-
Neural Network Equalizers and Successive Interference Cancellation for Bandlimited Channels with a Nonlinearity
Authors:
Daniel Plabst,
Tobias Prinz,
Francesca Diedolo,
Thomas Wiegart,
Georg Böcherer,
Norbert Hanik,
Gerhard Kramer
Abstract:
Neural networks (NNs) inspired by the forward-backward algorithm (FBA) are used as equalizers for bandlimited channels with a memoryless nonlinearity. The NN-equalizers are combined with successive interference cancellation (SIC) to approach the information rates of joint detection and decoding (JDD) with considerably less complexity than JDD and other existing equalizers. Simulations for short-ha…
▽ More
Neural networks (NNs) inspired by the forward-backward algorithm (FBA) are used as equalizers for bandlimited channels with a memoryless nonlinearity. The NN-equalizers are combined with successive interference cancellation (SIC) to approach the information rates of joint detection and decoding (JDD) with considerably less complexity than JDD and other existing equalizers. Simulations for short-haul optical fiber links with square-law detection illustrate the gains of NNs as compared to the complexity-limited FBA and Gibbs sampling.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Concatenated Forward Error Correction with KP4 and Single Parity Check Codes
Authors:
Diego Lentner,
Emna Ben Yacoub,
Stefano Calabrò,
Georg Böcherer,
Nebojša Stojanović,
Gerhard Kramer
Abstract:
Concatenated forward error correction is studied using an outer KP4 Reed-Solomon code with hard-decision decoding and inner single parity check (SPC) codes with Chase/Wagner soft-decision decoding. Analytical expressions are derived for the end-to-end frame and bit error rates for transmission over additive white Gaussian noise channels with binary phase-shift keying (BPSK) and quaternary amplitud…
▽ More
Concatenated forward error correction is studied using an outer KP4 Reed-Solomon code with hard-decision decoding and inner single parity check (SPC) codes with Chase/Wagner soft-decision decoding. Analytical expressions are derived for the end-to-end frame and bit error rates for transmission over additive white Gaussian noise channels with binary phase-shift keying (BPSK) and quaternary amplitude shift keying (4-ASK), as well as with symbol interleavers and quantized channel outputs. The BPSK error rates are compared to those of two other inner codes: a two-dimensional product code with SPC component codes and an extended Hamming code. Simulation results for unit-memory inter-symbol interference channels and 4-ASK are also presented. The results show that the coding schemes achieve similar error rates, but SPC codes have the lowest complexity and permit flexible rate adaptation.
△ Less
Submitted 17 May, 2023; v1 submitted 20 December, 2022;
originally announced December 2022.
-
CorrectNet: Robustness Enhancement of Analog In-Memory Computing for Neural Networks by Error Suppression and Compensation
Authors:
Amro Eldebiky,
Grace Li Zhang,
Georg Boecherer,
Bing Li,
Ulf Schlichtmann
Abstract:
The last decade has witnessed the breakthrough of deep neural networks (DNNs) in many fields. With the increasing depth of DNNs, hundreds of millions of multiply-and-accumulate (MAC) operations need to be executed. To accelerate such operations efficiently, analog in-memory computing platforms based on emerging devices, e.g., resistive RAM (RRAM), have been introduced. These acceleration platforms…
▽ More
The last decade has witnessed the breakthrough of deep neural networks (DNNs) in many fields. With the increasing depth of DNNs, hundreds of millions of multiply-and-accumulate (MAC) operations need to be executed. To accelerate such operations efficiently, analog in-memory computing platforms based on emerging devices, e.g., resistive RAM (RRAM), have been introduced. These acceleration platforms rely on analog properties of the devices and thus suffer from process variations and noise. Consequently, weights in neural networks configured into these platforms can deviate from the expected values, which may lead to feature errors and a significant degradation of inference accuracy. To address this issue, in this paper, we propose a framework to enhance the robustness of neural networks under variations and noise. First, a modified Lipschitz constant regularization is proposed during neural network training to suppress the amplification of errors propagated through network layers. Afterwards, error compensation is introduced at necessary locations determined by reinforcement learning to rescue the feature maps with remaining errors. Experimental results demonstrate that inference accuracy of neural networks can be recovered from as low as 1.69% under variations and noise back to more than 95% of their original accuracy, while the training and hardware cost are negligible.
△ Less
Submitted 27 November, 2022;
originally announced November 2022.
-
Codebook Mismatch Can Be Fully Compensated by Mismatched Decoding
Authors:
Neri Merhav,
Georg Bocherer
Abstract:
We consider an ensemble of constant composition codes that are subsets of linear codes: while the encoder uses only the constant-composition subcode, the decoder operates as if the full linear code was used, with the motivation of simultaneously benefiting both from the probabilistic sha** of the channel input and from the linear structure of the code. We prove that the codebook mismatch can be…
▽ More
We consider an ensemble of constant composition codes that are subsets of linear codes: while the encoder uses only the constant-composition subcode, the decoder operates as if the full linear code was used, with the motivation of simultaneously benefiting both from the probabilistic sha** of the channel input and from the linear structure of the code. We prove that the codebook mismatch can be fully compensated by using a mismatched additive decoding metric that achieves the random coding error exponent of (non-linear) constant composition codes. As the coding rate tends to the mutual information, the optimal mismatched metric approaches the maximum a posteriori probability (MAP) metric, showing that codebook mismatch with mismatched MAP metric is capacity-achieving for the optimal input assignment.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
Nonlinear Equalization for Optical Communications Based on Entropy-Regularized Mean Square Error
Authors:
Francesca Diedolo,
Georg Böcherer,
Maximilian Schädler,
Stefano Calabró
Abstract:
An entropy-regularized mean square error (MSE-X) cost function is proposed for nonlinear equalization of short-reach optical channels. For a coherent optical transmission experiment, MSE-X achieves the same bit error rate as the standard MSE cost function and a significantly higher achievable information rate.
An entropy-regularized mean square error (MSE-X) cost function is proposed for nonlinear equalization of short-reach optical channels. For a coherent optical transmission experiment, MSE-X achieves the same bit error rate as the standard MSE cost function and a significantly higher achievable information rate.
△ Less
Submitted 2 June, 2022;
originally announced June 2022.
-
Spiking Neural Network Equalization for IM/DD Optical Communication
Authors:
Elias Arnold,
Georg Böcherer,
Eric Müller,
Philipp Spilger,
Johannes Schemmel,
Stefano Calabrò,
Maxim Kuschnerov
Abstract:
A spiking neural network (SNN) equalizer model suitable for electronic neuromorphic hardware is designed for an IM/DD link. The SNN achieves the same bit-error-rate as an artificial neural network, outperforming linear equalization.
A spiking neural network (SNN) equalizer model suitable for electronic neuromorphic hardware is designed for an IM/DD link. The SNN achieves the same bit-error-rate as an artificial neural network, outperforming linear equalization.
△ Less
Submitted 1 June, 2022; v1 submitted 9 May, 2022;
originally announced May 2022.
-
PAM-6 Coded Modulation for IM/DD Channels with a Peak-Power Constraint
Authors:
Tobias Prinz,
Thomas Wiegart,
Daniel Plabst,
Stefano Calabrò,
Georg Böcherer,
Nebojsa Stojanovic,
Talha Rahman
Abstract:
Coded modulation with probabilistic amplitude sha** (PAS) is considered for intensity modulation/direct detection channels with a transmitter peak-power constraint. PAS is used to map bits to a uniform PAM-6 distribution and outperforms PAM-8 for rates up to around 2.3 bits per channel use. PAM-6 with PAS also outperforms a cross-shaped QAM-32 constellation by up to 1 dB and 0.65 dB after bit-me…
▽ More
Coded modulation with probabilistic amplitude sha** (PAS) is considered for intensity modulation/direct detection channels with a transmitter peak-power constraint. PAS is used to map bits to a uniform PAM-6 distribution and outperforms PAM-8 for rates up to around 2.3 bits per channel use. PAM-6 with PAS also outperforms a cross-shaped QAM-32 constellation by up to 1 dB and 0.65 dB after bit-metric soft- and hard decoding, respectively. An alternative PAM-6 scheme based on a framed cross-shaped QAM-32 constellation is proposed that shows similar gains.
△ Less
Submitted 29 April, 2021;
originally announced April 2021.
-
Probabilistic Parity Sha** for Linear Codes
Authors:
Georg Böcherer,
Diego Lentner,
Alessandro Cirino,
Fabian Steiner
Abstract:
Linear layered probabilistic sha** (LLPS) is proposed, an architecture for linear codes to efficiently encode to shaped code words. In the previously proposed probabilistic amplitude sha** (PAS) architecture, a distribution matcher (DM) maps information bits to shaped bits, which are then systematically encoded by appending uniformly distributed parity bits. LLPS extends PAS by probabilistic p…
▽ More
Linear layered probabilistic sha** (LLPS) is proposed, an architecture for linear codes to efficiently encode to shaped code words. In the previously proposed probabilistic amplitude sha** (PAS) architecture, a distribution matcher (DM) maps information bits to shaped bits, which are then systematically encoded by appending uniformly distributed parity bits. LLPS extends PAS by probabilistic parity sha** (PPS), which uses a syndrome DM to calculate shaped parity bits. LLPS enables the transmission with any desired distribution using linear codes, furthermore, by LLPS, a given linear code with rate $R_\text{fec}$ can be operated at any rate $R\leq R_\text{fec}$ by changing the distribution. LLPS is used with an LDPC code for dirty paper coding against an interfering BPSK signal, improving the energy efficiency by 0.8 dB.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
Polar-Coded Pulse Position Modulation for the Poisson Channel
Authors:
Delcho Donev,
Georg Böcherer
Abstract:
A polar-coded modulation scheme for deep-space optical communication is proposed. The photon counting Poisson channel with pulse position modulation (PPM) is considered. We use the fact that PPM is particularly well suited to be used with multilevel codes to design a polar-coded modulation scheme for the system in consideration. The construction of polar codes for the Poisson channel based on Gaus…
▽ More
A polar-coded modulation scheme for deep-space optical communication is proposed. The photon counting Poisson channel with pulse position modulation (PPM) is considered. We use the fact that PPM is particularly well suited to be used with multilevel codes to design a polar-coded modulation scheme for the system in consideration. The construction of polar codes for the Poisson channel based on Gaussian approximation is demonstrated to be accurate. The proposed scheme uses a cyclic redundancy check outer code and a successive cancellation decoder with list decoding and it is shown that it outperforms the competing schemes.
△ Less
Submitted 7 December, 2018;
originally announced December 2018.
-
Bit-Metric Decoding of Non-Binary LDPC Codes with Probabilistic Amplitude Sha**
Authors:
Fabian Steiner,
Georg Böcherer,
Gianluigi Liva
Abstract:
A new approach for combining non-binary low-density parity-check (NB-LDPC) codes with higher-order modulation and probabilistic amplitude sha** (PAS) is presented. Instead of symbol-metric decoding (SMD), a bit-metric decoder (BMD) is used so that matching the field order of the non-binary code to the constellation size is not needed, which increases the flexibility of the coding scheme. Informa…
▽ More
A new approach for combining non-binary low-density parity-check (NB-LDPC) codes with higher-order modulation and probabilistic amplitude sha** (PAS) is presented. Instead of symbol-metric decoding (SMD), a bit-metric decoder (BMD) is used so that matching the field order of the non-binary code to the constellation size is not needed, which increases the flexibility of the coding scheme. Information rates, density evolution thresholds and finite-length simulations show that the flexibility comes at no loss of performance if PAS is used.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Blind Decoding-Metric Estimation for Probabilistic Sha** via Expectation Maximization
Authors:
Fabian Steiner,
Patrick Schulte,
Georg Böcherer
Abstract:
An unsupervised learning approach based on expectation maximization is proposed to obtain the parameters of a soft decision forward error correction decoding metric for probabilistic sha**. The algorithm depends only on the channel observations and does not require transmitted data.
An unsupervised learning approach based on expectation maximization is proposed to obtain the parameters of a soft decision forward error correction decoding metric for probabilistic sha**. The algorithm depends only on the channel observations and does not require transmitted data.
△ Less
Submitted 26 June, 2018;
originally announced June 2018.
-
Flexible IR-HARQ Scheme for Polar-Coded Modulation
Authors:
Peihong Yuan,
Fabian Steiner,
Tobias Prinz,
Georg Böcherer
Abstract:
A flexible incremental redundancy hybrid auto- mated repeat request (IR-HARQ) scheme for polar codes is proposed based on dynamically frozen bits and the quasi-uniform puncturing (QUP) algorithm. The length of each transmission is not restricted to a power of two. It is applicable for the binary input additive white Gaussian noise (biAWGN) channel as well as higher-order modulation. Simulation res…
▽ More
A flexible incremental redundancy hybrid auto- mated repeat request (IR-HARQ) scheme for polar codes is proposed based on dynamically frozen bits and the quasi-uniform puncturing (QUP) algorithm. The length of each transmission is not restricted to a power of two. It is applicable for the binary input additive white Gaussian noise (biAWGN) channel as well as higher-order modulation. Simulation results show that this scheme has similar performance as directly designed polar codes with QUP and outperforms LTE-turbo and 5G-LDPC codes with IR-HARQ.
△ Less
Submitted 18 May, 2018;
originally announced May 2018.
-
Approaching Waterfilling Capacity of Parallel Channels by Higher Order Modulation and Probabilistic Amplitude Sha**
Authors:
Fabian Steiner,
Georg Böcherer,
Patrick Schulte
Abstract:
Parallel, additive white Gaussian noise (AWGN) channels with an average sum power constraint are considered. It is shown how the waterfilling Shannon capacity can be approached by higher order modulation and probabilistic amplitude sha** (PAS). This is achieved by a new distribution matching approach called product distribution matching (PDM). The asymptotic performance of PDM is analyzed by ach…
▽ More
Parallel, additive white Gaussian noise (AWGN) channels with an average sum power constraint are considered. It is shown how the waterfilling Shannon capacity can be approached by higher order modulation and probabilistic amplitude sha** (PAS). This is achieved by a new distribution matching approach called product distribution matching (PDM). The asymptotic performance of PDM is analyzed by achievable rates. A heuristic for optimizing the input distribution is proposed, which enables signaling at a target spectral efficiency with a fixed-rate forward error correction (FEC) code, while the optimal power allocation is ensured by mercury-waterfilling and a simple bit-loading strategy. Finite blocklength simulation results with 5G low-density parity-check codes show power savings of around 1 dB compared to a conventional scheme with uniform input distributions.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
Experimental Verification of Rate Flexibility and Probabilistic Sha** by 4D Signaling
Authors:
Fabian Steiner,
Francesco Da Ros,
Metodi Plamenov Yankov,
Georg Böcherer,
Patrick Schulte,
Søren Forchhammer,
Gerhard Kramer
Abstract:
The rate flexibility and probabilistic sha** gain of $4$-dimensional signaling is experimentally tested for short-reach, unrepeated transmission. A rate granularity of 0.5 bits/QAM symbol is achieved with a distribution matcher based on a simple look-up table.
The rate flexibility and probabilistic sha** gain of $4$-dimensional signaling is experimentally tested for short-reach, unrepeated transmission. A rate granularity of 0.5 bits/QAM symbol is achieved with a distribution matcher based on a simple look-up table.
△ Less
Submitted 18 March, 2018;
originally announced March 2018.
-
Ultra-Sparse Non-Binary LDPC Codes for Probabilistic Amplitude Sha**
Authors:
Fabian Steiner,
Gianluigi Liva,
Georg Böcherer
Abstract:
This work shows how non-binary low-density parity-check codes over GF($2^p$) can be combined with probabilistic amplitude sha** (PAS) (Böcherer, et al., 2015), which combines forward-error correction with non-uniform signaling for power-efficient communication. Ultra-sparse low-density parity-check codes over GF(64) and GF(256) gain 0.6 dB in power efficiency over state-of-the-art binary LDPC co…
▽ More
This work shows how non-binary low-density parity-check codes over GF($2^p$) can be combined with probabilistic amplitude sha** (PAS) (Böcherer, et al., 2015), which combines forward-error correction with non-uniform signaling for power-efficient communication. Ultra-sparse low-density parity-check codes over GF(64) and GF(256) gain 0.6 dB in power efficiency over state-of-the-art binary LDPC codes at a spectral efficiency of 1.5 bits per channel use and a blocklength of 576 bits. The simulation results are compared to finite length coding bounds and complemented by density evolution analysis.
△ Less
Submitted 18 August, 2017;
originally announced August 2017.
-
Polar Code Construction for List Decoding
Authors:
Peihong Yuan,
Tobias Prinz,
Georg Böcherer,
Onurcan İşcan,
Ronald Böhnke,
Wen Xu
Abstract:
A heuristic construction of polar codes for successive cancellation list (SCL) decoding with a given list size is proposed to balance the trade-off between performance measured in frame error rate (FER) and decoding complexity. Furthermore, a construction based on dynamically frozen bits with constraints among the "low weight bits" (LWB) is presented. Simulation results show that the LWB-polar cod…
▽ More
A heuristic construction of polar codes for successive cancellation list (SCL) decoding with a given list size is proposed to balance the trade-off between performance measured in frame error rate (FER) and decoding complexity. Furthermore, a construction based on dynamically frozen bits with constraints among the "low weight bits" (LWB) is presented. Simulation results show that the LWB-polar codes outperform the CRC-polar codes and the eBCH-polar codes under SCL decoding.
△ Less
Submitted 2 August, 2018; v1 submitted 31 July, 2017;
originally announced July 2017.
-
Achievable Rates for Probabilistic Sha**
Authors:
Georg Böcherer
Abstract:
For a layered probabilistic sha** (PS) scheme with a general decoding metric, an achievable rate is derived using Gallager's error exponent approach and the concept of achievable code rates is introduced. Several instances for specific decoding metrics are discussed, including bit-metric decoding, interleaved coded modulation, and hard-decision decoding. It is shown that important previously kno…
▽ More
For a layered probabilistic sha** (PS) scheme with a general decoding metric, an achievable rate is derived using Gallager's error exponent approach and the concept of achievable code rates is introduced. Several instances for specific decoding metrics are discussed, including bit-metric decoding, interleaved coded modulation, and hard-decision decoding. It is shown that important previously known achievable rates can also be achieved by layered PS. A practical instance of layered PS is the recently proposed probabilistic amplitude sha** (PAS).
△ Less
Submitted 22 May, 2018; v1 submitted 4 July, 2017;
originally announced July 2017.
-
Experimental Comparison of Probabilistic Sha** Methods for Unrepeated Fiber Transmission
Authors:
Julian Renner,
Tobias Fehenberger,
Metodi P. Yankov,
Francesco Da Ros,
Søren Forchhammer,
Georg Böcherer,
Norbert Hanik
Abstract:
This paper studies the impact of probabilistic sha** on effective signal-to-noise ratios (SNRs) and achievable information rates (AIRs) in a back-to-back configuration and in unrepeated nonlinear fiber transmissions. For back-to-back, various shaped quadrature amplitude modulation (QAM) distributions are found to have the same implementation penalty as uniform input. By demonstrating in transmis…
▽ More
This paper studies the impact of probabilistic sha** on effective signal-to-noise ratios (SNRs) and achievable information rates (AIRs) in a back-to-back configuration and in unrepeated nonlinear fiber transmissions. For back-to-back, various shaped quadrature amplitude modulation (QAM) distributions are found to have the same implementation penalty as uniform input. By demonstrating in transmission experiments that shaped QAM input leads to lower effective SNR than uniform input at a fixed average launch power, we experimentally confirm that sha** enhances the fiber nonlinearities. However, sha** is ultimately found to increase the AIR, which is the most relevant figure of merit as it is directly related to spectral efficiency. In a detailed study of these sha** gains for the nonlinear fiber channel, four strategies for optimizing QAM input distributions are evaluated and experimentally compared in wavelength division multiplexing (WDM) systems. The first sha** scheme generates a Maxwell-Boltzmann (MB) distribution based on a linear additive white Gaussian noise channel. The second strategy uses the Blahut-Arimoto algorithm to optimize an unconstrained QAM distribution for a split-step Fourier method based channel model. In the third and fourth approach, MB-shaped QAM and unconstrained QAM are optimized via the enhanced Gaussian noise (EGN) model. Although the absolute sha** gains are found to be relatively small, the relative improvements by EGN-optimized unconstrained distributions over linear AWGN optimized MB distributions are up to 59%. This general behavior is observed in 9-channel and fully loaded WDM experiments.
△ Less
Submitted 8 November, 2017; v1 submitted 3 May, 2017;
originally announced May 2017.
-
High Throughput Probabilistic Sha** with Product Distribution Matching
Authors:
Georg Böcherer,
Patrick Schulte,
Fabian Steiner
Abstract:
Product distribution matching (PDM) is proposed to generate target distributions over large alphabets by combining the output of several parallel distribution matchers (DMs) with smaller output alphabets. The parallel architecture of PDM enables low-complexity and high-throughput implementation. PDM is used as a sha** device for probabilistic amplitude sha** (PAS). For 64-ASK and a spectral ef…
▽ More
Product distribution matching (PDM) is proposed to generate target distributions over large alphabets by combining the output of several parallel distribution matchers (DMs) with smaller output alphabets. The parallel architecture of PDM enables low-complexity and high-throughput implementation. PDM is used as a sha** device for probabilistic amplitude sha** (PAS). For 64-ASK and a spectral efficiency of 4.5 bits per channel use (bpcu), PDM is as power efficient as a single full-fledged DM. It is shown how PDM enables PAS for parallel channels present in multi-carrier systems like digital subscriber line (DSL) and orthogonal frequency-division multiplexing (OFDM). The key feature is that PDM shares the DMs for lower bit-levels among different sub-carriers, which improves the power efficiency significantly. A representative parallel channel example shows that PAS with PDM is 0.93 dB more power efficient than conventional uniform signaling and PDM is 0.35 dB more power efficient than individual per channel DMs.
△ Less
Submitted 24 February, 2017;
originally announced February 2017.
-
Efficient Polar Code Construction for Higher-Order Modulation
Authors:
Georg Böcherer,
Tobias Prinz,
Peihong Yuan,
Fabian Steiner
Abstract:
An efficient algorithm for the construction of polar codes for higher-order modulation is presented based on information-theoretic principles. The bit reliabilities after successive demap** are estimated using the LM-rate, an achievable rate for mismatched decoding. The successive demapper bit channels are then replaced by binary input Additive White Gaussian Noise (biAWGN) surrogate channels an…
▽ More
An efficient algorithm for the construction of polar codes for higher-order modulation is presented based on information-theoretic principles. The bit reliabilities after successive demap** are estimated using the LM-rate, an achievable rate for mismatched decoding. The successive demapper bit channels are then replaced by binary input Additive White Gaussian Noise (biAWGN) surrogate channels and polar codes are constructed using the Gaussian approximation (GA). This LM-rate Demapper GA (LM-DGA) construction is used to construct polar codes for several demap** strategies proposed in literature. For all considered demappers, the LM-DGA constructed polar codes have the same performance as polar codes constructed by Monte Carlo (MC) simulation. The proposed LM-DGA construction is much faster than the MC construction. For 64-QAM, spectral efficiency 3 bits/s/Hz, and block length 1536 bits, simulation results show that LM-DGA constructed polar codes with cyclic redundancy check and successive cancellation list decoding are 1 dB more power efficient than state-of-the-art AR4JA low-density parity-check codes.
△ Less
Submitted 25 October, 2016;
originally announced October 2016.
-
Comparison of Geometric and Probabilistic Sha** with Application to ATSC 3.0
Authors:
Fabian Steiner,
Georg Böcherer
Abstract:
In this work, geometric sha** (GS) and probabilistic sha** (PS) for the AWGN channel is reviewed. Both approaches are investigated in terms of symbol-metric decoding (SMD) and bit-metric decoding (BMD). For GS, an optimization algorithm based on differential evolution is formulated. Achievable rate analysis reveals that GS suffers from a 0.4 dB performance degradation compared to PS when BMD i…
▽ More
In this work, geometric sha** (GS) and probabilistic sha** (PS) for the AWGN channel is reviewed. Both approaches are investigated in terms of symbol-metric decoding (SMD) and bit-metric decoding (BMD). For GS, an optimization algorithm based on differential evolution is formulated. Achievable rate analysis reveals that GS suffers from a 0.4 dB performance degradation compared to PS when BMD is used. Forward-error correction simulations of the ATSC 3.0 modulation and coding formats (modcods) confirm the theoretical findings. In particular, PS enables seamless rate adaptation with one single modcod and it outperforms ATSC 3.0 GS modcods by more than 0.5 dB for spectral efficiencies larger than 3.2 bits per channel use.
△ Less
Submitted 15 August, 2016; v1 submitted 1 August, 2016;
originally announced August 2016.
-
Lecture Notes on Channel Coding
Authors:
Georg Böcherer
Abstract:
These lecture notes on channel coding were developed for a one-semester course for graduate students of electrical engineering. Chapter 1 reviews the basic problem of channel coding. Chapters 2-5 are on linear block codes, cyclic codes, Reed-Solomon codes, and BCH codes, respectively. The notes are self-contained and were written with the intent to derive the presented results with mathematical ri…
▽ More
These lecture notes on channel coding were developed for a one-semester course for graduate students of electrical engineering. Chapter 1 reviews the basic problem of channel coding. Chapters 2-5 are on linear block codes, cyclic codes, Reed-Solomon codes, and BCH codes, respectively. The notes are self-contained and were written with the intent to derive the presented results with mathematical rigor. The notes contain in total 68 homework problems, of which 20% require computer programming.
△ Less
Submitted 4 July, 2016;
originally announced July 2016.
-
On Probabilistic Sha** of Quadrature Amplitude Modulation for the Nonlinear Fiber Channel
Authors:
Tobias Fehenberger,
Alex Alvarado,
Georg Böcherer,
Norbert Hanik
Abstract:
Different aspects of probabilistic sha** for a multi-span optical communication system are studied. First, a numerical analysis of the additive white Gaussian noise (AWGN) channel investigates the effect of using a small number of input probability mass functions (PMFs) for a range of signal-to-noise ratios (SNRs), instead of optimizing the constellation sha** for each SNR. It is shown that if…
▽ More
Different aspects of probabilistic sha** for a multi-span optical communication system are studied. First, a numerical analysis of the additive white Gaussian noise (AWGN) channel investigates the effect of using a small number of input probability mass functions (PMFs) for a range of signal-to-noise ratios (SNRs), instead of optimizing the constellation sha** for each SNR. It is shown that if a small penalty of at most 0.1 dB SNR to the full sha** gain is acceptable, just two shaped PMFs are required per quadrature amplitude modulation (QAM) over a large SNR range. For a multi-span wavelength division multiplexing (WDM) optical fiber system with 64QAM input, it is shown that just one PMF is required to achieve large gains over uniform input for distances from 1,400 km to 3,000 km. Using recently developed theoretical models that extend the Gaussian noise (GN) model and full-field split-step simulations, we illustrate the ramifications of probabilistic sha** on the effective SNR after fiber propagation. Our results show that, for a fixed average optical launch power, a sha** gain is obtained for the noise contributions from fiber amplifiers and modulation-independent nonlinear interference (NLI), whereas sha** simultaneously causes a penalty as it leads to an increased NLI. However, this nonlinear sha** loss is found to have a relatively minor impact, and optimizing the shaped PMF with a modulation-dependent GN model confirms that the PMF found for AWGN is also a good choice for a multi-span fiber system.
△ Less
Submitted 28 July, 2016; v1 submitted 13 June, 2016;
originally announced June 2016.
-
Greedy Algorithms for Optimal Distribution Approximation
Authors:
Bernhard C. Geiger,
Georg Böcherer
Abstract:
The approximation of a discrete probability distribution $\mathbf{t}$ by an $M$-type distribution $\mathbf{p}$ is considered. The approximation error is measured by the informational divergence $\mathbb{D}(\mathbf{t}\Vert\mathbf{p})$, which is an appropriate measure, e.g., in the context of data compression. Properties of the optimal approximation are derived and bounds on the approximation error…
▽ More
The approximation of a discrete probability distribution $\mathbf{t}$ by an $M$-type distribution $\mathbf{p}$ is considered. The approximation error is measured by the informational divergence $\mathbb{D}(\mathbf{t}\Vert\mathbf{p})$, which is an appropriate measure, e.g., in the context of data compression. Properties of the optimal approximation are derived and bounds on the approximation error are presented, which are asymptotically tight. It is shown that $M$-type approximations that minimize either $\mathbb{D}(\mathbf{t}\Vert\mathbf{p})$, or $\mathbb{D}(\mathbf{p}\Vert\mathbf{t})$, or the variational distance $\Vert\mathbf{p}-\mathbf{t}\Vert_1$ can all be found by using specific instances of the same general greedy algorithm.
△ Less
Submitted 22 January, 2016;
originally announced January 2016.
-
Capacity Bounds for Discrete-Time, Amplitude-Constrained, Additive White Gaussian Noise Channels
Authors:
Andrew Thangaraj,
Gerhard Kramer,
Georg Bocherer
Abstract:
The capacity-achieving input distribution of the discrete-time, additive white Gaussian noise (AWGN) channel with an amplitude constraint is discrete and seems difficult to characterize explicitly. A dual capacity expression is used to derive analytic capacity upper bounds for scalar and vector AWGN channels. The scalar bound improves on McKellips' bound and is within 0.1 bits of capacity for all…
▽ More
The capacity-achieving input distribution of the discrete-time, additive white Gaussian noise (AWGN) channel with an amplitude constraint is discrete and seems difficult to characterize explicitly. A dual capacity expression is used to derive analytic capacity upper bounds for scalar and vector AWGN channels. The scalar bound improves on McKellips' bound and is within 0.1 bits of capacity for all signal-to-noise ratios (SNRs). The two-dimensional bound is within 0.15 bits of capacity provably up to 4.5 dB, and numerical evidence suggests a similar gap for all SNRs.
△ Less
Submitted 27 November, 2015;
originally announced November 2015.
-
Experimental Demonstration of Capacity Increase and Rate-Adaptation by Probabilistically Shaped 64-QAM
Authors:
Fred Buchali,
Georg Böcherer,
Wilfried Idler,
Laurent Schmalen,
Patrick Schulte,
Fabian Steiner
Abstract:
We implemented a flexible transmission system operating at adjustable data rate and fixed bandwidth, baudrate, constellation and overhead using probabilistic sha**. We demonstrated in a transmission experiment up to 15% capacity and 43% reach increase versus 200 Gbit/s 16-QAM.
We implemented a flexible transmission system operating at adjustable data rate and fixed bandwidth, baudrate, constellation and overhead using probabilistic sha**. We demonstrated in a transmission experiment up to 15% capacity and 43% reach increase versus 200 Gbit/s 16-QAM.
△ Less
Submitted 29 September, 2015;
originally announced September 2015.
-
Protograph-Based LDPC Code Design for Shaped Bit-Metric Decoding
Authors:
Fabian Steiner,
Georg Böcherer,
Gianluigi Liva
Abstract:
A protograph-based low-density parity-check (LDPC) code design technique for bandwidth-efficient coded modulation is presented. The approach jointly optimizes the LDPC code node degrees and the map** of the coded bits to the bit-interleaved coded modulation (BICM) bit-channels. For BICM with uniform input and for BICM with probabilistic sha**, binary-input symmetric-output surrogate channels f…
▽ More
A protograph-based low-density parity-check (LDPC) code design technique for bandwidth-efficient coded modulation is presented. The approach jointly optimizes the LDPC code node degrees and the map** of the coded bits to the bit-interleaved coded modulation (BICM) bit-channels. For BICM with uniform input and for BICM with probabilistic sha**, binary-input symmetric-output surrogate channels for the code design are used. The constructed codes for uniform inputs perform as good as the multi-edge type codes of Zhang and Kschischang (2013). For 8-ASK and 64-ASK with probabilistic sha**, codes of rates 2/3 and 5/6 with blocklength 64800 are designed, which operate within 0.63dB and 0.69dB of continuous AWGN capacity for a target frame error rate of 1e-3 at spectral efficiencies of 1.38 and 4.25 bits/channel use, respectively.
△ Less
Submitted 14 April, 2015;
originally announced April 2015.
-
Constant Composition Distribution Matching
Authors:
Patrick Schulte,
Georg Böcherer
Abstract:
Distribution matching transforms independent and Bernoulli(1/2) distributed input bits into a sequence of output symbols with a desired distribution. Fixed-to-fixed length, invertible, and low complexity encoders and decoders based on constant composition and arithmetic coding are presented. Asymptotically in the blocklength, the encoder achieves the maximum rate, namely the entropy of the desired…
▽ More
Distribution matching transforms independent and Bernoulli(1/2) distributed input bits into a sequence of output symbols with a desired distribution. Fixed-to-fixed length, invertible, and low complexity encoders and decoders based on constant composition and arithmetic coding are presented. Asymptotically in the blocklength, the encoder achieves the maximum rate, namely the entropy of the desired distribution. Furthermore, the normalized divergence of the encoder output and the desired distribution goes to zero in the blocklength.
△ Less
Submitted 17 March, 2015;
originally announced March 2015.
-
Bandwidth Efficient and Rate-Matched Low-Density Parity-Check Coded Modulation
Authors:
Georg Böcherer,
Patrick Schulte,
Fabian Steiner
Abstract:
A new coded modulation scheme is proposed. At the transmitter, the concatenation of a distribution matcher and a systematic binary encoder performs probabilistic signal sha** and channel coding. At the receiver, the output of a bitwise demapper is fed to a binary decoder. No iterative demap** is performed. Rate adaption is achieved by adjusting the input distribution and the transmission power…
▽ More
A new coded modulation scheme is proposed. At the transmitter, the concatenation of a distribution matcher and a systematic binary encoder performs probabilistic signal sha** and channel coding. At the receiver, the output of a bitwise demapper is fed to a binary decoder. No iterative demap** is performed. Rate adaption is achieved by adjusting the input distribution and the transmission power. The scheme is applied to bipolar amplitude shift keying (ASK) constellations with equidistant signal points and it is directly applicable to two-dimensional quadrature amplitude modulation (QAM). The scheme is implemented by using the DVB-S2 low-density parity-check (LDPC) codes. At a frame error rate of 1e-3, the new scheme operates within less than 1 dB of the AWGN capacity 0.5log2(1+SNR) at any spectral efficiency between 1 and 5 bits/s/Hz by using only 5 modes, i.e., 4-ASK with code rate 2/3, 8-ASK with 3/4, 16-ASK and 32-ASK with 5/6 and 64-ASK with 9/10.
△ Less
Submitted 22 April, 2015; v1 submitted 9 February, 2015;
originally announced February 2015.
-
Protograph-Based LDPC Code Design for Bit-Metric Decoding
Authors:
Fabian Steiner,
Georg Böcherer,
Gianluigi Liva
Abstract:
A protograph-based low-density parity-check (LDPC) code design technique for bandwidth-efficient coded modulation is presented. The approach jointly optimizes the LDPC code node degrees and the map** of the coded bits to the bit-interleaved coded modulation (BICM) bit-channels. For BICM with uniform input and for BICM with probabilistic sha**, binary-input symmetric-output surrogate channels a…
▽ More
A protograph-based low-density parity-check (LDPC) code design technique for bandwidth-efficient coded modulation is presented. The approach jointly optimizes the LDPC code node degrees and the map** of the coded bits to the bit-interleaved coded modulation (BICM) bit-channels. For BICM with uniform input and for BICM with probabilistic sha**, binary-input symmetric-output surrogate channels are constructed and used for code design. The constructed codes perform as good as multi-edge type codes of Zhang and Kschischang (2013). For 64-ASK with probabilistic sha**, a blocklength 64800 code is constructed that operates within 0.69 dB of 0.5log(1+SNR) at a spectral efficiency of 4.2 bits/channel use and a frame error rate of 1e-3.
△ Less
Submitted 22 January, 2015;
originally announced January 2015.
-
LDPC Coded Modulation with Probabilistic Sha** for Optical Fiber Systems
Authors:
Tobias Fehenberger,
Georg Böcherer,
Alex Alvarado,
Norbert Hanik
Abstract:
An LDPC coded modulation scheme with probabilistic sha**, optimized interleavers and noniterative demap** is proposed. Full-field simulations show an increase in transmission distance by 8% compared to uniformly distributed input.
An LDPC coded modulation scheme with probabilistic sha**, optimized interleavers and noniterative demap** is proposed. Full-field simulations show an increase in transmission distance by 8% compared to uniformly distributed input.
△ Less
Submitted 8 January, 2015;
originally announced January 2015.
-
Achievable Rates for Shaped Bit-Metric Decoding
Authors:
Georg Böcherer
Abstract:
A new achievable rate for bit-metric decoding (BMD) is derived using random coding arguments. The rate expression can be evaluated for any input distribution, and in particular the bit-levels of binary input labels can be stochastically dependent. Probabilistic sha** with dependent bit-levels (shaped BMD), sha** of independent bit-levels (bit-shaped BMD) and uniformly distributed independent b…
▽ More
A new achievable rate for bit-metric decoding (BMD) is derived using random coding arguments. The rate expression can be evaluated for any input distribution, and in particular the bit-levels of binary input labels can be stochastically dependent. Probabilistic sha** with dependent bit-levels (shaped BMD), sha** of independent bit-levels (bit-shaped BMD) and uniformly distributed independent bit-levels (uniform BMD) are evaluated on the additive white Gaussian noise (AWGN) channel with Gray labeled bipolar amplitude shift keying (ASK). For 32-ASK at a rate of 3.8 bits/channel use, the gap to 32-ASK capacity is 0.008 dB for shaped BMD, 0.46 dB for bit-shaped BMD, and 1.42 dB for uniform BMD. These numerical results illustrate that dependence between the bit-levels is beneficial on the AWGN channel. The relation to the LM rate and the generalized mutual information (GMI) is discussed.
△ Less
Submitted 28 May, 2016; v1 submitted 29 October, 2014;
originally announced October 2014.
-
Arithmetic Distribution Matching
Authors:
Sebastian Baur,
Georg Böcherer
Abstract:
In this work, arithmetic distribution matching (ADM) is presented. ADM invertibly transforms a discrete memoryless source (DMS) into a target DMS. ADM can be used for probabilistic sha** and for rate adaption. Opposed to existing algorithms for distribution matching, ADM works online and can transform arbitrarily long input sequences. It is shown analytically that as the input length tends to in…
▽ More
In this work, arithmetic distribution matching (ADM) is presented. ADM invertibly transforms a discrete memoryless source (DMS) into a target DMS. ADM can be used for probabilistic sha** and for rate adaption. Opposed to existing algorithms for distribution matching, ADM works online and can transform arbitrarily long input sequences. It is shown analytically that as the input length tends to infinity, the ADM output perfectly emulates the target DMS with respect to the normalized informational divergence and the entropy rate. Numerical results are presented that confirm the analytical bounds.
△ Less
Submitted 18 August, 2014;
originally announced August 2014.
-
Probabilistic Signal Sha** for Bit-Metric Decoding
Authors:
Georg Böcherer
Abstract:
A scheme is proposed that combines probabilistic signal sha** with bit-metric decoding. The transmitter generates symbols according to a distribution on the channel input alphabet. The symbols are labeled by bit strings. At the receiver, the channel output is decoded with respect to a bit-metric. An achievable rate is derived using random coding arguments. For the 8-ASK AWGN channel, numerical r…
▽ More
A scheme is proposed that combines probabilistic signal sha** with bit-metric decoding. The transmitter generates symbols according to a distribution on the channel input alphabet. The symbols are labeled by bit strings. At the receiver, the channel output is decoded with respect to a bit-metric. An achievable rate is derived using random coding arguments. For the 8-ASK AWGN channel, numerical results show that at a spectral efficiency of 2 bits/s/Hz, the new scheme outperforms bit-interleaved coded modulation (BICM) without sha** and BICM with bit sha** (i Fabregas and Martinez, 2010) by 0.87 dB and 0.15 dB, respectively, and is within 0.0094 dB of the coded modulation capacity. The new scheme is implemented by combining a distribution matcher with a systematic binary low-density parity-check code. The measured finite-length gains are very close to the gains predicted by the asymptotic theory.
△ Less
Submitted 19 April, 2014; v1 submitted 23 January, 2014;
originally announced January 2014.
-
Informational Divergence and Entropy Rate on Rooted Trees with Probabilities
Authors:
Georg Böcherer,
Rana Ali Amjad
Abstract:
Rooted trees with probabilities are used to analyze properties of a variable length code. A bound is derived on the difference between the entropy rates of the code and a memoryless source. The bound is in terms of normalized informational divergence. The bound is used to derive converses for exact random number generation, resolution coding, and distribution matching.
Rooted trees with probabilities are used to analyze properties of a variable length code. A bound is derived on the difference between the entropy rates of the code and a memoryless source. The bound is in terms of normalized informational divergence. The bound is used to derive converses for exact random number generation, resolution coding, and distribution matching.
△ Less
Submitted 10 October, 2013;
originally announced October 2013.
-
Optimal Quantization for Distribution Synthesis
Authors:
Georg Böcherer,
Bernhard C. Geiger
Abstract:
Finite precision approximations of discrete probability distributions are considered, applicable for distribution synthesis, e.g., probabilistic sha**. Two algorithms are presented that find the optimal $M$-type approximation $Q$ of a distribution $P$ in terms of the variational distance $| Q-P|_1$ and the informational divergence $\mathbb{D}(Q| P)$. Bounds on the approximation errors are derive…
▽ More
Finite precision approximations of discrete probability distributions are considered, applicable for distribution synthesis, e.g., probabilistic sha**. Two algorithms are presented that find the optimal $M$-type approximation $Q$ of a distribution $P$ in terms of the variational distance $| Q-P|_1$ and the informational divergence $\mathbb{D}(Q| P)$. Bounds on the approximation errors are derived and shown to be asymptotically tight. Several examples illustrate that the variational distance optimal approximation can be quite different from the informational divergence optimal approximation.
△ Less
Submitted 19 January, 2016; v1 submitted 25 July, 2013;
originally announced July 2013.
-
Fixed-to-Variable Length Resolution Coding for Target Distributions
Authors:
Georg Böcherer,
Rana Ali Amjad
Abstract:
The number of random bits required to approximate a target distribution in terms of un-normalized informational divergence is considered. It is shown that for a variable-to-variable length encoder, this number is lower bounded by the entropy of the target distribution. A fixed-to-variable length encoder is constructed using M-type quantization and Tunstall coding. It is shown that the encoder achi…
▽ More
The number of random bits required to approximate a target distribution in terms of un-normalized informational divergence is considered. It is shown that for a variable-to-variable length encoder, this number is lower bounded by the entropy of the target distribution. A fixed-to-variable length encoder is constructed using M-type quantization and Tunstall coding. It is shown that the encoder achieves in the limit an un-normalized informational divergence of zero with the number of random bits per generated symbol equal to the entropy of the target distribution. Numerical results show that the proposed encoder significantly outperforms the optimal block-to-block encoder in the finite length regime.
△ Less
Submitted 1 August, 2013; v1 submitted 11 June, 2013;
originally announced June 2013.
-
Block-to-Block Distribution Matching
Authors:
Georg Böcherer,
Rana Ali Amjad
Abstract:
In this work, binary block-to-block distribution matching is considered. m independent and uniformly distributed bits are mapped to n output bits resembling a target product distribution. A rate R is called achieved by a sequence of encoder-decoder pairs, if for m,n to infinity, (1) m/n approaches R, (2) the informational divergence per bit of the output distribution and the target distribution go…
▽ More
In this work, binary block-to-block distribution matching is considered. m independent and uniformly distributed bits are mapped to n output bits resembling a target product distribution. A rate R is called achieved by a sequence of encoder-decoder pairs, if for m,n to infinity, (1) m/n approaches R, (2) the informational divergence per bit of the output distribution and the target distribution goes to zero, and (3) the probability of erroneous decoding goes to zero. It is shown that the maximum achievable rate is equal to the entropy of the target distribution. A practical encoder-decoder pair is constructed that provably achieves the maximum rate in the limit. Numerical results illustrate that the suggested system operates close to the limits with reasonable complexity. The key idea is to internally use a fixed-to-variable length matcher and to compensate underflow by random map** and to cast an error when overflow occurs.
△ Less
Submitted 5 February, 2013;
originally announced February 2013.
-
Rooted Trees with Probabilities Revisited
Authors:
Georg Böcherer
Abstract:
Rooted trees with probabilities are convenient to represent a class of random processes with memory. They allow to describe and analyze variable length codes for data compression and distribution matching. In this work, the Leaf-Average Node-Sum Interchange Theorem (LANSIT) and the well-known applications to path length and leaf entropy are re-stated. The LANSIT is then applied to informational di…
▽ More
Rooted trees with probabilities are convenient to represent a class of random processes with memory. They allow to describe and analyze variable length codes for data compression and distribution matching. In this work, the Leaf-Average Node-Sum Interchange Theorem (LANSIT) and the well-known applications to path length and leaf entropy are re-stated. The LANSIT is then applied to informational divergence. Next, the differential LANSIT is derived, which allows to write normalized functionals of leaf distributions as an average of functionals of branching distributions. Joint distributions of random variables and the corresponding conditional distributions are special cases of leaf distributions and branching distributions. Using the differential LANSIT, Pinsker's inequality is formulated for rooted trees with probabilities, with an application to the approximation of product distributions. In particular, it is shown that if the normalized informational divergence of a distribution and a product distribution approaches zero, then the entropy rate approaches the entropy rate of the product distribution.
△ Less
Submitted 4 February, 2013;
originally announced February 2013.
-
Fixed-to-Variable Length Distribution Matching
Authors:
Rana Ali Amjad,
Georg Böcherer
Abstract:
Fixed-to-variable length (f2v) matchers are used to reversibly transform an input sequence of independent and uniformly distributed bits into an output sequence of bits that are (approximately) independent and distributed according to a target distribution. The degree of approximation is measured by the informational divergence between the output distribution and the target distribution. An algori…
▽ More
Fixed-to-variable length (f2v) matchers are used to reversibly transform an input sequence of independent and uniformly distributed bits into an output sequence of bits that are (approximately) independent and distributed according to a target distribution. The degree of approximation is measured by the informational divergence between the output distribution and the target distribution. An algorithm is developed that efficiently finds optimal f2v codes. It is shown that by encoding the input bits blockwise, the informational divergence per bit approaches zero as the block length approaches infinity. A relation to data compression by Tunstall coding is established.
△ Less
Submitted 1 July, 2013; v1 submitted 31 January, 2013;
originally announced February 2013.
-
Optimal Non-Uniform Map** for Probabilistic Sha**
Authors:
Georg Böcherer
Abstract:
The construction of optimal non-uniform map**s for discrete input memoryless channels (DIMCs) is investigated. An efficient algorithm to find optimal map**s is proposed and the rate by which a target distribution is approached is investigated. The results are applied to non-uniform map**s for additive white Gaussian noise (AWGN) channels with finite signal constellations. The map**s found…
▽ More
The construction of optimal non-uniform map**s for discrete input memoryless channels (DIMCs) is investigated. An efficient algorithm to find optimal map**s is proposed and the rate by which a target distribution is approached is investigated. The results are applied to non-uniform map**s for additive white Gaussian noise (AWGN) channels with finite signal constellations. The map**s found by the proposed methods outperform those obtained via a central limit theorem approach as suggested in the literature.
△ Less
Submitted 7 July, 2014; v1 submitted 6 August, 2012;
originally announced August 2012.
-
Strategies for Distributed Sensor Selection Using Convex Optimization
Authors:
Fabian Altenbach,
Steven Corroy,
Georg Böcherer,
Rudolf Mathar
Abstract:
Consider the estimation of an unknown parameter vector in a linear measurement model. Centralized sensor selection consists in selecting a set of k_s sensor measurements, from a total number of m potential measurements. The performance of the corresponding selection is measured by the volume of an estimation error covariance matrix. In this work, we consider the problem of selecting these sensors…
▽ More
Consider the estimation of an unknown parameter vector in a linear measurement model. Centralized sensor selection consists in selecting a set of k_s sensor measurements, from a total number of m potential measurements. The performance of the corresponding selection is measured by the volume of an estimation error covariance matrix. In this work, we consider the problem of selecting these sensors in a distributed or decentralized fashion. In particular, we study the case of two leader nodes that perform naive decentralized selections. We demonstrate that this can degrade the performance severely. Therefore, two heuristics based on convex optimization methods are introduced, where we first allow one leader to make a selection, and then to share a modest amount of information about his selection with the remaining node. We will show that both heuristics clearly outperform the naive decentralized selection, and achieve a performance close to the centralized selection.
△ Less
Submitted 6 August, 2012;
originally announced August 2012.
-
An Efficient Algorithm to Calculate BICM Capacity
Authors:
Georg Böcherer,
Fabian Altenbach,
Alex Alvarado,
Steven Corroy,
Rudolf Mathar
Abstract:
Bit-interleaved coded modulation (BICM) is a practical approach for reliable communication over the AWGN channel in the bandwidth limited regime. For a signal point constellation with 2^m points, BICM labels the signal points with bit strings of length m and then treats these m bits separately both at the transmitter and the receiver. BICM capacity is defined as the maximum of a certain achievable…
▽ More
Bit-interleaved coded modulation (BICM) is a practical approach for reliable communication over the AWGN channel in the bandwidth limited regime. For a signal point constellation with 2^m points, BICM labels the signal points with bit strings of length m and then treats these m bits separately both at the transmitter and the receiver. BICM capacity is defined as the maximum of a certain achievable rate. Maximization has to be done over the probability mass functions (pmf) of the bits. This is a non-convex optimization problem. So far, the optimal bit pmfs were determined via exhaustive search, which is of exponential complexity in m. In this work, an algorithm called bit-alternating convex concave method (Bacm) is developed. This algorithm calculates BICM capacity with a complexity that scales approximately as m^3. The algorithm iteratively applies convex optimization techniques. Bacm is used to calculate BICM capacity of 4,8,16,32, and 64-PAM in AWGN. For PAM constellations with more than 8 points, the presented values are the first results known in the literature.
△ Less
Submitted 1 June, 2012; v1 submitted 5 March, 2012;
originally announced March 2012.
-
Short Huffman Codes Producing 1s Half of the Time
Authors:
Fabian Altenbach,
Georg Böcherer,
Rudolf Mathar
Abstract:
The design of the channel part of a digital communication system (e.g., error correction, modulation) is heavily based on the assumption that the data to be transmitted forms a fair bit stream. However, simple source encoders such as short Huffman codes generate bit streams that poorly match this assumption. As a result, the channel input distribution does not match the original design criteria. I…
▽ More
The design of the channel part of a digital communication system (e.g., error correction, modulation) is heavily based on the assumption that the data to be transmitted forms a fair bit stream. However, simple source encoders such as short Huffman codes generate bit streams that poorly match this assumption. As a result, the channel input distribution does not match the original design criteria. In this work, a simple method called half Huffman coding (halfHc) is developed. halfHc transforms a Huffman code into a source code whose output is more similar to a fair bit stream. This is achieved by permuting the codewords such that the frequency of 1s at the output is close to 0.5. The permutations are such that the optimality in terms of achieved compression ratio is preserved. halfHc is applied in a practical example, and the resulting overall system performs better than when conventional Huffman coding is used.
△ Less
Submitted 22 July, 2011;
originally announced July 2011.
-
Writing on the Facade of RWTH ICT Cubes: Cost Constrained Geometric Huffman Coding
Authors:
Georg Böcherer,
Fabian Altenbach,
Martina Malsbender,
Rudolf Mathar
Abstract:
In this work, a coding technique called cost constrained Geometric Huffman coding (ccGhc) is developed. ccGhc minimizes the Kullback-Leibler distance between a dyadic probability mass function (pmf) and a target pmf subject to an affine inequality constraint. An analytical proof is given that when ccGhc is applied to blocks of symbols, the optimum is asymptotically achieved when the blocklength go…
▽ More
In this work, a coding technique called cost constrained Geometric Huffman coding (ccGhc) is developed. ccGhc minimizes the Kullback-Leibler distance between a dyadic probability mass function (pmf) and a target pmf subject to an affine inequality constraint. An analytical proof is given that when ccGhc is applied to blocks of symbols, the optimum is asymptotically achieved when the blocklength goes to infinity. The derivation of ccGhc is motivated by the problem of encoding a text to a sequence of slats subject to architectural design criteria. For the considered architectural problem, for a blocklength of 3, the codes found by ccGhc match the design criteria. For communications channels with average cost constraints, ccGhc can be used to efficiently find prefix-free modulation codes that are provably capacity achieving.
△ Less
Submitted 28 June, 2011;
originally announced June 2011.
-
Operating LDPC Codes with Zero Sha** Gap
Authors:
Georg Böcherer,
Rudolf Mathar
Abstract:
Unequal transition probabilities between input and output symbols, input power constraints, or input symbols of unequal durations can lead to non-uniform capacity achieving input distributions for communication channels. Using uniform input distributions reduces the achievable rate, which is called the sha** gap. Gallager's idea for reliable communication with zero sha** gap is to do encoding,…
▽ More
Unequal transition probabilities between input and output symbols, input power constraints, or input symbols of unequal durations can lead to non-uniform capacity achieving input distributions for communication channels. Using uniform input distributions reduces the achievable rate, which is called the sha** gap. Gallager's idea for reliable communication with zero sha** gap is to do encoding, matching, and jointly decoding and dematching. In this work, a scheme is proposed that consists in matching, encoding, decoding, and dematching. Only matching is channel specific whereas coding is not. Thus off-the-shelf LDPC codes can be applied. Analytical formulas for sha** and coding gap of the proposed scheme are derived and it is shown that the sha** gap can be made zero. Numerical results show that the proposed scheme allows to operate off-the-shelf LDPC codes with zero sha** gap and a coding gap that is unchanged compared to uniform transmission.
△ Less
Submitted 9 June, 2011;
originally announced June 2011.
-
Capacity Achieving Modulation for Fixed Constellations with Average Power Constraint
Authors:
Georg Böcherer,
Fabian Altenbach,
Rudolf Mathar
Abstract:
The capacity achieving probability mass function (PMF) of a finite signal constellation with an average power constraint is in most cases non-uniform. A common approach to generate non-uniform input PMFs is Huffman sha**, which consists of first approximating the capacity achieving PMF by a sampled Gaussian density and then to calculate the Huffman code of the sampled Gaussian density. The Huffm…
▽ More
The capacity achieving probability mass function (PMF) of a finite signal constellation with an average power constraint is in most cases non-uniform. A common approach to generate non-uniform input PMFs is Huffman sha**, which consists of first approximating the capacity achieving PMF by a sampled Gaussian density and then to calculate the Huffman code of the sampled Gaussian density. The Huffman code is then used as a prefix-free modulation code. This approach showed good results in practice, can however lead to a significant gap to capacity. In this work, a method is proposed that efficiently constructs optimal prefix-free modulation codes for any finite signal constellation with average power constraint in additive noise. The proposed codes operate as close to capacity as desired. The major part of this work elaborates an analytical proof of this property. The proposed method is applied to 64-QAM in AWGN and numeric results are given, which show that, opposed to Huffman sha**, by using the proposed method, it is possible to operate very close to capacity over the whole range of parameters.
△ Less
Submitted 27 June, 2011; v1 submitted 12 October, 2010;
originally announced October 2010.
-
Matching Dyadic Distributions to Channels
Authors:
Georg Böcherer,
Rudolf Mathar
Abstract:
Many communication channels with discrete input have non-uniform capacity achieving probability mass functions (PMF). By parsing a stream of independent and equiprobable bits according to a full prefix-free code, a modu-lator can generate dyadic PMFs at the channel input. In this work, we show that for discrete memoryless channels and for memoryless discrete noiseless channels, searching for good…
▽ More
Many communication channels with discrete input have non-uniform capacity achieving probability mass functions (PMF). By parsing a stream of independent and equiprobable bits according to a full prefix-free code, a modu-lator can generate dyadic PMFs at the channel input. In this work, we show that for discrete memoryless channels and for memoryless discrete noiseless channels, searching for good dyadic input PMFs is equivalent to minimizing the Kullback-Leibler distance between a dyadic PMF and a weighted version of the capacity achieving PMF. We define a new algorithm called Geometric Huffman Coding (GHC) and prove that GHC finds the optimal dyadic PMF in O(m \log m) steps where m is the number of input symbols of the considered channel. Furthermore, we prove that by generating dyadic PMFs of blocks of consecutive input symbols, GHC achieves capacity when the block length goes to infinity.
△ Less
Submitted 31 December, 2010; v1 submitted 20 September, 2010;
originally announced September 2010.
-
Throughput, Bit-Cost, Network State Information: Tradeoffs in Cooperative CSMA Protocols
Authors:
Georg Bocherer,
Rudolf Mathar
Abstract:
In wireless local area networks, spatially varying channel conditions result in a severe performance discrepancy between different nodes in the uplink, depending on their position. Both throughput and energy expense are affected. Cooperative protocols were proposed to mitigate these discrepancies. However, additional network state information (NSI) from other nodes is needed to enable cooperation.…
▽ More
In wireless local area networks, spatially varying channel conditions result in a severe performance discrepancy between different nodes in the uplink, depending on their position. Both throughput and energy expense are affected. Cooperative protocols were proposed to mitigate these discrepancies. However, additional network state information (NSI) from other nodes is needed to enable cooperation. The aim of this work is to assess how NSI and the degree of cooperation affect throughput and energy expenses. To this end, a CSMA protocol called fairMAC is defined, which allows to adjust the amount of NSI at the nodes and the degree of cooperation among the nodes in a distributed manner. By analyzing the data obtained by Monte Carlo simulations with varying protocol parameters for fairMAC, two fundamental tradeoffs are identified: First, more cooperation leads to higher throughput, but also increases energy expenses. Second, using more than one helper increases throughput and decreases energy expenses, however, more NSI has to be acquired by the nodes in the network. The obtained insights are used to increase the lifetime of a network. While full cooperation shortens the lifetime compared to no cooperation at all, lifetime can be increased by over 25% with partial cooperation.
△ Less
Submitted 21 June, 2010; v1 submitted 10 June, 2010;
originally announced June 2010.
-
Deriving the Probabilistic Capacity of General Run-Length Sets Using Generating Functions
Authors:
Georg Böcherer,
Rudolf Mathar,
Valdemar Cardoso da Rocha Junior,
Cecilio Pimentel
Abstract:
In "Reliable Communication in the Absence of a Common Clock" (Yeung et al., 2009), the authors introduce general run-length sets, which form a class of constrained systems that permit run-lengths from a countably infinite set. For a particular definition of probabilistic capacity, they show that probabilistic capacity is equal to combinatorial capacity. In the present work, it is shown that the…
▽ More
In "Reliable Communication in the Absence of a Common Clock" (Yeung et al., 2009), the authors introduce general run-length sets, which form a class of constrained systems that permit run-lengths from a countably infinite set. For a particular definition of probabilistic capacity, they show that probabilistic capacity is equal to combinatorial capacity. In the present work, it is shown that the same result also holds for Shannon's original definition of probabilistic capacity. The derivation presented here is based on generating functions of constrained systems as developed in "On the Capacity of Constrained Systems" (Boecherer et al., 2010) and provides a unified information-theoretic treatment of general run-length sets.
△ Less
Submitted 13 January, 2010;
originally announced January 2010.