-
Band-ESS: Streaming Enumerative Coding with Applications to Probabilistic Sha**
Authors:
Yunus Can Gültekin,
Frans M. J. Willems,
Alex Alvarado
Abstract:
Probabilistic amplitude sha** (PAS) is on track to become the de facto coded modulation standard for communication systems aiming to operate close to channel capacity at high transmission rates. The essential component of PAS that breeds this widespread interest is the amplitude sha** block, through which the channel input distribution is controlled. This block is responsible for converting bi…
▽ More
Probabilistic amplitude sha** (PAS) is on track to become the de facto coded modulation standard for communication systems aiming to operate close to channel capacity at high transmission rates. The essential component of PAS that breeds this widespread interest is the amplitude sha** block, through which the channel input distribution is controlled. This block is responsible for converting bit strings into amplitude sequences with certain properties, e.g., fixed composition, limited energy, limited energy variation, etc. Recently, band-trellis enumerative sphere sha** (B-ESS) was introduced as an amplitude sha** technique that achieves limited energy variations which is useful in optical communication scenarios. B-ESS operates based on a trellis diagram in which sequences with high energy variations are pruned. In this work, we study the implementation of B-ESS. We first show that thanks to the trellis structure obtained by this pruning, B-ESS can be implemented with very low storage complexity. The trellis computation is shown to be reduced to a set of recursive multiplications with a scalar factor. Then we show that this scalar factor can be adjusted such that the trellis computation is further simplified and realized with only binary shifts. This shift-based B-ESS (1) can be implemented for arbitrarily long blocklengths without incurring an increase in complexity, and (2) can operate in a streaming mode similar to convolutional coding.
△ Less
Submitted 15 August, 2022;
originally announced August 2022.
-
Log-CCDM: Distribution Matching via Multiplication-free Arithmetic Coding
Authors:
Yunus Can Gültekin,
Frans M. J. Willems,
Alex Alvarado
Abstract:
Recent years have seen renewed attention to arithmetic coding (AC). This is thanks to the use of AC for distribution matching (DM) to control the channel input distribution in probabilistic amplitude sha**. There are two main problems inherent to AC: (1) its required arithmetic precision grows linearly with the input length, and (2) high-precision multiplications and divisions are required. Here…
▽ More
Recent years have seen renewed attention to arithmetic coding (AC). This is thanks to the use of AC for distribution matching (DM) to control the channel input distribution in probabilistic amplitude sha**. There are two main problems inherent to AC: (1) its required arithmetic precision grows linearly with the input length, and (2) high-precision multiplications and divisions are required. Here, we introduce a multiplication-free AC-based DM technique via three lookup tables (LUTs) which solves both problems above. These LUTs are used to approximate the high-precision multiplications and divisions by additions and subtractions. The required precision of our approach is shown to grow logarithmically with the input length. We prove that this approximate technique maintains the invertibility of DM. At an input length of 1024 symbols, the proposed technique achieves negligible rate loss ($<0.01$ bit/sym) against the full-precision DM, while requiring less than 4 kilobytes of storage.
△ Less
Submitted 8 July, 2022;
originally announced July 2022.
-
On Kurtosis-limited Enumerative Sphere Sha** for Reach Increase in Single-span Systems
Authors:
Yunus Can Gültekin,
Alex Alvarado,
Olga Vassilieva,
Inwoong Kim,
Paparao Palacharla,
Chigo M. Okonkwo,
Frans M. J. Willems
Abstract:
The effect of decreasing the kurtosis of channel inputs is investigated for the first time with an algorithmic sha** implementation. No significant gains in decoding performance are observed for multi-span systems, while an increase in reach is obtained for single-span transmission.
The effect of decreasing the kurtosis of channel inputs is investigated for the first time with an algorithmic sha** implementation. No significant gains in decoding performance are observed for multi-span systems, while an increase in reach is obtained for single-span transmission.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Orthogonal Time Frequency Space Modulation: A Discrete Zak Transform Approach
Authors:
Franz Lampel,
Alex Alvarado,
Frans M. J. Willems
Abstract:
In orthogonal time frequency space (OTFS) modulation, information-carrying symbols reside in the delay-Doppler (DD) domain. By operating in the DD domain, an appealing property for communication arises: time-frequency (TF) dispersive channels encountered in high mobility environments become time-invariant. The time-invariance of the channel in the DD domain enables efficient equalizers for time-fr…
▽ More
In orthogonal time frequency space (OTFS) modulation, information-carrying symbols reside in the delay-Doppler (DD) domain. By operating in the DD domain, an appealing property for communication arises: time-frequency (TF) dispersive channels encountered in high mobility environments become time-invariant. The time-invariance of the channel in the DD domain enables efficient equalizers for time-frequency dispersive channels. In this paper, we propose an OTFS system based on the discrete Zak transform. The presented formulation not only allows an efficient implementation of OTFS but also simplifies the derivation and analysis of the input-output relation of TF dispersive channel in the DD domain.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Temporal Energy Analysis of Symbol Sequences for Fiber Nonlinear Interference Modelling via Energy Dispersion Index
Authors:
Kaiquan Wu,
Gabriele Liga,
Alireza Sheikh,
Frans M. J. Willems,
Alex Alvarado
Abstract:
The stationary statistical properties of independent, identically distributed (i.i.d.) input symbols provide insights on the induced nonlinear interference (NLI) during fiber transmission. For example, kurtosis is known to predict the modulation format-dependent NLI. These statistical properties can be used in the design of probabilistic amplitude sha** (PAS), which is a popular scheme that reli…
▽ More
The stationary statistical properties of independent, identically distributed (i.i.d.) input symbols provide insights on the induced nonlinear interference (NLI) during fiber transmission. For example, kurtosis is known to predict the modulation format-dependent NLI. These statistical properties can be used in the design of probabilistic amplitude sha** (PAS), which is a popular scheme that relies on an amplitude shaper for increasing spectral efficiencies of fiber-optic systems. One property of certain shapers used in PAS -- including constant-composition distribution matchers -- that is often overlooked is that a time-dependency between amplitudes is introduced. This dependency results in symbols that are non-i.i.d., which have time-varying statistical properties. Somewhat surprisingly, the effective signal-to-noise ratio (SNR) in PAS has been shown to increase when the sha** blocklength decreases. This blocklength dependency of SNR has been attributed to time-varying statistical properties of the symbol sequences, in particular, to variation of the symbol energies. In this paper, we investigate the temporal energy behavior of symbol sequences, and introduce a new metric called energy dispersion index (EDI). EDI captures the time-varying statistical properties of symbol energies. Numerical results show strong correlations between EDI and effective SNR, with absolute correlation coefficients above 99% for different transmission distances.
△ Less
Submitted 24 February, 2021;
originally announced February 2021.
-
Achievable Information Rates for Probabilistic Amplitude Sha**: An Alternative Approach via Random Sign-Coding Arguments
Authors:
Yunus Can Gültekin,
Alex Alvarado,
Frans M. J. Willems
Abstract:
Probabilistic amplitude sha** (PAS) is a coded modulation strategy in which constellation sha** and channel coding are combined. PAS has attracted considerable attention in both wireless and optical communications. Achievable information rates (AIRs) of PAS have been investigated in the literature using Gallager's error exponent approach. In particular, it has been shown that PAS achieves the…
▽ More
Probabilistic amplitude sha** (PAS) is a coded modulation strategy in which constellation sha** and channel coding are combined. PAS has attracted considerable attention in both wireless and optical communications. Achievable information rates (AIRs) of PAS have been investigated in the literature using Gallager's error exponent approach. In particular, it has been shown that PAS achieves the capacity of the additive white Gaussian noise channel (Böcherer, 2018). In this work, we revisit the capacity-achieving property of PAS and derive AIRs using weak typicality. Our objective is to provide alternative proofs based on random sign-coding arguments that are as constructive as possible. Accordingly, in our proofs, only some signs of the channel inputs are drawn from a random code, while the remaining signs and amplitudes are produced constructively. We consider both symbol-metric and bit-metric decoding.
△ Less
Submitted 12 July, 2020; v1 submitted 24 February, 2020;
originally announced February 2020.
-
First Experimental Demonstration of Probabilistic Enumerative Sphere Sha** in Optical Fiber Communications
Authors:
Sebastiaan Goossens,
Sjoerd van der Heide,
Menno van den Hout,
Abdelkerim Amari,
Yunus Can Gültekin,
Olga Vassilieva,
Inwoong Kim,
Tadashi Ikeuchi,
Frans M. J. Willems,
Alex Alvarado,
Chigo Okonkwo
Abstract:
We transmit probabilistic enumerative sphere shaped dual-polarization 64-QAM at 350Gbit/s/channel over 1610km SSMF using a short blocklength of 200. A reach increase of 15% over constant composition distribution matching with identical blocklength is demonstrated.
We transmit probabilistic enumerative sphere shaped dual-polarization 64-QAM at 350Gbit/s/channel over 1610km SSMF using a short blocklength of 200. A reach increase of 15% over constant composition distribution matching with identical blocklength is demonstrated.
△ Less
Submitted 19 August, 2019; v1 submitted 1 August, 2019;
originally announced August 2019.
-
Enumerative Sphere Sha** for Rate Adaptation and Reach Increase in WDM Transmission Systems
Authors:
Abdelkerim Amari,
Sebastiaan Goossens,
Yunus Can Gultekin,
Olga Vassilieva,
Inwoong Kim,
Tadashi Ikeuchi,
Chigo Okonkwo,
Frans M. J. Willems,
Alex Alvarado
Abstract:
The performance of enumerative sphere sha** (ESS), constant composition distribution matching (CCDM), and uniform signalling are compared at the same forward error correction rate. ESS is shown to offer a reach increase of approximately 10% and 22% compared to CCDM and uniform signalling, respectively.
The performance of enumerative sphere sha** (ESS), constant composition distribution matching (CCDM), and uniform signalling are compared at the same forward error correction rate. ESS is shown to offer a reach increase of approximately 10% and 22% compared to CCDM and uniform signalling, respectively.
△ Less
Submitted 3 July, 2019;
originally announced July 2019.
-
Introducing Enumerative Sphere Sha** for Optical Communication Systems with Short Blocklengths
Authors:
Abdelkerim Amari,
Sebastiaan Goossens,
Yunus Can Gultekin,
Olga Vassilieva,
Inwoong Kim,
Tadashi Ikeuchi,
Chigo Okonkwo,
Frans M. J. Willems,
Alex Alvarado
Abstract:
Probabilistic sha** based on constant composition distribution matching (CCDM) has received considerable attention as a way to increase the capacity of fiber optical communication systems. CCDM suffers from significant rate loss at short blocklengths and requires long blocklengths to achieve high sha** gain, which makes its implementation very challenging. In this paper, we propose to use enum…
▽ More
Probabilistic sha** based on constant composition distribution matching (CCDM) has received considerable attention as a way to increase the capacity of fiber optical communication systems. CCDM suffers from significant rate loss at short blocklengths and requires long blocklengths to achieve high sha** gain, which makes its implementation very challenging. In this paper, we propose to use enumerative sphere sha** (ESS) and investigate its performance for the nonlinear fiber optical channel. ESS has lower rate loss than CCDM at the same sha** rate, which makes it a suitable candidate to be implemented in real-time high-speed optical systems. In this paper, we first show that finite blocklength ESS and CCDM exhibit higher effective signal-to-noise ratio than their infinite blocklength counterparts. These results show that for the nonlinear fiber optical channel, large blocklengths should be avoided. We then show that for a 400 Gb/s dual-polarization 64-QAM WDM transmission system, ESS with short blocklengths outperforms both uniform signaling and CCDM. Gains in terms of both bit-metric decoding rate and bit-error rate are presented. ESS with a blocklength of 200 is shown to provide an extension reach of about 200 km in comparison with CCDM with the same blocklength. The obtained reach increase of ESS with a blocklength of 200 over uniform signaling is approximately 450 km (approximately 19%)
△ Less
Submitted 19 September, 2019; v1 submitted 13 April, 2019;
originally announced April 2019.
-
Achievable Information Rates for Fiber Optics: Applications and Computations
Authors:
Alex Alvarado,
Tobias Fehenberger,
Bin Chen,
Frans M. J. Willems
Abstract:
In this paper, achievable information rates (AIR) for fiber optical communications are discussed. It is shown that AIRs such as the mutual information and generalized mutual information are good design metrics for coded optical systems. The theoretical predictions of AIRs are compared to the performance of modern codes including low-parity density check (LDPC) and polar codes. Two different comput…
▽ More
In this paper, achievable information rates (AIR) for fiber optical communications are discussed. It is shown that AIRs such as the mutual information and generalized mutual information are good design metrics for coded optical systems. The theoretical predictions of AIRs are compared to the performance of modern codes including low-parity density check (LDPC) and polar codes. Two different computation methods for these AIRs are also discussed: Monte-Carlo integration and Gauss-Hermite quadrature. Closed-form ready-to-use approximations for such computations are provided for arbitrary constellations and the multidimensional AWGN channel. The computation of AIRs in optical experiments and simulations is also discussed.
△ Less
Submitted 21 December, 2017; v1 submitted 26 July, 2017;
originally announced September 2017.
-
A Robust SRAM-PUF Key Generation Scheme Based on Polar Codes
Authors:
Bin Chen,
Tanya Ignatenko,
Frans M. J. Willems,
Roel Maes,
Erik van der Sluis,
Georgios Selimis
Abstract:
Physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret key generation. In this paper we focus on SRAM-PUFs. The SRAM-PUFs enjoy uniqueness and randomness properties stemming from the intrinsic randomness of SRAM memory cells, which is a result of manufacturing variations. This randomness can be translated into the crypt…
▽ More
Physical unclonable functions (PUFs) are relatively new security primitives used for device authentication and device-specific secret key generation. In this paper we focus on SRAM-PUFs. The SRAM-PUFs enjoy uniqueness and randomness properties stemming from the intrinsic randomness of SRAM memory cells, which is a result of manufacturing variations. This randomness can be translated into the cryptographic keys thus avoiding the need to store and manage the device cryptographic keys. Therefore these properties, combined with the fact that SRAM memory can be often found in today's IoT devices, make SRAM-PUFs a promising candidate for securing and authentication of the resource-constrained IoT devices. PUF observations are always effected by noise and environmental changes. Therefore secret-generation schemes with helper data are used to guarantee reliable regeneration of the PUF-based secret keys. Error correction codes (ECCs) are an essential part of these schemes. In this work, we propose a practical error correction construction for PUF-based secret generation that are based on polar codes. The resulting scheme can generate $128$-bit keys using $1024$ SRAM-PUF bits and $896$ helper data bits and achieve a failure probability of $10^{-9}$ or lower for a practical SRAM-PUFs setting with bit error probability of $15\%$. The method is based on successive cancellation combined with list decoding and hash-based checking that makes use of the hash that is already available at the decoder. In addition, an adaptive list decoder for polar codes is investigated. This decoder increases the list size only if needed.
△ Less
Submitted 27 July, 2017; v1 submitted 25 January, 2017;
originally announced January 2017.
-
Information Theoretical Analysis of Identification based on Active Content Fingerprinting
Authors:
Farzad Farhadzadeh,
Frans M. J. Willems,
Sviatoslav Voloshinovskiy
Abstract:
Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring. Over the past few years, both techniques have been well studied and their shortcomings understood. Recently, a new content fingerprinting scheme called {\em active content fingerprinting} was introduced to overcome these shortcomings. Active content fingerprinting aims t…
▽ More
Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring. Over the past few years, both techniques have been well studied and their shortcomings understood. Recently, a new content fingerprinting scheme called {\em active content fingerprinting} was introduced to overcome these shortcomings. Active content fingerprinting aims to modify a content to extract robuster fingerprints than the conventional content fingerprinting. Moreover, contrary to digital watermarking, active content fingerprinting does not embed any message independent of contents thus does not face host interference. The main goal of this paper is to analyze fundamental limits of active content fingerprinting in an information theoretical framework.
△ Less
Submitted 18 November, 2014;
originally announced November 2014.
-
Rotated and Scaled Alamouti Coding
Authors:
Frans M. J. Willems
Abstract:
Repetition-based retransmission is used in Alamouti-modulation [1998] for $2\times 2$ MIMO systems. We propose to use instead of ordinary repetition so-called "scaled repetition" together with rotation. It is shown that the rotated and scaled Alamouti code has a hard-decision performance which is only slightly worse than that of the Golden code [2005], the best known $2\times 2$ space-time code.…
▽ More
Repetition-based retransmission is used in Alamouti-modulation [1998] for $2\times 2$ MIMO systems. We propose to use instead of ordinary repetition so-called "scaled repetition" together with rotation. It is shown that the rotated and scaled Alamouti code has a hard-decision performance which is only slightly worse than that of the Golden code [2005], the best known $2\times 2$ space-time code. Decoding the Golden code requires an exhaustive search over all codewords, while our rotated and scaled Alamouti code can be decoded with an acceptable complexity however.
△ Less
Submitted 5 February, 2008;
originally announced February 2008.