scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Dirty paper coding using sign-bit shaping and LDPC codes

TL;DR: A lattice-based DPC scheme that provides good shaping and coding gains with moderate complexity at both the encoder and the decoder and a design for superposition coding that provides rates better than time-sharing over a Gaussian broadcast channel.
Abstract: Dirty paper coding (DPC) refers to methods for pre-subtraction of known interference at the transmitter of a multiuser communication system. There are numerous applications for DPC, including coding for broadcast channels. Recently, lattice-based coding techniques have provided several designs for DPC. In lattice-based DPC, there are two codes - a convolutional code that defines a lattice used for shaping and an error correction code used for channel coding. Several specific designs have been reported in the recent literature using convolutional and graph-based codes for capacity-approaching shaping and coding gains. In most of the reported designs, either the encoder works on a joint trellis of shaping and channel codes or the decoder requires iterations between the shaping and channel decoders. This results in high complexity of implementation. In this work, we present a lattice-based DPC scheme that provides good shaping and coding gains with moderate complexity at both the encoder and the decoder. We use a convolutional code for sign-bit shaping, and a low-density parity check (LDPC) code for channel coding. The crucial idea is the introduction of a one-codeword delay and careful parsing of the bits at the transmitter, which enables an LDPC decoder to be run first at the receiver. This provides gains without the need for iterations between the shaping and channel decoders. Simulation results confirm that at high rates the proposed DPC method performs close to capacity with moderate complexity. As an application of the proposed DPC method, we show a design for superposition coding that provides rates better than time-sharing over a Gaussian broadcast channel.

Summary (2 min read)

Introduction

  • Situations where interference is known non-causally at the transmitter but not at the receiver model several useful multiuser communication scenarios.
  • In [5], multilevel coding is used, and there are different codes for different bits of the symbols.
  • In [8] and [9], shaping follows channel coding and the receiver performs iterations between the shaping and channel decoders.
  • The rest of the paper is organized as follows.
  • After a brief review of the lattice-based DPC coding method in Section II, the authors present the proposed DPC method in Section III.

II. LATTICE DIRTY PAPER CODES

  • The transmit power is assumed to be upper-bounded by 1nE[|X|2] ≤ PX per symbol, and the interference power is denoted 1nE[|S|2] = PS per symbol.
  • The noise variance per symbol is denoted PN .
  • In [1], Costa shows that the capacity of the dirty paper channel is 12 log ( 1 + PXPN ) i.e. known interference can be canceled perfectly at the transmitter.
  • The lattice transmission approach of [3] [4] is as follows.
  • Note that the dither is assumed to be known at the transmitter and receiver (say, through the use of a common seed in a random number generator).

III. PROPOSED SCHEME

  • The proposed scheme uses a convolutional code for signbit shaping [10] and low density parity check (LDPC) codes for channel coding.
  • For M = 16, the constellation and mapping are shown in Fig.
  • The mapping in Fig. 1 is suited for signbit shaping, since a flip of the most significant bit results in a significant change in symbol value for all possible 4-bit inputs.
  • Also, the mapping is mostly Gray except for a few symbol transitions.
  • As expected, larger values of M will result in larger shaping gains in their design, and the authors stick to the 16-PAM shown in Fig. 1 for illustration and simulation.

A. Encoder Structure

  • The encoder structure for the proposed scheme is as shown in Fig.
  • Note that the authors need the rate of the convolutional code to be 1−k′/s.
  • Let the coset chosen by m′ be denoted C(m′).
  • The sign-bit vector z is chosen from C(m′) so as to minimize the squared sum of the vector (v − αS) mod M , where α = PXPX+PN is the MMSE factor and S is the interference vector.
  • In summary, the encoder structure achieves DPC shaping and LDPC coding with bit-interleaved modulation.

B. Decoder Structure

  • The decoder for the proposed scheme is as shown in Fig.3.
  • The decoded shaped bits are passed through a syndrome former to get message bits used for shaping.
  • The LDPC decoder outputs k−k′ message bits and s bits of the sign bit vector of the previous block.
  • The demapper function at the receiver has to calculate LLRs taking into account the modulo M operation at the encoder [4].
  • Therefore, the received constellation AR is a replicated version of the M -PAM constellation A used at the transmitter (assuming that scaling factors have been corrected at the receiver).

IV. SIMULATION RESULTS

  • A non-systematic convolutional code is used to avoid error propagation problems.
  • The authors considered several candidate distributions originally designed for BPSK over AWGN, and chose the one that provided the best performance.
  • The plot with interference did not change appreciably for all power levels of interference, and the authors have provided one plot for illustration.
  • This shows that the authors are 1.46 dB away from ideal dirty paper channel capacity.
  • The authors observed that trellis shaping with larger number of states results in a decrease in shaping loss in other simulations.

V. APPLICATION TO GAUSSIAN BROADCAST CHANNEL

  • Here, User 2 is coded using DPC considering User 1 as interference.
  • User 1 is shaped using sign-bit shaping and coded using an LDPC code over M -PAM.
  • The demapper at Receiver 1 calculates LLR for the i-th bit in the j-th receiver symbol Y1j using the following formula.
  • Comparison with the SNR needed for a single user capacity of 3 bits per channel use (which is 17.99 dB) shows that the total loss for both the users is about 2.4642dB.
  • The authors see that the (3,3) rate point is clearly outside the time-sharing region.

VI. CONCLUSIONS

  • The authors have proposed a method for designing lattice-based schemes for dirty paper coding using sign-bit shaping and LDPC codes.
  • Simulation results show that the proposed design performs 1.46dB away from the dirty paper capacity for a block length of n = 40000 at the rate of 3 bits/channel use.
  • This performance is comparable to other results in the literature.
  • As discussed in this article, a novel method for combining shaping and coding results in good gains at lesser complexity in their design, when compared to other lattice-based strategies.
  • As an application, the authors have designed a superposition coding scheme for Gaussian broadcast channels that is shown to perform better than timesharing through simulations.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Dirty Paper Coding using Sign-bit Shaping and
LDPC Codes
Shilpa G, Andrew Thangaraj and Srikrishna Bhashyam
Dept of Electrical Engg
Indian Institute of Technology Madras
Chennai 600036, India
Email: andrew,skrishna@ee.iitm.ac.in
Abstract—Dirty paper coding (DPC) refers to methods for
pre-subtraction of known interference at the transmitter of a
multiuser communication system. There are numerous applica-
tions for DPC, including coding for broadcast channels. Recently,
lattice-based coding techniques have provided several designs for
DPC. In lattice-based DPC, there are two codes - a convolutional
code that defines a lattice used for shaping and an error
correction code used for channel coding. Several specific designs
have been reported in the recent literature using convolutional
and graph-based codes for capacity-approaching shaping and
coding gains. In most of the reported designs, either the encoder
works on a joint trellis of shaping and channel codes or the
decoder requires iterations between the shaping and channel
decoders. This results in high complexity of implementation. In
this work, we present a lattice-based DPC scheme that provides
good shaping and coding gains with moderate complexity at both
the encoder and the decoder. We use a convolutional code for
sign-bit shaping, and a low-density parity check (LDPC) code
for channel coding. The crucial idea is the introduction of a one-
codeword delay and careful parsing of the bits at the transmitter,
which enables an LDPC decoder to be run first at the receiver.
This provides gains without the need for iterations between the
shaping and channel decoders. Simulation results confirm that at
high rates the proposed DPC method performs close to capacity
with moderate complexity. As an application of the proposed DPC
method, we show a design for superposition coding that provides
rates better than time-sharing over a Gaussian broadcast channel.
I. INTRODUCTION
Situations where interference is known non-causally at
the transmitter but not at the receiver model several useful
multiuser communication scenarios. In [1], Costa introduced
and studied coding for such situations and called it “writing on
dirty paper”. Dirty paper coding (DPC) is now recognized as a
powerful notion central to approaching capacity on multiuser
channels.
Lattice-based ideas for DPC were suggested and shown to
be capacity-approaching in [2], [3]. Recently, many designs
of lattice-based DPC schemes have been proposed in [4]–[8].
Lattice-based schemes typically use cosets of a convolutional
code for lattice-quantizing or shaping to minimize the energy
of the difference of the coded symbols and the interfering
symbols. A part of the message bits is used to choose the
specific coset used in the minimization. In addition to the
shaping convolutional code, an error correction code needs
to be used to obtain coding gain and approach capacity.
The main source of complexity in lattice-based DPC designs
is combining shaping and coding encoders/decoders at the
transmitter/receiver. Simple concatenation schemes are not
applicable because of the following reasons - outer shaping
followed by inner coding results in unshaped parity symbols
that increase transmitted energy, while outer coding followed
by inner shaping results in a poor inner code that needs to be
iteratively decoded at the receiver with the outer code.
In [6], encoding is done on a combined trellis of the source
code (Turbo TCQ) and a channel code (Turbo TCM). At the
receiver, decoding is done for Turbo TCM followed by syn-
drome computation to recover message bits. The transmitter
is complex in [6] because of the use of the joint trellis. The
DPC method proposed in [7] is similar to that of [6]. In [5],
multilevel coding is used, and there are different codes for
different bits of the symbols. At the receiver, iterations have
to be performed between decoders for some of the channel
codes and the shaping decoder. In [8] and [9], shaping follows
channel coding and the receiver performs iterations between
the shaping and channel decoders.
In this work, we propose a lattice-based method that uses a
novel combination of a convolutional code for sign-bit shaping
and a low density parity check (LDPC) code for channel
coding. As shown in specific designs and simulations, the
method provides good shaping and coding gains at moderate
complexity. The main idea for reducing complexity at the
receiver is the introduction of a one-codeword delay at the
transmitter, and the shaping of symbols from current message
bits combined with parity bits from the previous codeword.
This enables the LDPC decoder to be run first at the receiver
(with a one-codeword delay) without any need for iterations
with a shaping decoder. As an application, we use the proposed
DPC method to design codes for superposition coding in two-
user Gaussian broadcast channels. By simulations, we show
that rate points outside the time-sharing region are achieved.
The rest of the paper is organized as follows. After a brief
review of the lattice-based DPC coding method in Section
II, we present the proposed DPC method in Section III.
This is followed by description and simulation of specific
designs of DPC codes in Section IV. In Section V, design
of a superposition scheme using the proposed DPC method
is described and simulation results are presented. Concluding
remarks are made in Section VI.
ISIT 2010, Austin, Texas, U.S.A., June 13 - 18, 2010
923978-1-4244-7891-0/10/$26.00 ©2010 IEEE ISIT 2010

II. LATTICE DIRTY PAPER CODES
In a Gaussian dirty paper channel, the received symbol
vector Y =[Y
1
Y
2
···Y
n
] is modeled as
Y = X + S + N,
where X =[X
1
X
2
···X
n
] denotes the transmitted vector,
S =[S
1
S
2
···S
n
] denotes the interfering vector assumed
to be known non-causally at the transmitter and N denotes
the additive Gaussian noise vector. The transmit power is
assumed to be upper-bounded by
1
n
E[|X|
2
] P
X
per symbol,
and the interference power is denoted
1
n
E[|S|
2
]=P
S
per
symbol. The noise variance per symbol is denoted P
N
.In
[1], Costa shows that the capacity of the dirty paper channel
is
1
2
log
1+
P
X
P
N
i.e. known interference can be canceled
perfectly at the transmitter.
The interfering vector S is used as an input in the encoding
process and plays an important role to determine a suitable
transmit vector X. A coding strategy for choosing X needs
to overcome the imminent addition of S and protect the
transmitted information from the addition of the noise N. Such
coding strategies are called dirty paper coding (DPC) methods.
In [3], a dirty paper coding (DPC) scheme based on
lattice strategies was proposed and shown to achieve the
capacity of the dirty paper channel. We follow [4] for a
brief review of the transmitter and receiver structure in the
lattice DPC method [3]. Let Λ denote an n-dimensional
lattice with fundamental Voronoi region ν having averaged
second moment P (Λ) = P
X
and normalized second moment
G (Λ). Also let U Unif (ν) i.e. U is a random variable
(dither) uniformly distributed over ν. The lattice transmission
approach of [3] [4] is as follows.
Transmitter: The input alphabet X is restricted to ν.For
any v ν, the encoder sends
X =[v αS U] mod Λ, (1)
where α =
P
X
P
X
+P
N
is a MMSE scaling factor [4].
Receiver: The receiver computes
Y
=[αY + U] mod Λ (2)
The channel from v to Y
defined by (1) and (2) is equivalent
in distribution to
Y
=[v + N
] mod Λ, (3)
where
N
= [(1 α) U + αN] mod Λ. (4)
Lower bounds on achievable rates for the above equivalent
channel is shown in [4] to be equal to
I (V;Y
)
1
2
log
2
(1 + SNR)
1
2
log
2
(2πeG (Λ)) . (5)
For optimal shaping, G (Λ)
1
2πe
and we approach capacity
of the dirty paper channel. Note that the dither is assumed to
be known at the transmitter and receiver (say, through the use
of a common seed in a random number generator).
III. P
ROPOSED SCHEME
The proposed scheme uses a convolutional code for sign-
bit shaping [10] and low density parity check (LDPC) codes
for channel coding. We assume a M-PAM signal constellation
with a carefully chosen bit-to-symbol mapping that is compati-
ble with sign-bit shaping and bit-interleaved coded modulation
(BICM) [11]. For M =16, the constellation and mapping are
shown in Fig. 1. The mapping in Fig. 1 is suited for sign-
bit shaping, since a flip of the most significant bit results in a
significant change in symbol value for all possible 4-bit inputs.
Also, the mapping is mostly Gray except for a few symbol
transitions. Gray mapping is known to be the most effective
mapping for BICM with LDPC codes. This heuristic choice of
mapping enables the possibility of good shaping and coding
gains to be obtained simultaneously. As expected, larger values
of M will result in larger shaping gains in our design, and
we stick to the 16-PAM shown in Fig. 1 for illustration and
simulation.
A. Encoder Structure
The encoder structure for the proposed scheme is as
shown in Fig. 2. We describe the operations in the en-
coder at time step T or in the T -th block. A k-bit mes-
sage m =[m
1
m
2
···m
k
] is encoded into a s-symbol
vector u =[u
1
u
2
···u
s
] from the M -PAM constellation
A = {−(M 1)/2, ··· , 1/2, 1/2, ··· , (M 1)/2}, where
s =
n
log
2
M
is assumed to be an integer. Let l = log
2
M and
let f
M
: {0, 1}
l
A denote the bit-to-symbol mapping. The
bits that map to the i-th symbol are denoted z
i
a
2i
a
3i
···a
li
;
the sign-bit vector is denoted z =[z
1
z
2
···z
s
], and we define
vectors a
j
=[a
j
1
a
j
2
···a
j
s
] for 2 j l. Finally, we have
v = f
M
(za
2
···a
l
), where f
M
operates component-wise on
a vector input.
Let us assume that the vectors a
j
, 2 j l are available
at the encoder. The sign-bit shaping convolutional code is
used to determine the sign-bit vector z as follows. A part
of the message m
=[m
1
m
2
···m
k
] with k
<kbits is
mapped to a coset leader of the convolutional code using an
inverse syndrome former [10]. Note that we need the rate of
the convolutional code to be 1 k
/s. Let the coset chosen by
m
be denoted C(m
). The sign-bit vector z is chosen from
C(m
) so as to minimize the squared sum (energy) of the
vector (v αS)modM, where α =
P
X
P
X
+P
N
is the MMSE
factor and S is the interference vector. That is,
z = arg min
uC(m
)
|(f
M
(ua
2
···a
l
) αS)modM|
2
. (6)
The minimization in (6) is implemented using the Viterbi
algorithm [10].
The a
j
, 2 j l are determined as follows. An (n, kk
+
s) LDPC code is used at the encoder with a systematic encoder
E : {0, 1}
kk
+s
→{0, 1}
n
. Let m

=[z m
k
+1
···m
k
] be
input to the systematic LDPC encoder to obtain the codeword
E(m

)=[m

p
T
], where p
T
is the parity-bit vector for the
T -th block. The parity-bit vector is delayed by one time step.
For the T -th block, the n s = s(l 1) bits in [m
k
+1
···m
k
]
ISIT 2010, Austin, Texas, U.S.A., June 13 - 18, 2010
924

1000
-15/2
1001
-13/2
1011
-11/2
1010
-9/2
1110
-7/2
1111
-5/2
1101
-3/2
1100
-1/2
0000
1/2
0001
3/2
0011
5/2
0010
7/2
0110
9/2
0111
11/2
0101
13/2
0100
15/2
Fig. 1. 16-PAM constellation.
- -
k
Message
Bits
H
1
T
(k k
)
Message
Bits
Algorithm
Viterbi
Shaping Coder
minimizes the
energy of
(v αS) mod M
-
s
s =
n
log
2
M
Bits
Shaped
Bits
Encoder
LDPC
of rate
(k k
+ s) /n
6
-
-
-
-
a
b c
n (k k
+ s)
Parity
Bits
Delay
k k
Message bits
-
s
Shaped Bits
z
Mapping
to
M PAM
map (zabc)
-


?
?
v
αS
(v αS) mod M
mod M
?
?
n s
Parity plus Message
Bits
Fig. 2. Encoder structure.
and p
T 1
are rearranged by a permutation Π to form the
vectors a
j
, 2 j l. This permutation is necessary in an
implementation of BICM [11].
Note that both the shaping and coding objectives have
been met at the encoder. The transmitted symbols v αS
mod M have minimal energy in the lattice defined by sign-
bit shaping using the convolutional code. Selected bits in
successive blocks of symbols form codewords of the LDPC
code. In summary, the encoder structure achieves DPC shaping
and LDPC coding with bit-interleaved modulation.
B. Decoder Structure
The decoder for the proposed scheme is as shown in Fig.3.
Because of the one-codeword delay, parity bits of the T +
1-th block and message plus shaped bits of the T -th block
form a valid LDPC codeword. Therefore, an LDPC decoder
is first run on these symbols corresponding to a codeword. The
decoded shaped bits are passed through a syndrome former to
get message bits used for shaping. Iterations between shaping
decoder and channel decoder are not needed. The demapper
computes log likelihood ratios (LLRs) for the bits from the
received symbols in
Y = αY + U. The LLRs of the (k k
)
message bits after a delay of one time step, and the LLRs of the
n (k k
+ s) parity bits are de-interleaved. The s =
n
log
2
M
LLRs of the sign bits after a delay on one time step, and the
ns output LLRs of the de-interleaver are given as the input to
the LDPC decoder. The LDPC decoder outputs kk
message
bits and s bits of the sign bit vector of the previous block. Now,
the s-bit sign vector is passed through the syndrome former
to recover the remaining k
message bits.
The demapper function at the receiver has to calculate LLRs
taking into account the modulo M operation at the encoder [4].
Therefore, the received constellation A
R
is a replicated version
of the M-PAM constellation A used at the transmitter (assum-
ing that scaling factors have been corrected at the receiver).
That is, A
R
= {ArM,··· ,AM, A, A+M, ··· ,A+rM}.
The number of replications r is chosen so that the average
power of A
R
is approximately equal to the total average
power P
X
+ P
S
, and the bit mapping of the symbol a + jM
(a A, 1 j r) is the same as that for a. The LLR for
the i-th bit in the j-th symbol
Y
j
is computed according to
the constellation A
R
using the following formula:
L
i
=
aA
R
:bit i=0
exp
1
2
Y
j
a
2
αP
N
aA
R
:bit i=1
exp
1
2
Y
j
a
2
αP
N
.
ISIT 2010, Austin, Texas, U.S.A., June 13 - 18, 2010
925

-
Y = αY + U
Demapper
- -
1
-
Delay
-
n (k k
+ s)
LLRs of
Parity Bits
-
Delay
- -
(k k
)
LLRs of Message Bits
n
log
2
M
LLRs of sign bits
LDPC
Decoder
-
- -
H
T
s
Bits
k
Message
Bits
k k
Message
Bits
Fig. 3. Decoder structure.
Since the constellation mapping is nearly Gray, iterations
with the demapper do not provide significant improvements
in coding gain, particularly for large M.
IV. S
IMULATION RESULTS
For simulations, we have taken n = 40000, k = 30000,
k
= 5000 with M =16; this results in s = 10000.
The constellation mapping is as given in Fig. 1. We
have chosen a rate-1/2 memory 8 (256 state) non-
systematic convolutional code with generator polynomials
D
8
+ D
5
+ D
4
+ D
2
+ D +1,D
8
+ D
7
+ D
4
+ D
2
+1
as the sign-bit shaping code. A non-systematic convolutional
code is used to avoid error propagation problems.
A randomly constructed irregular LDPC code (40000,
35000) of rate 7/8 with variable node degree distribution
0.1256x+0.7140x
2
+0.1604x
9
and check node degree distri-
bution x
31
is used as the channel code. We considered several
candidate distributions originally designed for BPSK over
AWGN, and chose the one that provided the best performance.
The overall rate of transmission is seen to be
30000
40000
× 4=3
bits per channel use. Fig. 4 shows BER plots over an AWGN
channel and a DPC channel with interference known at the
transmitter. The interfering vector was generated at random
10 10.5 11 11.5 12 12.5 13
10
5
10
4
10
3
10
2
Eb/N0(dB)
Bit error rate
AWGN
DPC
Capacity for 3 bits/sym
Fig. 4. BER plot for DPC and AWGN.
for different power levels. The plot with interference did not
change appreciably for all power levels of interference, and
we have provided one plot for illustration. We see that a BER
of 10
5
is achieved at an SNR of 19.45dB with interference,
and at an SNR of 19.33 dB without interference. We have
simulated 1000 blocks of length 40000 to obtain sufficient
statistics for a BER of 10
5
.
The AWGN capacity at an SNR of 10 log
10
(2
6
1)=17.99
dB for a rate of 3 bits per channel use. This shows that we
are 1.46 dB away from ideal dirty paper channel capacity.
The granular gain G(Λ)=2
2R
/6S
x
is computed from the
simulations to be 1.282dB [4], where R =3.5 is the rate
before channel coding, and S
x
is the transmit power (obtained
through simulations). From this, the shaping loss is calculated
as follows:
10log
10
2πeG (Λ) 2
2C
1
2
2C
1
=0.2548 dB, (7)
where C
=3. So, of the total gap of 1.46 dB, we have
a shaping gap of 0.2548dB, and a coding gap of 1.2052dB
to capacity. We observed that trellis shaping with larger
number of states results in a decrease in shaping loss in other
simulations.
V. A
PPLICATION TO GAUSSIAN BROADCAST CHANNEL
We use the proposed scheme for superposition coding in
a two-user Gaussian broadcast channel Y
1
= X + N
1
and
Y
2
= X + N
2
with P
N
1
>P
N
2
. We let P
X
1
=(1 β) P
and P
X
2
= βP, where P is the total transmit power. Here,
User 2 is coded using DPC considering User 1 as interference.
User 1 is shaped using sign-bit shaping and coded using an
LDPC code over M-PAM. Fig. 5 shows a block diagram of
the transmitter and receivers. The encoder structure for User
1 is as in Fig. 2 with the interference vector S = 0. Hence,
for User 1, the shaping coder minimizes the energy of v. The
demapper at Receiver 1 calculates LLR for the i-th bit in the
j-th receiver symbol Y
1j
using the following formula.
L
i
=
aA:bit i=0
p(a) exp{−
1
2
(Y
1j
a)
2
βP+P
N
1
}
aA:bit i=1
p(a) exp{−
1
2
(Y
1j
a)
2
βP+P
N
1
}
,
where p(a) for a A represents the a priori probability of the
M-PAM symbol a. At the receiver, we approximate p
i
using
ISIT 2010, Austin, Texas, U.S.A., June 13 - 18, 2010
926

-
User 1
Message bits
Shaped and
LDPC coded
?
X
1
as S for
User 2
?
X
1
-
User 2
Message bits
DPC coded
6
X
2


-
X
@
@
@
@
@
@
@
@R
Y
1
= X + N
1
Y
2
= X + N
2
Receiver 1
Receiver 2
Fig. 5. Block diagram for a two-user Gaussian broadcast channel.
a Gaussian distribution with variance P
S
assuming that the
distribution of M-PAM symbols is approximately Gaussian.
We simulated a two user degraded broadcast channel with
P
N
1
=0.9 and P
N
2
=0.09 using the proposed scheme with
parameters from Section IV. The total transmit power, power
for User 1 and power for User 2 required for a bit error rate of
10
5
(at both receivers) are estimated from the simulation and
denoted P , P
x
1
and P
X
2
, respectively. The SNR for Receiver
1 is computed as 10 log
10
P
X
1
P
X
2
+P
N
1
=19.1791 dB. Since
DPC is done for User 2, the effective SNR at Receiver 2
is computed as 10 log
10
P
X
2
P
N
2
=19.4574 dB. Comparison
with the SNR needed for a single user capacity of 3 bits per
channel use (which is 17.99 dB) shows that the total loss for
both the users is about 2.4642dB. Fig. 6 shows the (3, 3) rate
pair in the capacity region of the two-user Gaussian broadcast
channel with total transmit power P and noise power P
N
1
,
P
N
2
, which is defined by R
1
1
2
log
1+
(1β)P
βP+P
N
1
, R
2
1
2
log
1+
βP
P
N
2
for 0 β 1. We see that the (3,3) rate
point is clearly outside the time-sharing region.
VI. C
ONCLUSIONS
In this work, we have proposed a method for designing
lattice-based schemes for dirty paper coding using sign-bit
shaping and LDPC codes. Simulation results show that the
proposed design performs 1.46dB away from the dirty paper
capacity for a block length of n = 40000 at the rate of
3 bits/channel use. This performance is comparable to other
results in the literature. However, as discussed in this article,
a novel method for combining shaping and coding results
in good gains at lesser complexity in our design, when
compared to other lattice-based strategies. As an application,
we have designed a superposition coding scheme for Gaussian
broadcast channels that is shown to perform better than time-
sharing through simulations.
Out of the 1.46 dB gap to capacity, about 1.2 dB is gap
attributed to a sub-optimal choice of the LDPC code and a
relatively low blocklength. Optimizing the LDPC code using
genetic algorithms and asymmetric density evolution [12]
0 1 2 3 4 5 6 7
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
R
2
(Rate of User 2 in bits/channel use)
R
1
(Rate of User 1 in bits/channel use)
Broadcast capacity
Time sharing
(3, 3.409)
(3.451, 3)
(3, 3)
(2.474, 3)
(3, 2.608)
Fig. 6. Two-user Gaussian broadcast channel capacity region.
along with joint optimization of shaping code and LDPC code
using EXIT charts [8] are topics for future work.
REFERENCES
[1] M. Costa, “Writing on dirty paper (corresp.), Information Theory, IEEE
Transactions on, vol. 29, no. 3, pp. 439–441, May 1983.
[2] T. Philosof, U. Erez, and R. Zamir, “Combined shaping and precoding
for interference cancellation at low snr, in Information Theory, 2003.
Proceedings. IEEE International Symposium on, June-4 July 2003, pp.
68–.
[3] U. Erez, S. Shamai, and R. Zamir, “Capacity and lattice strategies for
canceling known interference, Information Theory, IEEE Transactions
on, vol. 51, no. 11, pp. 3820–3833, Nov. 2005.
[4] U. Erez and S. Brink, A close-to-capacity dirty paper coding scheme,
Information Theory, IEEE Transactions on, vol. 51, no. 10, pp. 3417–
3432, Oct. 2005.
[5] S.-Y. Chung, “Multi-level dirty paper coding, Communications Letters,
IEEE, vol. 12, no. 6, pp. 456–458, June 2008.
[6] Y. Sun, M. Uppal, A. Liveris, S. Cheng, V. Stankovic, and Z. Xiong,
“Nested turbo codes for the costa problem, Communications, IEEE
Transactions on, vol. 56, no. 3, pp. 388–399, March 2008.
[7] M. Uppal, V. Stankovic, and Z. Xiong, “Code design for mimo broadcast
channels, Communications, IEEE Transactions on, vol. 57, no. 4, pp.
986–996, April 2009.
[8] Y. Sun, Y. Yang, A. Liveris, V. Stankovic, and Z. Xiong, “Near-
capacity dirty-paper code design: A source-channel coding approach,
Information Theory, IEEE Transactions on, vol. 55, no. 7, pp. 3013–
3031, July 2009.
[9] Y. Sun, A. Liveris, V. Stankovic, and Z. Xiong, “Near-capacity dirty-
paper code designs based on tcq and ira codes, in Information Theory,
2005. ISIT 2005. Proceedings. International Symposium on, Sept. 2005,
pp. 184–188.
[10] J. Forney, G.D., “Trellis shaping, Information Theory, IEEE Transac-
tions on, vol. 38, no. 2, pp. 281–300, Mar 1992.
[11] G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modula-
tion, IEEE Trans. on Info. theory, vol. 44, no. 3, pp. 927–946, May
1998.
[12] C.-C. Wang, S. Kulkarni, and H. Poor, “Density evolution for asymmet-
ric memoryless channels, Information Theory, IEEE Transactions on,
vol. 51, no. 12, pp. 4216–4236, Dec. 2005.
ISIT 2010, Austin, Texas, U.S.A., June 13 - 18, 2010
927
Citations
More filters
Journal ArticleDOI
TL;DR: In this article, the authors proposed a user grouping based precoder which improves the sum rate performance of the zero-forcing (ZF) precoder specially when the channel is ill-conditioned.
Abstract: We consider the Multiple Input Single Output (MISO) Gaussian Broadcast channel with $N_t$ antennas at the base station (BS) and $N_u$ single-antenna users in the downlink. We propose a novel user grouping precoder which improves the sum rate performance of the Zero-Forcing (ZF) precoder specially when the channel is ill-conditioned. The proposed precoder partitions all the users into small groups of equal size. Downlink beamforming is then done in such a way that, at each user's receiver the interference from the signal intended for users not in its group is nulled out. Intra-group interference still remains, and is cancelled through successive interference pre-subtraction at the BS using Dirty Paper Coding (DPC). The proposed user grouping method is different from user selection, since it is a method for precoding of information to the selected (scheduled) users, and not for selecting which users are to be scheduled. Through analysis and simulations, the proposed user grouping based precoder is shown to achieve significant improvement in the achievable sum rate when compared to the ZF precoder. When users are paired (i.e., each group has two users), the complexity of the proposed precoder is $O(N_u^3) + O(N_u^2 N_t)$ which is the same as that of the ZF precoder.

3 citations

Proceedings ArticleDOI
01 Nov 2016
TL;DR: A simplified expression is obtained for the exact difference in sum rate between DPC and ZFBF at all SNRs, and a significant improvement in rate in wideband OFDM transmission by using DPC for only a small fraction of subcarriers is shown.
Abstract: Consider a two-user MIMO Gaussian Broadcast Channel with two antennas at the transmitter and two single-antenna receivers. While Dirty Paper Coding (DPC) achieves capacity, its practical adoption needs a precise comparison with the popular method of Zero Forcing Beam Forming (ZFBF). In this work, we obtain a simplified expression for the exact difference in sum rate between DPC and ZFBF at all SNRs. Using this expression, we obtain the distribution of the difference under block fading, and show a significant improvement in rate in wideband OFDM transmission by using DPC for only a small fraction of subcarriers.

1 citations


Cites background from "Dirty paper coding using sign-bit s..."

  • ...Given the simplified implementations in [10] [11], DPC might become viable in future MU-MIMOOFDM systems....

    [...]

Proceedings ArticleDOI
01 Oct 2015
TL;DR: A novel PAPR shaping technique for single carrier transmission with high spectral efficiency is presented, which applies puncturing of error correction redundancy bits to achieve a desired Markovian symbol transmission probability distribution, which avoids symbol sequences with high peak values.
Abstract: A novel PAPR shaping technique for single carrier transmission with high spectral efficiency is presented. This technique applies puncturing of error correction redundancy bits to achieve a desired Markovian symbol transmission probability distribution, which avoids symbol sequences with high peak values. To measure the overall gain of a peak reduction transmission, a link-gain metric, which takes into account both PAPR reduction and average energy loss, is presented. For a 16-QAM system with transmission rate of 3 bits/symbol and a SRRC pulse shape with roll-off factor 0.1 and duration of 4 symbols, a link gain of 1.87 dB is demonstrated using a pragmatic binary Turbo code for error correction. The technique can be used to improve any single carrier communication link limited by the PA peak power. It is in particular attractive to satellite communications by maximizing the rate of a given transponder, or given terminal hardware.

1 citations

Proceedings ArticleDOI
04 Dec 2022
TL;DR: In this paper , a probabilistic shaping based dirty paper coding (DPC) scheme was proposed for a two-user MISO broadcast channel and the rate region of the users in the finite block length regime by utilizing analytic approximations introduced for shaping and channel coding parts of DPC.
Abstract: In this work, we analyze a probabilistic shaping based dirty paper coding (DPC) scheme on a two user multiple input single output (MISO) broadcast channel (BC) and evaluate rate region of the users in the finite block length regime by utilizing analytic approximations introduced for shaping and channel coding parts of DPC. The DPC scheme can be implemented with low complexity and enlarges rate region of the users in finite block length regime substantially compared to linear precoding and time sharing strategies.
Proceedings ArticleDOI
04 Dec 2022
TL;DR: In this article , a finite blocklength (FBL) coding scheme is proposed for the dirty-tape channel with causal state interference at the trans-mitter, and an achievable rate for given blocklength and decoding error probability is obtained, and the results of this paper are further illustrated via numerical examples.
Abstract: In this paper, the dirty-tape channel (the white Gaussian channel with causal state interference at the trans-mitter) is revisited by considering a noisy feedback link between the transmitter and receiver. A finite blocklength (FBL) coding scheme is proposed for this model, which is based on the classical Schalkwijk-Kailath (SK) scheme and an existing lattice-based interference canceling scheme. Based on the proposed scheme, an achievable rate for given blocklength and decoding error probability is obtained, and the results of this paper are further illustrated via numerical examples.
References
More filters
Journal ArticleDOI
Max Costa1
TL;DR: It is shown that the optimal transmitter adapts its signal to the state S rather than attempting to cancel it, which is also the capacity of a standard Gaussian channel with signal-to-noise power ratio P/N.
Abstract: A channel with output Y = X + S + Z is examined, The state S \sim N(0, QI) and the noise Z \sim N(0, NI) are multivariate Gaussian random variables ( I is the identity matrix.). The input X \in R^{n} satisfies the power constraint (l/n) \sum_{i=1}^{n}X_{i}^{2} \leq P . If S is unknown to both transmitter and receiver then the capacity is \frac{1}{2} \ln (1 + P/( N + Q)) nats per channel use. However, if the state S is known to the encoder, the capacity is shown to be C^{\ast} =\frac{1}{2} \ln (1 + P/N) , independent of Q . This is also the capacity of a standard Gaussian channel with signal-to-noise power ratio P/N . Therefore, the state S does not affect the capacity of the channel, even though S is unknown to the receiver. It is shown that the optimal transmitter adapts its signal to the state S rather than attempting to cancel it.

4,130 citations

Book
30 Nov 2008
TL;DR: The goal of this paper is to present in a comprehensive fashion the theory underlying bit-interleaved coded modulation, to provide tools for evaluating its performance, and to give guidelines for its design.
Abstract: Zehavi (1992) showed that the performance of coded modulation over a Rayleigh fading channel can be improved by bit-wise interleaving the encoder output and by using an appropriate soft-decision metric as an input to a Viterbi decoder. The goal of this paper is to present in a comprehensive fashion the theory underlying bit-interleaved coded modulation, to provide tools for evaluating its performance, and to give guidelines for its design.

2,098 citations

Journal ArticleDOI
TL;DR: The results provide an information-theoretic framework for the study of common communication problems such as precoding for intersymbol interference (ISI) channels and broadcast channels.
Abstract: We consider the generalized dirty-paper channel Y=X+S+N,E{X/sup 2/}/spl les/P/sub X/, where N is not necessarily Gaussian, and the interference S is known causally or noncausally to the transmitter. We derive worst case capacity formulas and strategies for "strong" or arbitrarily varying interference. In the causal side information (SI) case, we develop a capacity formula based on minimum noise entropy strategies. We then show that strategies associated with entropy-constrained quantizers provide lower and upper bounds on the capacity. At high signal-to-noise ratio (SNR) conditions, i.e., if N is weak relative to the power constraint P/sub X/, these bounds coincide, the optimum strategies take the form of scalar lattice quantizers, and the capacity loss due to not having S at the receiver is shown to be exactly the "shaping gain" 1/2log(2/spl pi/e/12)/spl ap/ 0.254 bit. We extend the schemes to obtain achievable rates at any SNR and to noncausal SI, by incorporating minimum mean-squared error (MMSE) scaling, and by using k-dimensional lattices. For Gaussian N, the capacity loss of this scheme is upper-bounded by 1/2log2/spl pi/eG(/spl Lambda/), where G(/spl Lambda/) is the normalized second moment of the lattice. With a proper choice of lattice, the loss goes to zero as the dimension k goes to infinity, in agreement with the results of Costa. These results provide an information-theoretic framework for the study of common communication problems such as precoding for intersymbol interference (ISI) channels and broadcast channels.

504 citations


"Dirty paper coding using sign-bit s..." refers background or methods in this paper

  • ...In [3], a dirty paper coding (DPC) scheme based on lattice strategies was proposed and shown to achieve the capacity of the dirty paper channel....

    [...]

  • ...We follow [4] for a brief review of the transmitter and receiver structure in the lattice DPC method [3]....

    [...]

  • ...The lattice transmission approach of [3] [4] is as follows....

    [...]

  • ...Lattice-based ideas for DPC were suggested and shown to be capacity-approaching in [2], [3]....

    [...]

Journal ArticleDOI
TL;DR: Trellis shaping, a method of selecting a minimum-weight sequence from an equivalence class of possible transmitted sequences by a search through the trellis diagram of a shaping convolutional code C/sub s/.
Abstract: The author discusses trellis shaping, a method of selecting a minimum-weight sequence from an equivalence class of possible transmitted sequences by a search through the trellis diagram of a shaping convolutional code C/sub s/. Shaping gains on the order of 1 dB may be obtained with simple four-state shaping codes and with moderate constellation expansion. The shaping gains obtained with more complicated codes approach the ultimate shaping gain of 1.53 dB. With a feedback-free syndrome-former for C/sub s/, transmitted data can be recovered without catastrophic error propagation. Constellation expansion and peak-to-average energy ratio may be effectively limited by peak constraints. With lattice-theoretic constellations, the shaping operation may be characterized as a decoding of an initial sequence in a channel trellis code by a minimum-distance decoder for a shaping trellis code based on the shaping convolutional code, and the set of possible transmitted sequences is then the set of code sequences in the channel trellis code that lie in the Voronoi region of the trellis shaping code. >

419 citations


"Dirty paper coding using sign-bit s..." refers methods in this paper

  • ...A part of the message m′ = [m1 m2 · · ·mk′ ] with k′ < k bits is mapped to a coset leader of the convolutional code using an inverse syndrome former [10]....

    [...]

  • ...The proposed scheme uses a convolutional code for signbit shaping [10] and low density parity check (LDPC) codes for channel coding....

    [...]

  • ...The minimization in (6) is implemented using the Viterbi algorithm [10]....

    [...]

Journal ArticleDOI
TL;DR: This work designs an end-to-end coding realization of a system materializing a significant portion of the promised gains and achieves an improvement of 2dB over the best scalar quantization scheme.
Abstract: The "writing on dirty paper"-channel model offers an information-theoretic framework for precoding techniques for canceling arbitrary interference known at the transmitter. It indicates that lossless precoding is theoretically possible at any signal-to-noise ratio (SNR), and thus dirty-paper coding may serve as a basic building block in both single-user and multiuser communication systems. We design an end-to-end coding realization of a system materializing a significant portion of the promised gains. We employ multidimensional quantization based on trellis shaping at the transmitter. Coset decoding is implemented at the receiver using "virtual bits." Combined with iterative decoding of capacity-approaching codes we achieve an improvement of 2dB over the best scalar quantization scheme. Code design is done using the EXIT chart technique.

337 citations


"Dirty paper coding using sign-bit s..." refers background or methods in this paper

  • ...Recently, many designs of lattice-based DPC schemes have been proposed in [4]–[8]....

    [...]

  • ...Lower bounds on achievable rates for the above equivalent channel is shown in [4] to be equal to I (V;Y′) ≥ 1 2 log2 (1 + SNR) − 1 2 log2 (2πeG (Λ)) ....

    [...]

  • ...The demapper function at the receiver has to calculate LLRs taking into account the modulo M operation at the encoder [4]....

    [...]

  • ...The lattice transmission approach of [3] [4] is as follows....

    [...]

  • ...We follow [4] for a brief review of the transmitter and receiver structure in the lattice DPC method [3]....

    [...]

Frequently Asked Questions (18)
Q1. What are the contributions in "Dirty paper coding using sign-bit shaping and ldpc codes" ?

In most of the reported designs, either the encoder works on a joint trellis of shaping and channel codes or the decoder requires iterations between the shaping and channel decoders. In this work, the authors present a lattice-based DPC scheme that provides good shaping and coding gains with moderate complexity at both the encoder and the decoder. This provides gains without the need for iterations between the shaping and channel decoders. As an application of the proposed DPC method, the authors show a design for superposition coding that provides rates better than time-sharing over a Gaussian broadcast channel. 

Optimizing the LDPC code using genetic algorithms and asymmetric density evolution [ 12 ] along with joint optimization of shaping code and LDPC code using EXIT charts [ 8 ] are topics for future work. 

The SNR for Receiver 1 is computed as 10 log10 ( PX1PX2+PN1) = 19.1791 dB. SinceDPC is done for User 2, the effective SNR at Receiver 2 is computed as 10 log10 ( PX2 PN2 ) = 19.4574 dB. 

In a Gaussian dirty paper channel, the received symbolvector Y = [Y1 Y2 · · ·Yn] is modeled as Y = X + S + N,where X = [X1 X2 · · ·Xn] denotes the transmitted vector, S = [S1 S2 · · ·Sn] denotes the interfering vector assumed to be known non-causally at the transmitter and N denotes the additive Gaussian noise vector. 

The bits that map to the i-th symbol are denoted zia2ia3i · · · ali; the sign-bit vector is denoted z = [z1 z2 · · · zs], and the authors define vectors aj = [aj1 aj2 · · · ajs] for 2 ≤ j ≤ l. 

Simulation results show that the proposed design performs 1.46dB away from the dirty paper capacity for a block length of n = 40000 at the rate of 3 bits/channel use. 

The granular gain G(Λ) = 22R/6Sx is computed from the simulations to be 1.282dB [4], where R = 3.5 is the rate before channel coding, and Sx is the transmit power (obtained through simulations). 

Let m′′ = [z mk′+1 · · ·mk] be input to the systematic LDPC encoder to obtain the codeword E(m′′) = [m′′ pT ], where pT is the parity-bit vector for the T -th block. 

The interfering vector S is used as an input in the encoding process and plays an important role to determine a suitable transmit vector X. A coding strategy for choosing X needs to overcome the imminent addition of S and protect the transmitted information from the addition of the noise N. Such coding strategies are called dirty paper coding (DPC) methods. 

Because of the one-codeword delay, parity bits of the T + 1-th block and message plus shaped bits of the T -th block form a valid LDPC codeword. 

1. The mapping in Fig. 1 is suited for signbit shaping, since a flip of the most significant bit results in a significant change in symbol value for all possible 4-bit inputs. 

The transmit power is assumed to be upper-bounded by 1nE[|X|2] ≤ PX per symbol, and the interference power is denoted 1nE[|S|2] = PS per symbol. 

In [1], Costa shows that the capacity of the dirty paper channel is 12 log ( 1 + PXPN ) i.e. known interference can be canceled perfectly at the transmitter. 

The total transmit power, power for User 1 and power for User 2 required for a bit error rate of 10−5 (at both receivers) are estimated from the simulation and denoted P , Px1 and PX2 , respectively. 

At the receiver, the authors approximate pi usinga Gaussian distribution with variance PS assuming that the distribution of M -PAM symbols is approximately Gaussian. 

The authors use the proposed scheme for superposition coding in a two-user Gaussian broadcast channel Y1 = X + N1 and Y2 = X + N2 with PN1 > PN2 . 

The number of replications r is chosen so that the average power of AR is approximately equal to the total average power PX + PS , and the bit mapping of the symbol a + jM (a ∈ A, 1 ≤ j ≤ r) is the same as that for a. 

The s = nlog2M LLRs of the sign bits after a delay on one time step, and then−s output LLRs of the de-interleaver are given as the input to the LDPC decoder.