819 research outputs found
On Universal Properties of Capacity-Approaching LDPC Ensembles
This paper is focused on the derivation of some universal properties of
capacity-approaching low-density parity-check (LDPC) code ensembles whose
transmission takes place over memoryless binary-input output-symmetric (MBIOS)
channels. Properties of the degree distributions, graphical complexity and the
number of fundamental cycles in the bipartite graphs are considered via the
derivation of information-theoretic bounds. These bounds are expressed in terms
of the target block/ bit error probability and the gap (in rate) to capacity.
Most of the bounds are general for any decoding algorithm, and some others are
proved under belief propagation (BP) decoding. Proving these bounds under a
certain decoding algorithm, validates them automatically also under any
sub-optimal decoding algorithm. A proper modification of these bounds makes
them universal for the set of all MBIOS channels which exhibit a given
capacity. Bounds on the degree distributions and graphical complexity apply to
finite-length LDPC codes and to the asymptotic case of an infinite block
length. The bounds are compared with capacity-approaching LDPC code ensembles
under BP decoding, and they are shown to be informative and are easy to
calculate. Finally, some interesting open problems are considered.Comment: Published in the IEEE Trans. on Information Theory, vol. 55, no. 7,
pp. 2956 - 2990, July 200
Information-theoretic Physical Layer Security for Satellite Channels
Shannon introduced the classic model of a cryptosystem in 1949, where Eve has
access to an identical copy of the cyphertext that Alice sends to Bob. Shannon
defined perfect secrecy to be the case when the mutual information between the
plaintext and the cyphertext is zero. Perfect secrecy is motivated by
error-free transmission and requires that Bob and Alice share a secret key.
Wyner in 1975 and later I.~Csisz\'ar and J.~K\"orner in 1978 modified the
Shannon model assuming that the channels are noisy and proved that secrecy can
be achieved without sharing a secret key. This model is called wiretap channel
model and secrecy capacity is known when Eve's channel is noisier than Bob's
channel.
In this paper we review the concept of wiretap coding from the satellite
channel viewpoint. We also review subsequently introduced stronger secrecy
levels which can be numerically quantified and are keyless unconditionally
secure under certain assumptions. We introduce the general construction of
wiretap coding and analyse its applicability for a typical satellite channel.
From our analysis we discuss the potential of keyless information theoretic
physical layer security for satellite channels based on wiretap coding. We also
identify system design implications for enabling simultaneous operation with
additional information theoretic security protocols
New Codes on Graphs Constructed by Connecting Spatially Coupled Chains
A novel code construction based on spatially coupled low-density parity-check
(SC-LDPC) codes is presented. The proposed code ensembles are described by
protographs, comprised of several protograph-based chains characterizing
individual SC-LDPC codes. We demonstrate that code ensembles obtained by
connecting appropriately chosen SC-LDPC code chains at specific points have
improved iterative decoding thresholds compared to those of single SC-LDPC
coupled chains. In addition, it is shown that the improved decoding properties
of the connected ensembles result in reduced decoding complexity required to
achieve a specific bit error probability. The constructed ensembles are also
asymptotically good, in the sense that the minimum distance grows linearly with
the block length. Finally, we show that the improved asymptotic properties of
the connected chain ensembles also translate into improved finite length
performance.Comment: Submitted to IEEE Transactions on Information Theor
On Complexity, Energy- and Implementation-Efficiency of Channel Decoders
Future wireless communication systems require efficient and flexible baseband
receivers. Meaningful efficiency metrics are key for design space exploration
to quantify the algorithmic and the implementation complexity of a receiver.
Most of the current established efficiency metrics are based on counting
operations, thus neglecting important issues like data and storage complexity.
In this paper we introduce suitable energy and area efficiency metrics which
resolve the afore-mentioned disadvantages. These are decoded information bit
per energy and throughput per area unit. Efficiency metrics are assessed by
various implementations of turbo decoders, LDPC decoders and convolutional
decoders. New exploration methodologies are presented, which permit an
appropriate benchmarking of implementation efficiency, communications
performance, and flexibility trade-offs. These exploration methodologies are
based on efficiency trajectories rather than a single snapshot metric as done
in state-of-the-art approaches.Comment: Submitted to IEEE Transactions on Communication
Performance Prediction of Nonbinary Forward Error Correction in Optical Transmission Experiments
In this paper, we compare different metrics to predict the error rate of
optical systems based on nonbinary forward error correction (FEC). It is shown
that the correct metric to predict the performance of coded modulation based on
nonbinary FEC is the mutual information. The accuracy of the prediction is
verified in a detailed example with multiple constellation formats, FEC
overheads in both simulations and optical transmission experiments over a
recirculating loop. It is shown that the employed FEC codes must be universal
if performance prediction based on thresholds is used. A tutorial introduction
into the computation of the threshold from optical transmission measurements is
also given.Comment: submitted to IEEE/OSA Journal of Lightwave Technolog
How to Achieve the Capacity of Asymmetric Channels
We survey coding techniques that enable reliable transmission at rates that
approach the capacity of an arbitrary discrete memoryless channel. In
particular, we take the point of view of modern coding theory and discuss how
recent advances in coding for symmetric channels help provide more efficient
solutions for the asymmetric case. We consider, in more detail, three basic
coding paradigms.
The first one is Gallager's scheme that consists of concatenating a linear
code with a non-linear mapping so that the input distribution can be
appropriately shaped. We explicitly show that both polar codes and spatially
coupled codes can be employed in this scenario. Furthermore, we derive a
scaling law between the gap to capacity, the cardinality of the input and
output alphabets, and the required size of the mapper.
The second one is an integrated scheme in which the code is used both for
source coding, in order to create codewords distributed according to the
capacity-achieving input distribution, and for channel coding, in order to
provide error protection. Such a technique has been recently introduced by
Honda and Yamamoto in the context of polar codes, and we show how to apply it
also to the design of sparse graph codes.
The third paradigm is based on an idea of B\"ocherer and Mathar, and
separates the two tasks of source coding and channel coding by a chaining
construction that binds together several codewords. We present conditions for
the source code and the channel code, and we describe how to combine any source
code with any channel code that fulfill those conditions, in order to provide
capacity-achieving schemes for asymmetric channels. In particular, we show that
polar codes, spatially coupled codes, and homophonic codes are suitable as
basic building blocks of the proposed coding strategy.Comment: 32 pages, 4 figures, presented in part at Allerton'14 and published
in IEEE Trans. Inform. Theor
- …