block markov superposition transmission: a simple and flexible...

Post on 01-Mar-2021

0 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Block Markov Superposition Transmission: A

Simple and Flexible Method for Constructing

Good Codes

Xiao Ma

School of Data and Computer ScienceSun Yat-sen University

Email: maxiao@mail.sysu.edu.cn

CAM2016, Hong KongAugust 25, 2016

Xiao Ma (SYSU) BMST August 25, 2016 1 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 2 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 3 / 83

The Channel Coding Theorem

Theorem (Shannon 1948)1 For a channel, all rates below capacity C are achievable. Specifically, for

every rate R < C , there exists a sequence of (2nR,n) codes with maximalprobability of error λ(n) → 0.

2 Conversely, any rate above capacity C cannot be achievable. Equivalently,any sequence of (2nR,n) codes with λ(n) → 0 must have R ≤ C .

Capacity for AWGN Channels

A channel with additive white Gaussian noise (AWGN) is characterised byyt = xt + wt , where xt , yt and wt are input, output and noise, respectively. ForAWGN channels, the capacity per dimension is given by [Shannon 1948]

C =1

2log (1 + SNR) ,

where SNR is the signal-to-noise ratio (SNR).

Xiao Ma (SYSU) BMST August 25, 2016 4 / 83

Capacity curves for AWGN Channels

−10 −5 0 5 10 15 200

1

2

3

4

SNR (dB)

bits

/2−

dim

ensi

on

unconstraint4−PAM/16−QAM8−PSKBPSK/QPSK

Figure: Capacity curves for AWGN channels and the i.u.d. capacity limits for severalconstellations (BPSK, 4-PAM, QPSK, 8-PSK, 16-QAM).

Xiao Ma (SYSU) BMST August 25, 2016 5 / 83

Existing Good Codes

Turbo codes:parallel concatenated convolutional codes (PCCC) and serial concatenatedconvolutional codes (SCCC);

Low-density parity-check (LDPC) codes (either random construction oralgebraic construction): From decoding aspect, they can be viewed as seriallyconcatenated repetition codes with single parity-check codes;

Turbo/LDPC-like codes:(irregular) repeat-accumulate (RA) codes;accumulate-repeat-accumulate (ARA) codes;concatenated zigzag codes;precoded concatenated zigzag codes;

Polar codes: Concatenation of a series of simple transformation;

Spatially coupled codes: Convolutional LDPC codes; braidedblock/convolutional codes; stair-case codes;

· · ·

Non-binary, BICM, · · ·

Xiao Ma (SYSU) BMST August 25, 2016 6 / 83

Question

QuestionIs there a universal procedure to construct codes with

any given (rational) code rate R, say 119911 ;

any given signal constellation A (with moderate size);

2-PAM/BPSK 4-PAM 16-QAM8-PSK 8-AMPM

any given target error performance (of interest), say, 10−4, 10−6, or 10−15.

Xiao Ma (SYSU) BMST August 25, 2016 7 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 8 / 83

Principle of Block Markov SuperpositionTransmission (BMST)

!" #$

! #$ '()

*+,-.

# #$

%1

%"

$ #$

%1

%

0 1 2 3 4 5 6 7 8 910

−6

10−5

10−4

10−3

10−2

10−1

100

once

SNR= 10 log10(1/σ2) (dB)

BE

RRepetition Increases Reliability

Consider a basic code C = [N ,K ]B

B-fold Cartesian product of a short block code [N ,K ].

The codeword is transmitted once.

Performance curve in terms of BER versus SNR is shown.

Xiao Ma (SYSU) BMST August 25, 2016 9 / 83

Principle of Block Markov SuperpositionTransmission (BMST)

Encu 0)

v 0) BI-

AWGNC

y 0)

y 1)

BI-

AWGNC

c 0)

c 1)

1

0 1 2 3 4 5 6 7 8 910

−6

10−5

10−4

10−3

10−2

10−1

100

once

twice

10log10

(2)

SNR= 10 log10(1/σ2) (dB)

BE

RRepetition Increases Reliability

The same codeword is transmitted twice.

The performance curve shifts to the left by 10 log10 2 = 3 dB.

Xiao Ma (SYSU) BMST August 25, 2016 9 / 83

Principle of Block Markov SuperpositionTransmission (BMST)

Encu(0)

v(0)

m

BI-

AWGNC

y(0)

y(1)

y(m)

BI-

AWGNC

BI-

AWGNC

c(0)

c(1)

c(m)

1

0 1 2 3 4 5 6 7 8 910

−6

10−5

10−4

10−3

10−2

10−1

100

SNR= 10 log10(1/σ2) (dB)

BE

R

once

twice

10log10

(m+1)

m+1 times

10log10

(2)

Repetition Increases Reliability

The same codeword is transmitted m + 1 times.

The performance curve shifts to the left by 10 log10(m + 1) dB.

Repetition increases reliability but decreases efficiency (code rate).

Xiao Ma (SYSU) BMST August 25, 2016 9 / 83

Principle of Block Markov SuperpositionTransmission (BMST)

Encu(0) v(0) BI-AWGNC

y(0)c(0)

0 1 2 3 4 5 6 7 8 910

−6

10−5

10−4

10−3

10−2

10−1

100

once

SNR= 10 log10(1/σ2) (dB)

BE

R

Superposition Increases Efficiency

In the first transmission:

The transmitter sends a codeword v (0) from the code C that corresponds tothe first data block.

Xiao Ma (SYSU) BMST August 25, 2016 10 / 83

Principle of Block Markov SuperpositionTransmission (BMST)

Encu(0) v(0)

w(0,1)

BI-AWGNC

y(0)

y(1)BI-AWGNC

c(0)

c(1)

w(0,0)

1…

0 1 2 3 4 5 6 7 8 910

−6

10−5

10−4

10−3

10−2

10−1

100

once

twice

10log10

(2)

SNR= 10 log10(1/σ2) (dB)

BE

R

Superposition Increases Efficiency

In the second transmission:

The transmitter generates the codeword v (0) (interleaved version) one moretime;

Xiao Ma (SYSU) BMST August 25, 2016 10 / 83

Principle of Block Markov SuperpositionTransmission (BMST)

Encu(0) v(0)

w(0,1)

BI-AWGNC

y(0)

y(1)BI-AWGNCEncu(1)

c(0)

c(1)

w(1,0)

w(0,0)

1…

v(1)

0 1 2 3 4 5 6 7 8 910

−6

10−5

10−4

10−3

10−2

10−1

100

once

twice

10log10

(2)

SNR= 10 log10(1/σ2) (dB)

BE

R

Superposition Increases Efficiency

In the second transmission:

The transmitter generates the codeword v (0) (interleaved version) one moretime;In the meanwhile, a fresh codeword v (1) from C that corresponds to thesecond data block is superimposed on the interleaved version of v (0).

Xiao Ma (SYSU) BMST August 25, 2016 10 / 83

Principle of Block Markov SuperpositionTransmission (BMST)

Encu(0) v(0)

w(0,1)

BI-AWGNC

y(0)

y(1)

y(2)

BI-AWGNC

BI-AWGNC

Encu(1)

c(0)

1

Encu(2)w(1,1)

c(1)

c(2)

w(1,0)

w(0,0)

1

v(1)

w(2,0)

v(2)

………

0 1 2 3 4 5 6 7 8 910

−6

10−5

10−4

10−3

10−2

10−1

100

SNR= 10 log10(1/σ2) (dB)

BE

R

once

twice

BMST

10log10

(2)

Superposition Increases Efficiency

In the t-th transmission:

The current codeword v (t) is superimposed on (“mixed into”) the previouscodeword v (t−1) and then transmitted.

We obtain a BMST code with memory 1.

Xiao Ma (SYSU) BMST August 25, 2016 10 / 83

Principle of Block Markov SuperpositionTransmission (BMST)

Encu(0) v(0)

w(0,1)

w(0,m)

m

BI-AWGNC

y(0)

y(1)

y(m)

BI-AWGNC

BI-AWGNC

Encu(1)

c(0)

m-1

Encu(m)w(1,m-1)

c(1)

c(m)

w(1,0)

w(0,0)

1…

v(1)

w(m,0)

…v(m)

………

0 1 2 3 4 5 6 7 8 910

−6

10−5

10−4

10−3

10−2

10−1

100

SNR= 10 log10(1/σ2) (dB)

BE

R

once

twice

10log10

(m+1)

BMST

BMST

m+1 times

10log10

(2)

Superposition Increases Efficiency

For a BMST code with memory m, the t-th transmission is a superposition ofthe current codeword and the m previous codewords, all randomly-interleaved.

The high SNR performance can be predicted by shifting the BER curve to theleft by 10 log10(m + 1) dB.

Xiao Ma (SYSU) BMST August 25, 2016 10 / 83

Principle of BMST – Encoding Structure

m-1 m

u(t)

v(t)

v(t-1)

v(t-2)

v(t-m+1)

v(t-m)

c(t)

w(t,1)

w(t,m-1)

w(t,m)

w(t,0)

w(t,2)

A serially concatenated code:

Outer code (the basic code) introduces redundancy;Inner code (a rate-one block-oriented feedforward convolutional encoder)introduces memory between transmissions.

Termination procedure:

A tail consisting of m blocks of the all-zero vector is added;Much simpler than for spatially coupled LDPC codes.

Can be viewed as a class of spatially coupled codes

Generator matrix instead of the parity-check matrix is coupled.

Xiao Ma (SYSU) BMST August 25, 2016 11 / 83

Principle of BMST – Matrix Representation

GBMST =

GΠ0 GΠ1 · · · GΠm

GΠ0 GΠ1. . . GΠm

. . .. . .

. . .. . .

GΠ0 · · · GΠm−1 GΠm

Lk×(L+m)n

L: length (in terms of blocks) of the transmitted data (coupling length).

m: encoding memory (coupling width).

G: generator matrix of the basic code.

Πi (0 ≤ i ≤ m): m + 1 randomly selected permutation matrices.

Rate of the BMST code:

RBMST =Lk

(L + m)n=

L

L + mR,

where R is the rate of the basic code.

Xiao Ma (SYSU) BMST August 25, 2016 12 / 83

Principle of BMST – Decoding Algorithm

1 2

=

C

C(0)

U(0)

V(0)

1 2

=

C

+

C(3)

U(3)

V(3)

1 2

=

C

+

C(2)

U(2)

V(2)

+

C(4)

C(5)

1 2

=

C

+

C(1)

U(1)

V(1)

a decoding layer

Figure: The normal graph of a BMST system with L = 4 and m = 2.

An iterative sliding-window decoding (SWD) algorithm is used;

Four types of nodes: C , =, +, and∏

;

Messages are processed and passed through different decoding layers forwardand backward over the normal graph.

Xiao Ma (SYSU) BMST August 25, 2016 13 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 14 / 83

Performance Bounds of BMST – Genie-Aided Lower Bound

Encu(0) v(0)

w(0,1)

w(0,m)

m

BI-AWGNC

y(0)

y(1)

y(m)

BI-AWGNC

BI-AWGNC

Encu(1)

c(0)

m-1

Encu(m)w(1,m-1)

c(1)

c(m)

w(1,0)

w(0,0)

1…

v(1)

w(m,0)

…v(m)

………

Figure: The BMST system.

Encu

(t)v(t)

w(t,1)

w(0,m)

m

BI-

AWGNC

y(t)

y(t+1)

y(t+m)

BI-

AWGNC

BI-

AWGNC

c(t)

w(t+1,m-1)

c(t+1)

c(t+m)

w(t+1,0)

w(t,0)

1…

w(t+m,0)

w(t-1,1)

w(t-m,m)

w(t-m+1,m)…

Figure: The genie-aided lower bound system.

Genie-Aided Lower Bound

Imagine that u′ = {u(i), t −m ≤ i ≤ t + m , i , t} are known at the receiver.

This is equivalent to transmitting u (t) for m + 1 times.

The coding gain of the BMST can not be larger than

10 log10(m + 1) − 10 log10(1 + m/L) dB.

Noticing that Pr{u ′|y } ≈ 1 in the low error rate region, we can expect thatthe maximal coding gain 10 log10(m + 1) − 10 log10(1 + m/L) dB.

Xiao Ma (SYSU) BMST August 25, 2016 15 / 83

Performance Bounds of BMST – Upper Bound

Upper Bound

The input-output weight enumerating function (IOWEF) of the BMSTsystem can be computed from that of the basic code.

The BER can be upper-bounded by an improved union bound.

Notice that an incomplete (truncated) IOWEF is sufficient for upper bounds.(See Xiao Ma, Jia Liu and Baoming T-COMM 2013).

Xiao Ma (SYSU) BMST August 25, 2016 16 / 83

Performance Bounds of BMST – Example

0 1 2 3 4 5 6 710

−6

10−5

10−4

10−3

10−2

10−1

100

BCJR

SNR (dB)

BE

R

CC, k = 50, n = 104

Figure: Coding gain analysis of the BMST system. The basic code is a terminatedconvolutional code (CC) with the polynomial generator matrix [1, 1+D+D2

1+D2 ]. The codingparameters of the BMST system are m = 1, L = 19, d = 19, and Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 17 / 83

Performance Bounds of BMST – Example

0 1 2 3 4 5 6 710

−6

10−5

10−4

10−3

10−2

10−1

100

BCJR

10log10

(2)

SNR (dB)

BE

R

CC, k = 50, n = 104 m = 1µÄϽç

Figure: Coding gain analysis of the BMST system. The basic code is a terminatedconvolutional code (CC) with the polynomial generator matrix [1, 1+D+D2

1+D2 ]. The codingparameters of the BMST system are m = 1, L = 19, d = 19, and Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 17 / 83

Performance Bounds of BMST – Example

0 1 2 3 4 5 6 710

−6

10−5

10−4

10−3

10−2

10−1

100

BCJR

10log10

(2)

SNR (dB)

BE

R

CC, k = 50, n = 104 m = 1µÄϽç m = 1µÄÉϽç

Figure: Coding gain analysis of the BMST system. The basic code is a terminatedconvolutional code (CC) with the polynomial generator matrix [1, 1+D+D2

1+D2 ]. The codingparameters of the BMST system are m = 1, L = 19, d = 19, and Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 17 / 83

Performance Bounds of BMST – Example

0 1 2 3 4 5 6 710

−6

10−5

10−4

10−3

10−2

10−1

100

BCJR

10log10

(2)

SNR (dB)

BE

R

CC, k = 50, n = 104Lower bound for m = 1Upper bound for m = 1simulation for m = 1

Figure: Coding gain analysis of the BMST system. The basic code is a terminatedconvolutional code (CC) with the polynomial generator matrix [1, 1+D+D2

1+D2 ]. The codingparameters of the BMST system are m = 1, L = 19, d = 19, and Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 17 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 18 / 83

A General Procedure of Designing BMST

With the genie-aided lower bound, to construct a BMST system of a given rate Rwith a target BER of ptarget, we can perform the following steps.

1 Take a code [N ,K ]B with the given rate R as the basic code. In order to approachthe channel capacity, we set the code length n = NB ≥ 10000 in our simulations;

2 Find the performance curve fbasic (γb) of the basic code. From this curve, find therequired SNR ( 1

σ2 ) to achieve the target BER. That is, find γtarget such thatfbasic(γtarget) ≤ ptarget;

3 Find the Shannon limit for the code rate, denoted by γlim;

4 Determine the encoding memory by 10 log10(m + 1) ≥ γtarget − γlim. That is,

m =

⌊10

γtarget−γlim10 − 1

⌉,

where bx e stands for the integer that is closest to x .

5 Generate m + 1 interleavers randomly.

Xiao Ma (SYSU) BMST August 25, 2016 19 / 83

Construction Examples – BMST with Different Code Rates over

Binary-Input AWGN Channels (BI-AWGNC)

Table: The encoding memories required to approach the corresponding Shannon limitsusing BMST systems for different code rates at given target BERs

Basic codes ptarget γtarget (dB) γlim (dB) γtarget−γlim (dB) m

RC [8,1]1250 10−3 0.77 −7.23 8.00 6

RC [8,1]1250 10−6 4.51 −7.23 11.74 14

RC [4,1]2500 10−3 3.78 −3.80 7.58 5

RC [4,1]2500 10−6 7.52 −3.80 11.32 13

RC [2,1]5000 10−3 6.79 0.19 6.60 4

RC [2,1]5000 10−6 10.53 0.19 10.34 10

SPC [4,3]2500 10−3 7.62 3.39 4.23 2

SPC [4,3]2500 10−6 10.91 3.39 7.52 5

SPC [8,7]1250 10−3 8.18 5.27 2.91 1

SPC [8,7]1250 10−6 11.20 5.27 5.93 3

Xiao Ma (SYSU) BMST August 25, 2016 20 / 83

A Construction Example – BMST with Rate-1/2 over BI-AWGNC

0 1 2 3 4 5 6 7 8 9 10 1110

−7

10−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BE

R

RC[2,1]

Figure: Performance of the BMST systems with the RC [2, 1]5000 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 21 / 83

A Construction Example – BMST with Rate-1/2 over BI-AWGNC

0 1 2 3 4 5 6 7 8 9 10 1110

−7

10−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BE

R

RC[2,1]Shannon limit of rate 1/2

Figure: Performance of the BMST systems with the RC [2, 1]5000 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 21 / 83

A Construction Example – BMST with Rate-1/2 over BI-AWGNC

0 1 2 3 4 5 6 7 8 9 10 1110

−7

10−6

10−5

10−4

10−3

10−2

10−1

100

6.60dB

SNR (dB)

BE

R

RC[2,1]Shannon limit of rate 1/2

Figure: Performance of the BMST systems with the RC [2, 1]5000 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 21 / 83

A Construction Example – BMST with Rate-1/2 over BI-AWGNC

0 1 2 3 4 5 6 7 8 9 10 1110

−7

10−6

10−5

10−4

10−3

10−2

10−1

100

6.60dB

10log10

(4+1)dB

SNR (dB)

BE

R

RC[2,1]Shannon limit of rate 1/2Lower bound for m = 4

Figure: Performance of the BMST systems with the RC [2, 1]5000 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 21 / 83

A Construction Example – BMST with Rate-1/2 over BI-AWGNC

0 1 2 3 4 5 6 7 8 9 10 1110

−7

10−6

10−5

10−4

10−3

10−2

10−1

100

6.60dB

10log10

(4+1)dB

SNR (dB)

BE

R

RC[2,1]Shannon limit of rate 1/2Lower bound for m = 4

BMST, m = 4, d = 12, ptarget

= 10−3

Figure: Performance of the BMST systems with the RC [2, 1]5000 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 21 / 83

A Construction Example – BMST with Rate-1/2 over BI-AWGNC

0 1 2 3 4 5 6 7 8 9 10 1110

−7

10−6

10−5

10−4

10−3

10−2

10−1

100

6.60dB

10log10

(4+1)dB

10.34dB

SNR (dB)

BE

R

RC[2,1]Shannon limit of rate 1/2Lower bound for m = 4

BMST, m = 4, d = 12, ptarget

= 10−3

Figure: Performance of the BMST systems with the RC [2, 1]5000 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 21 / 83

A Construction Example – BMST with Rate-1/2 over BI-AWGNC

0 1 2 3 4 5 6 7 8 9 10 1110

−7

10−6

10−5

10−4

10−3

10−2

10−1

100

6.60dB

10log10

(4+1)dB

10.34dB

10log10

(10+1)dB

SNR (dB)

BE

R

RC[2,1]Shannon limit of rate 1/2Lower bound for m = 4

BMST, m = 4, d = 12, ptarget

= 10−3

Lower bound for m = 10

Figure: Performance of the BMST systems with the RC [2, 1]5000 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 21 / 83

A Construction Example – BMST with Rate-1/2 over BI-AWGNC

0 1 2 3 4 5 6 7 8 9 10 1110

−7

10−6

10−5

10−4

10−3

10−2

10−1

100

6.60dB

10log10

(4+1)dB

10.34dB

10log10

(10+1)dB

SNR (dB)

BE

R

RC[2,1]Shannon limit of rate 1/2Lower bound for m = 4

BMST, m = 4, d = 12, ptarget

= 10−3

Lower bound for m = 10

BMST, m = 10, d = 30, ptarget

= 10−6

Figure: Performance of the BMST systems with the RC [2, 1]5000 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 21 / 83

Construction Examples – BMST with Rate-1/8 over BI-AWGNC

−8 −7.5 −7 −6.5 −6 −5.5 −5 −4.5 −4 −3.5 −310

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BE

R

Shannon limit of rate 1/8

BMST, m = 6, d = 18, ptarget

= 10−3

BMST, m = 14, d = 42, ptarget

= 10−6

Lower bound for m = 6Lower bound for m = 14

Figure: Performance of the BMST systems with the RC [8, 1]1250 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 22 / 83

Construction Examples – BMST with Rate-1/4 over BI-AWGNC

−4 −3.5 −3 −2.5 −2 −1.5 −1 −0.5 010

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BE

R

Shannon limit of rate 1/4

BMST, m = 5, d = 15, ptarget

= 10−3

BMST, m = 13, d = 39, ptarget

= 10−6

Lower bound for m = 5Lower bound for m = 13

Figure: Performance of the BMST systems with the RC [4, 1]2500 as the basic code. Thetarget BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of data anddecode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 23 / 83

Construction Examples – BMST with Rate-3/4 over BI-AWGNC

3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 810

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BE

R

Shannon limit of rate 3/4

BMST, m = 2, d = 6, ptarget

= 10−3

BMST, m = 5, d = 15, ptarget

= 10−6

Lower bound for m = 2Lower bound for m = 5

Figure: Performance of the BMST systems with the SPC [4, 3]2500 as the basic code.The target BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of dataand decode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 24 / 83

Construction Examples – BMST with Rate-7/8 over BI-AWGNC

5 5.5 6 6.5 7 7.5 8 8.5 9 9.5 1010

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BE

R

Shannon limit of rate 7/8

BMST, m = 1, d = 3, ptarget

= 10−3

BMST, m = 3, d = 9, ptarget

= 10−6

Lower bound for m = 2Lower bound for m = 3

Figure: Performance of the BMST systems with the SPC [8, 7]1250 as the basic code.The target BERs are 10−3 and 10−6. The systems encode L = 100000 sub-blocks of dataand decode with the SWD algorithm of a maximum iteration Imax = 18.

Xiao Ma (SYSU) BMST August 25, 2016 25 / 83

Construction Examples – BMST with Different Code Rates over

BI-AWGNC

−11−10 −9 −8 −7 −6 −5 −4 −3 −2 −1 0 1 2 3 4 5 6 7 80

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SNR (dB)

Rat

e (b

its/c

hann

el u

se)

Performance of the BMST systemCapacity bound with BPSK signalling

Figure: The required SNRs (1/σ2) for the BMST system using repetition codes andsingle-parity-check codes to achieve the BER of 10−6 over the BI-AWGNC.

Xiao Ma (SYSU) BMST August 25, 2016 26 / 83

What does the performance curve look like?

Xiao Ma (SYSU) BMST August 25, 2016 27 / 83

What does the performance curve look like?

Xiao Ma (SYSU) BMST August 25, 2016 27 / 83

What does the performance curve look like?

Xiao Ma (SYSU) BMST August 25, 2016 27 / 83

What does the performance curve look like?

Xiao Ma (SYSU) BMST August 25, 2016 27 / 83

What does the performance curve look like?

Xiao Ma (SYSU) BMST August 25, 2016 27 / 83

What does the performance curve look like?

Xiao Ma (SYSU) BMST August 25, 2016 27 / 83

What does the performance curve look like?

Xiao Ma (SYSU) BMST August 25, 2016 27 / 83

What code can be the basic code?

What do we mean by short code?

Can a random-generated linear code [32, 16] be the basic code?

Is BMST an LDPC code or a convolutional LDPC code?

Actually, we care about neither the generator matrix nor the parity-checkmatrix. The basic code can even be a non-linear code.

What do we really care about?

Xiao Ma (SYSU) BMST August 25, 2016 28 / 83

What code can be the basic code?

What do we mean by short code?

Can a random-generated linear code [32, 16] be the basic code?

Is BMST an LDPC code or a convolutional LDPC code?

Actually, we care about neither the generator matrix nor the parity-checkmatrix. The basic code can even be a non-linear code.

What do we really care about?

Xiao Ma (SYSU) BMST August 25, 2016 28 / 83

What code can be the basic code?

What do we mean by short code?

Can a random-generated linear code [32, 16] be the basic code?

Is BMST an LDPC code or a convolutional LDPC code?

Actually, we care about neither the generator matrix nor the parity-checkmatrix. The basic code can even be a non-linear code.

What do we really care about?

Xiao Ma (SYSU) BMST August 25, 2016 28 / 83

What code can be the basic code?

What do we mean by short code?

Can a random-generated linear code [32, 16] be the basic code?

Is BMST an LDPC code or a convolutional LDPC code?

Actually, we care about neither the generator matrix nor the parity-checkmatrix. The basic code can even be a non-linear code.

What do we really care about?

Xiao Ma (SYSU) BMST August 25, 2016 28 / 83

What code can be the basic code?

What do we mean by short code?

Can a random-generated linear code [32, 16] be the basic code?

Is BMST an LDPC code or a convolutional LDPC code?

Actually, we care about neither the generator matrix nor the parity-checkmatrix. The basic code can even be a non-linear code.

What do we really care about?

Xiao Ma (SYSU) BMST August 25, 2016 28 / 83

What code can be the basic code?

What do we mean by short code?

Can a random-generated linear code [32, 16] be the basic code?

Is BMST an LDPC code or a convolutional LDPC code?

Actually, we care about neither the generator matrix nor the parity-checkmatrix. The basic code can even be a non-linear code.

What do we really care about?

Xiao Ma (SYSU) BMST August 25, 2016 28 / 83

What we really care about is whether or not the basic codehas efficient encoding/decoding algorithms.

ENC D D D

+

+

m-1

+

m

+

u(t)

v(t)

v(t-1)

v(t-2)

v(t-m+1)

v(t-m)

c(t)

Figure: Encoding of BMST with memory m.

1 2

=

C

C(0)

U(0)

V(0)

1 2

=

C

+

C(3)

U(3)

V(3)

1 2

=

C

+

C(2)

U(2)

V(2)

+

C(4)

C(5)

1 2

=

C

+

C(1)

U(1)

V(1)

a decoding layer

Figure: Sliding-window decoding over the normal graph.

Xiao Ma (SYSU) BMST August 25, 2016 29 / 83

Multiple-Rate Codes over BI-AWGNC – Hadamard Transform

(HT) Coset Codes

v0

v1

v2

v3

v4

v5

v6

v7

u0

uK-1

⎧⎨⎩

(8-K)

frozen

bits

++

++

+

+

+

+

+

+

+

+

T0 T1 T2

0

0

8H

……

……

Table: The Memory Required for Each Code Rate Using the BMST of HT-coset Codeswith N = 8 to Approach the Shannon Limit at the BER of 10−5

Rate R = K /8 1/8 2/8 3/8 4/8 5/8 6/8 7/8

γ∗K (dB) -7.2 -3.8 -1.5 0.2 1.8 3.4 5.3

γK (dB) 3.6 6.8 7.2 8.0 9.9 10.4 10.6

Gap γK −γ∗K (dB) 10.8 10.6 8.7 7.8 8.1 7.0 5.3

Memory mK 11 10 6 5 5 4 2

Xiao Ma (SYSU) BMST August 25, 2016 30 / 83

Multiple-Rate Codes over BI-AWGNC – BMST-HT Codes

−11 −10 −9 −8 −7 −6 −5 −4 −3 −2 −1 0 1 2 3 4 5 6 7 8 90

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SNR (dB)

Rat

e (b

its/c

hann

el u

se)

Capacity bound with BPSK modulationPerformance of the BMST−HT codes

Figure: The required SNR for the BMST-HT codes [8,K ]1250(1 ≤ K ≤ 7) to achieve theBER of 10−5 with BPSK signalling over AWGN channels.

Xiao Ma (SYSU) BMST August 25, 2016 31 / 83

Binary Multiple-Rate Codes over BI-AWGNC – Time-Sharing

Repetition (R) Codes And Single-Parity-Check (SPC) Codes

Repetition C

2N

Repetition SP CSP

Figure: The form of a codeword in an RSPC code, where the locations for informationbits are shaded. The code rate can be varied from 1/N to (N − 1)/N by settingβ = 0, 1, · · · ,N − 2.

Table: The Memories Required for the BMST-RSPC Codes with N = 10 to Approachthe Shannon Limit at the BER of 10−5

RateK /N 110

210

310

410

510

610

710

810

910

γ∗K

−8.3 −4.9 −2.8 −1.2 0.2 1.5 2.7 4.1 5.8

γK 2.6 10.4 10.4 10.5 10.5 10.5 10.5 10.5 10.5

MemorymK 11 33 20 14 10 7 5 3 2

Xiao Ma (SYSU) BMST August 25, 2016 32 / 83

Multiple-Rate Codes over BI-AWGNC – BMST-RSPCCodes

−10 −8 −6 −4 −2 0 2 4 6 8 100

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SNR (dB)

Rat

e

Performance of the BMST−RSPC codesCapacity bound with BPSK signalling

Figure: The required SNR for the BMST-RSPC codes with N = 10 to achieve the BERof 10−5 with BPSK signalling over AWGN channels.

Xiao Ma (SYSU) BMST August 25, 2016 33 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 34 / 83

BMST over High-Order Constellations – Binary Codes + Nonbinary

Constellations

Binary Encoder C

u(t)

v(t) v(t-1)

w(1)w(0)

m-1 m…

v(t-m+1) v(t-m)

c(t)

w(m-1) w(m)Signal

Mapperφ

x(t)

Figure: Binary BMST with high-order constellations.

Xiao Ma (SYSU) BMST August 25, 2016 35 / 83

BMST over High-Order Constellations – Binary BMST + 8-PSK

0 1 2 3 4 5 6 7 8 9 10 11 12 13 1410

−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0(dB)

BE

R

Shannon limit, unconstraintShannon limit, 8−PSKCC, k = 5500, n = 11004, m = 1

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 5500 and n = 11004.Signals are transmitted using 8-PSK modulation with Gray mapping over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm is performed, where the encoding memories and thedecoding delays are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 36 / 83

BMST over High-Order Constellations – Binary BMST + 8-PSK

0 1 2 3 4 5 6 7 8 9 10 11 12 13 1410

−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0(dB)

BE

R

Shannon limit, unconstraintShannon limit, 8−PSKCC, k = 5500, n = 11004, m = 1Lower bound for m = 1

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 5500 and n = 11004.Signals are transmitted using 8-PSK modulation with Gray mapping over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm is performed, where the encoding memories and thedecoding delays are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 36 / 83

BMST over High-Order Constellations – Binary BMST + 8-PSK

0 1 2 3 4 5 6 7 8 9 10 11 12 13 1410

−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0(dB)

BE

R

Shannon limit, unconstraintShannon limit, 8−PSKCC, k = 5500, n = 11004, m = 1BMST−BICM, m = 1, d = 3Lower bound for m = 1

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 5500 and n = 11004.Signals are transmitted using 8-PSK modulation with Gray mapping over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm is performed, where the encoding memories and thedecoding delays are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 36 / 83

BMST over High-Order Constellations – Binary BMST + 8-PSK

0 1 2 3 4 5 6 7 8 9 10 11 12 13 1410

−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0(dB)

BE

R

Shannon limit, unconstraintShannon limit, 8−PSKCC, k = 5500, n = 11004, m = 1CC, k = 5500, n = 11004, m = 2BMST−BICM, m = 1, d = 3Lower bound for m = 1Lower bound for m = 2

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 5500 and n = 11004.Signals are transmitted using 8-PSK modulation with Gray mapping over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm is performed, where the encoding memories and thedecoding delays are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 36 / 83

BMST over High-Order Constellations – Binary BMST + 8-PSK

0 1 2 3 4 5 6 7 8 9 10 11 12 13 1410

−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0(dB)

BE

R

Shannon limit, unconstraintShannon limit, 8−PSKCC, k = 5500, n = 11004, m = 1CC, k = 5500, n = 11004, m = 2BMST−BICM, m = 1, d = 3BMST−BICM, m = 2, d = 5Lower bound for m = 1Lower bound for m = 2

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 5500 and n = 11004.Signals are transmitted using 8-PSK modulation with Gray mapping over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm is performed, where the encoding memories and thedecoding delays are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 36 / 83

BMST over High-Order Constellations – Binary BMST + 8-PSK

0 1 2 3 4 5 6 7 8 9 10 11 12 13 1410

−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0(dB)

BE

R

Shannon limit, unconstraintShannon limit, 8−PSKCC, k = 5500, n = 11004, m = 1CC, k = 5500, n = 11004, m = 2CC, k = 5500, n = 11004, m = 3BMST−BICM, m = 1, d = 3BMST−BICM, m = 2, d = 5Lower bound for m = 1Lower bound for m = 2Lower bound for m = 3

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 5500 and n = 11004.Signals are transmitted using 8-PSK modulation with Gray mapping over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm is performed, where the encoding memories and thedecoding delays are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 36 / 83

BMST over High-Order Constellations – Binary BMST + 8-PSK

0 1 2 3 4 5 6 7 8 9 10 11 12 13 1410

−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0(dB)

BE

R

Shannon limit, unconstraintShannon limit, 8−PSKCC, k = 5500, n = 11004, m = 1CC, k = 5500, n = 11004, m = 2CC, k = 5500, n = 11004, m = 3BMST−BICM, m = 1, d = 3BMST−BICM, m = 2, d = 5BMST−BICM, m = 3, d = 7Lower bound for m = 1Lower bound for m = 2Lower bound for m = 3

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 5500 and n = 11004.Signals are transmitted using 8-PSK modulation with Gray mapping over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm is performed, where the encoding memories and thedecoding delays are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 36 / 83

BMST over High-Order Constellations – Nonbinary Codes +

Nonbinary Constellations

RUNu(t)

v(t) v(t-1)

w(1)w(0)

m-1 m…

v(t-m+1) v(t-m)

c(t)

w(m-1) w(m)Signal

Mapperφ

x(t)Nonbinary

Figure: Nonbinary BMST with high-order constellations. RUN stands a nonbinary codeover groups.

Xiao Ma (SYSU) BMST August 25, 2016 37 / 83

BMST over High-Order Constellations – Nonbinary Codes +

Nonbinary Constellations

Table: Construction Examples with 8-PSK Constellations over AWGN Channels

A PQ

(1

N+1 ,1N

)α ptarget γlim (dB) m

8-PSK 15

(16 ,

15

)0 10−4 −2.8 19

8-PSK 25

(13 ,

12

)12 10−4 1.3 17

8-PSK 35

(12 ,1

)23 10−4 4.7 15

8-PSK 45

(12 ,1

)14 10−4 8.1 7

Xiao Ma (SYSU) BMST August 25, 2016 38 / 83

BMST over High-Order Constellations – Nonbinary BMST + 8-PSK

−3 −1 1 3 5 7 9 11 13 15 1710

−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

SE

R

Rate 1/5, m = 19Rate 2/5, m = 17Rate 3/5, m = 15Rate 4/5, m = 7Rate 1/5, lower boundRate 2/5, lower boundRate 3/5, lower boundRate 4/5, lower boundRate 1/5, Shannon limitRate 2/5, Shannon limitRate 3/5, Shannon limitRate 4/5, Shannon limit

Figure: Performance of the BMST-RUN codes with the codesCRUN[Q ,P ]150( P

Q= 1

5, · · · , 4

5) as basic codes defined with 8-PSK modulation over

AWGN channels.

Xiao Ma (SYSU) BMST August 25, 2016 39 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 40 / 83

BMST Codes over Other Scenarios – Continuous Phase Modulation

(CPM) over AWGN channels

C D

+

u(t)

v(t) v(t-1)

w(1)w(0)

D

m-1

+

m

+

v(t-m+1) v(t-m)

c(t)

w(m-1) w(m)MM x(t)

CPE q(t)

MSK

Figure: The BMST combined with minimum shift keying (MSK) modulation.

Xiao Ma (SYSU) BMST August 25, 2016 41 / 83

BMST Codes over Other Scenarios – Continuous Phase Modulation

(CPM) over AWGN channels

0 1 2 3 4 5 6 7 810

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Shnnon limit of rate 1/2CC, k = 10000, n = 20004, m = 0

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 10000 andn = 20004. Signals are transmitted using non-recursive MSK modulation over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm with d = 7 and Imax = 18 is performed, where theencoding memories are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 42 / 83

BMST Codes over Other Scenarios – Continuous Phase Modulation

(CPM) over AWGN channels

0 1 2 3 4 5 6 7 810

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Shnnon limit of rate 1/2CC, k = 10000, n = 20004, m = 0CC, k = 10000, n = 20004, m = 1lower bound for m = 1

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 10000 andn = 20004. Signals are transmitted using non-recursive MSK modulation over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm with d = 7 and Imax = 18 is performed, where theencoding memories are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 42 / 83

BMST Codes over Other Scenarios – Continuous Phase Modulation

(CPM) over AWGN channels

0 1 2 3 4 5 6 7 810

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Shnnon limit of rate 1/2CC, k = 10000, n = 20004, m = 0CC, k = 10000, n = 20004, m = 1BMST−NRMSK, m = 1lower bound for m = 1

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 10000 andn = 20004. Signals are transmitted using non-recursive MSK modulation over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm with d = 7 and Imax = 18 is performed, where theencoding memories are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 42 / 83

BMST Codes over Other Scenarios – Continuous Phase Modulation

(CPM) over AWGN channels

0 1 2 3 4 5 6 7 810

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Shnnon limit of rate 1/2CC, k = 10000, n = 20004, m = 0CC, k = 10000, n = 20004, m = 1CC, k = 10000, n = 20004, m = 2BMST−NRMSK, m = 1lower bound for m = 1lower bound for m = 2

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 10000 andn = 20004. Signals are transmitted using non-recursive MSK modulation over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm with d = 7 and Imax = 18 is performed, where theencoding memories are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 42 / 83

BMST Codes over Other Scenarios – Continuous Phase Modulation

(CPM) over AWGN channels

0 1 2 3 4 5 6 7 810

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Shnnon limit of rate 1/2CC, k = 10000, n = 20004, m = 0CC, k = 10000, n = 20004, m = 1CC, k = 10000, n = 20004, m = 2BMST−NRMSK, m = 1BMST−NRMSK, m = 2lower bound for m = 1lower bound for m = 2

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 10000 andn = 20004. Signals are transmitted using non-recursive MSK modulation over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm with d = 7 and Imax = 18 is performed, where theencoding memories are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 42 / 83

BMST Codes over Other Scenarios – Continuous Phase Modulation

(CPM) over AWGN channels

0 1 2 3 4 5 6 7 810

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Shnnon limit of rate 1/2CC, k = 10000, n = 20004, m = 0CC, k = 10000, n = 20004, m = 1CC, k = 10000, n = 20004, m = 2CC, k = 10000, n = 20004, m = 3BMST−NRMSK, m = 1BMST−NRMSK, m = 2lower bound for m = 1lower bound for m = 2lower bound for m = 3

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 10000 andn = 20004. Signals are transmitted using non-recursive MSK modulation over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm with d = 7 and Imax = 18 is performed, where theencoding memories are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 42 / 83

BMST Codes over Other Scenarios – Continuous Phase Modulation

(CPM) over AWGN channels

0 1 2 3 4 5 6 7 810

−8

10−7

10−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

Shnnon limit of rate 1/2CC, k = 10000, n = 20004, m = 0CC, k = 10000, n = 20004, m = 1CC, k = 10000, n = 20004, m = 2CC, k = 10000, n = 20004, m = 3BMST−NRMSK, m = 1BMST−NRMSK, m = 2BMST−NRMSK, m = 3lower bound for m = 1lower bound for m = 2lower bound for m = 3

Figure: The basic code is a terminated 4-state (2, 1, 2) convolutional code defined by thepolynomial generator matrix G(D) = [1 + D2, 1 + D + D2] with k = 10000 andn = 20004. Signals are transmitted using non-recursive MSK modulation over AWGNchannels. The system encodes L = 1000 sub-blocks of data and the iterativesliding-window decoding algorithm with d = 7 and Imax = 18 is performed, where theencoding memories are specified in the legends.

Xiao Ma (SYSU) BMST August 25, 2016 42 / 83

BMST Codes over Other Scenarios – Binary + Visible Light

Communication (VLC)

u(t)

Data In

Encoder

c(t)

S/P

OOK

k hkOOK

OOK

0 h0

K-1 hK-1

Figure: The VLC transmission.

BasicEncoder D D

1 1m m

1w 1mw mw

tc0

S/P

BMSTencoder Pre-

coding1

ltc l

tc0w

tutv 1tv 1t mv t mv

Figure: BMST combined in VLC transmission.

Xiao Ma (SYSU) BMST August 25, 2016 43 / 83

BMST Codes over Other Scenarios – Binary + Visible Light

Communication (VLC)

0 5 10 15 20 25 30 3510

−6

10−5

10−4

10−3

10−2

10−1

100

Eb/N0(dB)

BE

R

BMST 3−wicks OOK,m=1,d=3BMST 3−wicks OOK with ID,m=1,d=3CC, k=5500,n=11004,m=1lowerbound for m=1shannon limit,unconstrainedlimit 3−wicks OOK

Figure: Performances of BMST systems with and without iterative demapping overAWGN Channels

Xiao Ma (SYSU) BMST August 25, 2016 44 / 83

BMST Codes over Other Scenarios – Nonbinary + Visible Light

Communication (VLC)

Figure: Block diagram of a VLC system.

Figure: The nonbinary BMST encoder for the VLC system.

Xiao Ma (SYSU) BMST August 25, 2016 45 / 83

BMST Codes over Other Scenarios – Nonbinary + Visible Light

Communication (VLC)

Figure: Error performances of the nonbinary BMST scheme under different delayrequirements and dimming targets: OOK modulation and the nonbinary LDPC codeC64[20, 10].

Xiao Ma (SYSU) BMST August 25, 2016 46 / 83

BMST Codes over Other Scenarios – Spatial Modulation (SM) over

Rayleigh Fading Channels AntennaSelectingBPSK SymbolSelectingu=(b1, b2) b1(2 bits) xb2(1 bit) SM Demapper ûFigure: The spatial modulation with 4 transmitter antennas and 4 receiver antennasusing BPSK modulation. Only one antenna is active for each transmission.

( )tu

Basic

Encoder D D( )t

v( 1)t

v− ( 1)t m

v− + ( )t m

v−

1∏

1m−∏m

(0)w

(1)w

( 1)m

w− ( )m

w

( )tc

L

⊕ ⊕

L

L

0∏

-bit SM

Mapper φ

( )

BMST

encoder

Figure: The BMST combined with spatial modulation.

Xiao Ma (SYSU) BMST August 25, 2016 47 / 83

BMST Codes over Other Scenarios – Spatial Modulation (SM) over

Rayleigh Fading Channels AntennaSelectingBPSK SymbolSelectingu=(b1, b2) b1(2 bits) xb2(1 bit) SM Demapper ûFigure: The spatial modulation with 4 transmitter antennas and 4 receiver antennasusing BPSK modulation. Only one antenna is active for each transmission.

( )tu

Basic

Encoder D D( )t

v( 1)t

v− ( 1)t m

v− + ( )t m

v−

1∏

1m−∏m

(0)w

(1)w

( 1)m

w− ( )m

w

( )tc

L

⊕ ⊕

L

L

0∏

-bit SM

Mapper φ

( )

BMST

encoder

Figure: The BMST combined with spatial modulation.

Xiao Ma (SYSU) BMST August 25, 2016 47 / 83

BMST Codes over Other Scenarios – Spatial Modulation (SM) over

Rayleigh Fading Channels

2 3 4 5 6 7 8 9 10 11 12 1310

−6

10−5

10−4

10−3

10−2

10−1

100

SNR(1/σ2)(dB)

BE

R

Shannon limit for 4 bits/s/HzBICSM, rate−2/3 punctured CC (5,7)

8, it. 3

BMST−SM, SPC[3,2]1000, m = 1, d = 3, Jmax

= 3

BMST−SM, SPC[3,2]1000, m = 2, d = 6, Jmax

= 3

Lower bound for BMST−SM with m = 1Lower bound for BMST−SM with m = 2

Figure: Comparison of the BMST-SM scheme with the BICSM scheme at 4 bits/s/Hzspectral efficiency.

Xiao Ma (SYSU) BMST August 25, 2016 48 / 83

BMST Codes over Other Scenarios – Two-Layer Coded Spatial

Modulation (SM) over Rayleigh Fading Channels

Spatial

Mapping φa

Spatial

Encoder

Spatial

Decoder

Spatial

Demapping

Signal

Encoder

Signal

Mapping φs

Signal

Decoder

S/P P/Su

au

su

ac

sc

ˆ

au

ˆ

su

u

x y

Signal

Demapping

SM Mappingφ

1z

2z

RMz

TM

RM

1 1

22

ϕs

ϕ

ϕ

,

( )a

e

CP u

l

,

( )s j

e

CP u

SM Demapping

,

( )a

i

CP u

l

,

( )s j

i

CP u

( , )P us

c

( , )P uac

Figure: The block diagram of the two-layer coded spatial modulation system.

Xiao Ma (SYSU) BMST August 25, 2016 49 / 83

BMST Codes over Other Scenarios – Two-Layer Coded Spatial

Modulation (SM) over Rayleigh Fading Channels

Spatial

EncoderD

...

...

...

(t)

au

(0)

aw

( )m

aw

( 1)m

a

−w

(1)

aw

(t)

av

(t m)

a

−v

(t m 1)

a

− −v

(t 1)

a

−v

SM

Mapper

(t)

ac

(t)

sc

(t)x

BMST

Encoder

D

0∏

1∏

1m−∏m

Signal

EncoderD

...

...

...

(t)

su

(0)

sw

( )m

sw

( 1)m

s

−w

(1)

sw

(t)

sv

(t m)

s

−v

(t m 1)

s

− −v

(t 1)

s

−v

BMST

Encoder

D

0∏

1∏

1m−∏m

Figure: The block diagram for the encoding and mapping of the two-layer scheme usingBMST codes.

Xiao Ma (SYSU) BMST August 25, 2016 50 / 83

BMST Codes over Other Scenarios – Two-Layer Coded Spatial

Modulation (SM) over Raleigh Fading Channels

−10 −5 0 5 10 15 20 250

0.5

1

1.5

2

2.5

3

3.5

4

SNR(1/σ2)(dB)

Mut

ual i

nfor

mat

ion

(bits

/cha

nnel

−us

e)

I (A, S; Y|H), 4 × 4, na = 2, BPSK

I (A; Y|H), 4 × 4, na = 2

I (S; Y|A, H), 4 × 4, BPSK

2.75 bits/channel−use

Figure: Mutual information for the 4 × 4, na = 2 BPSK setup.

Xiao Ma (SYSU) BMST August 25, 2016 51 / 83

BMST Codes over Other Scenarios – Two-Layer Coded Spatial

Modulation (SM) over Rayleigh Fading Channels

0 2 4 6 8 10 12 1410

−6

10−5

10−4

10−3

10−2

10−1

100

SNR(1/σ2)(dB)

BE

R

spatial, I

max = 1

spatial, lower bound with signal unkonwnspatial, I

max = 2

spatial, Imax

= 3

spatial, Imax

= 4

spatial, lower bound with signal konwnsignal, I

max = 1

signal, Imax

= 2

signal, Imax

= 3

signal, Imax

= 4

signal, lower boundShannon limit, 2.75 bits/channel−use

Figure: BER performance of the BMST-SM scheme with m1 = m2 = 1 andL1 = L2 = 100 under the 4 × 4, na = 2 BPSK setup, where the spectral efficiency is 2.75bits/channel-use and Imax is the number of iterations between the two layers.

Xiao Ma (SYSU) BMST August 25, 2016 52 / 83

BMST Codes over Other Scenarios – Coded OFDM System over

High-Mobility Channels

Encoder MapperCP

InsertionIDFT

Channel

Ht

AWGN

CP

RemovalDFTEqualizerDemapperDecoder

u

y

w

xc

u

Figure: The block diagram of the coded OFDM system.

The receive vector can be written as

y = FHtFHx + Fw.

Let the frequency-domain matrix Hf = FHtFH , then the receive vector can be

rewritten asy = Hf x + wf .

Xiao Ma (SYSU) BMST August 25, 2016 53 / 83

BMST Codes over Other Scenarios – Coded OFDM System over

High-Mobility Channels

8 10 12 14 16 18 2010

−6

10−5

10−4

10−3

10−2

10−1

100

SNR(1/σ2)(dB)

BE

R

CC ZF 16QAMBMST 16QAM ZF m=1BMST 16QAM ZF m=4Bound BMST 16QAM ZF m=4ZF shannon limitfor 2 bits/symbol/carrier

Figure: Comparison of the BMST scheme with the CC for OFDM system at 2bits/symbol/carrier spectral efficiency. 16-QAM is used over the high-mobility channelwith 360 km/h. The Shannon limit is based on ZF equalization.

Xiao Ma (SYSU) BMST August 25, 2016 54 / 83

BMST Codes over Other Scenarios – OFDM with Index Modulation

(OFDM-IM) System over High-Mobility Channels

Encoder MapperCP

InsertionIDFT

Channel

Ht

AWGN

CP

RemovalDFT

LMMSE

Equalizer

Soft

DemapperDecoder

u

y

w

xc

u

Π-1

Π

ΠGaussian

Mapper

,

( )e

CP u

β l

,

( )i

CP u

β l

Figure: The block diagram of the coded OFDM-IM system.

The receive vector can be written as

y = FHtFHx + Fw.

Let the frequency-domain matrix Hf = FHtFH , then the receive vector can be

rewritten asy = Hf x + wf .

Xiao Ma (SYSU) BMST August 25, 2016 55 / 83

BMST Codes over Other Scenarios – OFDM with Index Modulation

(OFDM-IM) System over High-Mobility Channels

Table: Simulation Parameters

Number of Subcarriers (N) 128Number of Occuppied Subcarriers 96Subcarrier Spacing Fc 15 KHzCarrier Frequency (fc) 2 GHzNumber of Multipaths (Ntap) 9Cyclic Prefix Length (Ncp) 8Velocity 360 km/hSpeed of Light (c0) 3 × 108 m/s

The power-delay profile (PDP) is Pi = αe−0.6i , 0 ≤ i ≤ Ntap − 1, where α is anormalization constant. For IM system, we assume that one group has 4subcarriers, i.e., we have

(42

)= 6 possible combinations of the selected subcarriers,

and we choose I = {(1, 1, 0, 0), (0, 1, 1, 0), (0, 0, 1, 1), (1, 0, 0, 1)} as the indexconstellation.

Xiao Ma (SYSU) BMST August 25, 2016 56 / 83

BMST Codes over Other Scenarios – OFDM-IM System under BPSK

5 10 15 20 25 30 3510

−6

10−5

10−4

10−3

10−2

10−1

100

SNR(1/σ2)(dB)

BE

R

Uncoded OFDM−IMUncoded OFDMBMST−OFDM m=1BMST−IM m=1Lower Bound for BMST−IM m=1BMST−IM m=2Lower Bound for BMST−IM m=2

Figure: Comparison of the BMST-IM, BMST-OFDM scheme and the uncoded systemunder BPSK.

Xiao Ma (SYSU) BMST August 25, 2016 57 / 83

BMST Codes over Other Scenarios – OFDM-IM System under QPSK

2 3 4 5 6 7 8 9 10 11 12

10−4

10−3

10−2

10−1

100

SNR(1/σ2)(dB)

BE

R

BMST−OFDM, RC[2,1]6432, m=2

BMST−IM, SPC[3,2]3216, m=2Lower Bound for BMST−IM m=2

Figure: Comparison of the BMST-IM, BMST-OFDM scheme at 1 bits/symbol/carrierspectral efficiency under QPSK.

Xiao Ma (SYSU) BMST August 25, 2016 58 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 59 / 83

Drawbacks of BMST Codes

Drawbacks

0 0 0 01 1 1

W(1,0) W(1,1)

U(0) U(1) U(2) U(L-1)

C(0) C(1) C(2) C(L-1) C(L)

W(2,0)

V(1) V(2) V(L-1)V(0)

W(0,0) W(0,1) W(L-1,0)W(L-2,1)W(L-1,1)

Neither rate-compatible nor systematic;Do not perform well over block fading channels due to error propagation.

Recent FocusRate-compatible systematic BMST codes

Support a wide range of code rates;Maintain essentially the same encoding/decoding hardware structure.

Xiao Ma (SYSU) BMST August 25, 2016 60 / 83

Drawbacks of BMST Codes

Drawbacks

0 0 0 01 1 1

W(1,0) W(1,1)

U(0) U(1) U(2) U(L-1)

C(0) C(1) C(2) C(L-1) C(L)

W(2,0)

V(1) V(2) V(L-1)V(0)

W(0,0) W(0,1) W(L-1,0)W(L-2,1)W(L-1,1)

Neither rate-compatible nor systematic;Do not perform well over block fading channels due to error propagation.

Recent FocusRate-compatible systematic BMST codes

Support a wide range of code rates;Maintain essentially the same encoding/decoding hardware structure.

Xiao Ma (SYSU) BMST August 25, 2016 60 / 83

Drawbacks of BMST Codes

Drawbacks

0 0 0 01 1 1

W(1,0) W(1,1)

U(0) U(1) U(2) U(L-1)

C(0) C(1) C(2) C(L-1) C(L)

W(2,0)

V(1) V(2) V(L-1)V(0)

W(0,0) W(0,1) W(L-1,0)W(L-2,1)W(L-1,1)

Neither rate-compatible nor systematic;Do not perform well over block fading channels due to error propagation.

Recent FocusRate-compatible systematic BMST codes

Support a wide range of code rates;Maintain essentially the same encoding/decoding hardware structure.

Xiao Ma (SYSU) BMST August 25, 2016 60 / 83

Drawbacks of BMST Codes

Drawbacks

0 0 0 01 1 1

W(1,0) W(1,1)

U(0) U(1) U(2) U(L-1)

C(0) C(1) C(2) C(L-1) C(L)

W(2,0)

V(1) V(2) V(L-1)V(0)

W(0,0) W(0,1) W(L-1,0)W(L-2,1)W(L-1,1)

Neither rate-compatible nor systematic;Do not perform well over block fading channels due to error propagation.

Recent FocusRate-compatible systematic BMST codes

Support a wide range of code rates;Maintain essentially the same encoding/decoding hardware structure.

Xiao Ma (SYSU) BMST August 25, 2016 60 / 83

Drawbacks of BMST Codes

Drawbacks

0 0 0 01 1 1

W(1,0) W(1,1)

U(0) U(1) U(2) U(L-1)

C(0) C(1) C(2) C(L-1) C(L)

W(2,0)

V(1) V(2) V(L-1)V(0)

W(0,0) W(0,1) W(L-1,0)W(L-2,1)W(L-1,1)

Neither rate-compatible nor systematic;Do not perform well over block fading channels due to error propagation.

Recent FocusRate-compatible systematic BMST codes

Support a wide range of code rates;Maintain essentially the same encoding/decoding hardware structure.

Xiao Ma (SYSU) BMST August 25, 2016 60 / 83

Systematic BMST of Repetition (BMST-R) Codes

u(t)

v(t) v

(t-1)v(t-2)

v(t-m+1)

v(t-m)

w(t,1)

w(t,m-1)

w(t,m)

w(t,0)

w(t,2)

m-1 m

v(t) v

(t-1)v(t-2)

v(t-m+1)

v(t-m)

c(t)

w(t,1)

w(t,m-1)

w(t,m)

w(t,0)

w(t,2)

m-1 m

v(t)

v(t-1)

v(t-2)

v(t-m+1)

v(t-m)

c(t)

w(t,1)

w(t,m-1)

w(t,m)

w(t,0)

w(t,2)

m-1

c(t)

c(t)

~

m

c(t)

Figure: Encoder of a systematic BMST-R code with repetition degree N and encodingmemory m.

Xiao Ma (SYSU) BMST August 25, 2016 61 / 83

Systematic BMST-R Codes – Encoding Algorithm

Encoding of Systematic BMST-R Codes

1 Initialization: For t < 0 and 1 ≤ i ≤ N − 1, set v (t)i = 0 ∈ FK2 .

2 Loop: For t ≥ 0,

Repeat u (t) N times such that c(t)0 = u (t) ∈ FK2 and v (t)

i = u (t) ∈ FK2 for1 ≤ i ≤ N − 1;For 1 ≤ i ≤ N − 1,

1 For 0 ≤ j ≤ m, interleave v (t−j )i into w (t ,j )

i using the (i , j )-th interleaver Πi ,j ;

2 Compute c(t)i =

∑0≤j≤m w (t ,j )

i .

Puncture randomly Kp of K bits in c(t)N−1, resulting in c(t)

N−1;

Take c(t) = {c(t)0 , c

(t)1 , c

(t)2 , · · · , c

(t)N−1} as the t-th block of transmission.

3 Termination: For t = L, L + 1, · · · , L + m − 1,

Set u (t) = 0 ∈ FK2 , compute c(t) following Loop;Take the redundant check part of c(t) as the t-th block of transmission.

Puncturing fraction θ∆=

Kp

K ;

Rate: RL = 1N−θ+(N−1−θ)m/L .

Xiao Ma (SYSU) BMST August 25, 2016 62 / 83

Systematic BMST-R Codes – Decoding Algorithm

Window Decoding

=

1,0

1,1

+

=

1,0

+

2,0 3,0

++

2,1 3,1

1,1

2,0 3,0

++

2,1 3,1

=

1,0

1,1

+

2,0 3,0

++

2,1 3,1

+

++

P P P P

C(0)1

C(0)2 C

(0)3

C(1)1

C(1)2 C

(1)3

C(2)1

C(2)2 C

(2)3

C(3)1

C(3)2 C

(3)3

~ ~ ~ ~

C(2)=U

(2)0

C(1)=U

(1)0

C(0)=U

(0)0

=

1,0

1,1

2,0 3,0

2,1 3,1

+

++

P

C(4)1

C(4)2 C

(4)3

~

C(3)=U

(3)0

Figure: Window decoder with decoding delay d = 2 operating on the normal graph of asystematic BMST-R code with N = 4, m = 1 and L = 3.

Xiao Ma (SYSU) BMST August 25, 2016 63 / 83

Systematic BMST-R Codes – Decoding Algorithm

Window Decoding

=

1,0

1,1

+

=

1,0

+

2,0 3,0

++

2,1 3,1

1,1

2,0 3,0

++

2,1 3,1

=

1,0

1,1

+

2,0 3,0

++

2,1 3,1

+

++

P P P P

C(0)1

C(0)2 C

(0)3

C(1)1

C(1)2 C

(1)3

C(2)1

C(2)2 C

(2)3

C(3)1

C(3)2 C

(3)3

~ ~ ~ ~

C(2)=U

(2)0

C(1)=U

(1)0

C(0)=U

(0)0

=

1,0

1,1

2,0 3,0

2,1 3,1

+

++

P

C(4)1

C(4)2 C

(4)3

~

C(3)=U

(3)0

Figure: Window decoder with decoding delay d = 2 operating on the normal graph of asystematic BMST-R code with N = 4, m = 1 and L = 3.

Xiao Ma (SYSU) BMST August 25, 2016 63 / 83

Systematic BMST-R Codes – Decoding Algorithm

Window Decoding

=

1,0

1,1

+

=

1,0

+

2,0 3,0

++

2,1 3,1

1,1

2,0 3,0

++

2,1 3,1

=

1,0

1,1

+

2,0 3,0

++

2,1 3,1

+

++

P P P P

C(0)1

C(0)2 C

(0)3

C(1)1

C(1)2 C

(1)3

C(2)1

C(2)2 C

(2)3

C(3)1

C(3)2 C

(3)3

~ ~ ~ ~

C(2)=U

(2)0

C(1)=U

(1)0

C(0)=U

(0)0

=

1,0

1,1

2,0 3,0

2,1 3,1

+

++

P

C(4)1

C(4)2 C

(4)3

~

C(3)=U

(3)0

Figure: Window decoder with decoding delay d = 2 operating on the normal graph of asystematic BMST-R code with N = 4, m = 1 and L = 3.

Xiao Ma (SYSU) BMST August 25, 2016 63 / 83

Systematic BMST-R Codes – Decoding Algorithm

Window Decoding

=

1,0

1,1

+

=

1,0

+

2,0 3,0

++

2,1 3,1

1,1

2,0 3,0

++

2,1 3,1

=

1,0

1,1

+

2,0 3,0

++

2,1 3,1

+

++

P P P P

C(0)1

C(0)2 C

(0)3

C(1)1

C(1)2 C

(1)3

C(2)1

C(2)2 C

(2)3

C(3)1

C(3)2 C

(3)3

~ ~ ~ ~

C(2)=U

(2)0

C(1)=U

(1)0

C(0)=U

(0)0

=

1,0

1,1

2,0 3,0

2,1 3,1

+

++

P

C(4)1

C(4)2 C

(4)3

~

C(3)=U

(3)0

Figure: Window decoder with decoding delay d = 2 operating on the normal graph of asystematic BMST-R code with N = 4, m = 1 and L = 3.

Xiao Ma (SYSU) BMST August 25, 2016 63 / 83

Systematic BMST-R Codes – Relations with Existing Codes

Systematic BMST-R codes resemble the classical rate-compatible puncturedconvolutional (RCPC) codes

Start from a rate 1/N systematic BMST-R code, where N is as large asrequired;By puncturing, one can obtain all code rates of interest from 1/N to 1.

The encoding of systematic BMST-R codes is block-oriented.

The decoding is typically not implementable by the Viterbi algorithm.

Systematic BMST-R codes can be viewed as a special class of spatiallycoupled codes.

Similar to SC-LDPC codes, systematic BMST-R codes are decodable with asliding window decoding algorithm.

The encoding procedure for systematic BMST-R codes is simpler than forSC-LDPC codes.

Different from existing codes, systematic BMST-R codes have a simple lowerbound on the BER performance.

Xiao Ma (SYSU) BMST August 25, 2016 64 / 83

Systematic BMST-R Codes – Performance Bounds

Upper Bound on BER Performance

Assuming that we know the truncated input-redundancy weight enumeratingfunction (IRWEF) {Ai ,j , 0 ≤ i ≤ T } of systematic BMST-R codes, thebit-error probability under MAP decoding can be upper-bounded by

BERMAP ≤ min0≤r ∗≤T/2

{ ∑i≤2r ∗

i

k

∑j

Ai ,jQ

( √i + j

σ

)+

k∑i=r ∗+1

min{i + r ∗, k }

k

(k

i

)εi (1 − ε)k−i

},

where ε∆= Q

(1σ

).

Lower Bound on BER PerformanceThe bit-error probability of a systematic BMST-R code ensemble under MAPdecoding can be lower-bounded by

BERMAP ≥

m+1∑`=0

(m + 1

`

)θm+1−`(1 − θ)`Q

( √N + m(N − 2) − 1 + `

σ

),

where θ is the puncturing fraction.Xiao Ma (SYSU) BMST August 25, 2016 65 / 83

Systematic BMST-R Codes – Example: Performance Bounds

0 2 4 6 8 10 12 1410

−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BER

Simulation m = 0

Figure: Performance of systematic BMST-R codes with m = 0, m = 1 and m = 2. BPSKmodulation and AWGN channels. L = 20, K = 30, and d = 3m. The truncatingparameter is set to T = 60.

Xiao Ma (SYSU) BMST August 25, 2016 66 / 83

Systematic BMST-R Codes – Example: Performance Bounds

0 2 4 6 8 10 12 1410

−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BER

Simulation m = 0Lower bound m = 1Upper bound m = 1

Figure: Performance of systematic BMST-R codes with m = 0, m = 1 and m = 2. BPSKmodulation and AWGN channels. L = 20, K = 30, and d = 3m. The truncatingparameter is set to T = 60.

Xiao Ma (SYSU) BMST August 25, 2016 66 / 83

Systematic BMST-R Codes – Example: Performance Bounds

0 2 4 6 8 10 12 1410

−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BER

Simulation m = 0Lower bound m = 1Upper bound m = 1Simulation m = 1 d = 3

Figure: Performance of systematic BMST-R codes with m = 0, m = 1 and m = 2. BPSKmodulation and AWGN channels. L = 20, K = 30, and d = 3m. The truncatingparameter is set to T = 60.

Xiao Ma (SYSU) BMST August 25, 2016 66 / 83

Systematic BMST-R Codes – Example: Performance Bounds

0 2 4 6 8 10 12 1410

−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BER

Simulation m = 0Lower bound m = 1Upper bound m = 1Simulation m = 1 d = 3Lower bound m = 2Upper bound m = 2

Figure: Performance of systematic BMST-R codes with m = 0, m = 1 and m = 2. BPSKmodulation and AWGN channels. L = 20, K = 30, and d = 3m. The truncatingparameter is set to T = 60.

Xiao Ma (SYSU) BMST August 25, 2016 66 / 83

Systematic BMST-R Codes – Example: Performance Bounds

0 2 4 6 8 10 12 1410

−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BER

Simulation m = 0Lower bound m = 1Upper bound m = 1Simulation m = 1 d = 3Lower bound m = 2Upper bound m = 2Simulation m = 2 d = 6

Figure: Performance of systematic BMST-R codes with m = 0, m = 1 and m = 2. BPSKmodulation and AWGN channels. L = 20, K = 30, and d = 3m. The truncatingparameter is set to T = 60.

Xiao Ma (SYSU) BMST August 25, 2016 66 / 83

Systematic BMST-R Codes – Example: Code Construction

Object

Target code rate: R ∈ (0, 1)Target BER: ptarget

To construct a code with rate RL ≈ R, which can approach the Shannonlimit at the target BER.

Five parameters: repetition degree N , information subsequence length K ,puncturing length Kp , data block length L, and encoding memory m.

Construction Procedure1 Determine N and θ such that 1

N−θ = R. Choose sufficiently large K and Kp

such that Kp/K ≈ θ;

2 Find the Shannon limit for the given code rate R and target BER ptarget;

3 Determine the minimum m such that the lower bound of BERMAP at theShannon limit is not greater than the preselected target BER ptarget;

4 Choose a L such that the rate loss (i.e., R − RL) is small;

5 Generate (m + 1)(N − 1) interleavers randomly.

Xiao Ma (SYSU) BMST August 25, 2016 67 / 83

Systematic BMST-R Codes – Example: Equal Decoding Latency

0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 2.2

x 104

0.8

0.9

1

1.1

1.2

1.3

1.4

1.5

1.6

1.7

Decoding latency (bits)

SNR

(dB)

(3,6)−regular SC−LDPC(4,8)−regular SC−LDPCNon−systematic BMST−R

Figure: Required SNR to achieve a BER of 10−5 for finite-length systematic BMST-Rcodes, non-systematic BMST-R codes, (3, 6)-regular SC-LDPC codes, and (4, 8)-regularSC-LDPC codes as a function of decoding latency.

Xiao Ma (SYSU) BMST August 25, 2016 68 / 83

Systematic BMST-R Codes – Example: Equal Decoding Latency

0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 2.2

x 104

0.8

0.9

1

1.1

1.2

1.3

1.4

1.5

1.6

1.7

Decoding latency (bits)

SNR

(dB)

(3,6)−regular SC−LDPC(4,8)−regular SC−LDPCNon−systematic BMST−RSystematic BMST−R, K = 150Systematic BMST−R, K = 200Systematic BMST−R, K = 300Systematic BMST−R, K = 400

Figure: Required SNR to achieve a BER of 10−5 for finite-length systematic BMST-Rcodes, non-systematic BMST-R codes, (3, 6)-regular SC-LDPC codes, and (4, 8)-regularSC-LDPC codes as a function of decoding latency.

Xiao Ma (SYSU) BMST August 25, 2016 68 / 83

Systematic BMST-R Codes – Example: Rate-Compatible Property

−6 −4 −2 0 2 4 6 8 10 12 14

10−6

10−5

10−4

10−3

10−2

10−1

100

SNR (dB)

BER

N = 2 m = 40 θ = 0.75N = 2 m = 24 θ = 0.5N = 2 m = 19 θ = 0.25N = 2 m = 16 θ = 0N = 3 m = 15 θ = 0.5N = 3 m = 14 θ = 0N = 4 m = 14 θ = 0.5N = 4 m = 14 θ = 0N = 5 m = 13 θ = 0N = 6 m = 13 θ = 0Uncoded code

Figure: Simulated decoding performance of systematic BMST-R codes with K = 500 andL = 500. The rates corresponding to the BER curves from left to right are 0.1631,0.1959, 0.2449, 0.2801, 0.3272, 0.3929, 0.4921, 0.5623, 0.6562, and 0.7874.

Xiao Ma (SYSU) BMST August 25, 2016 69 / 83

Systematic BMST-R Codes – Example: Bandwidth Efficiency

−10 −8 −6 −4 −2 0 2 4 60

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SNR (dB)

Rate

Capacity bound with BPSK modulationSystematic BMST-R with K = 500

Figure: Required SNR to achieve a BER of 10−5 for systematic BMST-R codes. Theperformances of three AR4JA LDPC codes with code rates 1/2, 2/3 and 4/5 in theCCSDS standard, and five PBRL LDPC codes with code rates 1/4, 1/3, 1/2, 2/3, and4/5, all of which have information length 16384, are also included.

Xiao Ma (SYSU) BMST August 25, 2016 70 / 83

Systematic BMST-R Codes – Example: Bandwidth Efficiency

−10 −8 −6 −4 −2 0 2 4 60

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SNR (dB)

Rate

Capacity bound with BPSK modulationSystematic BMST-R with K = 500AR4JA LDPC, information length 16384

Figure: Required SNR to achieve a BER of 10−5 for systematic BMST-R codes. Theperformances of three AR4JA LDPC codes with code rates 1/2, 2/3 and 4/5 in theCCSDS standard, and five PBRL LDPC codes with code rates 1/4, 1/3, 1/2, 2/3, and4/5, all of which have information length 16384, are also included.

Xiao Ma (SYSU) BMST August 25, 2016 70 / 83

Systematic BMST-R Codes – Example: Bandwidth Efficiency

−10 −8 −6 −4 −2 0 2 4 60

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

SNR (dB)

Rate

Capacity bound with BPSK modulationSystematic BMST-R with K = 500AR4JA LDPC, information length 16384PBRL LDPC, information length 16384

Figure: Required SNR to achieve a BER of 10−5 for systematic BMST-R codes. Theperformances of three AR4JA LDPC codes with code rates 1/2, 2/3 and 4/5 in theCCSDS standard, and five PBRL LDPC codes with code rates 1/4, 1/3, 1/2, 2/3, and4/5, all of which have information length 16384, are also included.

Xiao Ma (SYSU) BMST August 25, 2016 70 / 83

Systematic BMST-R Codes – Example: Block Fading Channels

0 2 4 6 8 10

10−4

10−3

10−2

10−1

100

SNR (dB)

WER

Systematic BMST-R, m = 8 d = 9(3,6)-regular SC-LDPC, m = 2 d = 9

Figure: Performance comparison of the systematic BMST-R code and the SC-LDPCcode with BPSK modulation over a block fading channel. The (3, 6)-regular SC-LDPCcodes is constructed with the protograph lifting factor 100 and three componentsubmatrices B0 = B1 = B2 = [1 1]. The decoding latencies of two codes are the same.

Xiao Ma (SYSU) BMST August 25, 2016 71 / 83

Three Ensembles of Low Density Generator Matrix(LDGM) Codes – Ensemble 1

Definition (Ensemble 1)

The generator matrix has the form G = [I P] of size k × n, where

P =

P1,1 P1,2 · · · P1,n−k

P2,1 P2,2 · · · P2,n−k

......

. . ....

Pk ,1 Pk ,2 · · · Pk ,n−k

and Pi ,j is generated independently according to the Bernoulli distribution withsuccess probability Pr{Pi ,j = 1} = ρ.

Theorem (Coding Theorem for Ensemble 1)

For any given 0 < ρ ≤ 1/2, Ensemble 1 is capacity-achieving in terms of BER inthe following sense. Given a code rate R < I (1/2). For any ε > 0, there exist asequence of codes C2[n , k ] such that limn→∞ k/n = R and BER is not greaterthan ε.

Xiao Ma (SYSU) BMST August 25, 2016 72 / 83

Three Ensembles of Low Density Generator Matrix(LDGM) Codes – Ensemble 1

Definition (Ensemble 1)

The generator matrix has the form G = [I P] of size k × n, where

P =

P1,1 P1,2 · · · P1,n−k

P2,1 P2,2 · · · P2,n−k

......

. . ....

Pk ,1 Pk ,2 · · · Pk ,n−k

and Pi ,j is generated independently according to the Bernoulli distribution withsuccess probability Pr{Pi ,j = 1} = ρ.

Theorem (Coding Theorem for Ensemble 1)

For any given 0 < ρ ≤ 1/2, Ensemble 1 is capacity-achieving in terms of BER inthe following sense. Given a code rate R < I (1/2). For any ε > 0, there exist asequence of codes C2[n , k ] such that limn→∞ k/n = R and BER is not greaterthan ε.

Xiao Ma (SYSU) BMST August 25, 2016 72 / 83

Three Ensembles of Low Density Generator Matrix(LDGM) Codes – Ensemble 2

Definition (Ensemble 2)

The generator matrix has the form G = [I P] of size kB × nB with B > 1, where

P =

P1,1 P1,2 · · · P1,n−k

P2,1 P2,2 · · · P2,n−k

......

. . ....

Pk ,1 Pk ,2 · · · Pk ,n−k

and Pi ,j is a random matrix of size B × B with each column drawn independentlyand uniformly from B = {vB ∈ FB |WH (vB ) ≤ 1}, the collection of all binarycolumn vectors of weight 0 or 1.

Theorem (Coding Theorem for Ensemble 2)

Ensemble 2 achieves the channel capacity as k → ∞.

Xiao Ma (SYSU) BMST August 25, 2016 73 / 83

Three Ensembles of Low Density Generator Matrix(LDGM) Codes – Ensemble 2

Definition (Ensemble 2)

The generator matrix has the form G = [I P] of size kB × nB with B > 1, where

P =

P1,1 P1,2 · · · P1,n−k

P2,1 P2,2 · · · P2,n−k

......

. . ....

Pk ,1 Pk ,2 · · · Pk ,n−k

and Pi ,j is a random matrix of size B × B with each column drawn independentlyand uniformly from B = {vB ∈ FB |WH (vB ) ≤ 1}, the collection of all binarycolumn vectors of weight 0 or 1.

Theorem (Coding Theorem for Ensemble 2)

Ensemble 2 achieves the channel capacity as k → ∞.

Xiao Ma (SYSU) BMST August 25, 2016 73 / 83

Three Ensembles of Low Density Generator Matrix(LDGM) Codes – Ensemble 3

Definition (Ensemble 3)

This ensemble is different from the above two ensembles, which is a convolutionalcode with memory mk and conveniently defined by an algorithm. The input to theencoder is a sequence of binary vectors uk (1), uk (2), · · · , uk (t), · · · , whereuk (t) ∈ Fk for all t ≥ 1. At time t ≥ 1, the output from the encoder isxn (t) = (uk (t),w (n−k )(t)) with

w (n−k )(t) =∑

t−m≤j≤t

uk (j )Pj ,t ,

where uk (t) = 0k for t < 1 and Pj ,t is a random matrix of size k × (n − k ) witheach column drawn independently and randomly at uniform fromK = {vk ∈ Fk |WH (vk ) ≤ 1}.

Theorem (Coding Theorem for Ensemble 3)

Ensemble 3 achieves capacity as m goes to infinity.

Xiao Ma (SYSU) BMST August 25, 2016 74 / 83

Three Ensembles of Low Density Generator Matrix(LDGM) Codes – Ensemble 3

Definition (Ensemble 3)

This ensemble is different from the above two ensembles, which is a convolutionalcode with memory mk and conveniently defined by an algorithm. The input to theencoder is a sequence of binary vectors uk (1), uk (2), · · · , uk (t), · · · , whereuk (t) ∈ Fk for all t ≥ 1. At time t ≥ 1, the output from the encoder isxn (t) = (uk (t),w (n−k )(t)) with

w (n−k )(t) =∑

t−m≤j≤t

uk (j )Pj ,t ,

where uk (t) = 0k for t < 1 and Pj ,t is a random matrix of size k × (n − k ) witheach column drawn independently and randomly at uniform fromK = {vk ∈ Fk |WH (vk ) ≤ 1}.

Theorem (Coding Theorem for Ensemble 3)

Ensemble 3 achieves capacity as m goes to infinity.

Xiao Ma (SYSU) BMST August 25, 2016 74 / 83

Outline

1 Existing Good Codes

2 Principle of Block Markov Superposition Transmission (BMST)

3 Performance Bounds of BMST

4 A General Procedure of Designing BMST

5 BMST over High-Order Constellations

6 BMST Codes over Other Scenarios

7 Systematic BMST Codes

8 Conclusions

Xiao Ma (SYSU) BMST August 25, 2016 75 / 83

Conclusions

ConclusionsBMST codes are spatially coupled codes with simple encoding algorithm andconstruction method.

BMST codes have predictable error floors (lower bound).

BMST codes have near-capacity performance in the waterfall region.

BMST codes have flexible construction: any basic code with SISO decoding,any rate, any signal constellation, any target BER.

BMST codes have good performance over different scenarios (BICM, CPM,VLC, SM, OFDM, IM, Rayleigh fading channels, High-mobility channels).

Xiao Ma (SYSU) BMST August 25, 2016 76 / 83

Related Works

X. Ma, C. Liang, K. Huang, and Q. Zhuang, “Block Markov superposition transmission: Construction of

big convolutional codes from short codes,” IEEE Trans. Inf. Theory, vol. 61, no. 6, pp. 3150-3163, Jun.2015.

X. Ma, “Coding theorem for systematic low density generator matrix codes,” in Proceeding the 9th Int.

Symp. Turbo Codes, Brest, France, Sep. 2016.

K. Huang and X. Ma, “Performance analysis of block Markov superposition transmission of short codes”,

IEEE J. Sel. Areas Commun., vol. 34, pp. 362-374, Feb. 2016.

C. Liang, X. Ma, Q. Zhuang, and B. Bai, “Spatial coupling of generator matrices: A general approach to

design good codes at a target BER,” IEEE Trans. Commun., vol. 62, no. 12, pp. 4211-4219, Dec. 2014.

X. Ma, C. Liang, K. Huang, and Q. Zhuang, ”Obtaining extra coding gain for short codes by block

Markov superposition transmission,” in Proceeding IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul.2013, pp. 2054-2058.

K. Huang, X. Ma, and D. J. Costello, Jr., “EXIT chart analysis of block Markov superposition

transmission of short codes”, in Proceeding IEEE Int. Symp. Inf. Theory, Hong Kong, China, Jun. 2015,pp. 894-898.

C. Liang, X. Ma, Q. Zhuang, and B. Bai, “A general procedure to design good codes at a target BER,”

in Proceeding the 8th Int. Symp. Turbo Codes, Bremen, Germany, 18-22, Aug. 2014, pp. 92-96.

Xiao Ma (SYSU) BMST August 25, 2016 77 / 83

Related Works

C. Liang, J. Hu, X. Ma, and B. Bai, “A new class of multiple-rate codes based on block Markov

superposition transmission,” submitted to IEEE Trans. Signal Process., vol. 63, no. 16, pp. 4236-4244,Aug. 15, 2015.

C. Liang, X. Ma, and B. Bai, “Block Markov superposition transmission of RUN codes”, IEEE Trans.

Commun., accepted, Aug. 2016.

J. Hu, X. Ma, and C. Liang, “Block Markov superposition transmission of repetition and

single-parity-check codes,” IEEE Commun. Lett., vol. 19, no. 2, pp. 131-134, Feb. 2015.

K. Huang, X. Ma, and B. Bai, “Systematic block Markov superposition transmission of repetition codes,”

in Proceeding IEEE Int. Symp. Inf. Theory, Barcelona, Spain, Jul. 2013, pp. 1929-1933.

J. Hu, C. Liang, X. Ma, and B. Bai, ”A new class of multiple-rate codes based on block Markov

superposition transmission,” in Proceeding Int. Workshop High Mobility Wirel. Commun., Beijing, China,Nov. 2014, pp. 109-114.

C. Liang, X. Ma, and B. Bai, “Spatial coupling of RUN codes via block Markov superposition

transmission,” in Proceeding Int. Workshop High Mobility Wirel. Commun., Xi’an, China, Oct. 2015, pp.6-10.

X. Ma, K. Huang and B. Bai, “Systematic block Markov superposition transmission of repetition codes,”

Submitted to IEEE Trans. Inf. Theory, 2016. [Online]. Available: http://arxiv.org/abs/1601.05193

Xiao Ma (SYSU) BMST August 25, 2016 78 / 83

Related Works

L. Wang, C. Liang, Z. Yang, and X. Ma, “Two-layer coded spatial modulation with block Markov

superposition transmission,” IEEE Trans. Commun., vol. 64, no. 2, pp. 643-653, Feb. 2016.

S. Zhao and X. Ma, “A low-complexity delay-tunable coding scheme for visible light communication

systems,” IEEE Photonics Tech. Lett., vol. 28, no. 18, pp. 1964-1967, Sep. 15 2016.

C. Liang, K. Huang, X. Ma, and B. Bai, “Block Markov superposition transmission with bit-interleaved

coded modulation,” IEEE Commun. Lett., vol. 18, no. 3, pp. 397-400, Mar., 2014.

X. Xu, C. Wang, Y.-J. Zhu, X. Ma, and X. Zhang, “Block Markov superposition transmission of short

codes for indoor visible light communications,” IEEE Commun. Lett., vol. 19, no. 3, pp. 359-362, Mar.2015.

X. Liu, C. Liang, and X. Ma, “Block Markov superposition transmission of convolutional codes with

MSK signaling,” IET Commun., vol. 9, no. 1, pp. 71-77, Jan. 2015.

Z. Yang, C. Liang, X. Xu, and X. Ma, “Block Markov superposition transmission with spatial

modulation,” IEEE Wirel. Commun. Lett., vol. 3, no. 6, pp. 565-568, Dec. 2014.

L. Wang, Y. Zhang, and X. Ma, “Block Markov superposition transmission for high-speed railway

wireless communication systems,” in Proceeding Int. Workshop High Mobility Wirel. Commun., Xi’an,China, Oct. 2015, pp. 61-65.

L. Wang, and X. Ma, “Coded index modulation with block Markov superposition transmission for highly

mobile OFDM systems,” in Proceeding 2016 IEEE 83rd Veh. Tech. Conf. (VTC Spring), Nanjing, China,

May 2016, pp. 1-5.Xiao Ma (SYSU) BMST August 25, 2016 79 / 83

Related Works

K. Huang, C. Liang, X. Ma, and B. Bai, “Unequal error protection by partial superposition transmission

using low-density parity-check codes,” IET Commun., vol. 8, no. 13, pp. 2348-2355, Sep. 2014.

K. Huang, C. Liang, and X. Ma, “Unequal error protection using LDPC codes by partial superposition

transmission,” in Proceeding Int. Workshop High Mobility Wirel. Commun., Shanghai, China, Nov. 2014,pp. 110-114.

Q. Zhuang, J. Liu, and X. Ma, “Upper bounds on the ML decoding error probability of general codes

over AWGN channels,” [Online]. Available: http://arxiv.org/abs/1308.3303.

Q. Zhuang, X. Ma, and A. Kavcic, “Bounds on the ML decoding error probability of RS-Coded

modulation over AWGN channels,” [Online]. Available: http://arxiv.org/abs/1401.5305.

Xiao Ma (SYSU) BMST August 25, 2016 80 / 83

Related Peoples

Xiao Ma Baoming Bai Chulong Liang Kechao Huang Qiutao Zhuang

Jingnan Hu Leijun Wang Zhihua Yang Xiaopei Xu Shancheng Zhao

Huicong Zeng Xiying Liu Yunhong Zhang

Xiao Ma (SYSU) BMST August 25, 2016 81 / 83

Acknowledgements

This work was partially supported by the 973 Program (No. 2012CB316100),the 863 Program (No. 2015AA01A709), and the China NSF (No. 91438101and No. 61172082).

Xiao Ma (SYSU) BMST August 25, 2016 82 / 83

Acknowledgements

Thank You for Your Attention!

Xiao Ma (SYSU) BMST August 25, 2016 83 / 83

top related