[ieee 2006 international multi-symposiums on computer and computational sciences (imsccs) -...

5
Constructions of Euclidean Geometry LDPC Codes and Performance Analysis in MIMO-OFDM System Fangni Chen, Lei Shen, and Shiju Li Dept. of ISEE Zhejiang University [email protected]; [email protected]; [email protected] Abstract In this paper, we introduce the history and basic characteristic of Low density parity check codes, then emphasize on the construction of Euclidean geometry LDPC code and take it as the channel code into IEEE802.16d MIMO-OFDM system simulation and compare it with RS-CC codes. Finally we makes a conclusion that Euclidean geometry LDPC codes are strong competitors to FEC codes for error control in communication systems. 1. Introduction Since LDPC (Low Density Parity Check) codes were first discovered by Gallager [l] in 1962, they haven’t received enough recognition for thirty years. But MacKay and Neal [2] rediscovered the excellent LDPC codes in 1996. Since then the researches on LDPC codes are increasing and hot. LDPC codes have the following properties: In binary input AWGN channel, the error performance of the best irregular LDPC code (with length 10 7 , rate R=1/2) is 0.04dB away from the Shannon limit, it is outperform all the Turbo codes ever known [3]; LDPC codes are flexible and have lower error floors; they can be described simply and validated for strict theoretic analysis; The decoding complexity is lower than Turbo codes. This paper starts with the structure of LDPC codes. Then emphasize on the constructions of Euclidean geometry LDPC code and take it as the channel code into IEEE802.16d MIMO-OFDM system simulation and compared it with RS-CC codes. 2. The structure of LDPC codes LDPC codes are linear block codes, they can be described using the results of the parity equations HC T =0, the matrix H is the parity check matrix of the code C. An LDPC code of length n is defined by a J * n parity check matrix H with the following structural properties: (1) each row consists of “ones”; (2) each column consists of “ones”; (3) the number of “ones” in common between any two columns is no greater than one; and (4) both and are small compared to n and J (the number of rows in H). An LDPC codes can also be expressed by the Bi- Partite graph or the Tanner graph [4], which is corresponding with a parity check matrix. Figure 1 shows the parity check matrix H and the Tanner graph of an (6, 2, 3) LDPC code. The Tanner graph consists of two node sets v and c: v=v 1 , v 2 , … v 6 called variable nodes or code bit nodes; c=c 1 ,c 2 ,c 3, ,c 4 called parity check nodes. 1 1 0 1 0 0 0 0 1 1 1 0 1 0 0 0 1 1 0 1 1 0 0 1 H 1 v 2 v 3 v 4 v 5 v 6 v 1 c 2 c 3 c 4 c Figure 1. LDPC code check matrix and Bi-Partite graph A line in the Tanner graph which connects a variable node v n and a parity check node c m if and only if H mn =1, is denoted (v n , c m ). From Figure 1 we can see a cycle of length 6 with bold black lines. For these short cycles of length 4 or 6 are adverse for the widely Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06) 0-7695-2581-4/06 $20.00 © 2006 IEEE

Upload: shiju

Post on 25-Feb-2017

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: [IEEE 2006 International Multi-Symposiums on Computer and Computational Sciences (IMSCCS) - Hangzhou, Zhejiang, China (2006.06.20-2006.06.24)] First International Multi-Symposiums

Constructions of Euclidean Geometry LDPC Codes and Performance Analysis in MIMO-OFDM System

Fangni Chen, Lei Shen, and Shiju LiDept. of ISEE

Zhejiang University [email protected]; [email protected]; [email protected]

Abstract

In this paper, we introduce the history and basic characteristic of Low density parity check codes, then emphasize on the construction of Euclidean geometry LDPC code and take it as the channel code into IEEE802.16d MIMO-OFDM system simulation and compare it with RS-CC codes. Finally we makes a conclusion that Euclidean geometry LDPC codes are strong competitors to FEC codes for error control in communication systems.

1. Introduction

Since LDPC (Low Density Parity Check) codes were first discovered by Gallager [l] in 1962, they haven’t received enough recognition for thirty years. But MacKay and Neal [2] rediscovered the excellent LDPC codes in 1996. Since then the researches on LDPC codes are increasing and hot.

LDPC codes have the following properties: In binary input AWGN channel, the error performance of the best irregular LDPC code (with length 107, rate R=1/2) is 0.04dB away from the Shannon limit, it is outperform all the Turbo codes ever known [3]; LDPC codes are flexible and have lower error floors; they can be described simply and validated for strict theoretic analysis; The decoding complexity is lower than Turbo codes.

This paper starts with the structure of LDPC codes. Then emphasize on the constructions of Euclidean geometry LDPC code and take it as the channel code into IEEE802.16d MIMO-OFDM system simulation and compared it with RS-CC codes.

2. The structure of LDPC codes

LDPC codes are linear block codes, they can be described using the results of the parity equations

HCT=0, the matrix H is the parity check matrix of the code C. An LDPC code of length n is defined by a J *n parity check matrix H with the following structural properties: (1) each row consists of “ones”; (2) eachcolumn consists of “ones”; (3) the number of “ones” in common between any two columns is no greater than one; and (4) both and are small compared to nand J (the number of rows in H).

An LDPC codes can also be expressed by the Bi-Partite graph or the Tanner graph [4], which is corresponding with a parity check matrix. Figure 1 shows the parity check matrix H and the Tanner graph of an (6, 2, 3) LDPC code. The Tanner graph consists of two node sets v and c: v=v1, v2, … v6 called variable nodes or code bit nodes; c=c1,c2,c3,,c4 called parity check nodes.

1 1 0 1 0 00 0 1 1 1 01 0 0 0 1 10 1 1 0 0 1

H

1v 2v 3v 4v 5v 6v

1c 2c 3c 4c

Figure 1. LDPC code check matrix and Bi-Partite graph

A line in the Tanner graph which connects a variable node vn and a parity check node cm if and only if Hmn=1, is denoted (vn, cm). From Figure 1 we can see a cycle of length 6 with bold black lines. For these short cycles of length 4 or 6 are adverse for the widely

Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06) 0-7695-2581-4/06 $20.00 © 2006 IEEE

Page 2: [IEEE 2006 International Multi-Symposiums on Computer and Computational Sciences (IMSCCS) - Hangzhou, Zhejiang, China (2006.06.20-2006.06.24)] First International Multi-Symposiums

used and the best LDPC decoding algorithm BP(Belief Propagation) algorithm, we should reduce the appearance of these short cycles when we do encoding.

Euclidean geometry LDPC codes introduced in the next sections are so-called good codes which don’t have cycles of length 4.

3. Euclidean geometry LDPC codes

Although LDPC codes have outstanding error performance and many methods have been found for constructing these codes, such as Gallager construction, MacKay construction, Xiaoyu Hu’s PEG construction and so on. But these methods are all random constructions, and good LDPC codes that have been constructed are largely computer generated, especially long codes. In 2000, Yu Kou and Shu Lin provided a new algebraic construction of LDPC codes base on finite geometry. Codes of this method are either cyclic or quasi-cyclic, therefore, their encoding is very simple because it can be implemented with linear feedback shift registers based on their generator polynomials. Euclidean geometry (EG) and projective geometry (PG) are two family of finite geometry, this paper emphasized on the former one.

3.1. EG-LDPC codes

Let ( , 2 )sEG m be an m-dimensional Euclidean

geometry over the Galois field (2 )sGF . This geometry

consists of 2 points, each point is simply an m-tuple over

ms

(2 )sGF . The all-zero m-tuple point is called the

origin. There are lines

in

( 1)2 (2 1) /(2m s ms s

Let i and j be two linearly independent points in ( , 2 )sEG m . Then the collection of the following

points: form a

line in

{ } { : (2i j i j sGF )}

( , 2 )sEG m that passes through the point i .Lines do not have any point in common and hence they are parallel. ( , 2 )sEG m consists of J lines do not pass

through the origin, ( 1)(2 1)(2 1) /(2 1)m s ms sJ .

Let be a matrix over GF(2) whose rows are the incidence vectors of all the lines in

(1) ( , 0, )EGH m s

( , 2 )sEG m that do not pass through the origin and whose columns correspond to the nonorigin points in ( , 2 )sEG m . The matrix (1) ( , 0, )EGH m s has these

parameters: row weight 2s , column weight

(2 1) /(2 1) 1ms s , density which is small as m 2 and s 2. Therefore,

is a low-density matrix and the null space

of it gives a regular LDPC code of length

2 /(2 1)s msr

(1) ( , 0, )EGH m s

2 1msn ,called the type-I m-dimensional EG-LDPC code, denoted . This code is cyclic and its

minimum distance is at least . The number of parity bits is equal to the degree of its generator polynomial, especially for type-I 2-dimensional EG-LDPC code, its number of parity bits is

(1) ( , 0, )EGC m s

(2 1) /(2 1)ms s

3 1sn k .Example 1: Construct an EG-LDPC 255 175

code.1)

( , 2 )sEG m , and 2s points in every line. There are

lines intersecting at one point.

Let be the extension field of

(2 1) /(2 1) 1ms s

1) Firstly, we know EG-LDPC 255 175 code

is based on Euclidean geometry , i.e. m=2,

s=4. The points in are correspond to the

elements in , so we can first

construct the Galois field , which can be generated by its primitive polynomial

4(2, 2 )EG4(2, 2 )EG

8(2 ) (2 )msGF GF8(2 )GF

(2 )msGF (2 )sGF and can be regarded as a realization of Euclidean geometry

( , 2 )sEG m .Therefore, the elements in may be

regarded as the points in

(2 )msGF

2ms ( , 2 )sEG m .The element

zero in is the origin of(2 )msGF ( , 2 )sEG m . Let be a

primitive element of , then the nonzero

elements in

(2 )msGF

(2 )msGF 0 1 2 21, , , ...,ms

2 3 4( ) 1 8p x x x x x .2) Secondly, we should find a line which pass

through one point but do not pass through the origin. Known that the points of a line that pass through the point i have the following form: 2 form

the (2 nonorigin points in1)ms ( , 2 )sEG m . { } { : (i j i j sGF 2 )} .

Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06) 0-7695-2581-4/06 $20.00 © 2006 IEEE

Page 3: [IEEE 2006 International Multi-Symposiums on Computer and Computational Sciences (IMSCCS) - Hangzhou, Zhejiang, China (2006.06.20-2006.06.24)] First International Multi-Symposiums

Let i=2, so we should find out the points which satisfy 2{ }ja , let

(2 1) /(2 1) 17ms s,

so2 14{0,1, , , ..., } .

Then we could get a line consists of 16 points. 3) Thirdly, we should find the incidence vector

from the line. The incidence vector consists of 255 points, if the point is on the line, the value of the corresponding place in the vector is 1, and otherwise, the value is 0.

4) Finally, we take the incidence vector as the first row of the parity check matrix. This vector and its 254 cyclic shifts form the parity check matrix of the 2-dimensional EG-LDPC code with length 255 and 175 information bits.

From this example, we find that the construction of EG-LDPC code is very simple as long as we get one line or one incidence vector. The next step is just cyclic shift.

The companion code of the m-dimensional type-I EG-LDPC code is the null space of the parity check matrix as follows:

(1) ( , 0, )EGC m s

(2) ( , 0, )EGH m s = (1) ( , 0, )[ ]TEGH m s .

This LDPC code is

long and its minimum distance is at least

( 1)(2 1)(2 1) /(2 1)m s ms s

2 1sd .We call this code the m-dimensional type-II EG-LDPC code, denoted . This code is not cyclic but can be put in quasi-cyclic form. It has the same number of parity check symbols as the type-I code .

(2) ( , 0, )EGC m s

(1) ( , 0, )EGC m s

3.2. Error performance analysis

Fig. 2 gives the bit error performance of EG-LDPC (255,175) code and MacKay-LDPC (255,175). These two LDPC codes have the same BPSK modulation, transmit to the AWGN channel and decoded with BP algorithm. For EG-LDPC codes, the maximum number of decoding iterations is set to 10. MacKay LDPC codes use 1A construction algorithm [2] and the maximum number of decoding iterations is set to 20. From Figure 2, we see the EG-LDPC code gives the better error performance than MacKay-LDPC although it has fewer iteration numbers. And from the simulation time, we get to know EG-LDPC has almost half of the time that MacKay LDPC code needs. As the decoding algorithms are the same, it shows that

Euclidean geometry encoding is simple than MacKay encoding because the former one takes advantage of the cyclic code.

Reference [5] proposed that an extended or shortened Euclidean geometry LDPC code can get excellent error performance: only a few tenths of a decibel away from the Shannon limit. That’s so amazing.

Figure 2. EG and MacKay LDPC codes performance analysis

4. Simulation and performance analysis

4.1. Simulation system and parameters

We adopt the base band system of IEEE 802.16d standard released in October, 2004 [6]. For the sake of simpleness, we omit the steps of randomization

interleave synchronization channel estimation and equalization. Fig. 3 illustrates the steps involved in the simulation system. Source data shall first be channel encoded and modulated (constellation mapped). The modulated symbols shall be space time encoded, and OFDM modulated: include insert pilot and add cyclic prefix IFFT. Then the base band symbols shall be transmitted to the channel, and do the reverse operations at the receiver, which includes OFDM demodulation space time decoding data demodulation and channel decoding.

The simulation parameters are listed in Table 1.

Table 1. Simulation parametersSubcarrier number 256FFT number 256

Guard interval 1/4

Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06) 0-7695-2581-4/06 $20.00 © 2006 IEEE

Page 4: [IEEE 2006 International Multi-Symposiums on Computer and Computational Sciences (IMSCCS) - Hangzhou, Zhejiang, China (2006.06.20-2006.06.24)] First International Multi-Symposiums

Channel encode EG-LDPC(255,175) RS-CC(64,48,2/3)

modulation BPSK 16QAMChannel model SUI: Standford University Interim

channel 2 3

Antenna number 2×2STC STBC

Dataout FFT

FFT

remove pilot and

cyclic prefix

remove pilot and

cyclic prefix

channel decode STC

decode

demod

STC

Datain insert pilot and

add cyclic prefix

insert pilot and

add cyclic prefix

Channel

encode

IFFT

IFFT

mod

Figure 3. Simulation system

4.2. System simulation result

Fig. 4 and Fig. 5 give the system simulation results. From the figure, we can see EG-LDPC (255,175) code perform a little worse than the RS-CC code when the modulation is BPSK. But when the modulation is 16QAM, the two curves are very close. It is believed that if we use a longer good EG-LDPC code, it will perform better. So we are confident with the EG-LDPC code take a very important position in the next wireless communication technology.

Figure 4. System performance graph (BPSK)

Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06) 0-7695-2581-4/06 $20.00 © 2006 IEEE

Page 5: [IEEE 2006 International Multi-Symposiums on Computer and Computational Sciences (IMSCCS) - Hangzhou, Zhejiang, China (2006.06.20-2006.06.24)] First International Multi-Symposiums

Figure 5. System performance graph (16QAM)

5. Conclusion

In this paper, we started with the development and the structure of LDPC codes. Then we constructed a Euclidean geometry LDPC code, made a comparison with a MacKay-LDPC code and found EG-LDPC code outperforms the latter one. As the EG-LDPC codes are cyclic or quasi-cyclic, they can be simply encoded and implemented. Finally, we took the EG-LDPC code as channel code into IEEE802.16d MIMO-OFDM system simulation and compared it with RS-CC code. And we find that Euclidean geometry LDPC codes are strong competitors to FEC codes for error control in communication systems and they may be adopted as one of the key technologies in the next wireless communication systems.

6. References

[1] R.G. Gallager, “Low-density parity-check codes,” IRETrans. Inform. Theory, IT-8, Jan. 1962, pp. 21-28.[2] D.J.C. MacKay and R.M. Neal, “Near shannon limit performance of low density parity check codes,” Electronic Letters, vol. 32, Aug. 1996, pp. 1645-1646. [3] D.J.C. MacKay, “Good error-correcting codes based on very sparse matrices,” IEEE Trans. Inform. Theory, vol. IT-45, 1999, pp. 399-431. [4] R. M. Tanner, “A recursive approach to low complexity codes,” IEEE Trans. Inform. Theory, vol. IT-27, Sept. 1981, pp. 533-547. [5] Y. Kou, S. Lin, and M. Fossorier, “Low-density parity-check codes based on finite geometries: a rediscovery and new results,” IEEE Trans. Inform. Theory, vol. 47, Nov. 2001, pp. 2711-2736. [6] IEEE Std 802.16-20004.

Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06) 0-7695-2581-4/06 $20.00 © 2006 IEEE