11.07.2015 Views

Dirty Paper Coding using Sign-bit Shaping and LDPC Codes

Dirty Paper Coding using Sign-bit Shaping and LDPC Codes

Dirty Paper Coding using Sign-bit Shaping and LDPC Codes

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ISIT 2010, Austin, Texas, U.S.A., June 13 - 18, 2010Ŷ = αY + U✲Demappern − (k − k ′ + s)LLRs ofParity Bits✲∏ −1✲ Delay ✲ ✲(k − k ′ )LLRs of Message Bitsnlog2MLLRs of sign <strong>bit</strong>s✲✲ Delay ✲<strong>LDPC</strong>DecodersBits k ′✲H T ✲✲MessageBitsk − k ′MessageBitsFig. 3.Decoder structure.Since the constellation mapping is nearly Gray, iterationswith the demapper do not provide significant improvementsin coding gain, particularly for large M.IV. SIMULATION RESULTSFor simulations, we have taken n = 40000, k = 30000,k ′ = 5000 with M = 16; this results in s = 10000.The constellation mapping is as given in Fig. 1. Wehave chosen a rate-1/2 memory 8 (256 state) nonsystematic( convolutional code with generator polynomialsD 8 + D 5 + D 4 + D 2 + D +1,D 8 + D 7 + D 4 + D 2 +1 )as the sign-<strong>bit</strong> shaping code. A non-systematic convolutionalcode is used to avoid error propagation problems.A r<strong>and</strong>omly constructed irregular <strong>LDPC</strong> code (40000,35000) of rate 7/8 with variable node degree distribution0.1256x+0.7140x 2 +0.1604x 9 <strong>and</strong> check node degree distributionx 31 is used as the channel code. We considered severalc<strong>and</strong>idate distributions originally designed for BPSK overAWGN, <strong>and</strong> chose the one that provided the best performance.The overall rate of transmission is seen to be 3000040000 × 4=3<strong>bit</strong>s per channel use. Fig. 4 shows BER plots over an AWGNchannel <strong>and</strong> a DPC channel with interference known at thetransmitter. The interfering vector was generated at r<strong>and</strong>omBit error rateAWGNDPCCapacity for 3 <strong>bit</strong>s/sym10 −310 −410 −510 10.5 11 11.5 12 12.5 1310 −2 Eb/N0(dB)Fig. 4.BER plot for DPC <strong>and</strong> AWGN.for different power levels. The plot with interference did notchange appreciably for all power levels of interference, <strong>and</strong>we have provided one plot for illustration. We see that a BERof 10 −5 is achieved at an SNR of 19.45dB with interference,<strong>and</strong> at an SNR of 19.33 dB without interference. We havesimulated 1000 blocks of length 40000 to obtain sufficientstatistics for a BER of 10 −5 .The AWGN capacity at an SNR of 10 log 10 (2 6 −1)=17.99dB for a rate of 3 <strong>bit</strong>s per channel use. This shows that weare 1.46 dB away from ideal dirty paper channel capacity.The granular gain G(Λ)=2 2R /6S x is computed from thesimulations to be 1.282dB [4], where R = 3.5 is the ratebefore channel coding, <strong>and</strong> S x is the transmit power (obtainedthrough simulations). From this, the shaping loss is calculatedas follows:2πeG (Λ) 2 2C∗ − 110log 10 =0.2548 dB, (7)2 2C∗ − 1where C ∗ = 3. So, of the total gap of 1.46 dB, we havea shaping gap of 0.2548dB, <strong>and</strong> a coding gap of 1.2052dBto capacity. We observed that trellis shaping with largernumber of states results in a decrease in shaping loss in othersimulations.V. APPLICATION TO GAUSSIAN BROADCAST CHANNELWe use the proposed scheme for superposition coding ina two-user Gaussian broadcast channel Y 1 = X + N 1 <strong>and</strong>Y 2 = X + N 2 with P N1 >P N2 . We let P X1 =(1− β) P<strong>and</strong> P X2 = βP, where P is the total transmit power. Here,User 2 is coded <strong>using</strong> DPC considering User 1 as interference.User 1 is shaped <strong>using</strong> sign-<strong>bit</strong> shaping <strong>and</strong> coded <strong>using</strong> an<strong>LDPC</strong> code over M-PAM. Fig. 5 shows a block diagram ofthe transmitter <strong>and</strong> receivers. The encoder structure for User1 is as in Fig. 2 with the interference vector S = 0. Hence,for User 1, the shaping coder minimizes the energy of v. Thedemapper at Receiver 1 calculates LLR for the i-th <strong>bit</strong> in thej-th receiver symbol Y 1j <strong>using</strong> the following formula.∑a∈A:<strong>bit</strong> i=0L i =p(a) exp{− 1 (Y 1j−a) 22 βP+P N1}∑a∈A:<strong>bit</strong> i=1 p(a) exp{− 1 (Y 1j−a) 22 βP+P N1} ,where p(a) for a ∈ A represents the a priori probability of theM-PAM symbol a. At the receiver, we approximate p i <strong>using</strong>926

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!