Institute for Experimental Mathematics Ellernstrasse 29 45326 Essen - Germany Coding for a Terrible Channel A.J. Han Vinck July 3, 2005 COST 289.

Slides:



Advertisements
Similar presentations
Iterative Equalization and Decoding
Advertisements

Convolutional Codes Representation and Encoding  Many known codes can be modified by an extra code symbol or by deleting a symbol * Can create codes of.
Introduction to Digital Communications
Efficient Soft-Decision Decoding of Reed- Solomon Codes Clemson University Center for Wireless Communications SURE 2006 Presented By: Sierra Williams Claflin.
Combined QPSK and MFSK Communication over an AWGN Channel Jennifer Christensen South Dakota School of Mines & Technology Advisor: Dr. Komo.
Submission May, 2000 Doc: IEEE / 086 Steven Gray, Nokia Slide Brief Overview of Information Theory and Channel Coding Steven D. Gray 1.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany Pulse Position Access Codes A.J. Han Vinck.
Cellular Communications
Turbo Codes – Decoding and Applications Bob Wall EE 548.
Multiple-input multiple-output (MIMO) communication systems
Institute for Experimental Mathematics Ellernstrasse Essen - Germany packet transmission A.J. Han Vinck January 19, 2010.
Division of Engineering and Applied Sciences DIMACS-04 Iterative Timing Recovery Aleksandar Kavčić Division of Engineering and Applied Sciences Harvard.
Space Time Block Codes Poornima Nookala.
EE 3220: Digital Communication Dr Hassan Yousif 1 Dr. Hassan Yousif Ahmed Department of Electrical Engineering College of Engineering at Wadi Aldwasser.
EE 3220: Digital Communication Dr Hassan Yousif 1 Dr. Hassan Yousif Ahmed Department of Electrical Engineering College of Engineering at Wadi Aldwasser.
Generalized Communication System: Error Control Coding Occurs In Right Column. 6.
Digital Communications I: Modulation and Coding Course
Reed Solomon Codes block oriented FEC used in high reliability wireless applications non-binary code with m-ary symbol alphabet e.g. M = 8  alphabet size.
Ger man Aerospace Center Gothenburg, April, 2007 Coding Schemes for Crisscross Error Patterns Simon Plass, Gerd Richter, and A.J. Han Vinck.
4.1 Why Modulate? 이번 발표자료는 연구배경 연구복적 제안시스템 시뮬레이션 향후 연구방향으로 구성되어 있습니다.
林茂昭 教授 台大電機系 個人專長 錯誤更正碼 數位通訊
ECED 4504 Digital Transmission Theory
DIGITAL COMMUNICATION Error - Correction A.J. Han Vinck.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION 2-dimensional transmission A.J. Han Vinck May 1, 2003.
Sequential Soft Decision Decoding of Reed Solomon Codes Hari Palaiyanur Cornell University Prof. John Komo Clemson University 2003 SURE Program.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany Data communication line codes and constrained sequences A.J. Han Vinck Revised.
Channel Coding Part 1: Block Coding
Institute for Experimental Mathematics Ellernstrasse Essen - Germany On STORAGE Systems A.J. Han Vinck June 2004.
1 SNS COLLEGE OF ENGINEERING Department of Electronics and Communication Engineering Subject: Digital communication Sem: V Cyclic Codes.
Rohit Iyer Seshadri and Matthew C. Valenti
Codes Codes are used for the following purposes: - to detect errors - to correct errors after detection Error Control Coding © Erhan A. Ince Types: -Linear.
Medicaps Institute of Technology & Management Submitted by :- Prasanna Panse Priyanka Shukla Savita Deshmukh Guided by :- Mr. Anshul Shrotriya Assistant.
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 12.
Introduction to Data Communication: the discrete channel model A.J. Han Vinck University of Essen April 2005.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany Data communication signatures A.J. Han Vinck July 29, 2004.
Week 7 Lecture 1+2 Digital Communications System Architecture + Signals basics.
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
Coding Theory. 2 Communication System Channel encoder Source encoder Modulator Demodulator Channel Voice Image Data CRC encoder Interleaver Deinterleaver.
DIGITAL COMMUNICATIONS Linear Block Codes
Dept. of EE, NDHU 1 Chapter Four Bandpass Modulation and Demodulation.
Name Iterative Source- and Channel Decoding Speaker: Inga Trusova Advisor: Joachim Hagenauer.
Real-Time Turbo Decoder Nasir Ahmed Mani Vaya Elec 434 Rice University.
1 Channel Coding (III) Channel Decoding. ECED of 15 Topics today u Viterbi decoding –trellis diagram –surviving path –ending the decoding u Soft.
Last time, we talked about:
Timo O. Korhonen, HUT Communication Laboratory 1 Convolutional encoding u Convolutional codes are applied in applications that require good performance.
Combined Linear & Constant Envelope Modulation
Outline Transmitters (Chapters 3 and 4, Source Coding and Modulation) (week 1 and 2) Receivers (Chapter 5) (week 3 and 4) Received Signal Synchronization.
Baseband Receiver Receiver Design: Demodulation Matched Filter Correlator Receiver Detection Max. Likelihood Detector Probability of Error.
Sujan Rajbhandari LCS Convolutional Coded DPIM for Indoor Optical Wireless Links S. Rajbhandari, N. M. Aldibbiat and Z. Ghassemlooy Optical Communications.
Sequential Soft Decision Decoding of Reed Solomon Codes Hari Palaiyanur Cornell University Prof. John Komo Clemson University 2003 SURE Program.
Matthew Valenti West Virginia University
Reed-Solomon Codes in Slow Frequency Hop Spread Spectrum Andrew Bolstad Iowa State University Advisor: Dr. John J. Komo Clemson University.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
Performance of Digital Communications System
Digital Communications I: Modulation and Coding Course Spring Jeffrey N. Denenberg Lecture 3c: Signal Detection in AWGN.
Information Theory & Coding for Digital Communications Prof JA Ritcey EE 417 Source; Anderson Digital Transmission Engineering 2005.
Diana B. Llacza Sosaya Digital Communications Chosun University
Block Coded Modulation Tareq Elhabbash, Yousef Yazji, Mahmoud Amassi.
Classical Coding for Forward Error Correction Prof JA Ritcey Univ of Washington.
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION introduction A.J. Han Vinck May 10, 2003.
Modulation and Coding Trade Offs Ramesh Kumar Lama.
Rohit Iyer Seshadri and Matthew C. Valenti
Optimal Receivers in Multipath: Single-Carrier and OFDM
MAP decoding: The BCJR algorithm
Coding for Noncoherent M-ary Modulation
Coding and Interleaving
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Homework #2 Due May 29 , Consider a (2,1,4) convolutional code with g(1) = 1+ D2, g(2) = 1+ D + D2 + D3 a. Draw the.
IV. Convolutional Codes
Presentation transcript:

Institute for Experimental Mathematics Ellernstrasse Essen - Germany Coding for a Terrible Channel A.J. Han Vinck July 3, 2005 COST 289

University Duisburg-Essendigital communications group 2 Content Motivation –Impulsive noise (broadband noise) –Broadcasters (narrowband noise) –Background noise –Frequency selective fading –High attenuation Permutation codes Block permutation code Convolutional permutation code Reed Solomon codes

University Duisburg-Essendigital communications group 3 Example: Power Line channel Maximum amplitude < 5 Volt ( CENELEC) –Use constant envelope modulation M-FSK ( or clipped OFDM) Impulsive noise (broad band) –Width < 100  Sec; interval average sec. Permanent disturbances (narrow band) –Television sets, PC, broadcasters Back ground noise –Power Density function: Log 10 N(f) = K – 4*10 -5 f Frequency selective fading –Channel impedance mismatch High attenuation –< 100 dB/Km A.J. Han Vinck, “ Coded Modulation for PLC,” AEU, Vol. 2000, pp

University Duisburg-Essendigital communications group 4 communication overview encoder K M-ary symbols N M-ary symbols M-FSK modulator non- coherent detection N x M envelopes decoder Message estimate of length K constant envelope Permutation codes Convolutional-permutation codes Reed Solomon Codes

University Duisburg-Essendigital communications group 5 Encoder: use permutation code Transmit messages as:  sequences (code words) of length M where all M symbols are different  minimum distance (# of differences) D p Example: M = 3 D p = 2 Code: time f

University Duisburg-Essendigital communications group 6 Non-coherent detection with thresholds filter matched to f 1 Envelope detector y1y1 filter matched to f 2 Envelope detector y2y2 filter matched to f M Envelope detector yMyM  Quantize > Th = 1 < Th = 0 sample  DetectPresence of code sequence X transmit ? ?

University Duisburg-Essendigital communications group 7 Block detection matrix structure hard soft softer softest select above ranking calculate largest threshold T likelihoods Needs full channel knowledge T=.6E 1/2 “like adding received energy” complexity

University Duisburg-Essendigital communications group 8 Effect of noise (simplified) Transmitted Background-insertion Background-deletion Impulsive-broadband narrowband-jammer frequency selective fading

University Duisburg-Essendigital communications group 9 Performance Permutation codewords: –M slots; M different symbols; minimum distance D p Error events agree with codewords in  1 position Hence:  D p events can create an additional codeword and a detection error may occur

University Duisburg-Essendigital communications group 10 Performance AWGN

University Duisburg-Essendigital communications group 11 Coding gain Coding gain (soft) for AWGN only: dB P e uncoded coded M = 4, D p = 4 3 dB !

University Duisburg-Essendigital communications group 12 Simulation results: PLC m800m1000m Impulse + jammer + background Impulse + background Coded D = 3 Uncoded Pe distance

University Duisburg-Essendigital communications group 13 Code parameters Upperbound on cardinality of the code Q1: when do we achieve equality? Q2: if not, what is the upperbound References: - Ian Blake, Permutation codes for discrete channels (1975, IT) - P. Frankl and M. Deza, On the max. # of Permutations with given Max. Or Min. Distance (1977, Jrnl of Comb. Th.) - T. Klöve: |C| = 18 for M = 6, D = 5 instead of 30

University Duisburg-Essendigital communications group 14 From block to convolutional codes like coded modulation! Advantages: lower complexity decoding lower decoding error probability

University Duisburg-Essendigital communications group 15 Permutation convolutional codes mapping D free ( permutation conv. code) = = 8 IDEA: convert binary output to permutation codewords keep ( or increase) distanceif possible!

University Duisburg-Essendigital communications group 16 Example of the mapping (a) Original code (b) permutation trellis code.

University Duisburg-Essendigital communications group 17 Reason why conv. code outputpermutation code word Distance tables +1 per branch!

University Duisburg-Essendigital communications group 18 Mappings, M = , 0001, 0010, , 1243, 1342, , 0101, 0110, , 1432, 2134, 2143 . 1000, 1001, 1010, , 3241, 2314, , 1101, 1110, , 3412, 3124, 3142 n = 4, distance conserving { 000,001,010,011}  { 4231,4213,4132,4123 } {100,101,110,111 }  { 1234,1243,1432,1423 } n = 3, distance increasing

University Duisburg-Essendigital communications group 19 Problems worked on Construct mappings: n bits to codewords from permutation code with at least the same distance or with distance increasing mappings Construct permutation convolutional codes increase thefree distance H.C. Ferreira and A.J. Han Vinck, Permutation Trellis Codes, to be published, IEEE Tr. on Comms.

University Duisburg-Essendigital communications group 20 Narrowband + background noise

University Duisburg-Essendigital communications group 21 Impulsive Free distance = 8

University Duisburg-Essendigital communications group 22 Encoder: use Reed Solomon code n aa 2... k+1... = G c = x G 1a k a 2k... Property: minimum difference between codewords D = N – k maximum number of agreements = N-D = N – (N – k) = k THUS: THUS: since  ( 1, 1,...,1) is a codeword for all  other codewords do not have more than k symbols of type 

University Duisburg-Essendigital communications group 23 Channel disturbances (1) Envelope detector output HHHHHHHH HHHHHHHH ALL outputs HIGH for some time: these are ERASURES for the RS code HLLLHLLL non- coherent detection Random errors occur H  L and L  H O( p 2 ) Erasures H  L or L  H O( p ) HLLHHLLH LLLLLLLL LLHLLLHL non- coherent detection erasure error Impulsive noise background noise

University Duisburg-Essendigital communications group 24 Threshold detection: AWGN, RS(15,3) SNR uncoded threshold Viterbi select best Prob. Symbol Error

University Duisburg-Essendigital communications group 25 Threshold detection: AWGN, RS(15,3) + impulsive noise ( av. 3 symbols) SNR uncoded threshold Viterbi select best (no alternatives) errors Prob. Symbol Error AWGN- only D = 13 erasures

University Duisburg-Essendigital communications group 26 Channel disturbances (2) LLHLLLHL LLLLLLLL LHLLLHLL Output LOW for long time non- coherent detection Effect: causes erasures # erasures depends on # hits HLHLHLHL HLLLHLLL HHLLHHLL output HIGH for long time non- coherent detection Effect: causes many erasures narrowband noise freq. sel. fading

University Duisburg-Essendigital communications group 27 Reed Solomon: avoid constant symbol codeword mother code 1aa 2... k a k a 2k... subcode The sub-code does not contain the constant symbol codewords ( except for 0 ) Properties: Minimum distance N-k+1 maximum # of symbols of same type = k at least N / k different symbols in a codeword (  0)

University Duisburg-Essendigital communications group 28 IDEA Detection strategy N=7, k = 2, D = 6; narrowband noise/fading Detect: reset: H H H H H H H L L L L L L L L L L L L L LL L L L L L L L L L L H H L L L L L L L L L L L L L L H L L L L L L L Result: maximum of 4 erasures General: D = N - k + 1 > k * # narrowband disturbances 6 = 7 – > 2 * 2 = 4

University Duisburg-Essendigital communications group 29 Threshold detection: modified RS(15,9) + narrow band noise SNR uncoded AWGN only Prob. Symbol Error Modified RS No side info + side info + constant codewords

University Duisburg-Essendigital communications group 30 Threshold detection: modified RS(15,3) + narrow band noise SNR uncoded + constant codewords + side info Prob. Symbol Error AWGN only modified RS no side info

University Duisburg-Essendigital communications group 31 Overall result Modified RS D > # narrowband noise errors (row insertion H) + # fading errors ( row deletion L ) + # impulsive noise errors (symbol insertion H) + # insertion/deletion errors (background noise) ERASURES !

University Duisburg-Essendigital communications group 32 Reed Solomon: avoid certain output symbols information Precoder avoid symbols from A M-ary RS- code avoid symbols from A |A| symbols from A forbidden Idea: Control the M-ary RS-output with r control bits r control sbls k info sblsn code sbls M- FSK G. Solomon, „A Note on Alphabet Codes and Fields of Computation,“ Inf. and Control, 1974, pp

University Duisburg-Essendigital communications group 33 Reed Solomon: avoid certain output symbols M-ary RS Code in systematic form: ( info, control ) I k 0 P = C k r 0 I r n - forbidden set of output symbols A, cardinality |A| - information precoded ( in A c ) - control such that symbols in A do not occur in C - PERFORMANCE?

University Duisburg-Essendigital communications group 34 performance ( info, control ) I k 0 P = C k r 0 I r k+r n-(k+r) possible if # possible control vectors = (M-|A|) r > # forbidden vectors in checkpart = ( n – (k+r)) |A |(M-|A|) r-1 Or |A| < (M-|A|)/(n-(k+r)) For |A| = 1, r = 1,  M = n + 1 > n - k, which is true for all RS codes

University Duisburg-Essendigital communications group 35 CONCLUSIONS – Application of permutation codes for „terrible“ channels – Extend: block to convolutional – Constructions and simulations – Reed Solomon codes with restricted output

University Duisburg-Essendigital communications group 36 Envelope detector with threshold Example: transmit detect 1 error 0 f non- coherent detection f 4 f 2 f erasure output M = 4