers information bits to symbols based on the mapping matrix and sends symbols continuously. The receiver continuously decode the source bits based on the received symbols until the source bits pass the CRC. After that, an ACK signal acts as a feedback to notify the transmitter starting to transmit symbols generated by another block of bits. In this way, RCM is able to achieve seamless rate adaptation under time-varying channel conditions.
Until now, the study of the RCM has mainly focused on decoding algorithms and practical applications. In [9,10,11,12], low complexity decoding algorithms are proposed which can effectively reduce the hardware implementation complexity. In [13], arithmetic bit-interleaved coded modulation (A-BICM) which cascaded LDPC codes is proposed. In [14], Duan et al. proposed a low peak to average power ratio (PAPR) constellation mapping scheme. In [15], a scheme for switching weight sets of RCM according to channel conditions is proposed. Due to the advantages of RCM, RCM has been applied in these areas including visible light communications [16] and multiple access for machine-to-machine communications [17].
However, there are still some problems in RCM. One is that the conventional mapping matrix has a large number of four rings. The existence of four rings will decrease the reliability performance of RCM. Another problem of RCM is that the process of iterative decoding loses lots of useful information. In the conventional RCM system, the receiver discards soft information each time the CRC of the source bits is failed i.e., decoding unsuccessfully. However, the discarded information can be reused in the next decoding process.
LDPC codes [18] have been widly studied to solve the problem that the check matrix has four rings. Quasi-cyclic LDPC (QC-LDPC) codes are a particularly important class of LDPC codes. The finite geometries method [19] or the circulant permutation matrix method [20,21] are the two construction methods of QC-LDPC codes, which are able to generate a check matrix without four rings. Therefore, the design RCM mapping matrix can combine the construction method of QC-LDPC codes.
In this paper, our main aim is to solve these two problems of RCM. We will propose a new method to construct the mapping matrix without four rings (MMwoFR). Specifically, the proposed construction method combines the construction method of QC-LDPC codes. In this proposed construction method, elementary matrix of mapping matrix has been changed and the distribution of the weights of the mapping matrix has been redesigned. Besides, we will present an improved belief propagation (IBP) algorithm for RCM decoding to make the most use of the soft information of the last unsuccessful decoding. In addition, we find that not all the output soft information of the last unsuccessful decoding can be used to help the next decoding. Therefore, the thresholds of the soft information are set to retain the useful soft information.
The rest of the paper is organized as follows. Section 2 reviews the original RCM. Section 3 presents a new mapping matrix construction method. Section 4 proposes an improved belief propagation (IBP) and analyzes the threshold of soft information. Simulations are performed in Section 5. In the Section 6, a conclusion of the paper is made.

2. Original Rate Compatible Modulation

In RCM, source bits are directly mapped to symbols. RCM symbols are generated by arithmetic summation of weighted source bits. x = ( x 1 , x 2 , x 3 , , x N ) T 0 , 1 N is a vector of source bits and the length of x is N. W s = w l | l = 1 L is the weights set of RCM. The transmitter randomly selects L source bits from x . These selected bits are part of a weighted arithmetic summation to generate an encoded symbol s i as Equation (1),
s i = l = 1 L w l x i l ,
where w l W s and the subscript i l is the index of the bit corresponding to the weight w l . When the number of the transmitted symbols is M, the encoding process can be represented in matrix form s = Gx , where G denotes the M × N mapping matrix and s is the symbol vector of length M. In RCM, every two consecutive symbols create one complex-valued symbol u n as Equation (2),
u n = s 2 n 1 + i · s 2 n , n > 0 ,
where i is the imaginary unit and s 2 n 1 , s 2 n s . In original RCM, W s = ± 1 , ± 2 , ± 4 , ± 4 . Therefore, the generated symbol is [ 11 , 11 ] . The constellation map corresponding to the transmitted complex-valued symbol is a 23 × 23 rectangular constellation point map. The construction of the mapping matrix is very crucial. The construction method of the original RCM mapping matrix takes three constraints as construction critera (more details can be found in [8]).
  • The mapping matrix should be regular in rows.
  • The mapping matrix should be as regular as possible in columns.
  • The weight set is able to create diverse symbol values.
In [8], three steps are taken to construct the mapping matrix. The first step is constructing the elementary matrix. C ( q ) is a N / 8 × N / 4 matrix as Equation (3), where q is a variable.
C ( q ) = + q q + q q + q q N / 8 × N / 4 .
According to the weight set of RCM, q is 1, 2 or 4. Therefore, three kinds of elementary matrices are constructed including C ( 1 ) , C ( 2 ) , and C ( 4 ) . For these three matrices, the only difference is the value of elements.
The second step is randomly permuting the columns of the three elementary matrices expressed as π ( C ( 1 ) ) , π ( C ( 2 ) ) , π ( C ( 4 ) ) . Then, we construct an N / 2 × N matrix G 0 as Equation (4):
G 0 = π C ( 4 ) π C ( 4 ) π C ( 2 ) π C ( 1 ) π C ( 2 ) π C ( 1 ) π C ( 4 ) π C ( 4 ) π C ( 4 ) π C ( 4 ) π C ( 1 ) π C ( 2 ) π C ( 1 ) π C ( 2 ) π C ( 4 ) π C ( 4 )
where π ( · ) represents the process of random permutation of columns of a matrix and π ( · ) is different each time. A plurality of kinds of G 0 can be obtained by using the above method.
The third step is superimposing G 0 of different numbers to obtain the mapping matrix G. In RCM, the mapping matrix is negotiated by the transmitter and the receiver. Generally, two G 0 are superimposed to construct a mapping matrix.
However, the construction method has a problem that the mapping matrix has a large number of four rings. The existence of four rings will affect the performance during decoding. In the actual process, we did the following experiment. Using the original method to construct the mapping matrix 1000 times, the average number of four rings is 729.34.

3. Mapping Matrix Construction Method

In this section, we will introduce a new method to construct the mapping matrix without four rings (MMwoFR). The design of MMwoFR aims at eradicating the four rings and satisfying the three constraints of RCM. Using the new construction method to construct a mapping matrix G n e w R N × N can be divided into three steps.
At first, we construct a check matrix of QC-LDPC codes using the construction method in [22], setting row weight and column weight of the matrix to be 8. The check matrix of the QC-LDPC codes is jointly determined by the base matrix and the shift matrix. The size of base matrix and the size of shift matrix are both 8 × 8 . The check matrix is also divided equally into 8 × 8 parts. Each element of the base matrix is 0 or 1. The position of check matrix corresponding to the 0 of base matrix will be an all-zero matrix. In contrast, the position of the check matrix corresponding to the 1 of the base matrix will be a cyclically right-shifting identity matrix. The base matrix G b is set to be an all-one matrix of 8 × 8 as Equation (5):
G b = 1 1 1 1 1 1 1 1 1 8 × 8 .
Therefore, each part of check matrix is a circulant permutation matrix obtained by cyclically right-shifting the identity matrix by p i j positions expressed as I p i j , where I is the identity matrix and p i j is the shifting value. The right-shifting value can be decided by the corresponding element of the shift matrix. Using the construction method of QC-LDPC codes, we can get a shift matrix as Equation (6):
G s = p 11 p 12 p 18 p 21 p 22 p 28 p 81 p 82 p 88 8 × 8 ,
where p i j ( 0 i 8 , 0 j 8 ) denotes the shift value of the identity matrix. By combining base matrix and shift matrix, we can get the check matrix H as Equation (7):
H = I p 11 I p 12 I p 17 I p 18 I p 21 I p 22 I p 27 I p 28 I p 71 I p 72 I p 77 I p 78 I p 81 I p 82 I p 87 I p 88
where I p i j is a N / 8 × N / 8 ( 0 p i j N / 8 ) circulant permutation matrix. It is matrix which doesn’t exists four rings.
The second step is replacing the value of the non-zero position in H with the weight set of RCM according to the three constraints in Section 2. Since each I p i j is obtained by a right-shifting identity matrix, there are only eight non-zero positions for each row and column of the matrix H. There must be a non-zero position in each row of I p i j . These two factors are helpful conditions for constructing the mapping matrix. Therefore, we combine two adjacent I p i j of each row into one block, denoted as g a b = [ I p a ( 2 b 1 ) , I p a ( 2 b ) ] ( 1 a 8 , 1 b 4 ) .
The last step is to divide the different weights into three groups denoted as + 1 , 1 , + 2 , 2 and + 4 , 4 . Each g a b is assigned to a definite group of weights. According to the conventional mapping matrix, g a b chooses weight set as Equation (8) (shown at the top of next page). Each row of each block has two non-zero positions. For different elements in the same group, the two weights are assigned to the two non-zero positions with equal probability. In this way, we can construct a mapping matrix without four rings, while satisfying the three constraints of RCM [8].
G new = g 11 { + 4 , 4 } g 12 { + 4 , 4 } g 13 { + 2 , 2 } g 14 { + 1 , 1 } g 21 { + 2 , 2 } g 22 { + 1 , 1 } g 23 { + 4 , 4 } g 24 { + 4 , 4 } g 31 { + 4 , 4 } g 32 { + 4 , 4 } g 33 { + 1 , 1 } g 34 { + 2 , 2 } g 41 { + 1 , 1 } g 42 { + 2 , 2 } g 43 { + 4 , 4 } g 44 { + 4 , 4 } g 51 { + 4 , 4 } g 52 { + 4 , 4 } g 53 { + 2 , 2 } g 54 { + 1 , 1 } g 61 { + 2 , 2 } g 62 { + 1 , 1 } g 63 { + 4 , 4 } g 64 { + 4 , 4 } g 71 { + 4 , 4 } g 72 { + 4 , 4 } g 73 { + 1 , 1 } g 74 { + 2 , 2 } g 81 { + 1 , 1 } g 82 { + 2 , 2 } g 83 { + 4 , 4 } g 84 { + 4 , 4 }

4. Improved Belief Propagation Algorithm

This section contains two parts. In the following, we first introduce the improved belief propagation (IBP) which is based on the threshold of the soft information. Next, we will analyze the error probability of soft information.

4.1. Introduction of Improved Belief Propagation

One advantage of RCM as an adaptive transmission system is that the transmitter does not require precise channel estimation feedback from the receiver. The transmitter transfers the next data block after receiving an acknowledgement (ACK) from the receiver. The specific model of transmitter is shown in Figure 1. A major feature of the transmitter is that it constantly increases the transmitted symbols for the same data block when no ACK is received. It achieves an adaptive code rate via adjusting the number of transmitted symbols.
As for the original receiver, it will continue to receive symbols when it fails to pass the cyclic redundancy check (CRC). In addition, the ACK signal will not be sent to the transmitter. As for the newly received symbols, they are put together with the previously received symbols for decoding. The receiver continuously repeats the two procedures of decoding and receiving symbols. This step will not stop until the CRC is passed. The receiver will feed back an ACK to the transmitter when CRC passes. The specific model of original receiver is shown in Figure 2a.
In the original model, soft information by the last decoding is completely discarded when the CRC is failed. However, in many cases, most of the soft information by the last decoding is correct. Only a small number of errors occur. Therefore, the efficiency of decoding is greatly reduced due to the large loss of valid information. IBP aims to retain as much valid information as possible.
RCM initially uses a belief propagation (BP) algorithm in [8] as the decoding algorithm. In [9], the maximum likelihood ratio BP (LLR-BP) decoding algorithm is proposed, which effectively accelerated decoding and reduced the complexity of the hardware. In the LLR-BP algorithm, the soft information is the LLR and each final decision depends on the LLR acquired by iterative decoding. The judgment rules are as follows. The final soft information which is larger than or equal to 0 is judged as information bit “1”. Thus, the soft information less than 0 is judged as information bit “0”. There is a very important property of the LLR-BP algorithm that the soft information, of which the absolute values are very large, has a small error probability of judgment. This property will be proven in Section 4.2. Based on this property, we proposed an improved belief propagation (IBP) decoding algorithm.
Due to the low error probability of judgment of larger value, the IBP sets a threshold of absolute value when the CRC fails. The portion of the soft information that is higher than the threshold is reserved. In contrast, the portion of soft information below the threshold is discarded. The reserved soft information is taken as the initial information at the beginning of the next iteration.
To keep the improved system stable and effective, we set the maximum value for the number of received symbols. The specific operation of setting the maximum value is as follows. When the maximum number of received symbols is not reached, we use the IBP algorithm to reserve the soft information whose absolute value is greater than the threshold. In contrast, When the maximum number of received symbols is reached and the CRC is still not passed, we will not reserve the soft information. Such a system design not only ensures the stability of the system, but also improves the efficiency of system decoding. The specific improved receiver model is shown in Figure 2b.

4.2. Analysis of Error Probability of Soft Information

At present, the additive white Gaussian noise (AWGN) channel model is mainly considered by RCM. Suppose the received symbol vector is r R M × 1 . r is denoted as follow:
r = G · x + e ,
where e R M × 1 , e i e and e i N ( 0 , σ 2 ) . The task of receiver is finding out the source bits with the maximum a posterior (MAP) probability. In [8], belief propagation algorithm has been used for decoding which is initially proposed in [23] for sparse signal recovery of compressive sensing. The decoding process is to find the optimal solution for the following problem:
x ^ = a r g m a x p ( x | r ) .
For the RCM, the BP iterative decoding algorithm is used. The process of iterative decoding repeatedly updates the variable nodes and the symbol nodes through the information exchange between the symbol nodes and the variable nodes. Suppose r i is the received symbol and r i r . As Figure 3 shows, the set of variable nodes x i = x i 1 , x i 2 , , x i L are connected to the symbol node r i . The number of the weight is L, W s = w 1 , w 2 , w 3 , , w L . The information transmitted by the symbol node to the variable nodes x i k is v i k = p ( r i | x i \ k ) , where x i \ k denotes the set of variable nodes connected to the symbol node r i excluding x i k .
The two conditional probability function sent by the symbol node to the variable nodes are as follow:
v i k ( 0 ) = p ( r i | x i k = 0 ) = s = s i \ k min s i \ k max p ( s i \ k = s ) · 1 2 π σ · e ( r i s ) 2 2 σ 2 ,
v i k ( 1 ) = p ( r i | x i k = 1 ) = s = s i \ k min s i \ k max p ( s i \ k = s ) · 1 2 π σ · e ( r i s w k ) 2 2 σ 2 ,
where s i \ k = d = 1 , d k L w d x i d , s i \ k min and s i \ k max represent the maximum and minimum values of s i \ k respectively.
As Figure 4 shows, the set of symbol nodes r j = r j 1 , r j 2 , , r j n are connected to the variable nodes x j . The information transmitted by the variable node to the symbol nodes is u j k = p ( x j | r j / k ) , where r j / k denotes the set of the symbol nodes connected to the variable node x j excluding r j k .
The two conditional probability function passed to the symbol nodes by the variable node are as follow:
u j k ( 0 ) = p ( x j = 0 | r j \ k ) = m = 1 , m k n p ( r j m | x j = 0 ) b { 0 , 1 } m = 1 , m k n p ( r j m | x j = b ) ,
u j k ( 1 ) = p ( x j = 1 | r j \ k ) = m = 1 , m k n p ( r j m | x j = 1 ) b { 0 , 1 } m = 1 , m k n p ( r j m | x j = b ) .
The transmitted symbols through the AWGN channel are independent of noise. As for transmitted symbol s and received symbol r i , the conditional probability function of the channel can be expressed as:
p ( r i | s ) = 1 2 π σ · e ( r i s ) 2 2 σ 2 .
Taking the LLR-BP in the decoding is equivalent to taking the logarithm of the conditional probability function of the channel.
ln p ( r i | s ) = ln 1 2 π σ ( r i s ) 2 2 σ 2 ,
where r i s = e i . The specific operation of BP-LLR is as follow. In the decoding of symbol nodes of the BP algorithm, symbol nodes transmit a message including v i k ( 0 ) and v i k ( 1 ) to variable nodes as Equations (11) and (12). Using LLR, The transmitted message v i k l will become the logarithmic form as follow:
v i k l = ln ( v i k ( 0 ) v i k ( 1 ) ) .
In the decoding of variable nodes, variable nodes transmit a message include u i k ( 0 ) and u i k ( 1 ) to variable node as Equations (13) and (14). Using LLR, it only needs to add an operation rather than multiplication. The information u j k ( l ) of variable nodes transmitted to symbol nodes is denoted as:
u j k l = ln ( u j k ( 0 ) u j k ( 1 ) ) = j k i k ln ( v i k ( 0 ) v i k ( 1 ) ) .
In LLR-BP, the LLR u j k l is the soft information acquired by iterative decoding. The decision process is as follow:
b = { 1 , u j k l < 0 ; 0 , u j k l 0 ;
Combining (11) and (12), v i k l is further represented as:
v i k l = s = s i \ k m i n s i \ k m a x ln s s = s i \ k m i n s i \ k m a x ( r i s ) 2 2 σ 2 s = s i \ k m i n s i \ k m a x ln s + s = s i \ k m i n s i \ k m a x ( r i s w k ) 2 2 σ 2 = s = s i \ k m i n s i \ k m a x w k 2 2 w k ( r i s ) 2 σ 2 = w k 2 σ 2 w k σ 2 s = s i \ k m i n s i \ k m a x ( r i s ) .
r i is the received symbol and s represents the possible transmitted symbol, r i s can be simplified to e i + d , where e i is the noise and d represents different values among possible symbols. Due to the reason that these possible transmitted symbols are accurate, d can be seen as a constant. w k and σ 2 both can be seen as constants. Let A represent an additive constant and let p represent a multiplier constant. We can further simplify v j k l .
v i k l = A + p · e i .
e i satisfies Gaussian distribution. As can be found from Equation (21), v i k l satisfies a distribution obtained by linear operation of Gaussian distribution. During the decoding, the variable nodes only perform the add operation u j k l is also a linear function of e i as Equation (22):
u j k l = A + p · e i .
According to the above analysis, the distribution of soft information is closed to Gaussian distribution. According to the property, the closer the absolute value of soft information is to 0, the greater the error probability of soft information. This property is helpful in the selection of thresholds.

5. Simulation

In this section, we first obtain the threshold of soft information through simulation. Then, we compare the performance of MMwoFR and IBP with the original RCM. We also have compared the complexity of the improved scheme. In order to evaluate the stability of the improved scheme, we also have performed a sensitivity analysis.

5.1. Threshold of Soft Information

In a practical system, a receiver should choose a suitable threshold. When the threshold is too large, less valid soft information is retained. Conversely, if the threshold is too small, the retained error soft information will increase. We have previously summarized the distribution of wrong soft information. It is verified below.
Simulation is performed at SNR from 5 dB to 30 dB. In the experiment, we choose 10 5 bits as a block and run 10,000 blocks for each SNR. For each block of bits, we find the soft information corresponding to error bits. Then, we got the probability density function (PDF) of these soft information values and averaged the 300 blocks to get the means. Figure 5 shows the PDF of wrong soft information values when SNR = 5 dB, 10 dB, 15 dB, 20 dB, 25 dB and 30 dB. It also shows that the probability will decrease when the soft information value is far from 0.
In order to obtain reliable thresholds, the cumulative distribution function (CDF) of soft information corresponding to error bits has been obtained according to the simulation results. According to the CDF, select the point corresponding to the probability at about 99 % as the threshold. The final selected threshold is at Table 1.
At the end of each iteration, the remaiing soft information is scaled down according to the threshold value so that the maximum value of soft information retained each time would not exceed the threshold.
Although these thresholds are based on simulations, they are not sensitive within a certain range. We also have done simulation analysis of sensitivity of the thresholds. The results will be shown in Section 5.4.

5.2. Performance Evaluation

In order to confirm the improved scheme’s performance, a lot of experiments are performed in this section. Utilizing the mapping matrix without four rings (MMwoFR) and improved belief propagation (IBP) algorithm, we implement four different situations. The first is the original RCM. The second only uses the MMwoFR. The third only uses the IBP. The last combines MMwoFR and IBP (MMwoFR-IBP). The presentation of these four situations will be more intuitive to the comparison of the performance of different schemes.
The weight set of the original RCM is ± 1 , ± 2 , ± 4 , ± 4 . In [13,15], the weight sets ± 1 , ± 2 , ± 4 , ± 8 and ± 1 , ± 1 , ± 2 , ± 2 have been discussed for RCM. In order to show the universality of the improved scheme, we take experimental simulations using the three weight sets (shown in Table 2). It can be found from Table 2 that different weight sets have different elements; therefore, the classes of generated symbols are different.
Simulation is performed under the AWGN channel. Every 400 bits are a block. The dimension of mapping matrix is designed as 400 × 400 . When the channel conditions are very poor, the number of generated symbols may exceed 400. At this time, the mapping matrix is repeated. Symbols generated by the same row of mapping matrix are merged using the maximum merger ratio.
During transmission, the demapping threshold is the same as the original RCM [8]. When CRC is failed, the receiver will increase the received symbols. In the original receiver model, the additional number of symbols is 10. As for IBP, less additional symbols may succeed during decoding due to the retention of soft information. However, the number of decoding will increase when the additional number of symbols is reduced. Therefore, the additional number of symbols is chosen based on the performance and the number of decoding. We simulated the performance of MMwoFR-IBP when the additional number is in the range of 1–10. According to the result of simulations, we choose the additional number which has the best performance. When the performance is equivalent, we choose the additional number which has less number of decoding. According to the above selection, the number of additional symbols is shown in Table 3.
In order to maintain a more stable system, a maximum number of received symbols is set. When the number of received symbols is lower than the maximum number, the soft information will be retained. In contrast, when the number of received symbols is higher than the maximum number, all the soft information will be discarded. In [8], the cumulative distribution function (CDF) of successful decoding at different SNR has been obtained. In our simulations, we ran 1000 blocks of data. In this case, we can get 1000 numbers of symbols for successful decoding at each SNR. We choose the maximum number in the 1000 numbers as the threshold of the maximum number of symbol. The maximum number of symbols for each SNR is shown in Table 4.
In order to evaluate the performance, we use goodput as the evaluation metric, which is the rate of correctly received bits. The goodput performance of different weight sets is shown in Figure 6, Figure 7 and Figure 8. When the weight set is ± 1 , ± 1 , ± 2 , ± 2 , RCM1 achieves the rate of 4.81 bits/s/Hz at 27 dB, while MMwoFR achieves the same rate at 25 dB, IBP at 26 dB and MMwoFR-IBP at 24 dB. MMwoFR-IBP’s most goodput reaches 5.28 bits/s/Hz and achieves 9.1% goodput gain.
When the weight set is ± 1 , ± 2 , ± 4 , ± 4 , RCM2 achieve the rate of 6.25 bits/s/Hz at 30 dB, while MMwoFR achieve the same rate at 27 dB, IBP at 24 dB and MMwoFR-IBP at 23 dB. MMwoFR-IBP’s most goodput reaches 7.29 bits/s/Hz and achieves 16.3% goodput gain.
When the weight set is ± 1 , ± 2 , ± 4 , ± 8 , RCM3 achieves the rate of 7.3 bits/s/Hz at 30 dB, while MMwoFR achieves the same rate at 28 dB, IBP at 28 dB and NMMCM-IBP-RCM2 at 26 dB. MMwoFR-IBP’s most goodput reaches 7.96 bits/s/Hz and achieves 7.2% goodput gain. As depicted from the curve in the figure, the performance of MMwoFR-IBP is optimal. Both MMwoFR and IBP can improve the spectrum efficiency. As the SNR increases, the increment of spectrum efficiency will be more obvious, and especially apparent at high SNR.
Through the comparison of performance of four situations, we find that MMwoFR-IBP, MMwoFR and IBP are all superior to the original RCM at high-SNR range. The reason resides in the following two points. First, when using MMwoFR, the speed of transmission and update of the soft information in the iterative decoding is accelerated. The result of demapping is more reliable. Second, the IBP algorithm retained valid information which is discarded for the original RCM. These valid information as initial information of next decoding will increase the correct probability of decoding so that the number of symbols required for decoding is reduced. The two points are both beneficial to the improvement of spectrum efficiency.

5.3. Comparison of Complexity

The iteration decoding algorithm of RCM is complex. The complexity mainly depends on the process of decoding. In the decoding, the complexity of the process of symbol nodes dominates. Existing improved decoding algorithms all aim to simplify the process of symbol nodes. When weight set is settled the same, the complexity of decoding depends just on the decoding number at each round. Under the condition that they use the same weight sets, the complexity of four schemes can be compared by the decoding number.
Figure 9 shows the average number of decoding for the original RCM, MMwoFR, IBP and MMwoFR-IBP with the weight sets ± 1 , ± 2 , ± 4 , ± 4 . As can be seen from the figure, the average decoding number at low SNR is much higher than that at high-SNR and the average decoding number of four schemes is comparable at low SNR. Due to the reason that the additional number of symbol is reduced, the complexity of IBP and MMwoFR-IBP is slightly higher than the original RCM and MMwoFR at high SNR. Overall, the complexity is comparable.

5.4. Sensitivity to SNR Estimation Error

In practical communication systems, the threshold will change as SNR changes. However, existing channel estimation techniques do not usually achieve accurate and real-time channel information. One obvious advantage of the original RCM is that it does not need accurate channel information. Therefore, it is necessary to evaluate whether the proposed scheme is sensitive to inaccurate SNR estimated value. According to [24], 98% of the SNR estimation error is within −6 dB to 6 dB. Therefore, our sensitivity analysis is within this range.
In the simulation, we chose four situations of 10 dB, 15 dB, 20 dB and 25 dB. Assume the estimated error within −6 dB to 6 dB × 10 7 bits were used in the experiment. The experimental results are shown in Figure 10. It can be found that the goodput performance has small fluctuation. According to the simulation result, we conclude that the proposed schemes are not sensitive to the SNR estimation error. It is crucial for the proposed scheme to adapt the actual communication environment.

6. Conclusions

In this paper, a new mapping matrix construction method of RCM is proposed. This method is able to construct the mapping matrix without four rings (MMwoFR), which improves the update rate of information between symbol nodes and variable nodes during decoding. Based on the LLR-BP decoding algorithm, an improved belief propagation (IBP) decoding algorithm which uses soft information by last decoding is proposed. When the CRC is failed, the soft information from the last decoding, which is higher than the threshold, is reserved as the initial information of the following decoding, which greatly improves the decoding efficiency. Simulation shows that these two methods achieve great goodput gain. We have evaluated the performance of MMwoFR, IBP and the combination of both (MMwoFR-IBP) in the additive white Gaussian noise (AWGN) channel. Compared to the original RCM, these three schemes all achieved performance gain at high SNR. MMwoFR achieves about 3 % goodput gain within the SNR region from 25 dB to 30 dB. IBP achieves at least 3 % goodput gain from 14 dB to 30 dB and achieves a maximum goodput gain of 8 % at 30 dB. Especially, using MMwoFR-IBP achieves at least 12 % goodput gain from 25 dB to 30 dB and achieves 16 % goodput gain at 30 dB. In the future, we aim to further research RCM and the transmission system.

Author Contributions

Experiments were conceived and designed by J.Z., W.L. (Wei Liu), Z.P.; Experiments were performed by J.Z., W.L. (Wei Liu), Z.P.; Results were analyzed by all authors. All authors were involved in paper writing.

Funding

This research received no external funding.

Acknowledgments

The authors would like to thank editors and reviewers for many constructive suggestions and comments that helped to improve the quality of the paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Goeckel, D.L. Adaptive coding for time-varying channels using outdated fading estimates. IEEE Trans. Commun. 1999, 47, 844–855. [Google Scholar] [CrossRef]
  2. Song, K.B.; Ekbal, A.; Chung, S.T.; Cioffi, J.M. Adaptive modulation and coding (AMC) for bit-interleaved coded OFDM (BIC-OFDM). IEEE Int. Conf. Commun. 2006, 6, 3197–3201. [Google Scholar]
  3. Tong, J.; Ping, L.; Ma, X. Superposition Coded Modulation With Peak-Power Limitation. IEEE Trans. Inf. Theory 2009, 55, 2562–2576. [Google Scholar] [CrossRef] [Green Version]
  4. Shokrollahi, A. Raptor codes. IEEE Trans. Inf. Theory 2006, 52, 2551–2567. [Google Scholar] [CrossRef]
  5. Luby, M. LT codes. In Proceedings of the Symposium on Foundations of Computer Science, Vancouver, BC, Canada, 16–19 November 2002; pp. 271–280. [Google Scholar]
  6. Perry, J.; Iannucci, P.A.; Fleming, K.E.; Balakrishnan, H.; Shah, D. Spinal codes. ACM SIGCOMM Comput. Commun. Rev. 2012, 42, 49–60. [Google Scholar] [CrossRef]
  7. Shirvanimoghaddam, M.; Li, Y.; Vucetic, B. Near-Capacity Adaptive Analog Fountain Codes for Wireless Channels. IEEE Commun. Lett. 2013, 17, 2241–2244. [Google Scholar] [CrossRef] [Green Version]
  8. Cui, H.; Luo, C.; Tan, K.; Wu, F.; Chen, C.W. Seamless rate adaptation for wireless networking. In Proceedings of the International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWIM 2011, Miami, FL, USA, 31 October–4 November 2011; pp. 437–446. [Google Scholar]
  9. Rao, W.; Dong, Y.; Lu, F.; Wang, S. Log-likelihood ratio algorithm for rate-compatible modulation. In Proceedings of the IEEE International Symposium on Circuits and Systems, Beijing, China, 19–23 May 2013; pp. 1938–1941. [Google Scholar]
  10. Cui, H.; Luo, C.; Wu, J.; Chen, C.W.; Wu, F. Compressive Coded Modulation for Seamless Rate Adaptation. IEEE Trans. Wirel. Commun. 2013, 12, 4892–4904. [Google Scholar] [CrossRef] [Green Version]
  11. Lu, F.; Dong, Y.; Rao, W.; Chen, C.W. Low Complexity Decoding Algorithms for Rate Compatible Modulation. IEEE Access 2018, 6, 31417–31429. [Google Scholar] [CrossRef]
  12. Lu, F.; Dong, Y.; Rao, W. A Parallel Belief Propagation Decoding Algorithm for Rate Compatible Modulation. IEEE Commun. Lett. 2017, 21, 1735–1738. [Google Scholar] [CrossRef]
  13. Wu, J.; Teng, Z.; Cui, H.; Luo, C.; Huang, X.; Chen, H.H. Arithmetic-BICM for Seamless Rate Adaptation for Wireless Communication Systems. IEEE Syst. J. 2016, 10, 228–239. [Google Scholar] [CrossRef]
  14. Duan, R.; Liu, R.; Shirvanimoghaddam, M.; Li, Y.; Chen, C.W. A Low PAPR Constellation Mapping Scheme for Rate Compatible Modulation. IEEE Commun. Lett. 2016, 20, 256–259. [Google Scholar] [CrossRef]
  15. Rao, W.; Dong, Y.; Chen, S.; Lu, F.; Wang, S. An Efficient Rate Compatible Modulation with Variable Weight Sets. IEEE Access 2018, 6, 5064–5074. [Google Scholar] [CrossRef]
  16. Wang, M.; Wu, J.; Yu, W.; Wang, H.; Li, J.; Shi, J.; Luo, C. Efficient coding modulation and seamless rate adaptation for visible light communications. IEEE Wirel. Commun. 2015, 22, 86–93. [Google Scholar] [CrossRef]
  17. Shirvanimoghaddam, M.; Li, Y.; Dohler, M.; Vucetic, B.; Feng, S. Probabilistic Rateless Multiple Access for Machine-to-Machine Communication. IEEE Trans. Wirel. Commun. 2015, 14, 6815–6826. [Google Scholar] [CrossRef]
  18. Gallager, R. Low-density parity-check codes. IRE Trans. Inf. Theory 1962, 8, 21–28. [Google Scholar] [CrossRef] [Green Version]
  19. Kou, Y.; Lin, S.; Fossorier, M.P.C. Low-density parity-check codes based on finite geometries: A rediscovery and new results. IEEE Trans. Inform. Theory 2001, 47, 2711–2736. [Google Scholar] [CrossRef]
  20. Fan, J.L. Array codes as LDPC codes. In Constrained Coding and Soft Iterative Decoding; Springer: Berlin, Germany, 2001; pp. 195–203. [Google Scholar]
  21. Tanner, R.M.; Sridhara, D.; Fuja, T. A class of group-structured LDPC codes. In Proceedings of the International Symposium on Communication Theory Applications, Ambleside, UK, 15–20 July 2001. [Google Scholar]
  22. Wang, Y.; Yedidia, J.S.; Draper, S.C. Construction of high-girth QC-LDPC codes. In Proceedings of the International Symposium on Turbo Codes and Related Topics, Lausanne, Switzerland, 1–5 September 2008; pp. 180–185. [Google Scholar]
  23. Baron, D.; Sarvotham, S.; Baraniuk, R.G. Bayesian Compressive Sensing Via Belief Propagation. IEEE Trans. Signal Process. 2009, 58, 269–280. [Google Scholar] [CrossRef]
  24. Edalat, F.; Edalat, F.; Katabi, D.; Sodini, C.G. Frequency-aware rate adaptation and MAC protocols. In Proceedings of the International Conference on Mobile Computing and NETWORKING, Beijing, China, 20–25 September 2009; pp. 193–204. [Google Scholar]
Figure 1. Transmission model of the transmitter.
Figure 1. Transmission model of the transmitter.
Electronics 08 00307 g001
Figure 2. Comparison between original receiver model and improved receiver model. (a) Original receiver model. (b) Improved receiver model.
Figure 2. Comparison between original receiver model and improved receiver model. (a) Original receiver model. (b) Improved receiver model.
Electronics 08 00307 g002
Figure 3. Symbol node conveys message to its all neighboring variable nodes.
Figure 3. Symbol node conveys message to its all neighboring variable nodes.
Electronics 08 00307 g003
Figure 4. Variable node conveys message to its all neighboring symbol nodes.
Figure 4. Variable node conveys message to its all neighboring symbol nodes.
Electronics 08 00307 g004
Figure 5. Probability density function of wrong soft information.
Figure 5. Probability density function of wrong soft information.
Electronics 08 00307 g005
Figure 6. Goodput comparison in different system with weight set ± 1 , ± 1 , ± 2 , ± 2 .
Figure 6. Goodput comparison in different system with weight set ± 1 , ± 1 , ± 2 , ± 2 .
Electronics 08 00307 g006
Figure 7. Goodput comparison in different system with weight set ± 1 , ± 2 , ± 4 , ± 4 .
Figure 7. Goodput comparison in different system with weight set ± 1 , ± 2 , ± 4 , ± 4 .
Electronics 08 00307 g007
Figure 8. Goodput comparison in different system with weight set ± 1 , ± 2 , ± 4 , ± 8 .
Figure 8. Goodput comparison in different system with weight set ± 1 , ± 2 , ± 4 , ± 8 .
Electronics 08 00307 g008
Figure 9. Average decoding number under different SNR with weight set ± 1 , ± 2 , ± 4 , ± 4 .
Figure 9. Average decoding number under different SNR with weight set ± 1 , ± 2 , ± 4 , ± 4 .
Electronics 08 00307 g009
Figure 10. Sensitivity to SNR estimation errors.
Figure 10. Sensitivity to SNR estimation errors.
Electronics 08 00307 g010
Table 1. Thresholds of soft information for different SNR.
Table 1. Thresholds of soft information for different SNR.
SNR(dB)5678910111213
Threshold8.067.577.356.906.816.56.346.176.00
SNR(dB)141516171819202122
Threshold5.915.805.335.144.674.474.254.134.04
SNR(dB)2324252627282930
Threshold3.913.753.553.463.403.243.103.07
Table 2. Three weight sets of RCM.
Table 2. Three weight sets of RCM.
NameWeight SetLType of Symbol
RCM1 ± 1 , ± 1 , ± 2 , ± 2 813
RCM2 ± 1 , ± 2 , ± 4 , ± 4 823
RCM3 ± 1 , ± 2 , ± 4 , ± 8 831
Table 3. Additional number of symbols for different SNR.
Table 3. Additional number of symbols for different SNR.
SNR(dB)5678910111213
Number101010101010101010
SNR(dB)141516171819202122
Number777555333
SNR(dB)2324252627282930
Number22211111
Table 4. Maximum number of received symbols for different SNR.
Table 4. Maximum number of received symbols for different SNR.
SNR(dB)5678910111213
Number2650210012801100980770710450350
SNR(dB)141516171819202122
Number300290260240230200190170170
SNR(dB)2324252627282930
Number170150150150150150150140

Share and Cite

MDPI and ACS Style

Zhu, J.; Pan, Z.; Liu, W.; Lei, J.; Li, W. Mapping Matrix Design and Improved Belief Propagation Decoding Algorithm for Rate-Compatible Modulation. Electronics 2019, 8, 307. https://doi.org/10.3390/electronics8030307

AMA Style

Zhu J, Pan Z, Liu W, Lei J, Li W. Mapping Matrix Design and Improved Belief Propagation Decoding Algorithm for Rate-Compatible Modulation. Electronics. 2019; 8(3):307. https://doi.org/10.3390/electronics8030307

Chicago/Turabian Style

Zhu, Jinkun, Zhipeng Pan, Wei Liu, Jing Lei, and Wei Li. 2019. "Mapping Matrix Design and Improved Belief Propagation Decoding Algorithm for Rate-Compatible Modulation" Electronics 8, no. 3: 307. https://doi.org/10.3390/electronics8030307

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop